/system/sepolicy/tools/ |
H A D | build_policies.sh | 36 for target in $all_targets; do 37 targets_map[$target]=$target 40 for target in $all_targets; do 41 clean_target=$(echo $target | sed 's/-eng/-userdebug/' | sed 's/aosp_//') 42 if [[ $clean_target != $target ]] && [[ ${targets_map[$clean_target]} == $clean_target ]]; then 43 echo "Ignoring $target in favor of $clean_target" 46 targets=$target 48 targets="$targets $target" 64 echo "$num_targets target( [all...] |
/system/vold/fs/ |
H A D | Ext4.h | 30 status_t Check(const std::string& source, const std::string& target); 31 status_t Mount(const std::string& source, const std::string& target, bool ro, 34 const std::string& target);
|
H A D | F2fs.h | 31 status_t Mount(const std::string& source, const std::string& target);
|
H A D | Exfat.h | 31 status_t Mount(const std::string& source, const std::string& target, int ownerUid, int ownerGid,
|
H A D | Vfat.h | 31 status_t Mount(const std::string& source, const std::string& target, bool ro,
|
H A D | Ext4.cpp | 70 status_t Check(const std::string& source, const std::string& target) { argument 75 const char* c_target = target.c_str(); 132 status_t Mount(const std::string& source, const std::string& target, bool ro, argument 138 const char* c_target = target.c_str(); 168 const std::string& target) { 179 cmd.push_back(target); 167 Format(const std::string& source, unsigned long numSectors, const std::string& target) argument
|
H A D | Exfat.cpp | 57 status_t Mount(const std::string& source, const std::string& target, int ownerUid, int ownerGid, argument 63 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) { 69 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) {
|
/system/extras/simpleperf/scripts/ |
H A D | update.py | 30 def __init__(self, target, name, install_path, need_strip=False): 31 self.target = target 81 def fetch_artifact(branch, build, target, name): 83 if target.startswith('local:'): 84 shutil.copyfile(target[6:], name) 87 target, branch, name) 89 cmd = [fetch_artifact_path, '--branch', branch, '--target', target, 132 target [all...] |
/system/netd/server/ |
H A D | StrictController.h | 48 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
|
H A D | IptablesBaseTest.cpp | 74 int IptablesBaseTest::fakeExecIptablesRestoreWithOutput(IptablesTarget target, argument 77 sRestoreCmds.push_back({ target, commands }); 87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { argument 88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); 91 int IptablesBaseTest::fakeExecIptablesRestoreCommand(IptablesTarget target, argument 96 return fakeExecIptablesRestoreWithOutput(target, fullCmd, output);
|
H A D | Controllers.h | 68 static std::set<std::string> findExistingChildChains(const IptablesTarget target, 71 static void createChildChains(IptablesTarget target, const char* table, const char* parentChain,
|
H A D | FirewallController.h | 67 static std::string makeCriticalCommands(IptablesTarget target, const char* chainName); 85 std::string makeUidRules(IptablesTarget target, const char *name, bool isWhitelist, 87 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
|
H A D | IptablesBaseTest.h | 31 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands); 32 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, 34 static int fakeExecIptablesRestoreCommand(IptablesTarget target, const std::string& table,
|
H A D | NetdConstants.h | 43 int execIptablesRestore(IptablesTarget target, const std::string& commands); 44 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, 46 int execIptablesRestoreCommand(IptablesTarget target, const std::string& table,
|
H A D | NetdConstants.cpp | 45 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, argument 47 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output); 50 int execIptablesRestore(IptablesTarget target, const std::string& commands) { argument 51 return execIptablesRestoreWithOutput(target, commands, nullptr); 54 int execIptablesRestoreCommand(IptablesTarget target, const std::string& table, argument 58 return execIptablesRestoreWithOutput(target, fullCmd, output);
|
/system/core/debuggerd/libdebuggerd/ |
H A D | open_files_list.cpp | 54 std::string target; local 55 if (android::base::Readlink(path, &target)) { 56 list->emplace_back(fd, target);
|
H A D | backtrace.cpp | 86 auto target = thread_info.find(target_thread); local 87 if (target == thread_info.end()) { 88 ALOGE("failed to find target thread in thread info"); 92 dump_process_header(&log, target->second.pid, target->second.process_name.c_str()); 94 dump_backtrace_thread(output_fd.get(), map, target->second); 101 dump_process_footer(&log, target->second.pid);
|
/system/iot/attestation/at-factory-tool/ |
H A D | atft.py | 57 def __init__(self, exception, operation=None, target=None): 63 target: The operating target device. 68 self.target = target 72 if self.target: 73 msg += '{' + str(self.target) + '} ' 292 # The target devices refresh timer object 295 # The field to sort target devices 301 # Store the last refreshed target lis [all...] |
H A D | atftman.py | 110 """The provision state of the target device.""" 147 # The provision status and provision state is only meaningful for target 277 # The list of target devices DeviceInfo objects. 321 Get the serial number of the ATFA device and the target device. If the 357 """Sort the target device list according to sort_by field. 414 Add device location information and target device provision status. 450 """Create a new target device object. 453 serial: The serial number for the new target device. 454 check_status: Whether to check provision status for the target device. 512 """Change the os version on the target devic [all...] |
H A D | atft_unittest.py | 320 lambda target=test_dev2, state=ProvisionStatus.LOCKAVB_SUCCESS: 321 self.MockStateChange(target, state)) 413 def MockStateChange(self, target, state): 414 target.provision_status = state 416 target.provision_state.bootloader_locked = True 418 target.provision_state.avb_perm_attr_set = True 420 target.provision_state.avb_locked = True 422 target.provision_state.provisioned = True 430 lambda target=mock_atft, state=ProvisionStatus.REBOOT_SUCCESS: 431 self.MockStateChange(target, stat [all...] |
/system/vold/ |
H A D | secdiscard.cpp | 60 for (auto const &target: options.targets) { 61 LOG(DEBUG) << "Securely discarding '" << target << "' unlink=" << options.unlink; 62 if (!secdiscard_path(target)) { 63 LOG(ERROR) << "Secure discard failed for: " << target; 66 if (unlink(target.c_str()) != 0 && errno != ENOENT) { 67 PLOG(ERROR) << "Unable to unlink: " << target; 70 LOG(DEBUG) << "Discarded: " << target;
|
/system/core/libutils/ |
H A D | Printer.cpp | 126 String8Printer::String8Printer(String8* target, const char* prefix) : argument 127 mTarget(target), 130 if (target == NULL) {
|
/system/core/lmkd/include/ |
H A D | lmkd.h | 66 int target_idx, struct lmk_target *target) { 67 target->minfree = ntohl(packet[target_idx * 2 + 1]); 68 target->oom_adj_score = ntohl(packet[target_idx * 2 + 2]); 65 lmkd_pack_get_target(LMKD_CTRL_PACKET packet, int target_idx, struct lmk_target *target) argument
|
/system/sepolicy/tests/ |
H A D | searchpolicy.py | 18 expr.add_argument("-t", "--target", 35 if not (args.source or args.target or args.tclass or args.perms): 36 parser.error("Must something to filter on, e.g. --source, --target, etc.") 44 if args.target: 45 tcontext = {args.target}
|
/system/update_engine/payload_consumer/ |
H A D | file_descriptor_utils.h | 28 // Copy blocks from the |source| file to the |target| file and hashes the 29 // contents. The blocks to copy from the |source| to the |target| files are 35 // The |source| and |target| files must be different, or otherwise |src_extents| 40 FileDescriptorPtr target,
|