/system/core/trusty/storage/lib/ |
H A D | storage.c | 127 int storage_open_session(const char *device, storage_session_t *session_p, argument 130 int rc = tipc_connect(device, port);
|
/system/update_engine/common/ |
H A D | utils.h | 109 // Returns the size of the block device at the file descriptor fd. If an error 114 // is actually a block device, this function will automatically call 152 // Splits the partition device name into the block device name and partition 155 // Returns false when malformed device name is passed in. 157 // just to test the validity of the device name. Note that the function 158 // simply checks if the device name looks like a valid device, no other 159 // checks are performed (i.e. it doesn't check if the device actually exists). 164 // Builds a partition device nam [all...] |
/system/bt/stack/hid/ |
H A D | hidh_conn.cc | 212 /* always add incoming connection device into HID database by default */ 297 * Description This function processes timeout (to page device). 303 tHID_HOST_DEV_CTB* device; local 307 device = &hh_cb.devices[dhandle]; 308 device->conn_tries++; 310 hh_cb.callback(dhandle, device->addr, HID_HDEV_EVT_RETRYING, 311 device->conn_tries, NULL); 330 // TODO(armansito): This kind of math to determine a device handle is way 940 /* If report ID required for this device */
|
/system/extras/simpleperf/ |
H A D | Android.mk | 385 LOCAL_COMPATIBILITY_SUITE := device-tests 425 LOCAL_COMPATIBILITY_SUITE := device-tests
|
/system/extras/tests/ext4/ |
H A D | android_emmc_perf_tests.sh | 24 echo "No device detected over adb" 83 # prepare the device 85 adb wait-for-device 125 # At this point, the device is quiescent, need to crank up the cpu speed, 233 # reading is non-destructive, and we've never shipped a device with less than 234 # 8 Gbytes, for this test we read from the raw emmc device, and randomly seek 235 # in the first 6 Gbytes. That is way more memory than any device we currently
|
/system/media/camera/docs/ |
H A D | camera_metadata_tags.mako | 46 * the static metadata that can be retrived without opening the camera device.
|
/system/core/adb/ |
H A D | transport.cpp | 188 // will kick the transport on their way out to disconnect the underlying device. 336 /* linked list of all device trackers */ 358 D("device tracker %p removed", tracker); 368 /* you can't read from a device tracker, close immediately */ 387 // We want to send the device list when the tracker connects 399 if (tracker == nullptr) fatal("cannot allocate device tracker"); 401 D("device tracker %p created", tracker); 449 // Nothing to do on the device side. 527 if (t->device) free(t->device); [all...] |
H A D | Android.mk | 328 # adbd device daemon
|
/system/core/libdiskconfig/ |
H A D | config_mbr.c | 316 /* Returns the device path of the partition referred to by 'name' 343 num = snprintf(dev_name, MAX_NAME_LEN, "%s%d", dinfo->device, num);
|
/system/extras/tests/workloads/ |
H A D | systemapps.sh | 70 handleError Must be root on device
|
H A D | defs.sh | 41 echo "-s device : adb device" 79 # check if running on a device 95 echo Error: could not find device $deviceName 471 echo Error: cannot generate activity list when run on device
|
/system/vold/ |
H A D | VolumeManager.cpp | 106 /* writes superblock at end of file or device given by name */ 154 SLOGE("ASEC loop device creation failed for %s (%s)", asecFileName, strerror(errno)); 158 SLOGD("New loop device created at %s", buffer); 173 SLOGE("ASEC device mapping failed for %s (%s)", asecFileName, strerror(errno)); 194 * Wait for the device mapper node to be created. Sometimes it takes a 287 dev_t device = mVirtualDisk->getDevice(); local 291 if ((*i)->getDevice() == device) { 356 dev_t device = makedev(major, minor); local 375 auto disk = new android::vold::Disk(eventPath, device, 387 if (disk->getDevice() == device) { [all...] |
/system/netd/server/ |
H A D | Android.mk | 155 LOCAL_COMPATIBILITY_SUITE := device-tests
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 733 * Generic device handling 736 hw_device_t** device) { 763 *device = reinterpret_cast<hw_device_t*>(dev.release()); 735 openssl_open(const hw_module_t* module, const char* name, hw_device_t** device) argument
|
/system/bt/btif/src/ |
H A D | btif_rc.cc | 47 #include "device/include/interop.h" 214 rc_device_t device; variable 404 BTIF_TRACE_ERROR("%s: device not found, returning NULL!", __func__); 637 /* report connection state if remote device is AVRCP target */ 661 BTIF_TRACE_ERROR("Got disconnect of unknown device"); 676 /* check if there is another device connected */ 696 /* report connection state if device is AVRCP target */ 1145 ** which causes the audio to be on th device's speaker. Delay between 1890 BTIF_TRACE_ERROR("%s: Avrcp device is not connected, handle: 0x%x", 2505 BTIF_TRACE_ERROR("%s: RC is not connected for device [all...] |
/system/core/libunwindstack/tests/ |
H A D | MapsTest.cpp | 124 TEST(MapsTest, device) {
|
/system/keymaster/ |
H A D | android_keymaster_test.cpp | 103 std::cerr << "Creating software-only device" << std::endl; 105 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); variable 109 device->keymaster2_device()->configure(device->keymaster2_device(), &version_info); 110 return device->keymaster2_device(); 132 std::cerr << "Creating keymaster0-backed device (with ec: " << std::boolalpha << support_ec_ 137 // Make the software device pretend to be hardware 143 // Make the software device pretend not to support EC 189 std::cerr << "Creating keymaster1-backed device that supports only SHA256"; 191 // fake_device doesn't leak because device (belo 197 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); local 232 SoftKeymasterDevice* device = new SoftKeymasterDevice(context_); local [all...] |
/system/libvintf/ |
H A D | parse_xml.cpp | 753 appendChild(root, halManifestSepolicyConverter(m.device.mSepolicyVersion, d)); 773 // tags for device hal manifest only. 777 &object->device.mSepolicyVersion)) { 866 appendChild(root, vndkConverter(m.device.mVndk, d)); 906 if (!parseOptionalChild(root, vndkConverter, {}, &object->device.mVndk)) {
|
H A D | assemble_vintf.cpp | 43 * Slurps the device manifest file and add build time flag to it. 184 if (!getFlag("BOARD_SEPOLICY_VERS", &halManifest->device.mSepolicyVersion)) { 430 " generated instead; for example, given a device manifest,\n"
|
/system/bt/tools/mcap_tool/ |
H A D | mcap_tool.cc | 358 hw_device_t* device; local 366 err = module->methods->open(module, BT_HARDWARE_MODULE_ID, &device); 368 sBtDevice = (bluetooth_device_t*)device;
|
/system/sepolicy/private/ |
H A D | file_contexts | 61 /dev(/.*)? u:object_r:device:s0 82 /dev/device-mapper u:object_r:dm_device:s0 93 /dev/iio:device[0-9]+ u:object_r:iio_device:s0
|
/system/libvintf/test/ |
H A D | main.cpp | 78 cm.device.mVndk.mVersionRange = range; 79 cm.device.mVndk.mLibraries = libs; 117 vm.device.mSepolicyVersion = {25, 0}; 229 "<manifest version=\"1.0\" type=\"device\">\n" 296 "<manifest version=\"1.0\" type=\"device\"></manifest>")); 298 "<manifest version=\"1.0\" type=\"device\">" 306 "<manifest version=\"1.0\" type=\"device\">" 317 "<manifest version=\"1.0\" type=\"device\">" 325 "<manifest version=\"1.0\" type=\"device\">" 339 "<manifest version=\"1.0\" type=\"device\">" [all...] |
/system/extras/app-launcher/ |
H A D | app-launcher | 260 # finally extract the last component of the absolute device pathname we got above 264 # For now, hardcode sda for Marlin/Sailfish block device 265 # XXX - We'll get stats for entire device 282 # finally extract the last component of the absolute device pathname we got above 286 # For now, hardcode sda for Marlin/Sailfish block device 287 # XXX - We'll get stats for entire device 295 # extract the last component of the absolute device pathname we got above 300 # extract the last component of the absolute device pathname we got above 342 # Note that the device (busy) ticks is in ms. Since hz=100, dividing 343 # device (bus [all...] |
/system/core/rootdir/ |
H A D | Android.mk | 113 # We need bzip2 on device for extraction.
|
/system/security/keystore/ |
H A D | keystore.cpp | 45 KeyStore::KeyStore(Entropy* entropy, const km_device_t& device, const km_device_t& fallback, argument 47 : mEntropy(entropy), mDevice(device), mFallbackDevice(fallback), 366 // A device doesn't have to implement delete_key. 554 ALOGW("can't get keymaster device");
|