Searched refs:flags (Results 1 - 25 of 382) sorted by relevance

1234567891011>>

/system/bt/btif/include/
H A Dbtif_sock_l2cap.h17 int flags, int app_uid);
19 int* sock_fd, int flags, int app_uid);
20 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_rfc.h35 int channel, int* sock_fd, int flags,
39 int* sock_fd, int flags, int app_uid);
40 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
H A Dbtif_sock_sco.h27 bt_status_t btsock_sco_listen(int* sock_fd, int flags);
29 int flags);
H A Dbtif_sock_thread.h42 typedef void (*btsock_signaled_cb)(int fd, int type, int flags,
47 int btsock_thread_add_fd(int handle, int fd, int type, int flags,
/system/media/audio_utils/include/audio_utils/
H A Dclock_nanosleep.h32 int audio_utils_clock_nanosleep(clockid_t clock_id, int flags, const struct timespec *request, argument
35 return syscall(SYS_clock_nanosleep, clock_id, flags, request, remain);
48 int audio_utils_clock_nanosleep(clockid_t clock_id, int flags, const struct timespec *request, argument
52 (void) flags;
/system/extras/kexec_tools/
H A Dkexec.h20 struct kexec_segment *segment, unsigned long flags) {
21 return syscall(__NR_kexec_load, entry, nr_segments, segment, flags);
19 kexec_load(unsigned int entry, unsigned long nr_segments, struct kexec_segment *segment, unsigned long flags) argument
/system/core/libpixelflinger/
H A Dtrap.h27 void ggl_state_changed(context_t* c, int flags);
/system/nvram/core/include/nvram/core/
H A Dpersistence.h35 // State flags affecting all spaces.
42 return (flags & flag) != 0;
47 flags |= flag;
64 // Current header flags. Bitwise OR of |NvramHeader::Flags| values.
65 uint32_t flags = 0; member in struct:nvram::NvramHeader
99 return (flags & flag) != 0;
104 flags |= flag;
107 // A helper to simplify checking control flags.
112 // Persistent space flags. Bitwise OR of |NvramSpace::Flags| values.
113 uint32_t flags member in struct:nvram::NvramSpace
[all...]
/system/update_engine/payload_consumer/
H A Dfile_descriptor.cc31 bool EintrSafeFileDescriptor::Open(const char* path, int flags, mode_t mode) { argument
33 return ((fd_ = HANDLE_EINTR(open(path, flags, mode))) >= 0);
36 bool EintrSafeFileDescriptor::Open(const char* path, int flags) { argument
38 return ((fd_ = HANDLE_EINTR(open(path, flags))) >= 0);
105 int flags = fcntl(fd_, F_GETFL, 0);
106 if (flags == -1) {
107 PLOG(WARNING) << "Couldn't get flags on fd " << fd_;
110 if ((flags & O_DIRECT) == 0 && fcntl(fd_, F_SETFL, flags | O_DIRECT) == -1) {
118 if ((flags
[all...]
H A Dcached_file_descriptor.h39 bool Open(const char* path, int flags, mode_t mode) override {
40 return fd_->Open(path, flags, mode);
42 bool Open(const char* path, int flags) override {
43 return fd_->Open(path, flags);
/system/bt/btif/src/
H A Dbtif_sock.cc44 int flags, int app_uid);
47 int flags, int app_uid);
51 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
132 int* sock_fd, int flags, int app_uid) {
133 if ((flags & BTSOCK_FLAG_NO_SDP) == 0) {
144 flags, app_uid);
148 btsock_l2cap_listen(service_name, channel, sock_fd, flags, app_uid);
151 if (flags & BTSOCK_FLAG_NO_SDP) {
159 flags |= BTSOCK_FLAG_LE_COC;
162 "%s: type=BTSOCK_L2CAP_LE, channel=0x%x, original=0x%x, flags
130 btsock_listen(btsock_type_t type, const char* service_name, const Uuid* service_uuid, int channel, int* sock_fd, int flags, int app_uid) argument
180 btsock_connect(const RawAddress* bd_addr, btsock_type_t type, const Uuid* uuid, int channel, int* sock_fd, int flags, int app_uid) argument
228 btsock_signaled(int fd, int type, int flags, uint32_t user_id) argument
[all...]
H A Dbtif_sock_thread.cc83 int flags; member in struct:__anon608
100 static inline void add_poll(int h, int fd, int type, int flags,
218 int flags; member in struct:__anon610
221 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) { argument
231 if (flags & SOCK_THREAD_ADD_FD_SYNC) {
234 // cleanup one-time flags
235 flags &= ~SOCK_THREAD_ADD_FD_SYNC;
236 add_poll(h, fd, type, flags, user_id);
242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id};
243 APPL_TRACE_DEBUG("adding fd:%d, flags
354 flags2pevents(int flags) argument
362 set_poll(poll_slot_t* ps, int fd, int type, int flags, uint32_t user_id) argument
375 add_poll(int h, int fd, int type, int flags, uint32_t user_id) argument
399 remove_poll(int h, poll_slot_t* ps, int flags) argument
475 int flags = 0; local
[all...]
/system/core/libion/include/ion/
H A Dion.h34 unsigned int flags, ion_user_handle_t *handle);
36 unsigned int flags, int *handle_fd);
40 int flags, off_t offset, unsigned char **ptr, int *map_fd);
/system/bt/include/hardware/
H A Dbt_sock.h66 int* sock_fd, int flags, int callingUid);
77 int flags, int callingUid);
/system/core/include/cutils/
H A Dandroid_reboot.h41 int android_reboot(int cmd, int flags, const char *arg);
/system/core/libcutils/include/cutils/
H A Dandroid_reboot.h41 int android_reboot(int cmd, int flags, const char *arg);
/system/core/libcutils/include_vndk/cutils/
H A Dandroid_reboot.h41 int android_reboot(int cmd, int flags, const char *arg);
/system/core/libunwindstack/include/unwindstack/
H A DMapInfo.h37 MapInfo(uint64_t start, uint64_t end, uint64_t offset, uint64_t flags, const std::string& name) argument
41 flags(flags),
49 uint16_t flags = 0; member in struct:unwindstack::MapInfo
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h37 uint64_t flags; member in struct:gatekeeper::password_handle_t
/system/nfc/src/nfa/include/
H A Dnfa_sys_int.h33 /* nfa_sys flags */
42 uint32_t flags; /* nfa_sys flags (must be first element of structure) */ member in struct:__anon2418
/system/update_engine/binder_bindings/android/brillo/
H A DIUpdateEngine.aidl23 void SetUpdateAttemptFlags(in int flags);
24 boolean AttemptUpdate(in String app_version, in String omaha_url, in int flags);
/system/vold/
H A DExt4Crypt.h35 int flags);
36 bool e4crypt_destroy_user_storage(const std::string& volume_uuid, userid_t user_id, int flags);
/system/core/base/
H A Dutf8.cpp56 const DWORD flags = local
63 const int chars_required = WideCharToMultiByte(CP_UTF8, flags, utf16, size,
73 const int result = WideCharToMultiByte(CP_UTF8, flags, utf16, size,
98 // Internal helper function that takes MultiByteToWideChar() flags.
100 const DWORD flags) {
109 const int chars_required = MultiByteToWideChar(CP_UTF8, flags, utf8, size,
119 const int result = MultiByteToWideChar(CP_UTF8, flags, utf8, size,
207 int open(const char* name, int flags, ...) { argument
214 if ((flags & O_CREAT) != 0) {
216 va_start(args, flags);
99 UTF8ToWideWithFlags(const char* utf8, const size_t size, std::wstring* utf16, const DWORD flags) argument
[all...]
/system/libhwbinder/include/hwbinder/
H A DBinder.h36 uint32_t flags = 0,
41 uint32_t flags = 0);
45 uint32_t flags = 0,
65 uint32_t flags = 0,
89 virtual bool onIncStrongAttempted(uint32_t flags, const void* id);
H A DBpHwBinder.h38 uint32_t flags = 0,
43 uint32_t flags = 0);
46 uint32_t flags = 0,
94 virtual bool onIncStrongAttempted(uint32_t flags, const void* id);
102 uint32_t flags; member in struct:android::hardware::BpHwBinder::Obituary

Completed in 465 milliseconds

1234567891011>>