/system/bt/btif/include/ |
H A D | btif_sock_l2cap.h | 17 int flags, int app_uid); 19 int* sock_fd, int flags, int app_uid); 20 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_rfc.h | 35 int channel, int* sock_fd, int flags, 39 int* sock_fd, int flags, int app_uid); 40 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
H A D | btif_sock_sco.h | 27 bt_status_t btsock_sco_listen(int* sock_fd, int flags); 29 int flags);
|
H A D | btif_sock_thread.h | 42 typedef void (*btsock_signaled_cb)(int fd, int type, int flags, 47 int btsock_thread_add_fd(int handle, int fd, int type, int flags,
|
/system/media/audio_utils/include/audio_utils/ |
H A D | clock_nanosleep.h | 32 int audio_utils_clock_nanosleep(clockid_t clock_id, int flags, const struct timespec *request, argument 35 return syscall(SYS_clock_nanosleep, clock_id, flags, request, remain); 48 int audio_utils_clock_nanosleep(clockid_t clock_id, int flags, const struct timespec *request, argument 52 (void) flags;
|
/system/extras/kexec_tools/ |
H A D | kexec.h | 20 struct kexec_segment *segment, unsigned long flags) { 21 return syscall(__NR_kexec_load, entry, nr_segments, segment, flags); 19 kexec_load(unsigned int entry, unsigned long nr_segments, struct kexec_segment *segment, unsigned long flags) argument
|
/system/core/libpixelflinger/ |
H A D | trap.h | 27 void ggl_state_changed(context_t* c, int flags);
|
/system/nvram/core/include/nvram/core/ |
H A D | persistence.h | 35 // State flags affecting all spaces. 42 return (flags & flag) != 0; 47 flags |= flag; 64 // Current header flags. Bitwise OR of |NvramHeader::Flags| values. 65 uint32_t flags = 0; member in struct:nvram::NvramHeader 99 return (flags & flag) != 0; 104 flags |= flag; 107 // A helper to simplify checking control flags. 112 // Persistent space flags. Bitwise OR of |NvramSpace::Flags| values. 113 uint32_t flags member in struct:nvram::NvramSpace [all...] |
/system/update_engine/payload_consumer/ |
H A D | file_descriptor.cc | 31 bool EintrSafeFileDescriptor::Open(const char* path, int flags, mode_t mode) { argument 33 return ((fd_ = HANDLE_EINTR(open(path, flags, mode))) >= 0); 36 bool EintrSafeFileDescriptor::Open(const char* path, int flags) { argument 38 return ((fd_ = HANDLE_EINTR(open(path, flags))) >= 0); 105 int flags = fcntl(fd_, F_GETFL, 0); 106 if (flags == -1) { 107 PLOG(WARNING) << "Couldn't get flags on fd " << fd_; 110 if ((flags & O_DIRECT) == 0 && fcntl(fd_, F_SETFL, flags | O_DIRECT) == -1) { 118 if ((flags [all...] |
H A D | cached_file_descriptor.h | 39 bool Open(const char* path, int flags, mode_t mode) override { 40 return fd_->Open(path, flags, mode); 42 bool Open(const char* path, int flags) override { 43 return fd_->Open(path, flags);
|
/system/bt/btif/src/ |
H A D | btif_sock.cc | 44 int flags, int app_uid); 47 int flags, int app_uid); 51 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 132 int* sock_fd, int flags, int app_uid) { 133 if ((flags & BTSOCK_FLAG_NO_SDP) == 0) { 144 flags, app_uid); 148 btsock_l2cap_listen(service_name, channel, sock_fd, flags, app_uid); 151 if (flags & BTSOCK_FLAG_NO_SDP) { 159 flags |= BTSOCK_FLAG_LE_COC; 162 "%s: type=BTSOCK_L2CAP_LE, channel=0x%x, original=0x%x, flags 130 btsock_listen(btsock_type_t type, const char* service_name, const Uuid* service_uuid, int channel, int* sock_fd, int flags, int app_uid) argument 180 btsock_connect(const RawAddress* bd_addr, btsock_type_t type, const Uuid* uuid, int channel, int* sock_fd, int flags, int app_uid) argument 228 btsock_signaled(int fd, int type, int flags, uint32_t user_id) argument [all...] |
H A D | btif_sock_thread.cc | 83 int flags; member in struct:__anon608 100 static inline void add_poll(int h, int fd, int type, int flags, 218 int flags; member in struct:__anon610 221 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) { argument 231 if (flags & SOCK_THREAD_ADD_FD_SYNC) { 234 // cleanup one-time flags 235 flags &= ~SOCK_THREAD_ADD_FD_SYNC; 236 add_poll(h, fd, type, flags, user_id); 242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; 243 APPL_TRACE_DEBUG("adding fd:%d, flags 354 flags2pevents(int flags) argument 362 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument 375 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument 399 remove_poll(int h, poll_slot_t* ps, int flags) argument 475 int flags = 0; local [all...] |
/system/core/libion/include/ion/ |
H A D | ion.h | 34 unsigned int flags, ion_user_handle_t *handle); 36 unsigned int flags, int *handle_fd); 40 int flags, off_t offset, unsigned char **ptr, int *map_fd);
|
/system/bt/include/hardware/ |
H A D | bt_sock.h | 66 int* sock_fd, int flags, int callingUid); 77 int flags, int callingUid);
|
/system/core/include/cutils/ |
H A D | android_reboot.h | 41 int android_reboot(int cmd, int flags, const char *arg);
|
/system/core/libcutils/include/cutils/ |
H A D | android_reboot.h | 41 int android_reboot(int cmd, int flags, const char *arg);
|
/system/core/libcutils/include_vndk/cutils/ |
H A D | android_reboot.h | 41 int android_reboot(int cmd, int flags, const char *arg);
|
/system/core/libunwindstack/include/unwindstack/ |
H A D | MapInfo.h | 37 MapInfo(uint64_t start, uint64_t end, uint64_t offset, uint64_t flags, const std::string& name) argument 41 flags(flags), 49 uint16_t flags = 0; member in struct:unwindstack::MapInfo
|
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 37 uint64_t flags; member in struct:gatekeeper::password_handle_t
|
/system/nfc/src/nfa/include/ |
H A D | nfa_sys_int.h | 33 /* nfa_sys flags */ 42 uint32_t flags; /* nfa_sys flags (must be first element of structure) */ member in struct:__anon2418
|
/system/update_engine/binder_bindings/android/brillo/ |
H A D | IUpdateEngine.aidl | 23 void SetUpdateAttemptFlags(in int flags); 24 boolean AttemptUpdate(in String app_version, in String omaha_url, in int flags);
|
/system/vold/ |
H A D | Ext4Crypt.h | 35 int flags); 36 bool e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags);
|
/system/core/base/ |
H A D | utf8.cpp | 56 const DWORD flags = local 63 const int chars_required = WideCharToMultiByte(CP_UTF8, flags, utf16, size, 73 const int result = WideCharToMultiByte(CP_UTF8, flags, utf16, size, 98 // Internal helper function that takes MultiByteToWideChar() flags. 100 const DWORD flags) { 109 const int chars_required = MultiByteToWideChar(CP_UTF8, flags, utf8, size, 119 const int result = MultiByteToWideChar(CP_UTF8, flags, utf8, size, 207 int open(const char* name, int flags, ...) { argument 214 if ((flags & O_CREAT) != 0) { 216 va_start(args, flags); 99 UTF8ToWideWithFlags(const char* utf8, const size_t size, std::wstring* utf16, const DWORD flags) argument [all...] |
/system/libhwbinder/include/hwbinder/ |
H A D | Binder.h | 36 uint32_t flags = 0, 41 uint32_t flags = 0); 45 uint32_t flags = 0, 65 uint32_t flags = 0, 89 virtual bool onIncStrongAttempted(uint32_t flags, const void* id);
|
H A D | BpHwBinder.h | 38 uint32_t flags = 0, 43 uint32_t flags = 0); 46 uint32_t flags = 0, 94 virtual bool onIncStrongAttempted(uint32_t flags, const void* id); 102 uint32_t flags; member in struct:android::hardware::BpHwBinder::Obituary
|