/system/media/camera/docs/ |
H A D | CameraCharacteristicsKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CameraCharacteristics', xml_kind='static'" />
|
H A D | CaptureRequestKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
|
H A D | CaptureResultKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureResult', xml_kind='dynamic'" />
|
H A D | metadata-parser-sanity-check | 7 # you may not use this file except in compliance with the License. 34 local file="$1" 36 results="$(python "$file" 2>&1)" 41 echo "FAILED: Unit tests $file" 43 echo "SUCCESS: Unit tests $file"
|
/system/netd/libnetdutils/ |
H A D | UniqueFile.cpp | 5 * you may not use this file except in compliance with the License. 25 void UniqueFileDtor::operator()(FILE* file) { argument 27 sys.fclose(file);
|
/system/extras/tests/sdcard/ |
H A D | profile_sdcard.sh | 5 # you may not use this file except in compliance with the License. 32 local file="/tmp/sdcard-scalability.txt" 33 rm -f ${file} 34 echo "# Scalability tests" | tee -a ${file} 35 echo "# Kernel: $(print_kernel)" | tee -a ${file} 36 echo "# Sched features: $(print_sched_features)" | tee -a ${file} 37 echo "# StopWatch scalability total/cumulative duration 0.0 Samples: 1" | tee -a ${file} 38 echo "# Process Time" | tee -a ${file} 42 echo "$p $t" | tee -a ${file}
|
/system/timezone/distro/core/src/main/com/android/timezone/distro/ |
H A D | FileUtils.java | 5 * you may not use this file except in compliance with the License. 36 * the resulting file would exist beneath {@code parentDir}. Useful if {@code name} could 39 * @throws java.io.IOException if the file would not exist beneath {@code parentDir} 95 public static void makeWorldReadable(File file) throws IOException { argument 96 if (!file.setReadable(true, false /* ownerOnly */)) { 97 throw new IOException("Unable to make " + file + " world-readable"); 108 public static void ensureFileDoesNotExist(File file) throws IOException { argument 109 if (file.exists()) { 110 if (!file.isFile()) { 111 throw new IOException(file 117 doDelete(File file) argument 123 isSymlink(File file) argument 165 readBytes(File file, int maxBytes) argument 185 createEmptyFile(File file) argument [all...] |
/system/core/debuggerd/libdebuggerd/test/ |
H A D | open_files_list_test.cpp | 5 * you may not use this file except in compliance with the License. 30 // that it includes a known open file. 32 // Open a temporary file that we can check for in the list of open files. 39 // Verify our open file is in the list. 41 for (auto& file : list) { 42 if (file.first == tf.fd) { 43 EXPECT_EQ(file.second, std::string(tf.path));
|
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 39 allow untrusted_app_25 proc_misc:file r_file_perms; 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | isolated_app.te | 4 ### This file defines the rules for isolated apps. An "isolated 14 allow isolated_app app_data_file:file { append read write getattr lock }; 27 # b/32896414: Allow accessing sdcard file descriptors passed to isolated_apps 34 allow isolated_app { sdcard_type media_rw_data_file }:file { read write append getattr lock }; 35 auditallow isolated_app { sdcard_type media_rw_data_file }:file { write append }; 47 allow isolated_app webview_zygote_tmpfs:file read; 57 neverallow isolated_app app_data_file:file open; 60 # TODO: are there situations where isolated_apps write to this file? 62 neverallow isolated_app anr_data_file:file ~{ open append }; 80 neverallow isolated_app cache_file:file ~{ rea [all...] |
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 47 allow untrusted_app_all system_app_data_file:file { read write getattr }; 56 allow untrusted_app_all media_rw_data_file:file create_file_perms; 84 allow untrusted_app_all perfprofd_data_file:file r_file_perms; 93 allow untrusted_app_all sysfs_hwrandom:file r_file_perm [all...] |
H A D | system_app.te | 16 allow system_app system_app_data_file:{ file lnk_file } create_file_perms; 20 allow system_app misc_user_data_file:file create_file_perms; 25 # Read wallpaper file. 26 allow system_app wallpaper_file:file r_file_perms; 28 # Read icon file. 29 allow system_app icon_file:file r_file_perms; 49 allow system_app anr_data_file:file create_file_perms; 52 allow system_app asec_apk_file:file r_file_perms;
|
H A D | system_server.te | 16 allow system_server zygote_tmpfs:file read; 20 allow system_server dalvikcache_data_file:file { r_file_perms execute }; 22 # Report dalvikcache_data_file:file execute violations. 23 auditallow system_server dalvikcache_data_file:file execute; 27 allow system_server resourcecache_data_file:file r_file_perms; 33 # Read and delete last_reboot_reason file 34 allow system_server reboot_data_file:file { rename r_file_perms unlink }; 46 allow system_server zygote_exec:file r_file_perms; 90 allow system_server config_gz:file { read open }; 121 allow system_server qtaguid_proc:file rw_file_perm [all...] |
/system/sepolicy/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 39 allow untrusted_app_25 proc_misc:file r_file_perms; 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 45 allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr}; 50 allow untrusted_app_all system_app_data_file:file { read write getattr }; 59 allow untrusted_app_all media_rw_data_file:file create_file_perms; 86 allow untrusted_app_all perfprofd_data_file:file r_file_perm [all...] |
H A D | ephemeral_app.te | 4 ### This file defines the security policy for apps with the ephemeral 20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append}; 24 allow ephemeral_app app_data_file:file {r_file_perms execute}; 42 neverallow ephemeral_app app_data_file:file execute_no_trans; 52 neverallow ephemeral_app debugfs:file read; 58 neverallow ephemeral_app sysfs:file *; 62 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms }; 65 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create}; 70 neverallow ephemeral_app proc_net:file no_rw_file_perms;
|
H A D | system_app.te | 19 allow system_app system_app_data_file:{ file lnk_file } create_file_perms; 23 allow system_app misc_user_data_file:file create_file_perms; 28 # Read wallpaper file. 29 allow system_app wallpaper_file:file r_file_perms; 31 # Read icon file. 32 allow system_app icon_file:file r_file_perms; 52 allow system_app anr_data_file:file create_file_perms; 55 allow system_app asec_apk_file:file r_file_perms;
|
/system/update_engine/payload_generator/ |
H A D | raw_filesystem.cc | 5 // you may not use this file except in compliance with the License. 46 File file; local 47 file.name = filename_; 48 file.extents = { ExtentForRange(0, block_count_) }; 49 files->push_back(file);
|
H A D | fake_filesystem.cc | 5 // you may not use this file except in compliance with the License. 43 File file; local 44 file.name = filename; 45 file.extents = extents; 50 files_.push_back(file);
|
/system/extras/perfprofd/quipper/base/ |
H A D | logging.cc | 60 LogMessage::LogMessage(const char* file, int line, LogSeverity severity) argument 61 : severity_(severity), file_(file), line_(line) { 62 Init(file, line); 65 LogMessage::LogMessage(const char* file, int line, std::string* result) argument 66 : severity_(LOG_FATAL), file_(file), line_(line) { 67 Init(file, line); 72 LogMessage::LogMessage(const char* file, int line, LogSeverity severity, argument 74 : severity_(severity), file_(file), line_(line) { 75 Init(file, line); 107 void LogMessage::Init(const char* /* file */, in [all...] |
/system/core/libnativebridge/tests/ |
H A D | Android.mk | 35 $(foreach file,$(test_src_files), \ 39 $(eval LOCAL_SRC_FILES := $(file)) \ 40 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \ 44 $(foreach file,$(test_src_files), \ 48 $(eval LOCAL_SRC_FILES := $(file)) \ 49 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \
|
/system/vold/ |
H A D | Loop.h | 5 * you may not use this file except in compliance with the License. 33 static int create(const std::string& file, std::string& out_device); 36 static int createImageFile(const char *file, unsigned long numSectors); 37 static int resizeImageFile(const char *file, unsigned long numSectors);
|
/system/netd/libnetdutils/include/netdutils/ |
H A D | UniqueFile.h | 5 * you may not use this file except in compliance with the License. 29 void operator()(FILE* file);
|
/system/extras/tests/cpueater/ |
H A D | daemonize.c | 5 * you may not use this file except in compliance with the License. 36 char *file = 0; local 53 file = *argv; 55 file = *++argv; 71 if (file) { 72 if(open(file, O_WRONLY|mode|O_CREAT, 0666) < 0) { 73 perror(file);
|
/system/libhidl/base/ |
H A D | HidlInternal.cpp | 5 * you may not use this file except in compliance with the License. 92 struct dirent *file; local 93 while ((file = readdir(dir)) != NULL) { 94 if (!isInstrumentationLib(file)) 97 void *handle = dlopen((path + file->d_name).c_str(), RTLD_NOW); 100 LOG(WARNING) << "couldn't load file: " << file->d_name 137 << file->d_name; 148 bool HidlInstrumentor::isInstrumentationLib(const dirent *file) { argument 150 if (file [all...] |