Skip to content
Snippets Groups Projects
Select Git revision
  • e98cda25e152e82b7a30ddfff63d69301cb90d60
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

Android.mk

Blame
    • Stephen Smalley's avatar
      8e0ca886
      Drop BOARD_SEPOLICY_UNION. · 8e0ca886
      Stephen Smalley authored
      As suggested in the comments on
      https://android-review.googlesource.com/#/c/141560/
      
      
      drop BOARD_SEPOLICY_UNION and simplify the build_policy logic.
      Union all files found under BOARD_SEPOLICY_DIRS.
      
      Unlike BOARD_SEPOLICY_REPLACE/IGNORE, on which we trigger an error
      to catch any lingering uses and force updating of the BoardConfig.mk
      files, we only warn on uses of BOARD_SEPOLICY_UNION to avoid
      breaking the build until all device BoardConfig*.mk files have been
      updated, and since they should be harmless - the files will be unioned
      regardless.
      
      Change-Id: I4214893c999c23631f5456cb1b8edd59771ef13b
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      8e0ca886
      History
      Drop BOARD_SEPOLICY_UNION.
      Stephen Smalley authored
      As suggested in the comments on
      https://android-review.googlesource.com/#/c/141560/
      
      
      drop BOARD_SEPOLICY_UNION and simplify the build_policy logic.
      Union all files found under BOARD_SEPOLICY_DIRS.
      
      Unlike BOARD_SEPOLICY_REPLACE/IGNORE, on which we trigger an error
      to catch any lingering uses and force updating of the BoardConfig.mk
      files, we only warn on uses of BOARD_SEPOLICY_UNION to avoid
      breaking the build until all device BoardConfig*.mk files have been
      updated, and since they should be harmless - the files will be unioned
      regardless.
      
      Change-Id: I4214893c999c23631f5456cb1b8edd59771ef13b
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    diffcore.h 4.37 KiB
    /*
     * Copyright (C) 2005 Junio C Hamano
     */
    #ifndef DIFFCORE_H
    #define DIFFCORE_H
    
    /* This header file is internal between diff.c and its diff transformers
     * (e.g. diffcore-rename, diffcore-pickaxe).  Never include this header
     * in anything else.
     */
    
    /* We internally use unsigned short as the score value,
     * and rely on an int capable to hold 32-bits.  -B can take
     * -Bmerge_score/break_score format and the two scores are
     * passed around in one int (high 16-bit for merge and low 16-bit
     * for break).
     */
    #define MAX_SCORE 60000.0
    #define DEFAULT_RENAME_SCORE 30000 /* rename/copy similarity minimum (50%) */
    #define DEFAULT_BREAK_SCORE  30000 /* minimum for break to happen (50%) */
    #define DEFAULT_MERGE_SCORE  36000 /* maximum for break-merge to happen (60%) */
    
    #define MINIMUM_BREAK_SIZE     400 /* do not break a file smaller than this */
    
    struct userdiff_driver;
    
    struct diff_filespec {
    	unsigned char sha1[20];
    	char *path;
    	void *data;
    	void *cnt_data;
    	const char *funcname_pattern_ident;
    	unsigned long size;
    	int count;               /* Reference count */
    	int xfrm_flags;		 /* for use by the xfrm */
    	int rename_used;         /* Count of rename users */
    	unsigned short mode;	 /* file mode */
    	unsigned sha1_valid : 1; /* if true, use sha1 and trust mode;
    				  * if false, use the name and read from
    				  * the filesystem.
    				  */
    #define DIFF_FILE_VALID(spec) (((spec)->mode) != 0)
    	unsigned should_free : 1; /* data should be free()'ed */
    	unsigned should_munmap : 1; /* data should be munmap()'ed */
    	unsigned dirty_submodule : 2;  /* For submodules: its work tree is dirty */
    #define DIRTY_SUBMODULE_UNTRACKED 1
    #define DIRTY_SUBMODULE_MODIFIED  2
    	unsigned has_more_entries : 1; /* only appear in combined diff */
    	struct userdiff_driver *driver;
    	/* data should be considered "binary"; -1 means "don't know yet" */
    	int is_binary;
    };
    
    extern struct diff_filespec *alloc_filespec(const char *);
    extern void free_filespec(struct diff_filespec *);
    extern void fill_filespec(struct diff_filespec *, const unsigned char *,
    			  unsigned short);
    
    extern int diff_populate_filespec(struct diff_filespec *, int);
    extern void diff_free_filespec_data(struct diff_filespec *);
    extern void diff_free_filespec_blob(struct diff_filespec *);
    extern int diff_filespec_is_binary(struct diff_filespec *);
    
    struct diff_filepair {
    	struct diff_filespec *one;
    	struct diff_filespec *two;
    	unsigned short int score;
    	char status; /* M C R A D U etc. (see Documentation/diff-format.txt or DIFF_STATUS_* in diff.h) */
    	unsigned broken_pair : 1;
    	unsigned renamed_pair : 1;