/system/bt/hci/include/ |
H A D | hci_inject.h | 28 bool (*open)(const hci_t *hci_interface); member in struct:hci_inject_t
|
/system/security/keystore/ |
H A D | entropy.h | 27 bool open();
|
H A D | entropy.cpp | 37 bool Entropy::open() { function in class:Entropy 39 mRandom = TEMP_FAILURE_RETRY(::open(randomDevice, O_RDONLY)); 41 ALOGE("open: %s: %s", randomDevice, strerror(errno));
|
/system/extras/tests/cpueater/ |
H A D | cpueater.c | 51 open("/dev/null", 0); 53 if(open("/dev/null", O_WRONLY) < 0) {
|
H A D | daemonize.c | 43 close(0); open("/dev/null", 0); 72 if(open(file, O_WRONLY|mode|O_CREAT, 0666) < 0) { 78 if(open("/dev/null", O_WRONLY) < 0) {
|
/system/vold/ |
H A D | BenchmarkGen.h | 42 int t3433f17 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 53 int t3433f18 = TEMP_FAILURE_RETRY(open("file1", O_RDONLY|O_LARGEFILE)); 61 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 71 t3433f18 = TEMP_FAILURE_RETRY(open("file2", O_RDONLY|O_LARGEFILE)); 79 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 89 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 99 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 109 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 119 t3433f18 = TEMP_FAILURE_RETRY(open("file0", O_RDONLY|O_LARGEFILE)); 129 t3433f18 = TEMP_FAILURE_RETRY(open("file [all...] |
/system/connectivity/shill/shims/ |
H A D | nfqueue-seccomp-amd64.policy | 16 open: return 1
|
H A D | nfqueue-seccomp-mips.policy | 18 # open: return EPERM 19 open: return 1
|
H A D | nfqueue-seccomp-x86.policy | 19 # open: return EPERM 20 open: return 1
|
H A D | nfqueue-seccomp-arm.policy | 19 # open: return EPERM 20 open: return 1
|
/system/core/base/include/android-base/ |
H A D | utf8.h | 24 #include <fcntl.h> // open 62 // // anonymous namespace to avoid conflict with existing open(), unlink(), etc. 68 // int fd = open(name, ...); // Calls android::base::utf8::open(). 76 int open(const char* name, int flags, ...); 79 using ::open;
|
/system/ca-certificates/google/ |
H A D | extract_from_pem.py | 37 with open(file_path) as existing_file: 43 with open(file_path, 'w') as new_file: 73 with open(args.pem_file) as pem_file: 83 with open(args.timestamp_file, 'w') as timestamp_file:
|
/system/core/toolbox/upstream-netbsd/bin/dd/ |
H A D | dd_hostops.c | 43 .op_open = open,
|
/system/sepolicy/ |
H A D | isolated_app.te | 15 # Access already open app data files received over Binder or local socket IPC. 33 # Do not allow isolated_app to directly open tun_device 34 neverallow isolated_app tun_device:chr_file open; 40 # Isolated apps should not directly open app data files themselves. 41 neverallow isolated_app app_data_file:file open; 46 neverallow isolated_app anr_data_file:file ~{ open append };
|
/system/bt/osi/src/ |
H A D | osi.c | 36 int rand_fd = open(RANDOM_PATH, O_RDONLY); 39 LOG_ERROR(LOG_TAG, "%s can't open rand fd %s: %s ", __func__, RANDOM_PATH,
|
/system/core/libcutils/ |
H A D | load_file.c | 29 fd = open(fn, O_RDONLY);
|
H A D | sched_policy.c | 59 // File descriptors open to /dev/cpuctl/../tasks, setup by initialize, or -1 on error. 64 // File descriptors open to /dev/cpuset/../tasks, setup by initialize, or -1 on error 114 fg_cgroup_fd = open(filename, O_WRONLY | O_CLOEXEC); 116 SLOGE("open of %s failed: %s\n", filename, strerror(errno)); 120 bg_cgroup_fd = open(filename, O_WRONLY | O_CLOEXEC); 122 SLOGE("open of %s failed: %s\n", filename, strerror(errno)); 132 fg_cpuset_fd = open(filename, O_WRONLY | O_CLOEXEC); 134 bg_cpuset_fd = open(filename, O_WRONLY | O_CLOEXEC); 136 system_bg_cpuset_fd = open(filename, O_WRONLY | O_CLOEXEC); 138 ta_cpuset_fd = open(filenam [all...] |
H A D | klog.c | 43 klog_fd = open("/dev/kmsg", O_WRONLY | O_CLOEXEC); 50 klog_fd = open(name, O_WRONLY | O_CLOEXEC);
|
/system/core/trusty/gatekeeper/ |
H A D | module.cpp | 42 .open = trusty_gatekeeper_open,
|
/system/extras/tests/workloads/ |
H A D | atrace-uncompress.py | 14 infile = open(sys.argv[1], "rb")
|
/system/core/init/ |
H A D | grab-bootchart.sh | 21 gnome-open ${TARBALL%.tgz}.png
|
/system/core/libdiskconfig/ |
H A D | diskutils.c | 45 if ((src_fd = open(src, O_RDONLY)) < 0) { 46 ALOGE("Could not open %s for reading (errno=%d).", src, errno); 51 if ((dst_fd = open(dst, O_RDWR)) < 0) { 52 ALOGE("Could not open '%s' for read/write (errno=%d).", dst, errno);
|
/system/core/libsparse/ |
H A D | img2simg.c | 72 in = open(argv[1], O_RDONLY | O_BINARY); 74 fprintf(stderr, "Cannot open input file %s\n", argv[1]); 82 out = open(argv[2], O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, 0664); 84 fprintf(stderr, "Cannot open output file %s\n", argv[2]);
|
H A D | simg2img.c | 50 out = open(argv[argc - 1], O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, 0664); 52 fprintf(stderr, "Cannot open output file %s\n", argv[argc - 1]); 60 in = open(argv[i], O_RDONLY | O_BINARY); 62 fprintf(stderr, "Cannot open input file %s\n", argv[i]);
|
/system/tpm/attestation/server/ |
H A D | attestationd-seccomp-amd64.policy | 46 open: 1
|