Searched refs:flags (Results 1 - 25 of 175) sorted by relevance

1234567

/system/bt/btif/include/
H A Dbtif_sock_l2cap.h16 int* sock_fd, int flags);
18 int channel, int* sock_fd, int flags);
19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_rfc.h33 int* sock_fd, int flags);
35 int channel, int* sock_fd, int flags);
36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_sco.h27 bt_status_t btsock_sco_listen(int *sock_fd, int flags);
28 bt_status_t btsock_sco_connect(const bt_bdaddr_t *bd_addr, int *sock_fd, int flags);
H A Dbtif_sock_thread.h39 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, uint32_t user_id);
43 int btsock_thread_add_fd(int handle, int fd, int type, int flags, uint32_t user_id);
/system/extras/kexec_tools/
H A Dkexec.h20 struct kexec_segment *segment, unsigned long flags) {
21 return syscall(__NR_kexec_load, entry, nr_segments, segment, flags);
19 kexec_load(unsigned int entry, unsigned long nr_segments, struct kexec_segment *segment, unsigned long flags) argument
/system/core/include/cutils/
H A Dandroid_reboot.h30 int android_reboot(int cmd, int flags, const char *arg);
/system/core/liblog/
H A Dfake_log_device.h24 int fakeLogOpen(const char *pathName, int flags);
/system/core/libpixelflinger/
H A Dtrap.h27 void ggl_state_changed(context_t* c, int flags);
/system/bt/btif/src/
H A Dbtif_sock.c35 static bt_status_t btsock_listen(btsock_type_t type, const char *service_name, const uint8_t *uuid, int channel, int *sock_fd, int flags);
36 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags);
38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
117 static bt_status_t btsock_listen(btsock_type_t type, const char *service_name, const uint8_t *service_uuid, int channel, int *sock_fd, int flags) { argument
118 if((flags & BTSOCK_FLAG_NO_SDP) == 0) {
128 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags);
131 status = btsock_l2cap_listen(service_name, channel, sock_fd, flags);
135 status = btsock_sco_listen(sock_fd, flags);
146 static bt_status_t btsock_connect(const bt_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags) { argument
156 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags);
175 btsock_signaled(int fd, int type, int flags, uint32_t user_id) argument
[all...]
H A Dbtif_sock_thread.c91 int flags; member in struct:__anon691
110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id);
299 int flags; member in struct:__anon693
302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) argument
314 if(flags & SOCK_THREAD_ADD_FD_SYNC)
319 //cleanup one-time flags
320 flags &= ~SOCK_THREAD_ADD_FD_SYNC;
321 add_poll(h, fd, type, flags, user_id);
326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
327 APPL_TRACE_DEBUG("adding fd:%d, flags
433 flags2pevents(int flags) argument
444 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument
455 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument
483 remove_poll(int h, poll_slot_t* ps, int flags) argument
554 int flags = 0; local
[all...]
/system/core/toolbox/
H A Dls.c118 // bits for flags argument
130 static int listpath(const char *name, int flags);
194 static int show_total_size(const char *dirname, DIR *d, int flags) argument
205 if (de->d_name[0] == '.' && (flags & LIST_ALL) == 0)
228 int flags)
235 if ((flags & LIST_SIZE) != 0) {
239 if ((flags & LIST_CLASSIFY) != 0) {
259 static int listfile_long(const char *path, struct stat *s, int flags) argument
280 if (flags & LIST_LONG_NUMERIC) {
395 static int listfile(const char *dirname, const char *filename, int flags) argument
227 listfile_size(const char *path, const char *filename, struct stat *s, int flags) argument
432 listdir(const char *name, int flags) argument
510 listpath(const char *name, int flags) argument
541 int flags = 0; local
[all...]
/system/core/init/
H A Dsignal_handler.cpp80 if (!(svc->flags & SVC_ONESHOT) || (svc->flags & SVC_RESTART)) {
92 if (svc->flags & SVC_EXEC) {
102 svc->flags &= (~SVC_RUNNING);
106 if ((svc->flags & SVC_ONESHOT) && !(svc->flags & SVC_RESTART)) {
107 svc->flags |= SVC_DISABLED;
111 if (svc->flags & (SVC_DISABLED | SVC_RESET)) {
117 if ((svc->flags & SVC_CRITICAL) && !(svc->flags
[all...]
H A Dueventd_keywords.h3 #define KEYWORD(symbol, flags, nargs) K_##symbol,
/system/core/libion/include/ion/
H A Dion.h34 unsigned int flags, ion_user_handle_t *handle);
36 unsigned int flags, int *handle_fd);
40 int flags, off_t offset, unsigned char **ptr, int *map_fd);
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h37 uint64_t flags; member in struct:gatekeeper::password_handle_t
/system/core/toolbox/upstream-netbsd/lib/libc/gen/
H A Dhumanize_number.c48 const char *suffix, int scale, int flags)
59 if (flags & HN_DIVISOR_1000) {
62 if (flags & HN_B)
72 if (flags & HN_B)
110 if (flags & HN_NOSPACE)
145 if (bytes < 995 && i > 0 && flags & HN_DECIMAL) {
47 humanize_number(char *buf, size_t len, int64_t bytes, const char *suffix, int scale, int flags) argument
/system/bt/hci/src/
H A Dbtsnoop.c199 int flags; local
204 flags = 2;
208 flags = is_received;
212 flags = is_received;
216 flags = 3;
225 flags = htonl(flags);
232 btsnoop_write(&flags, 4);
/system/vold/fs/
H A DExt4.cpp132 unsigned long flags; local
137 flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
139 flags |= (executable ? 0 : MS_NOEXEC);
140 flags |= (ro ? MS_RDONLY : 0);
141 flags |= (remount ? MS_REMOUNT : 0);
143 rc = mount(c_source, c_target, "ext4", flags, NULL);
147 flags |= MS_RDONLY;
148 rc = mount(c_source, c_target, "ext4", flags, NULL);
H A DVfat.cpp125 unsigned long flags; local
131 flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC;
133 flags |= (executable ? 0 : MS_NOEXEC);
134 flags |= (ro ? MS_RDONLY : 0);
135 flags |= (remount ? MS_REMOUNT : 0);
155 rc = mount(c_source, c_target, "vfat", flags, mountData);
159 flags |= MS_RDONLY;
160 rc = mount(c_source, c_target, "vfat", flags, mountData);
H A DF2fs.cpp56 unsigned long flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; local
58 int res = mount(c_source, c_target, "f2fs", flags, NULL);
62 res = mount(c_source, c_target, "f2fs", flags | MS_RDONLY, NULL);
/system/bt/osi/src/
H A Dsemaphore.c76 int flags = fcntl(semaphore->fd, F_GETFL); local
77 if (flags == -1) {
78 LOG_ERROR("%s unable to get flags for semaphore fd: %s", __func__, strerror(errno));
81 if (fcntl(semaphore->fd, F_SETFL, flags | O_NONBLOCK) == -1) {
90 if (fcntl(semaphore->fd, F_SETFL, flags) == -1)
91 LOG_ERROR("%s unable to resetore flags for semaphore fd: %s", __func__, strerror(errno));
/system/vold/
H A DTrimTask.h30 TrimTask(int flags);
/system/extras/tests/crypto/
H A Dget_dm_versions.c11 static void ioctl_init(struct dm_ioctl *io, size_t dataSize, const char *name, unsigned flags) argument
19 io->flags = flags;
/system/core/libpixelflinger/codeflinger/
H A Dblending.cpp40 integer_t fragment(temp.reg, temp.h, temp.flags);
41 if (!(temp.flags & CORRUPTIBLE)) {
43 temp.flags |= CORRUPTIBLE;
137 if (temp.l && (temp.flags & CORRUPTIBLE)) {
142 integer_t fragment(temp.reg, temp.size(), temp.flags);
149 fragment.flags |= CORRUPTIBLE;
152 if (!(temp.flags & CORRUPTIBLE)) {
156 temp.flags &= ~CORRUPTIBLE;
157 fragment.flags &= ~CORRUPTIBLE;
163 fragment.flags
[all...]
/system/core/libbacktrace/
H A DBacktraceMap.cpp74 map->flags = PROT_NONE;
76 map->flags |= PROT_READ;
79 map->flags |= PROT_WRITE;
82 map->flags |= PROT_EXEC;
93 ALOGV("Parsed map: start=%p, end=%p, flags=%x, name=%s",
95 map->flags, map->name.c_str());

Completed in 3102 milliseconds

1234567