Searched refs:target (Results 1 - 25 of 107) sorted by relevance

12345

/system/sepolicy/tools/
H A Dbuild_policies.sh36 for target in $all_targets; do
37 targets_map[$target]=$target
40 for target in $all_targets; do
41 clean_target=$(echo $target | sed 's/-eng/-userdebug/' | sed 's/aosp_//')
42 if [[ $clean_target != $target ]] && [[ ${targets_map[$clean_target]} == $clean_target ]]; then
43 echo "Ignoring $target in favor of $clean_target"
46 targets=$target
48 targets="$targets $target"
64 echo "$num_targets target(
[all...]
/system/vold/fs/
H A DExt4.h30 status_t Check(const std::string& source, const std::string& target);
31 status_t Mount(const std::string& source, const std::string& target, bool ro,
34 const std::string& target);
H A DF2fs.h31 status_t Mount(const std::string& source, const std::string& target);
H A DExfat.h31 status_t Mount(const std::string& source, const std::string& target, int ownerUid, int ownerGid,
H A DVfat.h31 status_t Mount(const std::string& source, const std::string& target, bool ro,
H A DExt4.cpp70 status_t Check(const std::string& source, const std::string& target) { argument
75 const char* c_target = target.c_str();
132 status_t Mount(const std::string& source, const std::string& target, bool ro, argument
138 const char* c_target = target.c_str();
168 const std::string& target) {
179 cmd.push_back(target);
167 Format(const std::string& source, unsigned long numSectors, const std::string& target) argument
H A DExfat.cpp57 status_t Mount(const std::string& source, const std::string& target, int ownerUid, int ownerGid, argument
63 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) {
69 if (mount(source.c_str(), target.c_str(), "exfat", mountFlags, mountData.c_str()) == 0) {
/system/extras/simpleperf/scripts/
H A Dupdate.py30 def __init__(self, target, name, install_path, need_strip=False):
31 self.target = target
81 def fetch_artifact(branch, build, target, name):
83 if target.startswith('local:'):
84 shutil.copyfile(target[6:], name)
87 target, branch, name)
89 cmd = [fetch_artifact_path, '--branch', branch, '--target', target,
132 target
[all...]
/system/netd/server/
H A DStrictController.h48 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
H A DIptablesBaseTest.cpp74 int IptablesBaseTest::fakeExecIptablesRestoreWithOutput(IptablesTarget target, argument
77 sRestoreCmds.push_back({ target, commands });
87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { argument
88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr);
91 int IptablesBaseTest::fakeExecIptablesRestoreCommand(IptablesTarget target, argument
96 return fakeExecIptablesRestoreWithOutput(target, fullCmd, output);
H A DControllers.h68 static std::set<std::string> findExistingChildChains(const IptablesTarget target,
71 static void createChildChains(IptablesTarget target, const char* table, const char* parentChain,
H A DFirewallController.h67 static std::string makeCriticalCommands(IptablesTarget target, const char* chainName);
85 std::string makeUidRules(IptablesTarget target, const char *name, bool isWhitelist,
87 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
H A DIptablesBaseTest.h31 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
32 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
34 static int fakeExecIptablesRestoreCommand(IptablesTarget target, const std::string& table,
H A DNetdConstants.h43 int execIptablesRestore(IptablesTarget target, const std::string& commands);
44 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
46 int execIptablesRestoreCommand(IptablesTarget target, const std::string& table,
H A DNetdConstants.cpp45 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, argument
47 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output);
50 int execIptablesRestore(IptablesTarget target, const std::string& commands) { argument
51 return execIptablesRestoreWithOutput(target, commands, nullptr);
54 int execIptablesRestoreCommand(IptablesTarget target, const std::string& table, argument
58 return execIptablesRestoreWithOutput(target, fullCmd, output);
/system/core/debuggerd/libdebuggerd/
H A Dopen_files_list.cpp54 std::string target; local
55 if (android::base::Readlink(path, &target)) {
56 list->emplace_back(fd, target);
H A Dbacktrace.cpp86 auto target = thread_info.find(target_thread); local
87 if (target == thread_info.end()) {
88 ALOGE("failed to find target thread in thread info");
92 dump_process_header(&log, target->second.pid, target->second.process_name.c_str());
94 dump_backtrace_thread(output_fd.get(), map, target->second);
101 dump_process_footer(&log, target->second.pid);
/system/iot/attestation/at-factory-tool/
H A Datft.py57 def __init__(self, exception, operation=None, target=None):
63 target: The operating target device.
68 self.target = target
72 if self.target:
73 msg += '{' + str(self.target) + '} '
292 # The target devices refresh timer object
295 # The field to sort target devices
301 # Store the last refreshed target lis
[all...]
H A Datftman.py110 """The provision state of the target device."""
147 # The provision status and provision state is only meaningful for target
277 # The list of target devices DeviceInfo objects.
321 Get the serial number of the ATFA device and the target device. If the
357 """Sort the target device list according to sort_by field.
414 Add device location information and target device provision status.
450 """Create a new target device object.
453 serial: The serial number for the new target device.
454 check_status: Whether to check provision status for the target device.
512 """Change the os version on the target devic
[all...]
H A Datft_unittest.py320 lambda target=test_dev2, state=ProvisionStatus.LOCKAVB_SUCCESS:
321 self.MockStateChange(target, state))
413 def MockStateChange(self, target, state):
414 target.provision_status = state
416 target.provision_state.bootloader_locked = True
418 target.provision_state.avb_perm_attr_set = True
420 target.provision_state.avb_locked = True
422 target.provision_state.provisioned = True
430 lambda target=mock_atft, state=ProvisionStatus.REBOOT_SUCCESS:
431 self.MockStateChange(target, stat
[all...]
/system/vold/
H A Dsecdiscard.cpp60 for (auto const &target: options.targets) {
61 LOG(DEBUG) << "Securely discarding '" << target << "' unlink=" << options.unlink;
62 if (!secdiscard_path(target)) {
63 LOG(ERROR) << "Secure discard failed for: " << target;
66 if (unlink(target.c_str()) != 0 && errno != ENOENT) {
67 PLOG(ERROR) << "Unable to unlink: " << target;
70 LOG(DEBUG) << "Discarded: " << target;
/system/core/libutils/
H A DPrinter.cpp126 String8Printer::String8Printer(String8* target, const char* prefix) : argument
127 mTarget(target),
130 if (target == NULL) {
/system/core/lmkd/include/
H A Dlmkd.h66 int target_idx, struct lmk_target *target) {
67 target->minfree = ntohl(packet[target_idx * 2 + 1]);
68 target->oom_adj_score = ntohl(packet[target_idx * 2 + 2]);
65 lmkd_pack_get_target(LMKD_CTRL_PACKET packet, int target_idx, struct lmk_target *target) argument
/system/sepolicy/tests/
H A Dsearchpolicy.py18 expr.add_argument("-t", "--target",
35 if not (args.source or args.target or args.tclass or args.perms):
36 parser.error("Must something to filter on, e.g. --source, --target, etc.")
44 if args.target:
45 tcontext = {args.target}
/system/update_engine/payload_consumer/
H A Dfile_descriptor_utils.h28 // Copy blocks from the |source| file to the |target| file and hashes the
29 // contents. The blocks to copy from the |source| to the |target| files are
35 // The |source| and |target| files must be different, or otherwise |src_extents|
40 FileDescriptorPtr target,

Completed in 345 milliseconds

12345