/system/media/camera/docs/ |
H A D | CameraCharacteristicsKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CameraCharacteristics', xml_kind='static'" />
|
H A D | CaptureRequestKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
|
H A D | CaptureResultKeys.mako | 6 ## you may not use this file except in compliance with the License. 17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureResult', xml_kind='dynamic'" />
|
H A D | metadata-parser-sanity-check | 7 # you may not use this file except in compliance with the License. 34 local file="$1" 36 results="$(python "$file" 2>&1)" 41 echo "FAILED: Unit tests $file" 43 echo "SUCCESS: Unit tests $file"
|
/system/netd/libnetdutils/ |
H A D | UniqueFile.cpp | 5 * you may not use this file except in compliance with the License. 25 void UniqueFileDtor::operator()(FILE* file) { argument 27 sys.fclose(file);
|
/system/extras/tests/sdcard/ |
H A D | profile_sdcard.sh | 5 # you may not use this file except in compliance with the License. 32 local file="/tmp/sdcard-scalability.txt" 33 rm -f ${file} 34 echo "# Scalability tests" | tee -a ${file} 35 echo "# Kernel: $(print_kernel)" | tee -a ${file} 36 echo "# Sched features: $(print_sched_features)" | tee -a ${file} 37 echo "# StopWatch scalability total/cumulative duration 0.0 Samples: 1" | tee -a ${file} 38 echo "# Process Time" | tee -a ${file} 42 echo "$p $t" | tee -a ${file}
|
/system/vold/ |
H A D | Loop.h | 5 * you may not use this file except in compliance with the License. 28 static int create(const std::string& file, std::string& out_device); 31 static int createImageFile(const char *file, unsigned long numSectors); 32 static int resizeImageFile(const char *file, unsigned long numSectors);
|
/system/timezone/distro/core/src/main/com/android/timezone/distro/ |
H A D | FileUtils.java | 5 * you may not use this file except in compliance with the License. 36 * the resulting file would exist beneath {@code parentDir}. Useful if {@code name} could 39 * @throws java.io.IOException if the file would not exist beneath {@code parentDir} 95 public static void makeWorldReadable(File file) throws IOException { argument 96 if (!file.setReadable(true, false /* ownerOnly */)) { 97 throw new IOException("Unable to make " + file + " world-readable"); 108 public static void ensureFileDoesNotExist(File file) throws IOException { argument 109 if (file.exists()) { 110 if (!file.isFile()) { 111 throw new IOException(file 117 doDelete(File file) argument 123 isSymlink(File file) argument 165 readBytes(File file, int maxBytes) argument 185 createEmptyFile(File file) argument [all...] |
/system/core/debuggerd/libdebuggerd/test/ |
H A D | open_files_list_test.cpp | 5 * you may not use this file except in compliance with the License. 30 // that it includes a known open file. 32 // Open a temporary file that we can check for in the list of open files. 39 // Verify our open file is in the list. 41 for (auto& file : list) { 42 if (file.first == tf.fd) { 43 EXPECT_EQ(file.second, std::string(tf.path));
|
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 39 allow untrusted_app_25 proc_misc:file r_file_perms; 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 39 allow untrusted_app_25 proc_misc:file r_file_perms; 46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 45 allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr}; 50 allow untrusted_app_all system_app_data_file:file { read write getattr }; 59 allow untrusted_app_all media_rw_data_file:file create_file_perms; 86 allow untrusted_app_all perfprofd_data_file:file r_file_perm [all...] |
/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 35 allow untrusted_app_25 proc_misc:file r_file_perms; 42 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 44 # Allow traceur to pass file descriptors through a content provider to untrusted apps 46 allow untrusted_app_all trace_data_file:file { getattr read }; 49 # upon traceur to pass a file descriptor 51 neverallow untrusted_app_all trace_data_file:file { no_w_file_perm [all...] |
H A D | ephemeral_app.te | 4 ### This file defines the security policy for apps with the ephemeral 20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append}; 24 allow ephemeral_app app_data_file:file {r_file_perms execute}; 41 allow ephemeral_app traced_tmpfs:file { read write getattr map }; 53 neverallow ephemeral_app app_data_file:file execute_no_trans; 63 neverallow ephemeral_app debugfs:file read; 69 neverallow ephemeral_app sysfs:file *; 73 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms }; 76 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create}; 81 neverallow ephemeral_app proc_net:file no_rw_file_perm [all...] |
/system/sepolicy/private/ |
H A D | untrusted_app_25.te | 4 ### This file defines the rules for untrusted apps running with 35 allow untrusted_app_25 proc_misc:file r_file_perms; 42 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
|
H A D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 25 allow untrusted_app_all apk_data_file:file execmod; 29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod }; 32 allow untrusted_app_all asec_apk_file:file r_file_perms; 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 41 allow untrusted_app_all shell_data_file:file r_file_perms; 44 # Allow traceur to pass file descriptors through a content provider to untrusted apps 46 allow untrusted_app_all trace_data_file:file { getattr read }; 49 # upon traceur to pass a file descriptor 51 neverallow untrusted_app_all trace_data_file:file { no_w_file_perm [all...] |
H A D | ephemeral_app.te | 4 ### This file defines the security policy for apps with the ephemeral 20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append}; 24 allow ephemeral_app app_data_file:file {r_file_perms execute}; 41 allow ephemeral_app traced_tmpfs:file { read write getattr map }; 53 neverallow ephemeral_app app_data_file:file execute_no_trans; 63 neverallow ephemeral_app debugfs:file read; 69 neverallow ephemeral_app sysfs:file *; 73 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms }; 76 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create}; 81 neverallow ephemeral_app proc_net:file no_rw_file_perm [all...] |
/system/update_engine/payload_generator/ |
H A D | raw_filesystem.cc | 5 // you may not use this file except in compliance with the License. 46 File file; local 47 file.name = filename_; 48 file.extents = { ExtentForRange(0, block_count_) }; 49 files->push_back(file);
|
/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | tee.te | 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/sepolicy/public/ |
H A D | tee.te | 10 allow tee fingerprint_vendor_data_file:file create_file_perms;
|
/system/timezone/tzlookup_generator/src/test/java/com/android/libcore/timezone/tzlookup/ |
H A D | TestUtils.java | 5 * you may not use this file except in compliance with the License. 21 import java.nio.file.FileVisitResult; 22 import java.nio.file.FileVisitor; 23 import java.nio.file.Files; 24 import java.nio.file.Path; 25 import java.nio.file.SimpleFileVisitor; 26 import java.nio.file.attribute.BasicFileAttributes; 48 public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) 50 return delete(file); 59 private FileVisitResult delete(Path file) throw [all...] |
H A D | ZoneTabFileTest.java | 5 * you may not use this file except in compliance with the License. 24 import java.nio.file.Files; 25 import java.nio.file.Path; 51 String file = createFile(""); 52 ZoneTabFile zoneTab = ZoneTabFile.parse(file); 58 String file = createFile( 64 ZoneTabFile zoneTab = ZoneTabFile.parse(file); 72 String file = createFile( 81 ZoneTabFile zoneTab = ZoneTabFile.parse(file); 93 String file [all...] |
/system/core/libnativebridge/tests/ |
H A D | Android.mk | 40 $(foreach file,$(test_src_files), \ 43 $(eval LOCAL_SRC_FILES := $(file)) \ 45 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \ 49 $(foreach file,$(test_src_files), \ 52 $(eval LOCAL_SRC_FILES := $(file)) \ 54 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \
|
/system/netd/libnetdutils/include/netdutils/ |
H A D | UniqueFile.h | 5 * you may not use this file except in compliance with the License. 29 void operator()(FILE* file);
|