/system/bt/btif/include/ |
H A D | btif_sock_l2cap.h | 16 int* sock_fd, int flags); 18 int channel, int* sock_fd, int flags); 19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_rfc.h | 33 int* sock_fd, int flags); 35 int channel, int* sock_fd, int flags); 36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_sco.h | 27 bt_status_t btsock_sco_listen(int *sock_fd, int flags); 28 bt_status_t btsock_sco_connect(const bt_bdaddr_t *bd_addr, int *sock_fd, int flags);
|
H A D | btif_sock_thread.h | 39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id); 43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id);
|
/system/extras/kexec_tools/ |
H A D | kexec.h | 20 struct kexec_segment *segment, unsigned long flags) { 21 return syscall(__NR_kexec_load, entry, nr_segments, segment, flags); 19 kexec_load(unsigned int entry, unsigned long nr_segments, struct kexec_segment *segment, unsigned long flags) argument
|
/system/core/include/cutils/ |
H A D | android_reboot.h | 30 int android_reboot(int cmd, int flags, const char *arg);
|
/system/core/liblog/ |
H A D | fake_log_device.h | 24 int fakeLogOpen(const char *pathName, int flags);
|
/system/core/libpixelflinger/ |
H A D | trap.h | 27 void ggl_state_changed(context_t* c, int flags);
|
/system/bt/btif/src/ |
H A D | btif_sock.c | 35 static bt_status_t btsock_listen(btsock_type_t type, const char *service_name, const uint8_t *uuid, int channel, int *sock_fd, int flags); 36 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags); 38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 117 static bt_status_t btsock_listen(btsock_type_t type, const char *service_name, const uint8_t *service_uuid, int channel, int *sock_fd, int flags) { argument 118 if((flags & BTSOCK_FLAG_NO_SDP) == 0) { 128 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags); 131 status = btsock_l2cap_listen(service_name, channel, sock_fd, flags); 135 status = btsock_sco_listen(sock_fd, flags); 146 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags) { argument 156 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags); 175 btsock_signaled(int fd, int type, int flags, uint32_t user_id) argument [all...] |
H A D | btif_sock_thread.c | 91 int flags; member in struct:__anon691 110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 299 int flags; member in struct:__anon693 302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument 314 if(flags & SOCK_THREAD_ADD_FD_SYNC) 319 //cleanup one-time flags 320 flags &= ~SOCK_THREAD_ADD_FD_SYNC; 321 add_poll(h, fd, type, flags, user_id); 326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 327 APPL_TRACE_DEBUG("adding fd:%d, flags 433 flags2pevents(int flags) argument 444 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument 455 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument 483 remove_poll(int h, poll_slot_t* ps, int flags) argument 554 int flags = 0; local [all...] |
/system/core/toolbox/ |
H A D | ls.c | 118 // bits for flags argument 130 static int listpath(const char *name, int flags); 194 static int show_total_size(const char *dirname, DIR *d, int flags) argument 205 if (de->d_name[0] == '.' && (flags & LIST_ALL) == 0) 228 int flags) 235 if ((flags & LIST_SIZE) != 0) { 239 if ((flags & LIST_CLASSIFY) != 0) { 259 static int listfile_long(const char *path, struct stat *s, int flags) argument 280 if (flags & LIST_LONG_NUMERIC) { 395 static int listfile(const char *dirname, const char *filename, int flags) argument 227 listfile_size(const char *path, const char *filename, struct stat *s, int flags) argument 432 listdir(const char *name, int flags) argument 510 listpath(const char *name, int flags) argument 541 int flags = 0; local [all...] |
/system/core/init/ |
H A D | signal_handler.cpp | 80 if (!(svc->flags & SVC_ONESHOT) || (svc->flags & SVC_RESTART)) { 92 if (svc->flags & SVC_EXEC) { 102 svc->flags &= (~SVC_RUNNING); 106 if ((svc->flags & SVC_ONESHOT) && !(svc->flags & SVC_RESTART)) { 107 svc->flags |= SVC_DISABLED; 111 if (svc->flags & (SVC_DISABLED | SVC_RESET)) { 117 if ((svc->flags & SVC_CRITICAL) && !(svc->flags [all...] |
H A D | ueventd_keywords.h | 3 #define KEYWORD(symbol, flags, nargs) K_##symbol,
|
/system/core/libion/include/ion/ |
H A D | ion.h | 34 unsigned int flags, ion_user_handle_t *handle); 36 unsigned int flags, int *handle_fd); 40 int flags, off_t offset, unsigned char **ptr, int *map_fd);
|
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 37 uint64_t flags; member in struct:gatekeeper::password_handle_t
|
/system/core/toolbox/upstream-netbsd/lib/libc/gen/ |
H A D | humanize_number.c | 48 const char *suffix, int scale, int flags) 59 if (flags & HN_DIVISOR_1000) { 62 if (flags & HN_B) 72 if (flags & HN_B) 110 if (flags & HN_NOSPACE) 145 if (bytes < 995 && i > 0 && flags & HN_DECIMAL) { 47 humanize_number(char *buf, size_t len, int64_t bytes, const char *suffix, int scale, int flags) argument
|
/system/bt/hci/src/ |
H A D | btsnoop.c | 199 int flags; local 204 flags = 2; 208 flags = is_received; 212 flags = is_received; 216 flags = 3; 225 flags = htonl(flags); 232 btsnoop_write(&flags, 4);
|
/system/vold/fs/ |
H A D | Ext4.cpp | 132 unsigned long flags; local 137 flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; 139 flags |= (executable ? 0 : MS_NOEXEC); 140 flags |= (ro ? MS_RDONLY : 0); 141 flags |= (remount ? MS_REMOUNT : 0); 143 rc = mount(c_source, c_target, "ext4", flags, NULL); 147 flags |= MS_RDONLY; 148 rc = mount(c_source, c_target, "ext4", flags, NULL);
|
H A D | Vfat.cpp | 125 unsigned long flags; local 131 flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC; 133 flags |= (executable ? 0 : MS_NOEXEC); 134 flags |= (ro ? MS_RDONLY : 0); 135 flags |= (remount ? MS_REMOUNT : 0); 155 rc = mount(c_source, c_target, "vfat", flags, mountData); 159 flags |= MS_RDONLY; 160 rc = mount(c_source, c_target, "vfat", flags, mountData);
|
H A D | F2fs.cpp | 56 unsigned long flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; local 58 int res = mount(c_source, c_target, "f2fs", flags, NULL); 62 res = mount(c_source, c_target, "f2fs", flags | MS_RDONLY, NULL);
|
/system/bt/osi/src/ |
H A D | semaphore.c | 76 int flags = fcntl(semaphore->fd, F_GETFL); local 77 if (flags == -1) { 78 LOG_ERROR("%s unable to get flags for semaphore fd: %s", __func__, strerror(errno)); 81 if (fcntl(semaphore->fd, F_SETFL, flags | O_NONBLOCK) == -1) { 90 if (fcntl(semaphore->fd, F_SETFL, flags) == -1) 91 LOG_ERROR("%s unable to resetore flags for semaphore fd: %s", __func__, strerror(errno));
|
/system/vold/ |
H A D | TrimTask.h | 30 TrimTask(int flags);
|
/system/extras/tests/crypto/ |
H A D | get_dm_versions.c | 11 static void ioctl_init(struct dm_ioctl *io, size_t dataSize, const char *name, unsigned flags) argument 19 io->flags = flags;
|
/system/core/libpixelflinger/codeflinger/ |
H A D | blending.cpp | 40 integer_t fragment(temp.reg, temp.h, temp.flags); 41 if (!(temp.flags & CORRUPTIBLE)) { 43 temp.flags |= CORRUPTIBLE; 137 if (temp.l && (temp.flags & CORRUPTIBLE)) { 142 integer_t fragment(temp.reg, temp.size(), temp.flags); 149 fragment.flags |= CORRUPTIBLE; 152 if (!(temp.flags & CORRUPTIBLE)) { 156 temp.flags &= ~CORRUPTIBLE; 157 fragment.flags &= ~CORRUPTIBLE; 163 fragment.flags [all...] |
/system/core/libbacktrace/ |
H A D | BacktraceMap.cpp | 74 map->flags = PROT_NONE; 76 map->flags |= PROT_READ; 79 map->flags |= PROT_WRITE; 82 map->flags |= PROT_EXEC; 93 ALOGV("Parsed map: start=%p, end=%p, flags=%x, name=%s", 95 map->flags, map->name.c_str());
|