/system/bt/vendor_libs/test_vendor_lib/ |
D | Android.bp | 1 // simulation library for testing virtual devices 28 "model/devices/beacon.cc", 29 "model/devices/beacon_swarm.cc", 30 "model/devices/broken_adv.cc", 31 "model/devices/car_kit.cc", 32 "model/devices/classic.cc", 33 "model/devices/device.cc", 34 "model/devices/device_properties.cc", 35 "model/devices/h4_packetizer.cc", 36 "model/devices/hci_protocol.cc", [all …]
|
/system/bt/stack/hid/ |
D | hidh_conn.cc | 120 hh_cb.devices[xx].in_use = false; in hidh_conn_reg() 121 hh_cb.devices[xx].conn.conn_state = HID_CONN_STATE_UNUSED; in hidh_conn_reg() 137 tHID_CONN* p_hcon = &hh_cb.devices[dhandle].conn; in hidh_conn_disconnect() 144 L2CA_SetIdleTimeoutByBdAddr(hh_cb.devices[dhandle].addr, 0, in hidh_conn_disconnect() 152 BTM_LogHistory(kBtmLogTag, hh_cb.devices[dhandle].addr, "Disconnecting", in hidh_conn_disconnect() 186 tHID_CONN* p_hcon = &hh_cb.devices[i].conn; in hidh_l2cif_connect_ind() 189 kBtmLogTag, hh_cb.devices[i].addr, "Connect request", in hidh_l2cif_connect_ind() 232 BTM_LogHistory(kBtmLogTag, hh_cb.devices[i].addr, "Connecting", in hidh_l2cif_connect_ind() 265 device = &hh_cb.devices[dhandle]; in hidh_try_repage() 285 if ((hh_cb.devices[dhandle].conn_tries <= HID_HOST_MAX_CONN_RETRY) && in hidh_on_l2cap_error() [all …]
|
D | hidh_api.cc | 278 hh_cb.devices[i].conn.process_repage_timer = in HID_HostRegister() 300 alarm_free(hh_cb.devices[i].conn.process_repage_timer); in HID_HostDeregister() 325 if ((hh_cb.devices[i].in_use) && addr == hh_cb.devices[i].addr) break; in HID_HostAddDev() 330 if (!hh_cb.devices[i].in_use) break; in HID_HostAddDev() 336 if (!hh_cb.devices[i].in_use) { in HID_HostAddDev() 337 hh_cb.devices[i].in_use = true; in HID_HostAddDev() 338 hh_cb.devices[i].addr = addr; in HID_HostAddDev() 339 hh_cb.devices[i].state = HID_DEV_NO_CONN; in HID_HostAddDev() 340 hh_cb.devices[i].conn_tries = 0; in HID_HostAddDev() 343 if (attr_mask != HID_ATTR_MASK_IGNORE) hh_cb.devices[i].attr_mask = attr_mask; in HID_HostAddDev() [all …]
|
/system/core/init/ |
D | block_dev_initializer.cpp | 73 std::set<std::string>* devices) { in HandleUevent() argument 88 auto iter = devices->find(name); in HandleUevent() 89 if (iter == devices->end()) { in HandleUevent() 95 devices->erase(iter); in HandleUevent() 97 return devices->empty() ? ListenerAction::kStop : ListenerAction::kContinue; in HandleUevent() 100 bool BlockDevInitializer::InitDevices(std::set<std::string> devices) { in InitDevices() argument 102 return HandleUevent(uevent, &devices); in InitDevices() 108 if (!devices.empty()) { in InitDevices() 111 << android::base::Join(devices, ", "); in InitDevices() 117 if (!devices.empty()) { in InitDevices() [all …]
|
D | first_stage_mount.cpp | 92 bool InitRequiredDevices(std::set<std::string> devices); 101 void GetSuperDeviceName(std::set<std::string>* devices); 111 virtual bool GetDmVerityDevices(std::set<std::string>* devices) = 0; 134 bool GetDmVerityDevices(std::set<std::string>* devices) override; 146 bool GetDmVerityDevices(std::set<std::string>* devices) override; 288 std::set<std::string> devices; in InitDevices() local 289 GetSuperDeviceName(&devices); in InitDevices() 291 if (!GetDmVerityDevices(&devices)) { in InitDevices() 294 if (!InitRequiredDevices(std::move(devices))) { in InitDevices() 315 void FirstStageMount::GetSuperDeviceName(std::set<std::string>* devices) { in GetSuperDeviceName() argument [all …]
|
/system/core/rootdir/ |
D | ueventd.rc | 75 /sys/devices/platform/trusty.* trusty_version 0440 root log 76 /sys/devices/virtual/input/input* enable 0660 root input 77 /sys/devices/virtual/input/input* poll_delay 0660 root input 78 /sys/devices/virtual/usb_composite/* enable 0664 root system 79 /sys/devices/system/cpu/cpu* cpufreq/scaling_max_freq 0664 system system 80 /sys/devices/system/cpu/cpu* cpufreq/scaling_min_freq 0664 system system 81 /sys/devices/virtual/misc/uhid/*/leds/* brightness 0664 system system 82 /sys/devices/virtual/misc/uhid/*/leds/* multi_intensity 0664 system system
|
/system/bt/test/suite/rfcomm/ |
D | rfcomm_test.cc | 44 RawAddress* devices = (RawAddress*)bonded_devices_prop->val; in SetUp() local 49 bt_interface()->get_remote_device_property(&devices[i], BT_PROPERTY_UUIDS); in SetUp() 53 GetRemoteDeviceProperty(&devices[i], BT_PROPERTY_UUIDS); in SetUp() 60 bt_remote_bdaddr_ = *(devices + i); in SetUp()
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | device.te | 57 # All devices have a uart for the hci 63 # All devices have a rpmsg device for 74 # Documented at https://source.android.com/devices/bootloader/partitions-images 78 # Documented at https://source.android.com/devices/bootloader/partitions-images 82 # Documented at https://source.android.com/devices/bootloader/partitions-images 86 # Documented at https://source.android.com/devices/bootloader/partitions-images 90 # Documented at https://source.android.com/devices/bootloader/partitions-images 99 # Documented at https://source.android.com/devices/bootloader/partitions-images 103 # Documented at https://source.android.com/devices/bootloader/partitions-images 109 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | device.te | 59 # All devices have a uart for the hci 65 # All devices have a rpmsg device for 76 # Documented at https://source.android.com/devices/bootloader/partitions-images 80 # Documented at https://source.android.com/devices/bootloader/partitions-images 84 # Documented at https://source.android.com/devices/bootloader/partitions-images 88 # Documented at https://source.android.com/devices/bootloader/partitions-images 92 # Documented at https://source.android.com/devices/bootloader/partitions-images 101 # Documented at https://source.android.com/devices/bootloader/partitions-images 105 # Documented at https://source.android.com/devices/bootloader/partitions-images 111 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/public/ |
D | device.te | 65 # All devices have a uart for the hci 71 # All devices have a rpmsg device for 82 # Documented at https://source.android.com/devices/bootloader/partitions-images 86 # Documented at https://source.android.com/devices/bootloader/partitions-images 90 # Documented at https://source.android.com/devices/bootloader/partitions-images 94 # Documented at https://source.android.com/devices/bootloader/partitions-images 98 # Documented at https://source.android.com/devices/bootloader/partitions-images 107 # Documented at https://source.android.com/devices/bootloader/partitions-images 111 # Documented at https://source.android.com/devices/bootloader/partitions-images 117 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | device.te | 65 # All devices have a uart for the hci 71 # All devices have a rpmsg device for 82 # Documented at https://source.android.com/devices/bootloader/partitions-images 86 # Documented at https://source.android.com/devices/bootloader/partitions-images 90 # Documented at https://source.android.com/devices/bootloader/partitions-images 94 # Documented at https://source.android.com/devices/bootloader/partitions-images 98 # Documented at https://source.android.com/devices/bootloader/partitions-images 107 # Documented at https://source.android.com/devices/bootloader/partitions-images 111 # Documented at https://source.android.com/devices/bootloader/partitions-images 117 # sdcard devices; normally vold uses the vold_block_device label and creates a
|
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 20 # block devices. With that information, it runs stat() on each block 24 # Allow stat access to all block devices so that fsck can compare 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
/system/memory/lmkd/ |
D | README.md | 70 low-RAM devices = 10, for high-end devices = 20 75 Default for low-RAM devices = 30, for high-end 76 devices = 100 81 after a kill. Default for low-RAM devices = 50, 82 for high-end devices = 10 86 low-RAM devices = 200, for high-end devices = 70
|
/system/vold/ |
D | Devmapper.cpp | 83 std::vector<DeviceMapper::DmBlockDevice> devices; in destroyAll() local 84 if (!dm.GetAvailableDevices(&devices)) { in destroyAll() 89 for (const auto& device : devices) { in destroyAll()
|
/system/bt/vendor_libs/test_vendor_lib/model/devices/ |
D | scripted_beacon.h | 26 using android::bluetooth::test_vendor_lib::model::devices::ScriptedBeaconBleAdProto::PlaybackEvent; 71 android::bluetooth::test_vendor_lib::model::devices:: 78 …android::bluetooth::test_vendor_lib::model::devices::ScriptedBeaconBleAdProto::BleAdvertisementLis…
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | blkid_untrusted.te | 1 # blkid for untrusted block devices 5 # Allowed read-only access to vold block devices to extract UUID/label 20 # Untrusted blkid should never be run on block devices holding sensitive data
|