/system/vold/ |
H A D | VolumeManager.cpp | 127 dev_t device = mVirtualDisk->getDevice(); local 128 handleDiskRemoved(device); 192 dev_t device = makedev(major, minor); local 211 auto disk = new android::vold::Disk(eventPath, device, 221 handleDiskChanged(device); 225 handleDiskRemoved(device); 237 // until the user unlocks the device to actually touch it 248 void VolumeManager::handleDiskChanged(dev_t device) { argument 250 if (disk->getDevice() == device) { 257 // we'll scan them once the device i 260 handleDiskRemoved(dev_t device) argument [all...] |
/system/vold/model/ |
H A D | Disk.cpp | 93 * MMC-based SD card device; instead, it emulates SD cards with virtio-blk, 95 * Unfortunately, the virtio-blk block device driver does not use a fixed 105 * b) If the major number is an experimental block device major number (for 110 * "ranchu", the device's sysfs path should end with "/block/vd[d-z]", etc. 117 Disk::Disk(const std::string& eventPath, dev_t device, argument 119 mDevice(device), mSize(-1), mNickname(nickname), mFlags(flags), mCreated( 121 mId = StringPrintf("disk:%u,%u", major(device), minor(device)); 178 void Disk::createPublicVolume(dev_t device) { argument 179 auto vol = std::shared_ptr<VolumeBase>(new PublicVolume(device)); 194 createPrivateVolume(dev_t device, const std::string& partGuid) argument [all...] |
H A D | EmulatedVolume.cpp | 48 EmulatedVolume::EmulatedVolume(const std::string& rawPath, dev_t device, argument 50 setId(StringPrintf("emulated:%u,%u", major(device), minor(device)));
|
H A D | PrivateVolume.cpp | 46 PrivateVolume::PrivateVolume(dev_t device, const std::string& keyRaw) : argument 47 VolumeBase(Type::kPrivate), mRawDevice(device), mKeyRaw(keyRaw) { 48 setId(StringPrintf("private:%u,%u", major(device), minor(device)));
|
H A D | PublicVolume.cpp | 46 PublicVolume::PublicVolume(dev_t device) : argument 47 VolumeBase(Type::kPublic), mDevice(device), mFusePid(0) { 48 setId(StringPrintf("public:%u,%u", major(device), minor(device)));
|
/system/update_engine/ |
H A D | boot_control_chromeos.cc | 47 // Resolve the boot device path fully, including dereferencing through 51 LOG(ERROR) << "rootdev failed to find the root device"; 54 LOG_IF(WARNING, ret > 0) << "rootdev found a device name with no device node"; 101 << "Booted from a removable device, pretending we have only one slot."; 121 << ". This device is not updateable."; 143 string* device) const { 152 *device = part_device; 256 string BootControlChromeOS::SysfsBlockDevice(const string& device) { argument 257 base::FilePath device_path(device); 265 IsRemovableDevice(const string& device) argument [all...] |
H A D | utils_android.cc | 27 // Open the appropriate fstab file and fallback to /fstab.device if 34 fstab = fs_mgr_read_fstab("/fstab.device"); 42 bool DeviceForMountPoint(const string& mount_point, base::FilePath* device) { argument 58 *device = base::FilePath(record->blk_device);
|
/system/update_engine/common/ |
H A D | fake_boot_control.h | 47 std::string* device) const override { 53 *device = part_it->second; 90 const std::string& device) { 92 devices_[slot][partition_name] = device; 88 SetPartitionDevice(const std::string& partition_name, BootControlInterface::Slot slot, const std::string& device) argument
|
H A D | utils.cc | 90 // Return true if |disk_name| is an MTD or a UBI device. Note that this test is 91 // simply based on the name of the device. 98 // Return the device name for the corresponding partition on a NAND device. 99 // WARNING: This function returns device names that are not mountable. 113 // Return the device name for the corresponding partition on a NAND device that 470 LOG(ERROR) << "Invalid partition device name: " << partition_name; 477 LOG(ERROR) << "Unable to parse partition device name: " << partition_name; 489 LOG(ERROR) << "Unable to parse partition device nam 633 SetBlockDeviceReadOnly(const string& device, bool read_only) argument 657 MountFilesystem(const string& device, const string& mountpoint, unsigned long mountflags, const string& type, const string& fs_mount_options) argument [all...] |
/system/update_engine/payload_generator/ |
H A D | delta_diff_utils.cc | 790 // the puffing on the client device. 918 bool IsExtFilesystem(const string& device) { argument 924 device, 0, SUPERBLOCK_OFFSET + SUPERBLOCK_SIZE, &header) ||
|
/system/tools/hidl/c2hal/test/ |
H A D | simple.h | 36 * Common methods of the simple device. 73 struct simple_t** device) { 75 FORGROUND_COLOR, (struct simple_t**)device); 78 static inline int hideColor(struct simple_t* device) { argument 79 return device->common.close(&device->common); 72 showColor(const struct hw_module_t* module, struct simple_t** device) argument
|
/system/sepolicy/ |
H A D | Android.mk | 48 # build process for device: 274 # sepolicy_policy.conf - All of the policy for the device. This is only used to 385 # which will ship with the device. The platform will always reflect the most 769 # CTS checks neverallow rules of this policy against the policy of the device under test. 806 # 2. Collect all device specific file_contexts files and process them with m4 807 # into a tmp file called file_contexts.device.tmp. 808 # 3. Run checkfc -e (allow no device fc entries ie empty) and fc_sort on 809 # file_contexts.device.tmp and output to file_contexts.device.sorted.tmp. 810 # 4. Concatenate file_contexts.local.tmp and file_contexts.device [all...] |
/system/security/keystore/ |
H A D | key_store_service.cpp | 715 // Do not clear keys critical to device encryption under system uid. 733 auto device = mKeyStore->getDevice(flagsToSecurityLevel(flags)); local 734 if (!device) { 738 KeyStoreServiceReturnCode(KS_HANDLE_HIDL_ERROR(device->addRngEntropy(entropy)))); 1277 // Add entropy to the device first. 1351 // This operation needs an auth token, but the device is a STRONGBOX, so it can't check the 1450 op.device->update(op.handle, inParams, data, authToken, op.verificationToken, hidlCb)); 1478 result->resultCode = KS_HANDLE_HIDL_ERROR(op.device->addRngEntropy(entropy)); 1507 op.device->finish(op.handle, inParams, 1534 ErrorCode error_code = KS_HANDLE_HIDL_ERROR(op.device [all...] |
H A D | operation_struct.h | 39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), 49 sp<Keymaster> device; member in struct:keystore::Operation
|
/system/nvram/client/ |
H A D | nvram_client.c | 101 static int HandleGetTotalSize(nvram_device_t* device, char* args[]) { argument 104 nvram_result_t result = device->get_total_size_in_bytes(device, &total_size); 113 static int HandleGetAvailableSize(nvram_device_t* device, char* args[]) { argument 117 device->get_available_size_in_bytes(device, &available_size); 126 static int HandleGetMaxSpaceSize(nvram_device_t* device, char* args[]) { argument 130 device->get_max_space_size_in_bytes(device, &max_space_size); 139 static int HandleGetMaxSpaces(nvram_device_t* device, cha argument 151 HandleGetSpaceList(nvram_device_t* device, char* args[]) argument 183 HandleGetSpaceSize(nvram_device_t* device, char* args[]) argument 195 HandleGetSpaceControls(nvram_device_t* device, char* args[]) argument 233 HandleIsSpaceReadLocked(nvram_device_t* device, char* args[]) argument 247 HandleIsSpaceWriteLocked(nvram_device_t* device, char* args[]) argument 261 HandleCreateSpace(nvram_device_t* device, char* args[]) argument 288 HandleDeleteSpace(nvram_device_t* device, char* args[]) argument 294 HandleDisableCreate(nvram_device_t* device, char* args[]) argument 299 HandleWriteSpace(nvram_device_t* device, char* args[]) argument 305 HandleReadSpace(nvram_device_t* device, char* args[]) argument 331 HandleEnableWriteLock(nvram_device_t* device, char* args[]) argument 337 HandleEnableReadLock(nvram_device_t* device, char* args[]) argument [all...] |
/system/nvram/hal/ |
H A D | nvram_device_adapter.cpp | 28 // Executes an operation on the |NvramDeviceAdapter| corresponding to |device|. 35 nvram_result_t Execute(const nvram_device_t* device, argument 39 const_cast<nvram_device_t*>(device)); 61 nvram_result_t device_get_total_size_in_bytes(const nvram_device_t* device, argument 66 device, std::move(get_info_request), &get_info_response); 71 nvram_result_t device_get_available_size_in_bytes(const nvram_device_t* device, argument 76 device, std::move(get_info_request), &get_info_response); 81 nvram_result_t device_get_max_space_size_in_bytes(const nvram_device_t* device, argument 86 device, std::move(get_info_request), &get_info_response); 91 nvram_result_t device_get_max_spaces(const nvram_device_t* device, argument 101 device_get_space_list(const nvram_device_t* device, uint32_t max_list_size, uint32_t* space_index_list, uint32_t* list_size) argument 123 device_get_space_size(const nvram_device_t* device, uint32_t index, uint64_t* size) argument 135 device_get_space_controls(const nvram_device_t* device, uint32_t index, uint32_t max_list_size, nvram_control_t* control_list, uint32_t* list_size) argument 159 device_is_space_locked(const nvram_device_t* device, uint32_t index, int* write_lock_enabled, int* read_lock_enabled) argument 173 device_create_space(const nvram_device_t* device, uint32_t index, uint64_t size_in_bytes, const nvram_control_t* control_list, uint32_t list_size, const uint8_t* authorization_value, uint32_t authorization_value_size) argument 198 device_delete_space(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument 213 device_disable_create(const nvram_device_t* device) argument 220 device_write_space(const nvram_device_t* device, uint32_t index, const uint8_t* buffer, uint64_t buffer_size, const uint8_t* authorization_value, uint32_t authorization_value_size) argument 238 device_read_space(const nvram_device_t* device, uint32_t index, uint64_t num_bytes_to_read, const uint8_t* authorization_value, uint32_t authorization_value_size, uint8_t* buffer, uint64_t* bytes_read) argument 260 device_enable_write_lock(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument 275 device_enable_read_lock(const nvram_device_t* device, uint32_t index, const uint8_t* authorization_value, uint32_t authorization_value_size) argument 290 device_nvram_device_close(struct hw_device_t* device) argument [all...] |
/system/nvram/hal/tests/ |
H A D | nvram_hal_test.cc | 86 ScopedNvramSpace(SafeScopedNvramDevice* device, uint32_t index, uint32_t size) argument 87 : ScopedNvramSpace(device, 95 ScopedNvramSpace(SafeScopedNvramDevice* device, argument 99 : ScopedNvramSpace(device, 105 ScopedNvramSpace(SafeScopedNvramDevice* device, argument 110 : device_(device), 137 bool CleanBurnSpaces(SafeScopedNvramDevice* device) { argument 147 if (device->GetSpaceList(&space_index_list) != NV_RESULT_SUCCESS) { 153 if (device->IsSpaceLocked(index, &write_lock, &read_lock) != 159 nvram_result_t result = device 175 GetNextBurnSpace(SafeScopedNvramDevice* device, uint32_t* index) argument [all...] |
/system/libvintf/include/vintf/ |
H A D | CompatibilityMatrix.h | 123 // entries only for device compatibility matrix. 132 } device; member in struct:android::vintf::CompatibilityMatrix
|
H A D | HalManifest.h | 55 // Construct a device HAL manifest. 67 // - framework manifest vs. device compat-mat 70 // - device manifest vs. framework compat-mat 82 // "android.hardware.camera.device@1.0", "android.hardware.camera.device@3.2", 93 // device.mSepolicyVersion. Assume type == device. 94 // Abort if type != device. 161 // entries for device hal manifest only 164 } device; member in struct:android::vintf::HalManifest [all...] |
/system/media/alsa_utils/ |
H A D | alsa_device_profile.c | 51 quality and driver instability (depends on device). 52 The order here determines the default sample rate for the device. 57 requires opening the device which may cause pops. */ 63 profile->card = profile->device = -1; 84 return profile->card >= 0 && profile->device >= 0; 91 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device) { argument 92 return card == profile->card && device == profile->device; 225 struct pcm * pcm = pcm_open(profile->card, profile->device, 310 ALOGW("usb device doe [all...] |
/system/media/alsa_utils/include/ |
H A D | alsa_device_profile.h | 40 int device; member in struct:__anon1982 52 /* read from the hardware device */ 65 bool profile_is_cached_for(const alsa_device_profile* profile, int card, int device);
|
/system/media/audio/include/system/ |
H A D | audio.h | 41 /* device address used to refer to the standard remote submix */ 216 * Stub audio output device. Used in policy configuration file on platforms without audio outputs. 221 * Stub audio input device. Used in policy configuration file on platforms without audio inputs. 384 /* the maximum length for the human-readable device name */ 387 /* maximum audio device address length */ 391 * hardware device */ 393 audio_module_handle_t hw_module; /* module the device is attached to */ 394 audio_devices_t type; /* device type (e.g AUDIO_DEVICE_OUT_SPEAKER) */ 395 char address[AUDIO_DEVICE_MAX_ADDRESS_LEN]; /* device address. "" if N/A */ 421 audio_port_type_t type; /* device, mi 428 struct audio_port_config_device_ext device; /* device specific info */ member in union:audio_port_config::__anon2011 479 struct audio_port_device_ext device; member in union:audio_port::__anon2012 554 audio_is_output_device(audio_devices_t device) argument 563 audio_is_input_device(audio_devices_t device) argument 573 audio_is_output_devices(audio_devices_t device) argument 578 audio_is_a2dp_in_device(audio_devices_t device) argument 588 audio_is_a2dp_out_device(audio_devices_t device) argument 597 audio_is_a2dp_device(audio_devices_t device) argument 602 audio_is_bluetooth_sco_device(audio_devices_t device) argument 616 audio_is_hearing_aid_out_device(audio_devices_t device) argument 621 audio_is_usb_out_device(audio_devices_t device) argument 626 audio_is_usb_in_device(audio_devices_t device) argument 637 audio_is_usb_device(audio_devices_t device) argument 642 audio_is_remote_submix_device(audio_devices_t device) argument 989 audio_device_address_to_parameter(audio_devices_t device, const char *address) argument 1004 audio_device_is_digital(audio_devices_t device) argument 1096 audio_devices_t device; member in struct:audio_microphone_characteristic_t [all...] |
/system/keymaster/contexts/ |
H A D | keymaster1_passthrough_context.cpp | 110 static keymaster_error_t parseKeymaster1HwBlob(const keymaster1_device_t* device, argument 127 keymaster_error_t error = device->get_key_characteristics(device, &blob, client_id_ptr, 159 error = parseKeymaster1HwBlob(km1_engine_->device(), blob, additional_params, 177 // HACK. Due to a bug with Qualcomm's Keymaster implementation, which causes the device to
|
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster0_engine.h | 41 * ownership of the device, and will close it during destruction. 63 const keymaster0_device_t* device() { return keymaster0_device_; } function in class:keymaster::Keymaster0Engine
|
H A D | keymaster1_engine.h | 41 * ownership of the device, and will close it during destruction. 80 const keymaster1_device_t* device() const { return keymaster1_device_; } function in class:keymaster::Keymaster1Engine
|