/system/media/camera/docs/ |
H A D | CameraCharacteristicsKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CameraCharacteristics', xml_kind='static'" />
|
H A D | CaptureRequestKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
|
H A D | CaptureResultKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureResult', xml_kind='dynamic'" />
|
H A D | metadata-parser-sanity-check | 7 # you may not use this file except in compliance with the License. 34 local file="$1" 36 results="$(python "$file" 2>&1)" 41 echo "FAILED: Unit tests $file" 43 echo "SUCCESS: Unit tests $file"
|
/system/extras/tests/sdcard/ |
H A D | profile_sdcard.sh | 5 # you may not use this file except in compliance with the License. 32 local file="/tmp/sdcard-scalability.txt" 33 rm -f ${file} 34 echo "# Scalability tests" | tee -a ${file} 35 echo "# Kernel: $(print_kernel)" | tee -a ${file} 36 echo "# Sched features: $(print_sched_features)" | tee -a ${file} 37 echo "# StopWatch scalability total/cumulative duration 0.0 Samples: 1" | tee -a ${file} 38 echo "# Process Time" | tee -a ${file} 42 echo "$p $t" | tee -a ${file}
|
/system/core/debuggerd/libdebuggerd/test/ |
H A D | open_files_list_test.cpp | 5 * you may not use this file except in compliance with the License. 30 // that it includes a known open file. 32 // Open a temporary file that we can check for in the list of open files. 39 // Verify our open file is in the list. 41 for (auto& file : list) { 42 if (file.first == tf.fd) { 43 EXPECT_EQ(file.second, std::string(tf.path));
|
/system/sepolicy/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 39 allow untrusted_app_25 proc_misc:file r_file_perms; 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | isolated_app.te | 4 ### This file defines the rules for isolated apps. An "isolated 14 allow isolated_app app_data_file:file { append read write getattr lock }; 27 # b/32896414: Allow accessing sdcard file descriptors passed to isolated_apps 34 allow isolated_app { sdcard_type media_rw_data_file }:file { read write append getattr lock }; 35 auditallow isolated_app { sdcard_type media_rw_data_file }:file { write append }; 47 allow isolated_app webview_zygote_tmpfs:file read; 57 neverallow isolated_app app_data_file:file open; 60 # TODO: are there situations where isolated_apps write to this file? 62 neverallow isolated_app anr_data_file:file ~{ open append }; 80 neverallow isolated_app cache_file:file ~{ rea [all...] |
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 47 allow untrusted_app_all system_app_data_file:file { read write getattr }; 56 allow untrusted_app_all media_rw_data_file:file create_file_perms; 84 allow untrusted_app_all perfprofd_data_file:file r_file_perms; 93 allow untrusted_app_all sysfs_hwrandom:file r_file_perm [all...] |
H A D | system_app.te | 16 allow system_app system_app_data_file:{ file lnk_file } create_file_perms; 20 allow system_app misc_user_data_file:file create_file_perms; 25 # Read wallpaper file. 26 allow system_app wallpaper_file:file r_file_perms; 28 # Read icon file. 29 allow system_app icon_file:file r_file_perms; 49 allow system_app anr_data_file:file create_file_perms; 52 allow system_app asec_apk_file:file r_file_perms;
|
H A D | system_server.te | 16 allow system_server zygote_tmpfs:file read; 20 allow system_server dalvikcache_data_file:file { r_file_perms execute }; 22 # Report dalvikcache_data_file:file execute violations. 23 auditallow system_server dalvikcache_data_file:file execute; 27 allow system_server resourcecache_data_file:file r_file_perms; 33 # Read and delete last_reboot_reason file 34 allow system_server reboot_data_file:file { rename r_file_perms unlink }; 46 allow system_server zygote_exec:file r_file_perms; 90 allow system_server config_gz:file { read open }; 121 allow system_server qtaguid_proc:file rw_file_perm [all...] |
H A D | ephemeral_app.te | 4 ### This file defines the security policy for apps with the ephemeral 20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append}; 40 neverallow ephemeral_app app_data_file:file { execute execute_no_trans }; 50 neverallow ephemeral_app debugfs:file read; 56 neverallow ephemeral_app sysfs:file *; 60 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms }; 63 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create}; 68 neverallow ephemeral_app proc_net:file no_rw_file_perms;
|
H A D | priv_app.te | 22 allow priv_app app_data_file:file execute; 44 allow priv_app { cache_file cache_recovery_file }:file create_file_perms; 50 allow priv_app ota_package_file:file create_file_perms; 54 allow priv_app media_rw_data_file:file create_file_perms; 58 allow priv_app shell_data_file:file r_file_perms; 63 allow priv_app { apk_tmp_file apk_private_tmp_file }:file r_file_perms; 66 allow priv_app anr_data_file:file r_file_perms; 72 allow priv_app perfprofd_data_file:file r_file_perms; 86 allow priv_app config_gz:file { open read getattr }; 100 allow priv_app ringtone_file:file { getatt [all...] |
H A D | adbd.te | 28 allow adbd functionfs:file rw_file_perms; 35 allow adbd shell_data_file:file create_file_perms; 39 allow adbd profman_dump_data_file:file r_file_perms; 46 allow adbd sdcard_type:file create_file_perms; 50 allow adbd anr_data_file:file r_file_perms; 64 allow adbd system_file:file rx_file_perms; 80 allow adbd adb_keys_file:file r_file_perms; 87 allow adbd adb_data_file:file create_file_perms; 96 allow adbd zygote_exec:file r_file_perms; 97 allow adbd system_file:file r_file_perm [all...] |
H A D | platform_app.te | 16 allow platform_app shell_data_file:file { open getattr read }; 17 allow platform_app icon_file:file { open getattr read }; 21 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms; 25 allow platform_app asec_apk_file:file create_file_perms; 29 allow platform_app media_rw_data_file:file create_file_perms; 33 allow platform_app cache_file:file create_file_perms; 39 allow platform_app vfat:file create_file_perms; 58 allow platform_app preloads_data_file:file r_file_perms; 60 allow platform_app preloads_media_file:file r_file_perms;
|
/system/update_engine/payload_generator/ |
H A D | raw_filesystem.cc | 5 // you may not use this file except in compliance with the License. 46 File file; local 47 file.name = filename_; 48 file.extents = { ExtentForRange(0, block_count_) }; 49 files->push_back(file);
|
H A D | fake_filesystem.cc | 5 // you may not use this file except in compliance with the License. 43 File file; local 44 file.name = filename; 45 file.extents = extents; 50 files_.push_back(file);
|
H A D | ext2_filesystem.cc | 5 // you may not use this file except in compliance with the License. 115 // Append this file to the output. If the file has a hard link, it will be 117 // help identify all the versions of the same file. 191 File& file = inodes[it_ino]; local 193 file.name = "<group-descriptors>"; 195 file.name = base::StringPrintf("<inode-%u>", it_ino); 198 memset(&file.file_stat, 0, sizeof(file.file_stat)); 199 file [all...] |
/system/extras/perfprofd/quipper/base/ |
H A D | logging.cc | 60 LogMessage::LogMessage(const char* file, int line, LogSeverity severity) argument 61 : severity_(severity), file_(file), line_(line) { 62 Init(file, line); 65 LogMessage::LogMessage(const char* file, int line, std::string* result) argument 66 : severity_(LOG_FATAL), file_(file), line_(line) { 67 Init(file, line); 72 LogMessage::LogMessage(const char* file, int line, LogSeverity severity, argument 74 : severity_(severity), file_(file), line_(line) { 75 Init(file, line); 107 void LogMessage::Init(const char* /* file */, in [all...] |
/system/core/libnativebridge/tests/ |
H A D | Android.mk | 37 $(foreach file,$(test_src_files), \ 41 $(eval LOCAL_SRC_FILES := $(file)) \ 42 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \ 46 $(foreach file,$(test_src_files), \ 50 $(eval LOCAL_SRC_FILES := $(file)) \ 51 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \
|
/system/vold/ |
H A D | Loop.h | 5 * you may not use this file except in compliance with the License. 33 static int create(const std::string& file, std::string& out_device); 36 static int createImageFile(const char *file, unsigned long numSectors); 37 static int resizeImageFile(const char *file, unsigned long numSectors);
|
/system/extras/tests/cpueater/ |
H A D | daemonize.c | 5 * you may not use this file except in compliance with the License. 36 char *file = 0; local 53 file = *argv; 55 file = *++argv; 71 if (file) { 72 if(open(file, O_WRONLY|mode|O_CREAT, 0666) < 0) { 73 perror(file);
|
/system/libhidl/base/ |
H A D | HidlInternal.cpp | 5 * you may not use this file except in compliance with the License. 91 struct dirent *file; local 92 while ((file = readdir(dir)) != NULL) { 93 if (!isInstrumentationLib(file)) 96 void *handle = dlopen((path + file->d_name).c_str(), RTLD_NOW); 99 LOG(WARNING) << "couldn't load file: " << file->d_name 136 << file->d_name; 147 bool HidlInstrumentor::isInstrumentationLib(const dirent *file) { argument 149 if (file [all...] |
/system/bt/conf/ |
H A D | Android.mk | 5 # Bluetooth bt_stack.conf config file 15 # Bluetooth bt_did.conf config file
|
/system/bt/embdrv/sbc/decoder/include/ |
H A D | oi_assert.h | 8 * you may not use this file except in compliance with the License. 22 /** @file 23 This file provides macros and functions for compile-time and run-time 49 void OI_AssertFail(char* file, int line, char* reason);
|