Home
last modified time | relevance | path

Searched refs:firmware (Results 1 – 10 of 10) sorted by relevance

/system/core/init/
Ddevices.cpp426 uevent->firmware = ""; in parse_event()
446 uevent->firmware = msg; in parse_event()
472 uevent->firmware, uevent->major, uevent->minor); in parse_event()
843 … PLOG(ERROR) << "firmware: sendfile failed { '" << root << "', '" << uevent->firmware << "' }"; in load_firmware()
858 LOG(INFO) << "firmware: loading '" << uevent->firmware << "' for '" << uevent->path << "'"; in process_firmware_event()
866 PLOG(ERROR) << "couldn't open firmware loading fd for " << uevent->firmware; in process_firmware_event()
872 PLOG(ERROR) << "couldn't open firmware data fd for " << uevent->firmware; in process_firmware_event()
878 std::string file = android::base::StringPrintf("%s/%s", firmware_dirs[i], uevent->firmware); in process_firmware_event()
895 LOG(ERROR) << "firmware: could not find firmware for " << uevent->firmware; in process_firmware_event()
914 PLOG(ERROR) << "could not fork to process firmware event for " << uevent->firmware; in handle_firmware_event()
Ddevices.h39 const char* firmware; member
/system/bt/doc/
Dproperties.md9 Maximum amount of time Bluetooth can take to start-up, upload firmware etc.
/system/sepolicy/public/
Dhal_wifi.te22 # hal_wifi writes firmware paths to this file.
Dueventd.te32 # Access for /vendor/ueventd.rc and /vendor/firmware
/system/tpm/trunks/
DREADME7 comply with the TSS specification. It is usable in firmware as well as in
/system/tpm/trunks/generator/
Draw_commands_fixed.txt915 firmware update), it is not possible to provide a compliant implementation. In those cases, any
1193 the platform firmware cannot know that the TPM is in Failure mode without accessing it, and
1195 platform firmware (the CRTM) will issue TPM2_Startup() and receive TPM_RC_FAILURE
12780 Each of the attestation structures contains a TPMS_CLOCK_INFO structure and a firmware version
14516 TPMS_ATTEST.clockInfo and again in TPMS_ATTEST.attested.time.clockInfo. The firmware version
28008 This clause contains the commands for managing field upgrade of the firmware in the TPM. The field
28009 upgrade scheme may be used for replacement or augmentation of the firmware installed in the TPM.
28012 …an algorithm is found to be flawed, a patch of that algorithm might be installed using the firmware
28014 replacement of the firmware.
28018 If an additional set of ECC parameters is needed, the firmware process may be used to add the
[all …]
Draw_structures_fixed.txt6206 firmware update. The values in the variable group (PT_VAR) may be changed with TPM commands but
6241 firmware change in the TPM.
6351 indicating the version of the firmware
6357 indicating the version of the firmware
6653 Protected Capability other than a firmware update. The
11998 firmware
12323 TPM-vendor-specific field identifying the firmware on the TPM
Draw_structures.txt6229 firmware update. The values in the variable group (PT_VAR) may be changed with TPM commands but
6263 firmware change in the TPM.
6361 indicating the version of the firmware
6366 indicating the version of the firmware
6628 Protected Capability other than a firmware update. The
11962 firmware
12285 TPM-vendor-specific field identifying the firmware on the TPM
/system/core/rootdir/
Dinit.rc286 # Remove a file to wake up anything waiting for firmware.