Searched refs:device (Results 126 - 150 of 157) sorted by relevance

1234567

/system/core/trusty/storage/lib/
H A Dstorage.c127 int storage_open_session(const char *device, storage_session_t *session_p, argument
130 int rc = tipc_connect(device, port);
/system/update_engine/common/
H A Dutils.h109 // Returns the size of the block device at the file descriptor fd. If an error
114 // is actually a block device, this function will automatically call
152 // Splits the partition device name into the block device name and partition
155 // Returns false when malformed device name is passed in.
157 // just to test the validity of the device name. Note that the function
158 // simply checks if the device name looks like a valid device, no other
159 // checks are performed (i.e. it doesn't check if the device actually exists).
164 // Builds a partition device nam
[all...]
/system/bt/stack/hid/
H A Dhidh_conn.cc212 /* always add incoming connection device into HID database by default */
297 * Description This function processes timeout (to page device).
303 tHID_HOST_DEV_CTB* device; local
307 device = &hh_cb.devices[dhandle];
308 device->conn_tries++;
310 hh_cb.callback(dhandle, device->addr, HID_HDEV_EVT_RETRYING,
311 device->conn_tries, NULL);
330 // TODO(armansito): This kind of math to determine a device handle is way
940 /* If report ID required for this device */
/system/extras/simpleperf/
H A DAndroid.mk385 LOCAL_COMPATIBILITY_SUITE := device-tests
425 LOCAL_COMPATIBILITY_SUITE := device-tests
/system/extras/tests/ext4/
H A Dandroid_emmc_perf_tests.sh24 echo "No device detected over adb"
83 # prepare the device
85 adb wait-for-device
125 # At this point, the device is quiescent, need to crank up the cpu speed,
233 # reading is non-destructive, and we've never shipped a device with less than
234 # 8 Gbytes, for this test we read from the raw emmc device, and randomly seek
235 # in the first 6 Gbytes. That is way more memory than any device we currently
/system/media/camera/docs/
H A Dcamera_metadata_tags.mako46 * the static metadata that can be retrived without opening the camera device.
/system/core/adb/
H A Dtransport.cpp188 // will kick the transport on their way out to disconnect the underlying device.
336 /* linked list of all device trackers */
358 D("device tracker %p removed", tracker);
368 /* you can't read from a device tracker, close immediately */
387 // We want to send the device list when the tracker connects
399 if (tracker == nullptr) fatal("cannot allocate device tracker");
401 D("device tracker %p created", tracker);
449 // Nothing to do on the device side.
527 if (t->device) free(t->device);
[all...]
H A DAndroid.mk328 # adbd device daemon
/system/core/libdiskconfig/
H A Dconfig_mbr.c316 /* Returns the device path of the partition referred to by 'name'
343 num = snprintf(dev_name, MAX_NAME_LEN, "%s%d", dinfo->device, num);
/system/extras/tests/workloads/
H A Dsystemapps.sh70 handleError Must be root on device
H A Ddefs.sh41 echo "-s device : adb device"
79 # check if running on a device
95 echo Error: could not find device $deviceName
471 echo Error: cannot generate activity list when run on device
/system/vold/
H A DVolumeManager.cpp106 /* writes superblock at end of file or device given by name */
154 SLOGE("ASEC loop device creation failed for %s (%s)", asecFileName, strerror(errno));
158 SLOGD("New loop device created at %s", buffer);
173 SLOGE("ASEC device mapping failed for %s (%s)", asecFileName, strerror(errno));
194 * Wait for the device mapper node to be created. Sometimes it takes a
287 dev_t device = mVirtualDisk->getDevice(); local
291 if ((*i)->getDevice() == device) {
356 dev_t device = makedev(major, minor); local
375 auto disk = new android::vold::Disk(eventPath, device,
387 if (disk->getDevice() == device) {
[all...]
/system/netd/server/
H A DAndroid.mk155 LOCAL_COMPATIBILITY_SUITE := device-tests
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp733 * Generic device handling
736 hw_device_t** device) {
763 *device = reinterpret_cast<hw_device_t*>(dev.release());
735 openssl_open(const hw_module_t* module, const char* name, hw_device_t** device) argument
/system/bt/btif/src/
H A Dbtif_rc.cc47 #include "device/include/interop.h"
214 rc_device_t device; variable
404 BTIF_TRACE_ERROR("%s: device not found, returning NULL!", __func__);
637 /* report connection state if remote device is AVRCP target */
661 BTIF_TRACE_ERROR("Got disconnect of unknown device");
676 /* check if there is another device connected */
696 /* report connection state if device is AVRCP target */
1145 ** which causes the audio to be on th device's speaker. Delay between
1890 BTIF_TRACE_ERROR("%s: Avrcp device is not connected, handle: 0x%x",
2505 BTIF_TRACE_ERROR("%s: RC is not connected for device
[all...]
/system/core/libunwindstack/tests/
H A DMapsTest.cpp124 TEST(MapsTest, device) {
/system/keymaster/
H A Dandroid_keymaster_test.cpp103 std::cerr << "Creating software-only device" << std::endl;
105 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); variable
109 device->keymaster2_device()->configure(device->keymaster2_device(), &version_info);
110 return device->keymaster2_device();
132 std::cerr << "Creating keymaster0-backed device (with ec: " << std::boolalpha << support_ec_
137 // Make the software device pretend to be hardware
143 // Make the software device pretend not to support EC
189 std::cerr << "Creating keymaster1-backed device that supports only SHA256";
191 // fake_device doesn't leak because device (belo
197 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); local
232 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); local
[all...]
/system/libvintf/
H A Dparse_xml.cpp753 appendChild(root, halManifestSepolicyConverter(m.device.mSepolicyVersion, d));
773 // tags for device hal manifest only.
777 &object->device.mSepolicyVersion)) {
866 appendChild(root, vndkConverter(m.device.mVndk, d));
906 if (!parseOptionalChild(root, vndkConverter, {}, &object->device.mVndk)) {
H A Dassemble_vintf.cpp43 * Slurps the device manifest file and add build time flag to it.
184 if (!getFlag("BOARD_SEPOLICY_VERS", &halManifest->device.mSepolicyVersion)) {
430 " generated instead; for example, given a device manifest,\n"
/system/bt/tools/mcap_tool/
H A Dmcap_tool.cc358 hw_device_t* device; local
366 err = module->methods->open(module, BT_HARDWARE_MODULE_ID, &device);
368 sBtDevice = (bluetooth_device_t*)device;
/system/sepolicy/private/
H A Dfile_contexts61 /dev(/.*)? u:object_r:device:s0
82 /dev/device-mapper u:object_r:dm_device:s0
93 /dev/iio:device[0-9]+ u:object_r:iio_device:s0
/system/libvintf/test/
H A Dmain.cpp78 cm.device.mVndk.mVersionRange = range;
79 cm.device.mVndk.mLibraries = libs;
117 vm.device.mSepolicyVersion = {25, 0};
229 "<manifest version=\"1.0\" type=\"device\">\n"
296 "<manifest version=\"1.0\" type=\"device\"></manifest>"));
298 "<manifest version=\"1.0\" type=\"device\">"
306 "<manifest version=\"1.0\" type=\"device\">"
317 "<manifest version=\"1.0\" type=\"device\">"
325 "<manifest version=\"1.0\" type=\"device\">"
339 "<manifest version=\"1.0\" type=\"device\">"
[all...]
/system/extras/app-launcher/
H A Dapp-launcher260 # finally extract the last component of the absolute device pathname we got above
264 # For now, hardcode sda for Marlin/Sailfish block device
265 # XXX - We'll get stats for entire device
282 # finally extract the last component of the absolute device pathname we got above
286 # For now, hardcode sda for Marlin/Sailfish block device
287 # XXX - We'll get stats for entire device
295 # extract the last component of the absolute device pathname we got above
300 # extract the last component of the absolute device pathname we got above
342 # Note that the device (busy) ticks is in ms. Since hz=100, dividing
343 # device (bus
[all...]
/system/core/rootdir/
H A DAndroid.mk113 # We need bzip2 on device for extraction.
/system/security/keystore/
H A Dkeystore.cpp45 KeyStore::KeyStore(Entropy* entropy, const km_device_t& device, const km_device_t& fallback, argument
47 : mEntropy(entropy), mDevice(device), mFallbackDevice(fallback),
366 // A device doesn't have to implement delete_key.
554 ALOGW("can't get keymaster device");

Completed in 836 milliseconds

1234567