/system/media/audio_utils/include/audio_utils/ |
H A D | fifo.h | 98 * Mark the FIFO as shutdown (permanently unusable), usually due to an -EIO status from an API. 101 void shutdown() const; 129 /** Whether FIFO is marked as shutdown due to detection of an "impossible" error condition. */ 285 * If it ever happens, then the FIFO will be marked unusable with shutdown().
|
/system/vold/ |
H A D | VolumeManager.h | 105 /* Prepare for device shutdown, safely unmounting all devices */ 106 int shutdown();
|
H A D | VoldNativeService.h | 38 binder::Status shutdown();
|
H A D | VoldNativeService.cpp | 243 binder::Status VoldNativeService::shutdown() { function in class:android::vold::VoldNativeService 247 return translate(VolumeManager::Instance()->shutdown());
|
H A D | cryptfs.cpp | 228 enum class RebootType {reboot, recovery, shutdown}; 240 case RebootType::shutdown: 241 property_set(ANDROID_RB_PROPERTY, "shutdown"); 1586 /* Now that the framework is shutdown, we should be able to umount() 2439 cryptfs_reboot(RebootType::shutdown); 2484 SLOGE("Error enabling encryption after framework is shutdown, no data changed, restarting system");
|
H A D | VolumeManager.cpp | 295 // Vold could receive "mount" after "shutdown" command in the extreme case. 583 // Can be called twice (sequentially) during shutdown. should be safe for that. 584 int VolumeManager::shutdown() { function in class:VolumeManager 586 return 0; // already shutdown
|
/system/netd/libnetdutils/ |
H A D | Syscalls.cpp | 166 Status shutdown(Fd fd, int how) const override { 167 auto rv = ::shutdown(fd.get(), how); 169 return statusFromErrno(errno, "shutdown() failed");
|
/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | te_macros | 120 allow $1 pdx_$2_endpoint_socket_type:unix_stream_socket { read getattr write setattr lock append getopt setopt shutdown listen accept }; 136 allow $1 pdx_$2_endpoint_socket_type:unix_stream_socket { connectto read write shutdown }; 145 allow $1 pdx_$2_channel_socket_type:unix_stream_socket { read getattr write setattr lock append getopt setopt shutdown }; 405 allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind };
|
/system/sepolicy/public/ |
H A D | te_macros | 120 allow $1 pdx_$2_endpoint_socket_type:unix_stream_socket { read getattr write setattr lock append getopt setopt shutdown listen accept }; 136 allow $1 pdx_$2_endpoint_socket_type:unix_stream_socket { connectto read write shutdown }; 145 allow $1 pdx_$2_channel_socket_type:unix_stream_socket { read getattr write setattr lock append getopt setopt shutdown }; 405 allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind };
|
/system/netd/libnetdutils/include/netdutils/ |
H A D | Syscalls.h | 76 virtual Status shutdown(Fd fd, int how) const = 0;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | app.te | 63 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown }; 64 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown }; 70 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown }; 147 allow appdomain dumpstate:unix_stream_socket { read write getopt getattr shutdown }; 197 allow appdomain appdomain:unix_stream_socket { getopt getattr read write shutdown }; 330 allow appdomain adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
H A D | access_vectors | 56 shutdown
|
H A D | system_server.te | 480 allow system_server appdomain:{ tcp_socket udp_socket } { getattr getopt setopt read write shutdown }; 623 allow system_server adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | access_vectors | 58 shutdown
|
H A D | system_server.te | 509 allow system_server appdomain:{ tcp_socket udp_socket } { getattr getopt setopt read write shutdown }; 651 allow system_server adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | access_vectors | 58 shutdown
|
H A D | system_server.te | 556 allow system_server appdomain:{ tcp_socket udp_socket } { getattr getopt setopt read write shutdown }; 707 allow system_server adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
/system/sepolicy/private/ |
H A D | access_vectors | 58 shutdown
|
H A D | system_server.te | 556 allow system_server appdomain:{ tcp_socket udp_socket } { getattr getopt setopt read write shutdown }; 707 allow system_server adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
|
/system/sepolicy/reqd_mask/ |
H A D | access_vectors | 58 shutdown
|
/system/chre/platform/slpi/ |
H A D | host_link.cc | 623 void HostLinkBase::shutdown() { function in class:chre::HostLinkBase 638 FARF(ERROR, "No room in outbound queue for shutdown message and host not " 641 // We were able to push the shutdown message. Wait for the queue to
|
/system/core/adb/ |
H A D | sysdeps_win32.cpp | 582 if (shutdown(f->fh_socket, SD_BOTH) == SOCKET_ERROR) { 586 D("socket shutdown failed: %s", 672 // Winsock because we don't cleanly shutdown all threads, so it 1024 if (shutdown(f->fh_socket, direction) == SOCKET_ERROR) { 1026 D("socket shutdown fd %d failed: %s", fd,
|
/system/bt/btif/src/ |
H A D | btif_sock_l2cap.cc | 225 shutdown(sock->our_fd, SHUT_RDWR);
|
H A D | btif_sock_rfc.cc | 412 shutdown(slot->fd, SHUT_RDWR);
|
/system/libhwbinder/ |
H A D | IPCThreadState.cpp | 290 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n"); 319 void IPCThreadState::shutdown() function in class:android::hardware::IPCThreadState
|