/system/tpm/trunks/ |
H A D | resource_manager.cc | 45 void Enable(bool* target) { argument 46 target_ = target;
|
H A D | trunks_factory_for_test.cc | 41 // Forwards all calls to a target instance. 44 explicit TpmStateForwarder(TpmState* target) : target_(target) {} argument 119 // Forwards all calls to a target instance. 122 explicit TpmUtilityForwarder(TpmUtility* target) : target_(target) {} argument 353 // Forwards all calls to a target instance. 356 explicit AuthorizationDelegateForwarder(AuthorizationDelegate* target) argument 357 : target_(target) {} 388 // Forwards all calls to a target instanc 391 SessionManagerForwarder(SessionManager* target) argument 418 HmacSessionForwarder(HmacSession* target) argument 453 PolicySessionForwarder(PolicySession* target) argument 503 BlobParserForwarder(BlobParser* target) argument [all...] |
/system/update_engine/payload_generator/ |
H A D | payload_generation_config.h | 71 // target image. 134 // in the delta_generator and the one supported by the target. 146 // Image information about the new image that's the target of this payload. 147 ImageConfig target; member in struct:chromeos_update_engine::PayloadGenerationConfig 160 // filesystem in either source or target version, since there is some space
|
/system/vold/ |
H A D | Utils.cpp | 177 status_t BindMount(const std::string& source, const std::string& target) { argument 178 if (::mount(source.c_str(), target.c_str(), "", MS_BIND, NULL)) { 179 PLOG(ERROR) << "Failed to bind mount " << source << " to " << target; local
|
H A D | VolumeManager.cpp | 428 std::string target(StringPrintf("/mnt/user/%d/primary", userId)); 429 if (TEMP_FAILURE_RETRY(unlink(target.c_str()))) { 431 SLOGW("Failed to unlink %s: %s", target.c_str(), strerror(errno)); 434 LOG(DEBUG) << "Linking " << source << " to " << target; local 435 if (TEMP_FAILURE_RETRY(symlink(source.c_str(), target.c_str()))) { 436 SLOGW("Failed to link %s to %s: %s", source.c_str(), target.c_str(),
|
/system/vold/fs/ |
H A D | Ext4.cpp | 67 status_t Check(const std::string& source, const std::string& target) { argument 72 const char* c_target = target.c_str(); 129 status_t Mount(const std::string& source, const std::string& target, bool ro, argument 135 const char* c_target = target.c_str(); 165 const std::string& target) { 171 cmd.push_back(target); 164 Format(const std::string& source, unsigned long numSectors, const std::string& target) argument
|
H A D | F2fs.cpp | 53 status_t Mount(const std::string& source, const std::string& target) { argument 55 const char* c_target = target.c_str();
|
H A D | Vfat.cpp | 126 status_t Mount(const std::string& source, const std::string& target, bool ro, argument 134 const char* c_target = target.c_str();
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 140 fprintf(stderr, "target type %s does not exist\n", t); 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local 244 {"target", required_argument, NULL, 't'}, 257 target = optarg; 273 if (!source || !target || !class || !perm || !policy) 282 match = check_rule(source, target, class, perm, &policydb);
|
/system/gatekeeper/ |
H A D | gatekeeper_messages.cpp | 49 SizedBuffer *target) { 50 if (*buffer + sizeof(target->length) > end) return ERROR_INVALID; 52 memcpy(&target->length, *buffer, sizeof(target->length)); 53 *buffer += sizeof(target->length); 54 if (target->length != 0) { 55 const uint8_t *buffer_end = *buffer + target->length; 58 target->buffer.reset(new uint8_t[target->length]); 59 memcpy(target 48 read_from_buffer(const uint8_t **buffer, const uint8_t *end, SizedBuffer *target) argument [all...] |
/system/netd/client/ |
H A D | NetdClient.cpp | 111 int setNetworkForTarget(unsigned netId, std::atomic_uint* target) { argument 113 *target = netId; 130 *target = netId;
|
/system/netd/server/ |
H A D | CommandListener.cpp | 161 static void createChildChains(IptablesTarget target, const char* table, const char* parentChain, argument 173 execIptablesSilently(target, "-t", table, "-D", parentChain, "-j", *childChain, NULL); 174 execIptablesSilently(target, "-t", table, "-F", *childChain, NULL); 175 execIptablesSilently(target, "-t", table, "-X", *childChain, NULL); 176 execIptables(target, "-t", table, "-N", *childChain, NULL); 177 execIptables(target, "-t", table, "-A", parentChain, "-j", *childChain, NULL);
|
H A D | FirewallController.cpp | 173 IptablesTarget target = V4; local 175 target = V6; 186 res |= execIptables(target, op, LOCAL_INPUT, "-d", addr, "-j", "RETURN", NULL); 187 res |= execIptables(target, op, LOCAL_OUTPUT, "-s", addr, "-j", "RETURN", NULL); 198 IptablesTarget target = V4; local 200 target = V6; 217 res |= execIptables(target, op, LOCAL_INPUT, "-s", addr, "-p", protocolStr, 219 res |= execIptables(target, op, LOCAL_OUTPUT, "-d", addr, "-p", protocolStr, 244 const char* target; local 247 target 298 makeUidRules(IptablesTarget target, const char *name, bool isWhitelist, const std::vector<int32_t>& uids) argument [all...] |
H A D | IptablesBaseTest.cpp | 43 int IptablesBaseTest::fakeExecIptables(IptablesTarget target, ...) { argument 46 va_start(args, target); 56 if (target == V4 || target == V4V6) { 59 if (target == V6 || target == V4V6) { 66 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { argument 67 sRestoreCmds.push_back({ target, commands }); 71 int IptablesBaseTest::expectIptablesCommand(IptablesTarget target, int pos, argument 80 if (target 101 auto target = expectedCmds[i].first; local [all...] |
H A D | NetdConstants.cpp | 73 static int execIptables(IptablesTarget target, bool silent, va_list args) { argument 95 if (target == V4 || target == V4V6) { 99 if (target == V6 || target == V4V6) { 106 int execIptables(IptablesTarget target, ...) { argument 108 va_start(args, target); 109 int res = execIptables(target, false, args); 114 int execIptablesSilently(IptablesTarget target, ...) { argument 116 va_start(args, target); 148 execIptablesRestore(IptablesTarget target, const std::string& commands) argument [all...] |
/system/extras/mmap-perf/ |
H A D | mmapPerf.cpp | 38 uint64_t *target = (uint64_t*)ptr; local 40 *target = seed ^ (uint64_t)(uintptr_t)target; 42 target++;
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/ |
H A D | perf.h | 169 struct perf_target target; member in struct:perf_record_opts
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/ |
H A D | perf.h | 205 #include "util/target.h" 214 struct perf_target target; member in struct:perf_record_opts
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/ |
H A D | target.h | 44 enum perf_target_errno perf_target__validate(struct perf_target *target); 45 enum perf_target_errno perf_target__parse_uid(struct perf_target *target); 47 int perf_target__strerror(struct perf_target *target, int errnum, char *buf, 50 static inline bool perf_target__has_task(struct perf_target *target) argument 52 return target->tid || target->pid || target->uid_str; 55 static inline bool perf_target__has_cpu(struct perf_target *target) argument 57 return target->system_wide || target 60 perf_target__none(struct perf_target *target) argument [all...] |
/system/extras/verity/ |
H A D | BootSignature.java | 57 * target CHARACTER STRING, 69 private DERPrintableString target; field in class:BootSignature 78 * @param target Target name, included in the signed data 81 public BootSignature(String target, int length) { argument 83 this.target = new DERPrintableString(target); 114 target = (DERPrintableString) attrs.getObjectAt(0); 122 attrs.add(target); 221 public static void doSignature( String target, argument 239 BootSignature bootsig = new BootSignature(target, imag [all...] |
H A D | verify_boot_signature.c | 44 ASN1_STRING *target; member in struct:__anon1771 49 ASN1_SIMPLE(AuthAttrs, target, ASN1_PRINTABLE),
|
/system/core/adb/ |
H A D | line_printer.cpp | 92 SMALL_RECT target = { local 104 WriteConsoleOutput(console_, &char_data[0], buf_size, zero_zero, &target);
|
/system/core/crash_reporter/ |
H A D | crash_collector.cc | 240 FilePath *target) { 265 *target = FilePath(buffer.data()); 271 FilePath target; local 274 if (!GetSymlinkTarget(exe_path, &target)) { 291 *base_name = target.BaseName().value(); 239 GetSymlinkTarget(const FilePath &symlink, FilePath *target) argument
|
/system/core/fs_mgr/ |
H A D | fs_mgr.c | 96 static void check_fs(char *blk_device, char *fs_type, char *target) argument 129 ret = mount(blk_device, target, fs_type, tmpmnt_flags, tmpmnt_opts); 131 __func__, blk_device, target, fs_type, ret, strerror(errno)); 137 int result = umount(target); 139 INFO("%s(): unmount(%s) succeeded\n", __func__, target); 142 ERROR("%s(): umount(%s)=%d: %s\n", __func__, target, result, strerror(errno)); 224 static int __mount(const char *source, const char *target, const struct fstab_rec *rec) argument 234 if (!lstat(target, &info)) 236 unlink(target); 237 mkdir(target, 075 [all...] |
/system/core/init/ |
H A D | builtins.cpp | 375 const char *source, *target, *system; local 401 target = args[3].c_str(); 413 if (mount(tmp, target, system, flags, options) < 0) { 442 if (mount(tmp, target, system, flags, options) < 0) { 462 if (mount(source, target, system, flags, options) < 0) { 669 ERROR("powerctl: unrecognized reboot target '%s'\n", &command[len]);
|