/system/core/toolbox/ |
D | ls.c | 130 static int listpath(const char *name, int flags); 194 static int show_total_size(const char *dirname, DIR *d, int flags) in show_total_size() argument 205 if (de->d_name[0] == '.' && (flags & LIST_ALL) == 0) in show_total_size() 228 int flags) in listfile_size() argument 235 if ((flags & LIST_SIZE) != 0) { in listfile_size() 239 if ((flags & LIST_CLASSIFY) != 0) { in listfile_size() 259 static int listfile_long(const char *path, struct stat *s, int flags) in listfile_long() argument 280 if (flags & LIST_LONG_NUMERIC) { in listfile_long() 395 static int listfile(const char *dirname, const char *filename, int flags) in listfile() argument 399 if ((flags & (LIST_LONG | LIST_SIZE | LIST_CLASSIFY | LIST_MACLABEL | LIST_INODE)) == 0) { in listfile() [all …]
|
/system/bt/btif/src/ |
D | btif_sock.c | 35 …_type_t type, const char *service_name, const uint8_t *uuid, int channel, int *sock_fd, int flags); 36 …_bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags); 38 static void btsock_signaled(int fd, int type, int flags, uint32_t user_id); 117 …ype, const char *service_name, const uint8_t *service_uuid, int channel, int *sock_fd, int flags) { in btsock_listen() argument 118 if((flags & BTSOCK_FLAG_NO_SDP) == 0) { in btsock_listen() 128 status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd, flags); in btsock_listen() 131 status = btsock_l2cap_listen(service_name, channel, sock_fd, flags); in btsock_listen() 135 status = btsock_sco_listen(sock_fd, flags); in btsock_listen() 146 …bdaddr_t *bd_addr, btsock_type_t type, const uint8_t *uuid, int channel, int *sock_fd, int flags) { in btsock_connect() argument 156 status = btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags); in btsock_connect() [all …]
|
D | btif_sock_thread.c | 91 int flags; member 110 static inline void add_poll(int h, int fd, int type, int flags, uint32_t user_id); 299 int flags; member 302 int btsock_thread_add_fd(int h, int fd, int type, int flags, uint32_t user_id) in btsock_thread_add_fd() argument 314 if(flags & SOCK_THREAD_ADD_FD_SYNC) in btsock_thread_add_fd() 320 flags &= ~SOCK_THREAD_ADD_FD_SYNC; in btsock_thread_add_fd() 321 add_poll(h, fd, type, flags, user_id); in btsock_thread_add_fd() 326 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; in btsock_thread_add_fd() 327 APPL_TRACE_DEBUG("adding fd:%d, flags:0x%x", fd, flags); in btsock_thread_add_fd() 433 static inline unsigned int flags2pevents(int flags) in flags2pevents() argument [all …]
|
D | btif_av.c | 82 UINT8 flags; member 278 dump_av_sm_event_name(event), btif_av_cb.flags); in btif_av_state_idle_handler() 285 btif_av_cb.flags = 0; in btif_av_state_idle_handler() 377 dump_av_sm_event_name(event), btif_av_cb.flags); in btif_av_state_opening_handler() 512 dump_av_sm_event_name(event), btif_av_cb.flags); in btif_av_state_closing_handler() 584 dump_av_sm_event_name(event), btif_av_cb.flags); in btif_av_state_opened_handler() 586 if ( (event == BTA_AV_REMOTE_CMD_EVT) && (btif_av_cb.flags & BTIF_AV_FLAG_REMOTE_SUSPEND) && in btif_av_state_opened_handler() 590 btif_av_cb.flags &= ~BTIF_AV_FLAG_REMOTE_SUSPEND; in btif_av_state_opened_handler() 596 btif_av_cb.flags &= ~BTIF_AV_FLAG_PENDING_STOP; in btif_av_state_opened_handler() 597 btif_av_cb.flags &= ~BTIF_AV_FLAG_PENDING_START; in btif_av_state_opened_handler() [all …]
|
/system/core/init/ |
D | signal_handler.cpp | 80 if (!(svc->flags & SVC_ONESHOT) || (svc->flags & SVC_RESTART)) { in wait_for_one_process() 92 if (svc->flags & SVC_EXEC) { in wait_for_one_process() 102 svc->flags &= (~SVC_RUNNING); in wait_for_one_process() 106 if ((svc->flags & SVC_ONESHOT) && !(svc->flags & SVC_RESTART)) { in wait_for_one_process() 107 svc->flags |= SVC_DISABLED; in wait_for_one_process() 111 if (svc->flags & (SVC_DISABLED | SVC_RESET)) { in wait_for_one_process() 117 if ((svc->flags & SVC_CRITICAL) && !(svc->flags & SVC_RESTART)) { in wait_for_one_process() 132 svc->flags &= (~SVC_RESTART); in wait_for_one_process() 133 svc->flags |= SVC_RESTARTING; in wait_for_one_process()
|
/system/vold/fs/ |
D | Ext4.cpp | 132 unsigned long flags; in Mount() local 137 flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; in Mount() 139 flags |= (executable ? 0 : MS_NOEXEC); in Mount() 140 flags |= (ro ? MS_RDONLY : 0); in Mount() 141 flags |= (remount ? MS_REMOUNT : 0); in Mount() 143 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount() 147 flags |= MS_RDONLY; in Mount() 148 rc = mount(c_source, c_target, "ext4", flags, NULL); in Mount()
|
D | Vfat.cpp | 125 unsigned long flags; in Mount() local 131 flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC; in Mount() 133 flags |= (executable ? 0 : MS_NOEXEC); in Mount() 134 flags |= (ro ? MS_RDONLY : 0); in Mount() 135 flags |= (remount ? MS_REMOUNT : 0); in Mount() 155 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount() 159 flags |= MS_RDONLY; in Mount() 160 rc = mount(c_source, c_target, "vfat", flags, mountData); in Mount()
|
/system/core/libion/tests/ |
D | device_test.cpp | 142 unsigned int flags = ION_FLAG_CACHED; in TEST_F() local 144 ASSERT_EQ(0, ion_alloc_fd(m_ionFd, 4096, 0, heapMask, flags, &map_fd)); in TEST_F() 179 unsigned int flags = ION_FLAG_CACHED; in TEST_F() local 181 ASSERT_EQ(0, ion_alloc_fd(m_ionFd, 4096, 0, heapMask, flags, &map_fd)); in TEST_F() 210 unsigned int flags = ION_FLAG_CACHED; in TEST_F() local 212 ASSERT_EQ(0, ion_alloc_fd(m_ionFd, 4096, 0, heapMask, flags, &map_fd)); in TEST_F() 245 unsigned int flags = ION_FLAG_CACHED; in TEST_F() local 247 ASSERT_EQ(0, ion_alloc_fd(m_ionFd, 4096, 0, heapMask, flags, &map_fd)); in TEST_F() 276 unsigned int flags = ION_FLAG_CACHED | ION_FLAG_CACHED_NEEDS_SYNC; in TEST_F() local 278 ASSERT_EQ(0, ion_alloc_fd(m_ionFd, 4096, 0, heapMask, flags, &map_fd)); in TEST_F() [all …]
|
/system/core/libpixelflinger/codeflinger/ |
D | blending.cpp | 40 integer_t fragment(temp.reg, temp.h, temp.flags); in build_fog() 41 if (!(temp.flags & CORRUPTIBLE)) { in build_fog() 43 temp.flags |= CORRUPTIBLE; in build_fog() 137 if (temp.l && (temp.flags & CORRUPTIBLE)) { in build_blending() 142 integer_t fragment(temp.reg, temp.size(), temp.flags); in build_blending() 149 fragment.flags |= CORRUPTIBLE; in build_blending() 152 if (!(temp.flags & CORRUPTIBLE)) { in build_blending() 156 temp.flags &= ~CORRUPTIBLE; in build_blending() 157 fragment.flags &= ~CORRUPTIBLE; in build_blending() 163 fragment.flags &= ~CORRUPTIBLE; in build_blending() [all …]
|
D | load_store.cpp | 27 void GGLAssembler::store(const pointer_t& addr, const pixel_t& s, uint32_t flags) in store() argument 30 const int inc = (flags & WRITE_BACK)?1:0; in store() 44 if (!(s.flags & CORRUPTIBLE)) { in store() 61 void GGLAssembler::load(const pointer_t& addr, const pixel_t& s, uint32_t flags) in load() argument 67 const int inc = (flags & WRITE_BACK)?1:0; in load() 152 integer_t r(d.reg, 32, d.flags); in extract() 163 if (s.l || (s.flags & CLEAR_HI)) { in expand() 167 expand(d, integer_t(s.reg, s.size(), s.flags), dbits); in expand() 173 integer_t r(d.reg, 32, d.flags); in expand() 188 dst.flags = 0; in expand() [all …]
|
/system/extras/tests/audio/alsa/ |
D | pcmtest.cpp | 46 unsigned int flags; member 93 char flags; in getSndDev() local 100 flags = de->d_name[strlen(de->d_name)-1]; in getSndDev() 101 if (flags == 'c') { in getSndDev() 102 pcmnodes[pcms].flags = PCM_IN; in getSndDev() 103 } else if(flags == 'p') { in getSndDev() 104 pcmnodes[pcms].flags = PCM_OUT; in getSndDev() 106 pcmnodes[pcms].flags = -1; in getSndDev() 107 testPrintI("Unknown PCM type = %c", flags); in getSndDev() 137 pcmnodes[i].flags); in getPcmParams()
|
/system/core/toolbox/upstream-netbsd/lib/libc/gen/ |
D | humanize_number.c | 48 const char *suffix, int scale, int flags) in humanize_number() argument 59 if (flags & HN_DIVISOR_1000) { in humanize_number() 62 if (flags & HN_B) in humanize_number() 72 if (flags & HN_B) in humanize_number() 110 if (flags & HN_NOSPACE) in humanize_number() 145 if (bytes < 995 && i > 0 && flags & HN_DECIMAL) { in humanize_number()
|
/system/core/debuggerd/test/ |
D | dump_maps_test.cpp | 134 map.flags = PROT_READ; in TEST_F() 169 map.flags = PROT_WRITE; in TEST_F() 207 map.flags = PROT_READ; in TEST_F() 214 map.flags = PROT_WRITE; in TEST_F() 221 map.flags = PROT_EXEC; in TEST_F() 228 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; in TEST_F() 266 map.flags = PROT_WRITE; in TEST_F() 273 map.flags = PROT_EXEC; in TEST_F() 280 map.flags = PROT_READ | PROT_WRITE | PROT_EXEC; in TEST_F() 320 map.flags = PROT_WRITE; in TEST_F() [all …]
|
/system/bt/hci/src/ |
D | btsnoop.c | 199 int flags; in btsnoop_write_packet() local 204 flags = 2; in btsnoop_write_packet() 208 flags = is_received; in btsnoop_write_packet() 212 flags = is_received; in btsnoop_write_packet() 216 flags = 3; in btsnoop_write_packet() 225 flags = htonl(flags); in btsnoop_write_packet() 232 btsnoop_write(&flags, 4); in btsnoop_write_packet()
|
/system/core/libion/ |
D | ion.c | 62 unsigned int flags, ion_user_handle_t *handle) in ion_alloc() argument 69 .flags = flags, in ion_alloc() 91 int flags, off_t offset, unsigned char **ptr, int *map_fd) in ion_map() argument 111 tmp_ptr = mmap(NULL, length, prot, flags, data.fd, offset); in ion_map() 143 unsigned int flags, int *handle_fd) { in ion_alloc_fd() argument 147 ret = ion_alloc(fd, len, align, heap_mask, flags, &handle); in ion_alloc_fd()
|
/system/bt/btif/include/ |
D | btif_sock_rfc.h | 33 int* sock_fd, int flags); 35 int channel, int* sock_fd, int flags); 36 void btsock_rfc_signaled(int fd, int flags, uint32_t user_id);
|
D | btif_sock_l2cap.h | 16 int* sock_fd, int flags); 18 int channel, int* sock_fd, int flags); 19 void btsock_l2cap_signaled(int fd, int flags, uint32_t user_id);
|
/system/core/libbacktrace/ |
D | BacktraceMap.cpp | 74 map->flags = PROT_NONE; 76 map->flags |= PROT_READ; 79 map->flags |= PROT_WRITE; 82 map->flags |= PROT_EXEC; 95 map->flags, map->name.c_str());
|
/system/extras/libpagemap/ |
D | pm_map.c | 54 uint64_t flags; in pm_map_usage_flags() local 56 &flags); in pm_map_usage_flags() 59 if ((flags & flags_mask) != required_flags) in pm_map_usage_flags() 92 uint64_t count, flags; in pm_map_workingset() local 106 &flags); in pm_map_workingset() 109 if (!(flags & PM_PAGE_REFERENCED)) in pm_map_workingset()
|
/system/netd/server/ |
D | MDnsSdListener.h | 27 void MDnsSdListenerDiscoverCallback(DNSServiceRef sdRef, DNSServiceFlags flags, 32 void MDnsSdListenerRegisterCallback(DNSServiceRef sdRef, DNSServiceFlags flags, 36 void MDnsSdListenerResolveCallback(DNSServiceRef sdRef, DNSServiceFlags flags, uint32_t interface, 40 void MDnsSdListenerSetHostnameCallback(DNSServiceRef, DNSServiceFlags flags, 43 void MDnsSdListenerGetAddrInfoCallback(DNSServiceRef sdRef, DNSServiceFlags flags, 133 int flagsToI(DNSServiceFlags flags);
|
/system/core/libion/include/ion/ |
D | ion.h | 34 unsigned int flags, ion_user_handle_t *handle); 36 unsigned int flags, int *handle_fd); 40 int flags, off_t offset, unsigned char **ptr, int *map_fd);
|
/system/gatekeeper/ |
D | gatekeeper.cpp | 53 bool throttle_secure = pw_handle->flags & HANDLE_FLAG_THROTTLE_SECURE; in Enroll() 81 uint64_t flags = 0; in Enroll() local 83 flags |= HANDLE_FLAG_THROTTLE_SECURE; in Enroll() 93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), in Enroll() 126 bool throttle_secure = password_handle->flags & HANDLE_FLAG_THROTTLE_SECURE; in Verify() 168 secure_id_t user_id, uint64_t flags, uint8_t handle_version, const uint8_t *password, in CreatePasswordHandle() argument 178 password_handle->flags = flags; in CreatePasswordHandle() 181 uint32_t metadata_length = sizeof(user_id) + sizeof(flags) + sizeof(HANDLE_VERSION); in CreatePasswordHandle() 204 expected_handle->flags, expected_handle->version, in DoVerify()
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/ |
D | perf.h | 156 int fd, int group_fd, unsigned long flags); 161 unsigned long flags) in sys_perf_event_open() argument 166 group_fd, flags); in sys_perf_event_open() 169 test_attr__open(attr, pid, cpu, fd, group_fd, flags); in sys_perf_event_open() 191 struct branch_flags flags; member
|
/system/bt/osi/src/ |
D | semaphore.c | 76 int flags = TEMP_FAILURE_RETRY(fcntl(semaphore->fd, F_GETFL)); in semaphore_try_wait() local 77 if (flags == -1) { in semaphore_try_wait() 81 if (TEMP_FAILURE_RETRY(fcntl(semaphore->fd, F_SETFL, flags | O_NONBLOCK)) == -1) { in semaphore_try_wait() 90 if (TEMP_FAILURE_RETRY(fcntl(semaphore->fd, F_SETFL, flags)) == -1) in semaphore_try_wait()
|
/system/core/libcutils/ |
D | socket_network_client.c | 49 int flags = 0, error = 0, ret = 0; in socket_network_client_timeout() local 68 if ((flags = fcntl(s, F_GETFL, 0)) < 0) { in socket_network_client_timeout() 73 if (fcntl(s, F_SETFL, flags | O_NONBLOCK) < 0) { in socket_network_client_timeout() 119 if (fcntl(s, F_SETFL, flags) < 0) { in socket_network_client_timeout()
|