/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
wdstpdi.h | 82 WDS_MC_SEVERITY Severity, 89 WDS_MC_SEVERITY Severity,
|
/external/llvm/include/llvm/IR/ |
DiagnosticInfo.h | 36 /// \brief Defines the different supported severity of a diagnostic. 85 /// Severity gives the severity of the diagnostic. 86 const DiagnosticSeverity Severity; 89 DiagnosticInfo(/* DiagnosticKind */ int Kind, DiagnosticSeverity Severity) 90 : Kind(Kind), Severity(Severity) {} 95 DiagnosticSeverity getSeverity() const { return Severity; } 101 /// The printed message must not end with '.' nor start with a severity 126 DiagnosticSeverity Severity = DS_Error [all...] |
/external/libchrome/base/ |
logging.h | 50 // things to LOG(<a particular severity level>). E.g., 132 // The supported severity levels for macros that allow you to specify one 133 // are (in increasing order of severity) INFO, WARNING, ERROR, and FATAL. 135 // Very important: logging a message at the FATAL severity level causes 138 // There is the special severity of DFATAL, which logs FATAL in debug mode, 273 BASE_EXPORT bool ShouldCreateLogMessage(int severity); 312 typedef bool (*LogMessageHandlerFunction)(int severity, 376 #define LOG_IS_ON(severity) \ 377 (::logging::ShouldCreateLogMessage(::logging::LOG_##severity)) 399 #define LOG_STREAM(severity) COMPACT_GOOGLE_LOG_ ## severity.stream( [all...] |
/docs/source.android.com/src/security/overview/ |
updates-resources.jd | 57 <p>The first task in handling a security vulnerability is to identify the severity 58 of the bug and which component of Android is affected. The severity determines 62 <h3 id=severity>Severity</h3> 64 <p>The severity of a bug generally reflects the potential harm that could occur if 66 severity:</p> 67 <p class="table-caption" id="severity-criteria"> 68 <strong>Table 1.</strong> Severity ratings and associated consequences</p> 134 <p>The Android security team may also adjust the severity of a vulnerability if it 138 team may consider it only a low-severity vulnerability.</p [all...] |
/external/clang/lib/Basic/ |
Warnings.cpp | 67 Diags.setExtensionHandlingBehavior(diag::Severity::Error); 69 Diags.setExtensionHandlingBehavior(diag::Severity::Warning); 71 Diags.setExtensionHandlingBehavior(diag::Severity::Ignored); 107 diag::Severity Mapping = 108 isPositive ? diag::Severity::Warning : diag::Severity::Ignored; 126 Diags.setSeverityForAll(Flavor, diag::Severity::Ignored); 207 auto Severity = IsPositive ? diag::Severity::Remark 208 : diag::Severity::Ignored [all...] |
DiagnosticIDs.cpp | 159 diag::Severity::Fatal, /*IsUser=*/false, /*IsPragma=*/false); 162 Info.setSeverity((diag::Severity)StaticInfo->DefaultSeverity); 165 assert(Info.getSeverity() == diag::Severity::Warning && 346 GetDefaultDiagMapping(DiagID).getSeverity() != diag::Severity::Ignored; 354 return GetDefaultDiagMapping(DiagID).getSeverity() == diag::Severity::Error; 366 static DiagnosticIDs::Level toLevel(diag::Severity SV) { 368 case diag::Severity::Ignored: 370 case diag::Severity::Remark: 372 case diag::Severity::Warning: 374 case diag::Severity::Error [all...] |
/external/sonivox/arm-wt-22k/host_src/ |
eas_report.c | 144 void EAS_ReportEx (int severity, unsigned long hashCode, int serialNum, ...) 149 /* check severity level */ 150 if (severity > severityLevel) 176 printf("Unrecognized error: Severity=%d; HashCode=%lu; SerialNum=%d\n", severity, hashCode, serialNum); 187 void EAS_Report (int severity, const char *fmt, ...) 191 /* check severity level */ 192 if (severity > severityLevel) 217 void EAS_ReportX (int severity, const char *fmt, ...) 221 /* check severity level * [all...] |
eas_report.h | 60 extern void EAS_ReportEx (int severity, unsigned long hashCode, int serialNum, ...); 65 extern void EAS_Report (int severity, const char* fmt, ...); 66 extern void EAS_ReportX (int severity, const char* fmt, ...); 70 extern void EAS_SetDebugLevel (int severity);
|
/docs/source.android.com/src/security/bulletin/ |
2015-12-01.jd | 50 Vulnerability and Exposures ID (CVE), and their assessed severity. The <a href="{@docRoot}security/overview/updates-resources.html#severity">severity assessment</a> is based on the effect that exploiting the vulnerability would have on an 57 <th>Severity</th> 192 vulnerabilities listed in the <a href="#security_vulnerability_summary">Security Vulnerability Summary</a> above. There is a description of the issue, a severity rationale, and a table 193 with the CVE, associated bug, severity, updated versions, and date reported. 209 <p>This issue is rated as a Critical severity due to the possibility of remote 217 <th>Severity</th> 259 severity due to the possibility of remote code execution through multiple 266 <th>Severity</th [all...] |
2016-01-01.jd | 51 Vulnerability and Exposures ID (CVE), and their assessed severity. The <a href="https://source.android.com/security/overview/updates-resources.html#severity">severity assessment</a> is based on the effect that exploiting the vulnerability would have on an 58 <th>Severity</th> 167 vulnerabilities listed in the <a href="#security_vulnerability_summary">Security Vulnerability Summary</a> above. There is a description of the issue, a severity rationale, and a table 168 with the CVE, associated bug, severity, updated versions, and date reported. 184 <p>This issue is rated as a Critical severity due to the possibility of remote 192 <th>Severity</th> 217 kernel. This issue is rated as a Critical severity due to the possibility of a 224 <th>Severity</th [all...] |
2016-02-01.jd | 41 Execution Vulnerability in Broadcom?s Wi-Fi driver is also Critical severity as 54 Vulnerability and Exposures ID (CVE), and their assessed severity. The <a href="https://source.android.com/security/overview/updates-resources.html#severity">severity assessment</a> is based on the effect that exploiting the vulnerability would possibly have 61 <th>Severity</th> 169 above. There is a description of the issue, a severity rationale, and a table 170 with the CVE, associated bug, severity, affected versions, and date reported. 183 rated as a Critical severity due to the possibility of remote code execution in 189 <th>Severity</th> 222 <p>This issue is rated as a Critical severity due to the possibility of remot [all...] |
/external/gmock/src/ |
gmock-internal-utils.cc | 108 // Returns true iff a log with the given severity is visible according 110 GTEST_API_ bool LogIsVisible(LogSeverity severity) { 120 return severity == kWarning; 124 // Prints the given message to stdout iff 'severity' >= the level 131 GTEST_API_ void Log(LogSeverity severity, 134 if (!LogIsVisible(severity)) 143 if (severity == kWarning) {
|
/external/google-breakpad/src/testing/src/ |
gmock-internal-utils.cc | 108 // Returns true iff a log with the given severity is visible according 110 GTEST_API_ bool LogIsVisible(LogSeverity severity) { 120 return severity == kWarning; 124 // Prints the given message to stdout iff 'severity' >= the level 131 GTEST_API_ void Log(LogSeverity severity, 134 if (!LogIsVisible(severity)) 143 if (severity == kWarning) {
|
/external/libevent/ |
log.c | 59 static void _warn_helper(int severity, const char *errstr, const char *fmt, 61 static void event_log(int severity, const char *msg); 170 _warn_helper(int severity, const char *errstr, const char *fmt, va_list ap) 187 event_log(severity, buf); 199 event_log(int severity, const char *msg) 202 log_fn(severity, msg); 205 switch (severity) {
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/support/ |
test_layer1.py | 45 severity = self.api.describe_severity_levels() 46 self.assertTrue('severityLevels' in severity) 47 severity_codes = [sev['code'] for sev in severity['severityLevels']]
|
/external/clang/include/clang/Basic/ |
DiagnosticIDs.h | 62 enum class Severity { 82 unsigned Severity : 3; 89 static DiagnosticMapping Make(diag::Severity Severity, bool IsUser, 92 Result.Severity = (unsigned)Severity; 100 diag::Severity getSeverity() const { return (diag::Severity)Severity; } 101 void setSeverity(diag::Severity Value) { Severity = (unsigned)Value; [all...] |
/system/connectivity/shill/ |
mock_log.cc | 43 bool ScopedMockLog::HandleLogMessages(int severity, 62 instance_->Log(severity, file, message); 66 return (*instance_->previous_handler_)(severity, file, line,
|
/external/libweave/third_party/chromium/base/ |
logging.h | 49 // things to LOG(<a particular severity level>). E.g., 119 // The supported severity levels for macros that allow you to specify one 120 // are (in increasing order of severity) INFO, WARNING, ERROR, and FATAL. 122 // Very important: logging a message at the FATAL severity level causes 125 // There is the special severity of DFATAL, which logs FATAL in debug mode, 223 BASE_EXPORT bool ShouldCreateLogMessage(int severity); 266 typedef bool (*LogMessageHandlerFunction)(int severity, 316 #define LOG_IS_ON(severity) \ 317 (::logging::ShouldCreateLogMessage(::logging::LOG_##severity)) 339 #define LOG_STREAM(severity) COMPACT_GOOGLE_LOG_ ## severity.stream( [all...] |
/external/kernel-headers/original/uapi/asm-x86/asm/ |
mce.h | 18 __u8 severity; member in struct:mce
|
/libcore/luni/src/main/java/org/w3c/dom/ |
DOMError.java | 23 * The severity of the error described by the <code>DOMError</code> is 30 * The severity of the error described by the <code>DOMError</code> is 37 * The severity of the error described by the <code>DOMError</code> is 47 * The severity of the error, either <code>SEVERITY_WARNING</code>,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/ |
fmtmsg.h | 53 /* Values to be for SEVERITY parameter of `fmtmsg'. */ 56 MM_NOSEV = 0, /* No severity level provided for the message. */ 93 /* Print message with given CLASSIFICATION, LABEL, SEVERITY, TEXT, ACTION 100 /* Add or remove severity level. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
fmtmsg.h | 53 /* Values to be for SEVERITY parameter of `fmtmsg'. */ 56 MM_NOSEV = 0, /* No severity level provided for the message. */ 93 /* Print message with given CLASSIFICATION, LABEL, SEVERITY, TEXT, ACTION 100 /* Add or remove severity level. */
|
/prebuilts/gradle-plugin/com/android/tools/build/manifest-merger/22.4.0/ |
manifest-merger-22.4.0-javadoc.jar | |
/prebuilts/gradle-plugin/com/android/tools/build/manifest-merger/22.4.2/ |
manifest-merger-22.4.2-javadoc.jar | |
/prebuilts/gradle-plugin/com/android/tools/build/manifest-merger/22.5.0/ |
manifest-merger-22.5.0-javadoc.jar | |