Searched refs:file (Results 1 - 25 of 422) sorted by relevance

1234567891011>>

/system/media/camera/docs/
H A DCameraCharacteristicsKeys.mako6 ## you may not use this file except in compliance with the License.
17 <%include file="CameraMetadataKeys.mako" args="java_class='CameraCharacteristics', xml_kind='static'" />
H A DCaptureRequestKeys.mako6 ## you may not use this file except in compliance with the License.
17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureRequest', xml_kind='controls'" />
H A DCaptureResultKeys.mako6 ## you may not use this file except in compliance with the License.
17 <%include file="CameraMetadataKeys.mako" args="java_class='CaptureResult', xml_kind='dynamic'" />
H A Dmetadata-parser-sanity-check7 # you may not use this file except in compliance with the License.
34 local file="$1"
36 results="$(python "$file" 2>&1)"
41 echo "FAILED: Unit tests $file"
43 echo "SUCCESS: Unit tests $file"
/system/netd/libnetdutils/
H A DUniqueFile.cpp5 * you may not use this file except in compliance with the License.
25 void UniqueFileDtor::operator()(FILE* file) { argument
27 sys.fclose(file);
/system/extras/tests/sdcard/
H A Dprofile_sdcard.sh5 # you may not use this file except in compliance with the License.
32 local file="/tmp/sdcard-scalability.txt"
33 rm -f ${file}
34 echo "# Scalability tests" | tee -a ${file}
35 echo "# Kernel: $(print_kernel)" | tee -a ${file}
36 echo "# Sched features: $(print_sched_features)" | tee -a ${file}
37 echo "# StopWatch scalability total/cumulative duration 0.0 Samples: 1" | tee -a ${file}
38 echo "# Process Time" | tee -a ${file}
42 echo "$p $t" | tee -a ${file}
/system/vold/
H A DLoop.h5 * you may not use this file except in compliance with the License.
28 static int create(const std::string& file, std::string& out_device);
31 static int createImageFile(const char *file, unsigned long numSectors);
32 static int resizeImageFile(const char *file, unsigned long numSectors);
/system/timezone/distro/core/src/main/com/android/timezone/distro/
H A DFileUtils.java5 * you may not use this file except in compliance with the License.
36 * the resulting file would exist beneath {@code parentDir}. Useful if {@code name} could
39 * @throws java.io.IOException if the file would not exist beneath {@code parentDir}
95 public static void makeWorldReadable(File file) throws IOException { argument
96 if (!file.setReadable(true, false /* ownerOnly */)) {
97 throw new IOException("Unable to make " + file + " world-readable");
108 public static void ensureFileDoesNotExist(File file) throws IOException { argument
109 if (file.exists()) {
110 if (!file.isFile()) {
111 throw new IOException(file
117 doDelete(File file) argument
123 isSymlink(File file) argument
165 readBytes(File file, int maxBytes) argument
185 createEmptyFile(File file) argument
[all...]
/system/core/debuggerd/libdebuggerd/test/
H A Dopen_files_list_test.cpp5 * you may not use this file except in compliance with the License.
30 // that it includes a known open file.
32 // Open a temporary file that we can check for in the list of open files.
39 // Verify our open file is in the list.
41 for (auto& file : list) {
42 if (file.first == tf.fd) {
43 EXPECT_EQ(file.second, std::string(tf.path));
/system/sepolicy/prebuilts/api/26.0/private/
H A Duntrusted_app_25.te4 ### This file defines the rules for untrusted apps running with
39 allow untrusted_app_25 proc_misc:file r_file_perms;
46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
/system/sepolicy/prebuilts/api/27.0/private/
H A Duntrusted_app_25.te4 ### This file defines the rules for untrusted apps running with
39 allow untrusted_app_25 proc_misc:file r_file_perms;
46 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
45 allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
50 allow untrusted_app_all system_app_data_file:file { read write getattr };
59 allow untrusted_app_all media_rw_data_file:file create_file_perms;
86 allow untrusted_app_all perfprofd_data_file:file r_file_perm
[all...]
/system/sepolicy/prebuilts/api/28.0/private/
H A Duntrusted_app_25.te4 ### This file defines the rules for untrusted apps running with
35 allow untrusted_app_25 proc_misc:file r_file_perms;
42 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
46 allow untrusted_app_all trace_data_file:file { getattr read };
49 # upon traceur to pass a file descriptor
51 neverallow untrusted_app_all trace_data_file:file { no_w_file_perm
[all...]
H A Dephemeral_app.te4 ### This file defines the security policy for apps with the ephemeral
20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
24 allow ephemeral_app app_data_file:file {r_file_perms execute};
41 allow ephemeral_app traced_tmpfs:file { read write getattr map };
53 neverallow ephemeral_app app_data_file:file execute_no_trans;
63 neverallow ephemeral_app debugfs:file read;
69 neverallow ephemeral_app sysfs:file *;
73 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms };
76 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create};
81 neverallow ephemeral_app proc_net:file no_rw_file_perm
[all...]
/system/sepolicy/private/
H A Duntrusted_app_25.te4 ### This file defines the rules for untrusted apps running with
35 allow untrusted_app_25 proc_misc:file r_file_perms;
42 allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
H A Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
46 allow untrusted_app_all trace_data_file:file { getattr read };
49 # upon traceur to pass a file descriptor
51 neverallow untrusted_app_all trace_data_file:file { no_w_file_perm
[all...]
H A Dephemeral_app.te4 ### This file defines the security policy for apps with the ephemeral
20 allow ephemeral_app { sdcard_type media_rw_data_file }:file {read write getattr ioctl lock append};
24 allow ephemeral_app app_data_file:file {r_file_perms execute};
41 allow ephemeral_app traced_tmpfs:file { read write getattr map };
53 neverallow ephemeral_app app_data_file:file execute_no_trans;
63 neverallow ephemeral_app debugfs:file read;
69 neverallow ephemeral_app sysfs:file *;
73 neverallow ephemeral_app proc:file { no_rw_file_perms no_x_file_perms };
76 neverallow ephemeral_app { sdcard_type media_rw_data_file }:file {open create};
81 neverallow ephemeral_app proc_net:file no_rw_file_perm
[all...]
/system/update_engine/payload_generator/
H A Draw_filesystem.cc5 // you may not use this file except in compliance with the License.
46 File file; local
47 file.name = filename_;
48 file.extents = { ExtentForRange(0, block_count_) };
49 files->push_back(file);
/system/sepolicy/prebuilts/api/28.0/public/
H A Dtee.te10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/sepolicy/public/
H A Dtee.te10 allow tee fingerprint_vendor_data_file:file create_file_perms;
/system/timezone/tzlookup_generator/src/test/java/com/android/libcore/timezone/tzlookup/
H A DTestUtils.java5 * you may not use this file except in compliance with the License.
21 import java.nio.file.FileVisitResult;
22 import java.nio.file.FileVisitor;
23 import java.nio.file.Files;
24 import java.nio.file.Path;
25 import java.nio.file.SimpleFileVisitor;
26 import java.nio.file.attribute.BasicFileAttributes;
48 public FileVisitResult visitFile(Path file, BasicFileAttributes attrs)
50 return delete(file);
59 private FileVisitResult delete(Path file) throw
[all...]
H A DZoneTabFileTest.java5 * you may not use this file except in compliance with the License.
24 import java.nio.file.Files;
25 import java.nio.file.Path;
51 String file = createFile("");
52 ZoneTabFile zoneTab = ZoneTabFile.parse(file);
58 String file = createFile(
64 ZoneTabFile zoneTab = ZoneTabFile.parse(file);
72 String file = createFile(
81 ZoneTabFile zoneTab = ZoneTabFile.parse(file);
93 String file
[all...]
/system/core/libnativebridge/tests/
H A DAndroid.mk40 $(foreach file,$(test_src_files), \
43 $(eval LOCAL_SRC_FILES := $(file)) \
45 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \
49 $(foreach file,$(test_src_files), \
52 $(eval LOCAL_SRC_FILES := $(file)) \
54 $(eval LOCAL_MODULE := $(notdir $(file:%.cpp=%))) \
/system/netd/libnetdutils/include/netdutils/
H A DUniqueFile.h5 * you may not use this file except in compliance with the License.
29 void operator()(FILE* file);

Completed in 1531 milliseconds

1234567891011>>