Searched defs:device (Results 1 - 25 of 53) sorted by last modified time

123

/system/vold/
H A DVolumeManager.cpp127 dev_t device = mVirtualDisk->getDevice(); local
128 handleDiskRemoved(device);
192 dev_t device = makedev(major, minor); local
211 auto disk = new android::vold::Disk(eventPath, device,
221 handleDiskChanged(device);
225 handleDiskRemoved(device);
237 // until the user unlocks the device to actually touch it
248 void VolumeManager::handleDiskChanged(dev_t device) { argument
250 if (disk->getDevice() == device) {
257 // we'll scan them once the device i
260 handleDiskRemoved(dev_t device) argument
[all...]
/system/vold/model/
H A DDisk.cpp93 * MMC-based SD card device; instead, it emulates SD cards with virtio-blk,
95 * Unfortunately, the virtio-blk block device driver does not use a fixed
105 * b) If the major number is an experimental block device major number (for
110 * "ranchu", the device's sysfs path should end with "/block/vd[d-z]", etc.
117 Disk::Disk(const std::string& eventPath, dev_t device, argument
119 mDevice(device), mSize(-1), mNickname(nickname), mFlags(flags), mCreated(
121 mId = StringPrintf("disk:%u,%u", major(device), minor(device));
178 void Disk::createPublicVolume(dev_t device) { argument
179 auto vol = std::shared_ptr<VolumeBase>(new PublicVolume(device));
194 createPrivateVolume(dev_t device, const std::string& partGuid) argument
[all...]
H A DEmulatedVolume.cpp48 EmulatedVolume::EmulatedVolume(const std::string& rawPath, dev_t device, argument
50 setId(StringPrintf("emulated:%u,%u", major(device), minor(device)));
H A DPrivateVolume.cpp46 PrivateVolume::PrivateVolume(dev_t device, const std::string& keyRaw) : argument
47 VolumeBase(Type::kPrivate), mRawDevice(device), mKeyRaw(keyRaw) {
48 setId(StringPrintf("private:%u,%u", major(device), minor(device)));
H A DPublicVolume.cpp46 PublicVolume::PublicVolume(dev_t device) : argument
47 VolumeBase(Type::kPublic), mDevice(device), mFusePid(0) {
48 setId(StringPrintf("public:%u,%u", major(device), minor(device)));
/system/update_engine/
H A Dboot_control_chromeos.cc47 // Resolve the boot device path fully, including dereferencing through
51 LOG(ERROR) << "rootdev failed to find the root device";
54 LOG_IF(WARNING, ret > 0) << "rootdev found a device name with no device node";
101 << "Booted from a removable device, pretending we have only one slot.";
121 << ". This device is not updateable.";
143 string* device) const {
152 *device = part_device;
256 string BootControlChromeOS::SysfsBlockDevice(const string& device) { argument
257 base::FilePath device_path(device);
265 IsRemovableDevice(const string& device) argument
[all...]
H A Dutils_android.cc27 // Open the appropriate fstab file and fallback to /fstab.device if
34 fstab = fs_mgr_read_fstab("/fstab.device");
42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument
58 *device = base::FilePath(record->blk_device);
/system/update_engine/common/
H A Dfake_boot_control.h47 std::string* device) const override {
53 *device = part_it->second;
90 const std::string& device) {
92 devices_[slot][partition_name] = device;
88 SetPartitionDevice(const std::string& partition_name, BootControlInterface::Slot slot, const std::string& device) argument
H A Dutils.cc90 // Return true if |disk_name| is an MTD or a UBI device. Note that this test is
91 // simply based on the name of the device.
98 // Return the device name for the corresponding partition on a NAND device.
99 // WARNING: This function returns device names that are not mountable.
113 // Return the device name for the corresponding partition on a NAND device that
470 LOG(ERROR) << "Invalid partition device name: " << partition_name;
477 LOG(ERROR) << "Unable to parse partition device name: " << partition_name;
489 LOG(ERROR) << "Unable to parse partition device nam
633 SetBlockDeviceReadOnly(const string& device, bool read_only) argument
657 MountFilesystem(const string& device, const string& mountpoint, unsigned long mountflags, const string& type, const string& fs_mount_options) argument
[all...]
/system/update_engine/payload_generator/
H A Ddelta_diff_utils.cc790 // the puffing on the client device.
918 bool IsExtFilesystem(const string& device) { argument
924 device, 0, SUPERBLOCK_OFFSET + SUPERBLOCK_SIZE, &header) ||
/system/tools/hidl/c2hal/test/
H A Dsimple.h36 * Common methods of the simple device.
73 struct simple_t** device) {
75 FORGROUND_COLOR, (struct simple_t**)device);
78 static inline int hideColor(struct simple_t* device) { argument
79 return device->common.close(&device->common);
72 showColor(const struct hw_module_t* module, struct simple_t** device) argument
/system/sepolicy/
H A DAndroid.mk48 # build process for device:
274 # sepolicy_policy.conf - All of the policy for the device. This is only used to
385 # which will ship with the device. The platform will always reflect the most
769 # CTS checks neverallow rules of this policy against the policy of the device under test.
806 # 2. Collect all device specific file_contexts files and process them with m4
807 # into a tmp file called file_contexts.device.tmp.
808 # 3. Run checkfc -e (allow no device fc entries ie empty) and fc_sort on
809 # file_contexts.device.tmp and output to file_contexts.device.sorted.tmp.
810 # 4. Concatenate file_contexts.local.tmp and file_contexts.device
[all...]
/system/security/keystore/
H A Dkey_store_service.cpp715 // Do not clear keys critical to device encryption under system uid.
733 auto device = mKeyStore->getDevice(flagsToSecurityLevel(flags)); local
734 if (!device) {
738 KeyStoreServiceReturnCode(KS_HANDLE_HIDL_ERROR(device->addRngEntropy(entropy))));
1277 // Add entropy to the device first.
1351 // This operation needs an auth token, but the device is a STRONGBOX, so it can't check the
1450 op.device->update(op.handle, inParams, data, authToken, op.verificationToken, hidlCb));
1478 result->resultCode = KS_HANDLE_HIDL_ERROR(op.device->addRngEntropy(entropy));
1507 op.device->finish(op.handle, inParams,
1534 ErrorCode error_code = KS_HANDLE_HIDL_ERROR(op.device
[all...]
H A Doperation_struct.h39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
49 sp<Keymaster> device; member in struct:keystore::Operation
/system/nvram/client/
H A Dnvram_client.c101 static int HandleGetTotalSize(nvram_device_t* device, char* args[]) { argument
104 nvram_result_t result = device->get_total_size_in_bytes(device, &total_size);
113 static int HandleGetAvailableSize(nvram_device_t* device, char* args[]) { argument
117 device->get_available_size_in_bytes(device, &available_size);
126 static int HandleGetMaxSpaceSize(nvram_device_t* device, char* args[]) { argument
130 device->get_max_space_size_in_bytes(device, &max_space_size);
139 static int HandleGetMaxSpaces(nvram_device_t* device, cha argument
151 HandleGetSpaceList(nvram_device_t* device, char* args[]) argument
183 HandleGetSpaceSize(nvram_device_t* device, char* args[]) argument
195 HandleGetSpaceControls(nvram_device_t* device, char* args[]) argument
233 HandleIsSpaceReadLocked(nvram_device_t* device, char* args[]) argument
247 HandleIsSpaceWriteLocked(nvram_device_t* device, char* args[]) argument
261 HandleCreateSpace(nvram_device_t* device, char* args[]) argument
288 HandleDeleteSpace(nvram_device_t* device, char* args[]) argument
294 HandleDisableCreate(nvram_device_t* device, char* args[]) argument
299 HandleWriteSpace(nvram_device_t* device, char* args[]) argument
305 HandleReadSpace(nvram_device_t* device, char* args[]) argument
331 HandleEnableWriteLock(nvram_device_t* device, char* args[]) argument
337 HandleEnableReadLock(nvram_device_t* device, char* args[]) argument
[all...]
/system/nvram/hal/
H A Dnvram_device_adapter.cpp28 // Executes an operation on the |NvramDeviceAdapter| corresponding to |device|.
35 nvram_result_t Execute(const nvram_device_t* device, argument
39 const_cast<nvram_device_t*>(device));
61 nvram_result_t device_get_total_size_in_bytes(const nvram_device_t* device, argument
66 device, std::move(get_info_request), &get_info_response);
71 nvram_result_t device_get_available_size_in_bytes(const nvram_device_t* device, argument
76 device, std::move(get_info_request), &get_info_response);
81 nvram_result_t device_get_max_space_size_in_bytes(const nvram_device_t* device, argument
86 device, std::move(get_info_request), &get_info_response);
91 nvram_result_t device_get_max_spaces(const nvram_device_t* device, argument
101 device_get_space_list(const nvram_device_t* device, uint32_t max_list_size, uint32_t* space_index_list, uint32_t* list_size) argument
123 device_get_space_size(const nvram_device_t* device, uint32_t index, uint64_t* size) argument
135 device_get_space_controls(const nvram_device_t* device, uint32_t index, uint32_t max_list_size, nvram_control_t* control_list, uint32_t* list_size) argument
159 device_is_space_locked(const nvram_device_t* device, uint32_t index, int* write_lock_enabled, int* read_lock_enabled) argument
173 device_create_space(const nvram_device_t* device, uint32_t index, uint64_t size_in_bytes, const nvram_control_t* control_list, uint32_t list_size, const uint8_t* authorization_value, uint32_t authorization_value_size) argument
198 device_delete_space(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument
213 device_disable_create(const nvram_device_t* device) argument
220 device_write_space(const nvram_device_t* device, uint32_t index, const uint8_t* buffer, uint64_t buffer_size, const uint8_t* authorization_value, uint32_t authorization_value_size) argument
238 device_read_space(const nvram_device_t* device, uint32_t index, uint64_t num_bytes_to_read, const uint8_t* authorization_value, uint32_t authorization_value_size, uint8_t* buffer, uint64_t* bytes_read) argument
260 device_enable_write_lock(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument
275 device_enable_read_lock(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument
290 device_nvram_device_close(struct hw_device_t* device) argument
[all...]
/system/nvram/hal/tests/
H A Dnvram_hal_test.cc86 ScopedNvramSpace(SafeScopedNvramDevice* device, uint32_t index, uint32_t size) argument
87 : ScopedNvramSpace(device,
95 ScopedNvramSpace(SafeScopedNvramDevice* device, argument
99 : ScopedNvramSpace(device,
105 ScopedNvramSpace(SafeScopedNvramDevice* device, argument
110 : device_(device),
137 bool CleanBurnSpaces(SafeScopedNvramDevice* device) { argument
147 if (device->GetSpaceList(&space_index_list) != NV_RESULT_SUCCESS) {
153 if (device->IsSpaceLocked(index, &write_lock, &read_lock) !=
159 nvram_result_t result = device
175 GetNextBurnSpace(SafeScopedNvramDevice* device, uint32_t* index) argument
[all...]
/system/libvintf/include/vintf/
H A DCompatibilityMatrix.h123 // entries only for device compatibility matrix.
132 } device; member in struct:android::vintf::CompatibilityMatrix
H A DHalManifest.h55 // Construct a device HAL manifest.
67 // - framework manifest vs. device compat-mat
70 // - device manifest vs. framework compat-mat
82 // "android.hardware.camera.device@1.0", "android.hardware.camera.device@3.2",
93 // device.mSepolicyVersion. Assume type == device.
94 // Abort if type != device.
161 // entries for device hal manifest only
164 } device; member in struct:android::vintf::HalManifest
[all...]
/system/media/alsa_utils/
H A Dalsa_device_profile.c51 quality and driver instability (depends on device).
52 The order here determines the default sample rate for the device.
57 requires opening the device which may cause pops. */
63 profile->card = profile->device = -1;
84 return profile->card >= 0 && profile->device >= 0;
91 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device) { argument
92 return card == profile->card && device == profile->device;
225 struct pcm * pcm = pcm_open(profile->card, profile->device,
310 ALOGW("usb device doe
[all...]
/system/media/alsa_utils/include/
H A Dalsa_device_profile.h40 int device; member in struct:__anon1982
52 /* read from the hardware device */
65 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device);
/system/media/audio/include/system/
H A Daudio.h41 /* device address used to refer to the standard remote submix */
216 * Stub audio output device. Used in policy configuration file on platforms without audio outputs.
221 * Stub audio input device. Used in policy configuration file on platforms without audio inputs.
384 /* the maximum length for the human-readable device name */
387 /* maximum audio device address length */
391 * hardware device */
393 audio_module_handle_t hw_module; /* module the device is attached to */
394 audio_devices_t type; /* device type (e.g AUDIO_DEVICE_OUT_SPEAKER) */
395 char address[AUDIO_DEVICE_MAX_ADDRESS_LEN]; /* device address. "" if N/A */
421 audio_port_type_t type; /* device, mi
428 struct audio_port_config_device_ext device; /* device specific info */ member in union:audio_port_config::__anon2011
479 struct audio_port_device_ext device; member in union:audio_port::__anon2012
554 audio_is_output_device(audio_devices_t device) argument
563 audio_is_input_device(audio_devices_t device) argument
573 audio_is_output_devices(audio_devices_t device) argument
578 audio_is_a2dp_in_device(audio_devices_t device) argument
588 audio_is_a2dp_out_device(audio_devices_t device) argument
597 audio_is_a2dp_device(audio_devices_t device) argument
602 audio_is_bluetooth_sco_device(audio_devices_t device) argument
616 audio_is_hearing_aid_out_device(audio_devices_t device) argument
621 audio_is_usb_out_device(audio_devices_t device) argument
626 audio_is_usb_in_device(audio_devices_t device) argument
637 audio_is_usb_device(audio_devices_t device) argument
642 audio_is_remote_submix_device(audio_devices_t device) argument
989 audio_device_address_to_parameter(audio_devices_t device, const char *address) argument
1004 audio_device_is_digital(audio_devices_t device) argument
1096 audio_devices_t device; member in struct:audio_microphone_characteristic_t
[all...]
/system/keymaster/contexts/
H A Dkeymaster1_passthrough_context.cpp110 static keymaster_error_t parseKeymaster1HwBlob(const keymaster1_device_t* device, argument
127 keymaster_error_t error = device->get_key_characteristics(device, &blob, client_id_ptr,
159 error = parseKeymaster1HwBlob(km1_engine_->device(), blob, additional_params,
177 // HACK. Due to a bug with Qualcomm's Keymaster implementation, which causes the device to
/system/keymaster/include/keymaster/legacy_support/
H A Dkeymaster0_engine.h41 * ownership of the device, and will close it during destruction.
63 const keymaster0_device_t* device() { return keymaster0_device_; } function in class:keymaster::Keymaster0Engine
H A Dkeymaster1_engine.h41 * ownership of the device, and will close it during destruction.
80 const keymaster1_device_t* device() const { return keymaster1_device_; } function in class:keymaster::Keymaster1Engine

Completed in 378 milliseconds

123