Home
last modified time | relevance | path

Searched refs:devices (Results 1 – 25 of 335) sorted by relevance

12345678910>>...14

/system/bt/vendor_libs/test_vendor_lib/
DAndroid.bp1 // simulation library for testing virtual devices
18 "model/devices/beacon.cc",
19 "model/devices/beacon_swarm.cc",
20 "model/devices/broken_adv.cc",
21 "model/devices/car_kit.cc",
22 "model/devices/classic.cc",
23 "model/devices/device.cc",
24 "model/devices/device_properties.cc",
25 "model/devices/h4_packetizer.cc",
26 "model/devices/h4_protocol.cc",
[all …]
/system/bt/stack/hid/
Dhidh_api.cc277 hh_cb.devices[i].conn.process_repage_timer = in HID_HostRegister()
299 alarm_free(hh_cb.devices[i].conn.process_repage_timer); in HID_HostDeregister()
324 if ((hh_cb.devices[i].in_use) && addr == hh_cb.devices[i].addr) break; in HID_HostAddDev()
329 if (!hh_cb.devices[i].in_use) break; in HID_HostAddDev()
335 if (!hh_cb.devices[i].in_use) { in HID_HostAddDev()
336 hh_cb.devices[i].in_use = true; in HID_HostAddDev()
337 hh_cb.devices[i].addr = addr; in HID_HostAddDev()
338 hh_cb.devices[i].state = HID_DEV_NO_CONN; in HID_HostAddDev()
339 hh_cb.devices[i].conn_tries = 0; in HID_HostAddDev()
342 if (attr_mask != HID_ATTR_MASK_IGNORE) hh_cb.devices[i].attr_mask = attr_mask; in HID_HostAddDev()
[all …]
Dhidh_conn.cc113 hh_cb.devices[xx].in_use = false; in hidh_conn_reg()
114 hh_cb.devices[xx].conn.conn_state = HID_CONN_STATE_UNUSED; in hidh_conn_reg()
130 tHID_CONN* p_hcon = &hh_cb.devices[dhandle].conn; in hidh_conn_disconnect()
139 L2CA_SetIdleTimeoutByBdAddr(hh_cb.devices[dhandle].addr, 0, in hidh_conn_disconnect()
221 p_hcon = &hh_cb.devices[i].conn; in hidh_l2cif_connect_ind()
222 p_dev = &hh_cb.devices[i]; in hidh_l2cif_connect_ind()
310 device = &hh_cb.devices[dhandle]; in hidh_try_repage()
335 dhandle = (PTR_TO_UINT(p_dev) - PTR_TO_UINT(&(hh_cb.devices[0]))) / in hidh_sec_check_complete_orig()
386 p_dev = &hh_cb.devices[dhandle]; in hidh_l2cif_connect_cfm()
387 p_hcon = &hh_cb.devices[dhandle].conn; in hidh_l2cif_connect_cfm()
[all …]
/system/core/init/
Dblock_dev_initializer.cpp73 std::set<std::string>* devices) { in HandleUevent() argument
88 auto iter = devices->find(name); in HandleUevent()
89 if (iter == devices->end()) { in HandleUevent()
95 devices->erase(iter); in HandleUevent()
97 return devices->empty() ? ListenerAction::kStop : ListenerAction::kContinue; in HandleUevent()
100 bool BlockDevInitializer::InitDevices(std::set<std::string> devices) { in InitDevices() argument
102 return HandleUevent(uevent, &devices); in InitDevices()
108 if (!devices.empty()) { in InitDevices()
111 << android::base::Join(devices, ", "); in InitDevices()
117 if (!devices.empty()) { in InitDevices()
[all …]
Dfirst_stage_mount.cpp88 bool InitRequiredDevices(std::set<std::string> devices);
97 void GetSuperDeviceName(std::set<std::string>* devices);
107 virtual bool GetDmVerityDevices(std::set<std::string>* devices) = 0;
129 bool GetDmVerityDevices(std::set<std::string>* devices) override;
141 bool GetDmVerityDevices(std::set<std::string>* devices) override;
259 std::set<std::string> devices; in InitDevices() local
260 GetSuperDeviceName(&devices); in InitDevices()
262 if (!GetDmVerityDevices(&devices)) { in InitDevices()
265 if (!InitRequiredDevices(std::move(devices))) { in InitDevices()
286 void FirstStageMount::GetSuperDeviceName(std::set<std::string>* devices) { in GetSuperDeviceName() argument
[all …]
/system/bt/test/suite/rfcomm/
Drfcomm_test.cc44 RawAddress* devices = (RawAddress*)bonded_devices_prop->val; in SetUp() local
49 bt_interface()->get_remote_device_property(&devices[i], BT_PROPERTY_UUIDS); in SetUp()
53 GetRemoteDeviceProperty(&devices[i], BT_PROPERTY_UUIDS); in SetUp()
60 bt_remote_bdaddr_ = *(devices + i); in SetUp()
/system/sepolicy/prebuilts/api/29.0/public/
Ddevice.te57 # All devices have a uart for the hci
63 # All devices have a rpmsg device for
74 # Documented at https://source.android.com/devices/bootloader/partitions-images
78 # Documented at https://source.android.com/devices/bootloader/partitions-images
82 # Documented at https://source.android.com/devices/bootloader/partitions-images
86 # Documented at https://source.android.com/devices/bootloader/partitions-images
90 # Documented at https://source.android.com/devices/bootloader/partitions-images
99 # Documented at https://source.android.com/devices/bootloader/partitions-images
103 # Documented at https://source.android.com/devices/bootloader/partitions-images
109 # sdcard devices; normally vold uses the vold_block_device label and creates a
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/30.0/public/
Ddevice.te59 # All devices have a uart for the hci
65 # All devices have a rpmsg device for
76 # Documented at https://source.android.com/devices/bootloader/partitions-images
80 # Documented at https://source.android.com/devices/bootloader/partitions-images
84 # Documented at https://source.android.com/devices/bootloader/partitions-images
88 # Documented at https://source.android.com/devices/bootloader/partitions-images
92 # Documented at https://source.android.com/devices/bootloader/partitions-images
101 # Documented at https://source.android.com/devices/bootloader/partitions-images
105 # Documented at https://source.android.com/devices/bootloader/partitions-images
111 # sdcard devices; normally vold uses the vold_block_device label and creates a
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/public/
Ddevice.te60 # All devices have a uart for the hci
66 # All devices have a rpmsg device for
77 # Documented at https://source.android.com/devices/bootloader/partitions-images
81 # Documented at https://source.android.com/devices/bootloader/partitions-images
85 # Documented at https://source.android.com/devices/bootloader/partitions-images
89 # Documented at https://source.android.com/devices/bootloader/partitions-images
93 # Documented at https://source.android.com/devices/bootloader/partitions-images
102 # Documented at https://source.android.com/devices/bootloader/partitions-images
106 # Documented at https://source.android.com/devices/bootloader/partitions-images
112 # sdcard devices; normally vold uses the vold_block_device label and creates a
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/27.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/28.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
20 # block devices. With that information, it runs stat() on each block
24 # Allow stat access to all block devices so that fsck can compare
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/core/rootdir/
Dueventd.rc64 /sys/devices/platform/trusty.* trusty_version 0440 root log
65 /sys/devices/virtual/input/input* enable 0660 root input
66 /sys/devices/virtual/input/input* poll_delay 0660 root input
67 /sys/devices/virtual/usb_composite/* enable 0664 root system
68 /sys/devices/system/cpu/cpu* cpufreq/scaling_max_freq 0664 system system
69 /sys/devices/system/cpu/cpu* cpufreq/scaling_min_freq 0664 system system
/system/memory/lmkd/
DREADME.md70 low-RAM devices = 10, for high-end devices = 20
75 Default for low-RAM devices = 30, for high-end
76 devices = 100
81 after a kill. Default for low-RAM devices = 50,
82 for high-end devices = 10
86 low-RAM devices = 200, for high-end devices = 70
/system/sepolicy/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/27.0/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/28.0/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/26.0/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/29.0/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data
/system/vold/
DDevmapper.cpp83 std::vector<DeviceMapper::DmBlockDevice> devices; in destroyAll() local
84 if (!dm.GetAvailableDevices(&devices)) { in destroyAll()
89 for (const auto& device : devices) { in destroyAll()
/system/bt/vendor_libs/test_vendor_lib/model/devices/
Dscripted_beacon.h26 using android::bluetooth::test_vendor_lib::model::devices::ScriptedBeaconBleAdProto::PlaybackEvent;
71 android::bluetooth::test_vendor_lib::model::devices::
78 …android::bluetooth::test_vendor_lib::model::devices::ScriptedBeaconBleAdProto::BleAdvertisementLis…
/system/sepolicy/prebuilts/api/30.0/private/
Dblkid_untrusted.te1 # blkid for untrusted block devices
5 # Allowed read-only access to vold block devices to extract UUID/label
20 # Untrusted blkid should never be run on block devices holding sensitive data

12345678910>>...14