/system/core/liblog/ |
D | event_tag_map.cpp | 138 for (size_t which = 0; which < NUM_MAPS; ++which) { in ~EventTagMap() local 139 if (mapAddr[which]) { in ~EventTagMap() 140 munmap(mapAddr[which], mapLen[which]); in ~EventTagMap() 141 mapAddr[which] = 0; in ~EventTagMap() 350 static int parseMapLines(EventTagMap* map, size_t which) { in parseMapLines() argument 351 const char* cp = static_cast<char*>(map->mapAddr[which]); in parseMapLines() 352 size_t len = map->mapLen[which]; in parseMapLines() 359 which, len); in parseMapLines() 361 if (which) { // do not propagate errors for other files in parseMapLines() 381 if (!which || (errno != EMLINK)) { in parseMapLines() [all …]
|
/system/nvram/messages/tests/ |
D | nvram_messages_test.cpp | 44 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 69 EXPECT_EQ(COMMAND_GET_INFO, decoded.payload.which()); in TEST() 101 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 126 EXPECT_EQ(COMMAND_CREATE_SPACE, decoded.payload.which()); in TEST() 139 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 163 EXPECT_EQ(COMMAND_GET_SPACE_INFO, decoded.payload.which()); in TEST() 189 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 210 EXPECT_EQ(COMMAND_DELETE_SPACE, decoded.payload.which()); in TEST() 221 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() 234 EXPECT_EQ(COMMAND_DISABLE_CREATE, decoded.payload.which()); in TEST() [all …]
|
/system/core/libcutils/ |
D | fs_config.cpp | 220 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument 231 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 237 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY | O_BINARY)); in fs_config_open() 292 size_t which, plen; in fs_config() local 300 for (which = 0; which < (sizeof(conf) / sizeof(conf[0])); ++which) { in fs_config() 303 int fd = fs_config_open(dir, which, target_out_path); in fs_config() 311 ALOGE("%s len is corrupted", conf[which][dir]); in fs_config() 316 ALOGE("%s out of memory", conf[which][dir]); in fs_config() 321 ALOGE("%s prefix is truncated", conf[which][dir]); in fs_config() 327 ALOGE("%s is corrupted", conf[which][dir]); in fs_config()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 25 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/bt/build/toolchain/clang/ |
D | get_clang_suffix.py | 6 def which(cmd): function 14 clang_path = which("clang++") 35 clang_path = which("clang++-" + clang_version_str)
|
/system/bt/build/ |
D | install_deps.sh | 7 clang_path=`which clang` 25 clang_path=`which clang-$clang_version` 51 gn_path=`which gn`
|
/system/sepolicy/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
D | halserverdomain.te | 2 ### Rules for all domains which offer a HAL service over HwBinder
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | dexoptanalyzer.te | 5 # Reading an APK opens a ZipArchive, which unpack to tmpfs. 6 # Use tmpfs_domain() which will give tmpfs files created by dexoptanalyzer their 7 # own label, which differs from other labels created by other processes. 29 # Allow testing /data/user/0 which symlinks to /data/data
|
/system/timezone/input_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/input_tools/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/timezone/output_data/iana/ |
D | NOTICE | 3 newstrftime.3, and strftime.c, which contain material derived from BSD 4 and which use the BSD 3-clause license.
|
/system/update_engine/ |
D | pylintrc | 51 # optimizer, which will apply various small optimizations. For instance, it can 115 # Python expression which should return a note less than 10 (10 is the highest 116 # note). You have access to the variables errors warning, statement which 148 # List of module names for which member attributes should not be checked 154 # List of classes names for which member attributes should not be checked 159 # List of members which are set dynamically and missed by pylint inference 205 # List of strings which can identify a callback function by name. A callback 265 # Good variable names which should always be accepted, separated by a comma 268 # Bad variable names which should always be refused, separated by a comma 278 # Regular expression which should only match correct function names. [all …]
|
/system/bt/doc/ |
D | power_management.md | 24 Each of these correspond to a function name in `bta/sys/bta_sys_conn.cc`, which 33 well, which filters down through the same status function. 39 connection is up which specifies it is willing to go into SNIFF, but its action 44 The tables that determine which power levels are acceptable for which profiles 51 the `spec_idx` field to index into `bta_dm_pm_spec` array to determine which 66 level specifies a set of parameters for the SNIFF mode which relate to the 73 timeout is possible to be set, which effectively allows a power operation to 135 which calls `BTM_ReadPowerMode` and `BTM_SetPowerMode` to make an HCI 139 called, which makes various calls to `BTM_ReadLocalFeatures`, 143 is made, which calls `BTM_SetPowerMode` to set the link into ACTIVE [all …]
|
/system/netd/server/ |
D | InterfaceController.cpp | 144 const char *family, const char *which, const char *interface, const char *parameter) { in getParameterPathname() argument 148 } else if (!isNormalPathComponent(which) || in getParameterPathname() 155 return StringPrintf("%s/%s/%s/%s/%s", proc_net_path, family, which, interface, parameter); in getParameterPathname() 362 const char *family, const char *which, const char *interface, const char *parameter, in getParameter() argument 364 const std::string path(getParameterPathname(family, which, interface, parameter)); in getParameter() 372 const char *family, const char *which, const char *interface, const char *parameter, in setParameter() argument 374 const std::string path(getParameterPathname(family, which, interface, parameter)); in setParameter()
|
D | InterfaceController.h | 50 const char *family, const char *which, const char *interface, const char *parameter, 53 const char *family, const char *which, const char *interface, const char *parameter,
|
/system/media/camera/docs/ |
D | metadata-check-dependencies | 25 if ! which port >& /dev/null 29 elif [[ "$OSTYPE" == "linux-gnu" ]] && which apt-get >& /dev/null
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | attributes | 81 # services which should be available to all but isolated apps 84 # services which should be available to all ephemeral apps 87 # services which export only system_api 145 # All vendor domains which violate the requirement of not using Binder 150 # All vendor domains which violate the requirement of not using sockets for 156 # All vendor domains which violate the requirement of not executing 162 # All domains which violate the requirement of not sharing files by path 168 # All system domains which violate the requirement of not executing vendor 174 # All system domains which violate the requirement of not writing vendor 308 # which contains clients of this service.
|
D | mediaprovider.te | 2 ### A domain for android.process.media, which contains both
|
/system/sepolicy/public/ |
D | attributes | 81 # services which should be available to all but isolated apps 84 # services which should be available to all ephemeral apps 87 # services which export only system_api 145 # All vendor domains which violate the requirement of not using Binder 150 # All vendor domains which violate the requirement of not using sockets for 156 # All vendor domains which violate the requirement of not executing 162 # All domains which violate the requirement of not sharing files by path 168 # All system domains which violate the requirement of not executing vendor 174 # All system domains which violate the requirement of not writing vendor 308 # which contains clients of this service.
|
D | mediaprovider.te | 2 ### A domain for android.process.media, which contains both
|
/system/netd/server/dns/ |
D | README.md | 20 `DnsTlsSocket`, which happen on a different thread. 30 know anything about which queries correspond to which responses, and does not retain 53 from its thread, and the loop thread (which owns the SSL socket) 84 which could happen as a result of malfunctioning authoritative DNS servers. 108 `DnsTlsSocket` (which requires `CAP_NET_ADMIN` because it uses `setsockopt(SO_MARK)`) and 109 `DnsTlsSessionCache` (which requires integration with libssl). These classes are 121 which in production is a `DnsTlsSocketFactory`. However, in unit tests, we can
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | attributes | 70 # services which should be available to all but isolated apps 73 # services which should be available to all ephemeral apps 76 # services which export only system_api 133 # All vendor domains which violate the requirement of not using Binder 137 # All vendor domains which violate the requirement of not using sockets for 142 # All vendor domains which violate the requirement of not executing 288 # which contains clients of this service.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | mediaprovider.te | 2 ### A domain for android.process.media, which contains both
|