/aosp12/system/apex/apexd/ |
H A D | apex_database_test.cpp | 33 constexpr const char* kPath[] = {"path1", "path2", "path3"}; in TEST() local 39 constexpr size_t kCount = arraysize(kLoopName) * arraysize(kPath) * in TEST() 45 const size_t path_index = loop_rest % arraysize(kPath); in TEST() 46 const size_t path_rest = loop_rest / arraysize(kPath); in TEST() 138 constexpr const char* kPath = "path"; in TEST() local 153 db.RemoveMountedApex(kPackage, kPath); in TEST() 173 db.AddMountedApex(kPackage[i], false, kLoopName[i], kPath[i], in TEST() 179 ASSERT_TRUE(Contains(db, kPackage[i], kLoopName[i], kPath[i], in TEST() 185 db.RemoveMountedApex(kPackage[0], kPath[0]); in TEST() 207 constexpr const char* kPath = "path"; in TEST() local [all …]
|
/aosp12/packages/services/Car/cpp/watchdog/server/src/ |
H A D | ProcStat.cpp | 77 return Error() << "Can not access " << kPath; in collect() 95 if (!ReadFileToString(kPath, &buffer)) { in getProcStatLocked() 96 return Error() << "ReadFileToString failed for " << kPath; in getProcStatLocked() 109 return Error() << "Duplicate `cpu .*` line in " << kPath; in getProcStatLocked() 112 return Error() << "Failed to parse `cpu .*` line in " << kPath; in getProcStatLocked() 117 return Error() << "Duplicate `procs_running .*` line in " << kPath; in getProcStatLocked() 120 return Error() << "Failed to parse `procs_running .*` line in " << kPath; in getProcStatLocked() 126 return Error() << "Duplicate `procs_blocked .*` line in " << kPath; in getProcStatLocked() 129 return Error() << "Failed to parse `procs_blocked .*` line in " << kPath; in getProcStatLocked() 134 return Error() << "Unknown procs_ line `" << lines[i] << "` in " << kPath; in getProcStatLocked() [all …]
|
H A D | UidIoStatsCollector.cpp | 103 return Error() << "Can not access " << kPath; in collect() 131 if (!ReadFileToString(kPath, &buffer)) { in readUidIoStatsLocked() 132 return Error() << "ReadFileToString failed for " << kPath; in readUidIoStatsLocked() 146 return Error() << "Failed to parse the contents of " << kPath; in readUidIoStatsLocked()
|
H A D | ProcDiskStats.h | 102 kPath(path) {} 120 std::string filePath() const { return kPath; } in filePath() 140 const std::string kPath; variable
|
H A D | UidIoStatsCollector.h | 103 kEnabled(!access(path.c_str(), R_OK)), kPath(path) {} 121 const std::string filePath() const override { return kPath; } in filePath() 140 const std::string kPath; variable
|
H A D | ProcStat.h | 96 kPath(path) {} 139 const std::string kPath; variable
|
H A D | ProcDiskStats.cpp | 206 return Error() << "Failed to access " << kPath; in collect() 210 if (auto latestPerPartitionDiskStats = readDiskStatsFile(kPath); in collect() 212 return Error() << "Failed to read per-partition disk stats from '" << kPath in collect()
|
/aosp12/frameworks/base/tools/aapt2/cmd/ |
H A D | Link.h | 117 AddRequiredFlag("-o", "Output path.", &options_.output_path, Command::kPath); in LinkCommand() 119 &options_.manifest_path, Command::kPath); in LinkCommand() 121 Command::kPath); in LinkCommand() 123 &options_.assets_dirs, Command::kPath); in LinkCommand() 126 Command::kPath); in LinkCommand() 131 &options_.generate_java_class_path, Command::kPath); in LinkCommand() 133 &options_.generate_proguard_rules_path, Command::kPath); in LinkCommand() 136 &options_.generate_main_dex_proguard_rules_path, Command::kPath); in LinkCommand()
|
H A D | Compile.h | 50 AddRequiredFlag("-o", "Output path", &options_.output_path, Command::kPath); in CompileCommand() 51 AddOptionalFlag("--dir", "Directory to scan for resources", &options_.res_dir, Command::kPath); in CompileCommand() 53 &options_.res_zip, Command::kPath); in CompileCommand() 56 "specified file", &options_.generate_text_symbols_path, Command::kPath); in CompileCommand()
|
H A D | Command_test.cpp | 40 command.AddRequiredFlag("--rflag", "", &required_flag, Command::kPath); in TEST() 42 command.AddOptionalFlag("--oflag", "", &optional_flag, Command::kPath); in TEST() 44 command.AddRequiredFlagList("--rlflag", "", &required_flag_list, Command::kPath); in TEST() 46 command.AddOptionalFlagList("--olflag", "", &optional_flag_list, Command::kPath); in TEST()
|
H A D | Optimize.h | 70 AddOptionalFlag("-o", "Path to the output APK.", &options_.output_path, Command::kPath); in OptimizeCommand() 72 Command::kPath); in OptimizeCommand() 73 AddOptionalFlag("-x", "Path to XML configuration file.", &config_path_, Command::kPath); in OptimizeCommand()
|
H A D | Command.cpp | 57 *value = (flags & Command::kPath) ? GetSafePath(arg) : arg.to_string(); in AddRequiredFlag() 67 value->push_back((flags & Command::kPath) ? GetSafePath(arg) : arg.to_string()); in AddRequiredFlagList() 77 *value = (flags & Command::kPath) ? GetSafePath(arg) : arg.to_string(); in AddOptionalFlag() 87 value->push_back((flags & Command::kPath) ? GetSafePath(arg) : arg.to_string()); in AddOptionalFlagList()
|
H A D | Convert.h | 31 AddRequiredFlag("-o", "Output path", &output_path_, Command::kPath); in ConvertCommand()
|
H A D | Command.h | 50 kPath = 1 << 0, enumerator
|
H A D | Compile.cpp | 748 context.GetDiagnostics()->Error(DiagMessage(kPath) in Action()
|
/aosp12/system/netd/libnetdutils/ |
H A D | SyscallsTest.cpp | 57 const char kPath[] = "/test/path/please/ignore"; in TEST_F() local 62 EXPECT_CALL(mSyscalls, open(kPath, kFlags, kMode)).WillOnce(Return(ByMove(UniqueFd(kFd)))); in TEST_F() 64 auto result = sys.open(kPath, kFlags, kMode); in TEST_F()
|