| /linux/Documentation/admin-guide/ |
| H A D | binderfs.rst | 6 Android binderfs is a filesystem for the Android binder IPC mechanism. It 7 allows to dynamically add and remove binder devices at runtime. Binder devices 8 located in a new binderfs instance are independent of binder devices located in 10 to get a set of private binder devices. 18 mount -t binder binder /dev/binderfs 21 In a fresh instance of binderfs no binder devices will be present. There will 22 only be a ``binder-control`` device which serves as the request handler for 31 binderfs instances can be mounted with a limit on the number of binder 34 of binder devices can be allocated in this binderfs instance. 37 Using ``stats=global`` enables global binder statistics. [all …]
|
| /linux/samples/binderfs/ |
| H A D | binderfs_example.c | 15 #include <linux/android/binder.h> 44 ret = mount(NULL, "/dev/binderfs", "binder", 0, 0); in main() 51 memcpy(device.name, "my-binder", strlen("my-binder")); in main() 53 fd = open("/dev/binderfs/binder-control", O_RDONLY | O_CLOEXEC); in main() 55 fprintf(stderr, "%s - Failed to open binder-control device\n", in main() 65 fprintf(stderr, "%s - Failed to allocate new binder device\n", in main() 70 printf("Allocated new binder device with major %d, minor %d, and name %s\n", in main() 73 ret = unlink("/dev/binderfs/my-binder"); in main() 75 fprintf(stderr, "%s - Failed to delete binder device\n", in main()
|
| /linux/sound/soc/intel/avs/boards/ |
| H A D | hdaudio.c | 172 struct snd_soc_dai_link *binder; in avs_hdaudio_probe() local 187 binder = devm_kmemdup(dev, &probing_link, sizeof(probing_link), GFP_KERNEL); in avs_hdaudio_probe() 188 if (!binder) in avs_hdaudio_probe() 191 binder->platforms = devm_kzalloc(dev, sizeof(*binder->platforms), GFP_KERNEL); in avs_hdaudio_probe() 192 binder->codecs = devm_kzalloc(dev, sizeof(*binder->codecs), GFP_KERNEL); in avs_hdaudio_probe() 193 if (!binder->platforms || !binder->codecs) in avs_hdaudio_probe() 196 binder in avs_hdaudio_probe() [all...] |
| /linux/include/uapi/linux/android/ |
| H A D | binderfs.h | 10 #include <linux/android/binder.h> 17 * struct binderfs_device - retrieve information about a new binder device 18 * @name: the name to use for the new binderfs binder device 19 * @major: major number allocated for binderfs binder devices 20 * @minor: minor number allocated for the new binderfs binder device 30 * Allocate a new binder device.
|
| H A D | binder.h | 6 * OpenBinder.org binder driver interface, which is: 63 * struct binder_object_header - header shared by all binder metadata objects. 71 * This is the flattened representation of a Binder object for transfer 72 * between processes. The 'offsets' supplied as part of a binder transaction 73 * contains offsets into the data where these structures occur. The Binder 83 binder_uintptr_t binder; /* local object */ member 119 * binder kernel driver can copy verbatim to the target 173 * translate the buffer (and local binder) addresses appropriately. 412 * void *: ptr to binder 413 * void *: cookie for binder [all...] |
| /linux/drivers/android/ |
| H A D | binder_alloc.h | 16 #include <uapi/linux/android/binder.h> 21 * struct binder_buffer - buffer used for binder transactions 39 * Bookkeeping structure for binder transaction buffers 61 * struct binder_shrinker_mdata - binder metadata used to reclaim pages 82 * struct binder_alloc - per-binder proc state for binder allocator 97 * @mapped: whether the vm area is mapped, each binder instance is 102 * Bookkeeping structure for per-proc address space management for binder
|
| H A D | binder_alloc.c | 633 * binder_alloc_new_buf() - Allocate a new binder buffer 795 * @buffer: binder buffer to be accessed 829 * @buffer: binder buffer to be cleared 854 * binder_alloc_free_buf() - free a binder buffer 887 * vma for allocating binder buffers 1250 * new binder proc 1265 binder_shrinker = shrinker_alloc(0, "android-binder"); in binder_alloc_shrinker_init() 1288 * @buffer: binder buffer to be accessed 1320 * @buffer: binder buffer to be accessed
|
| H A D | binder.c | 2 /* binder.c 73 #include <uapi/linux/android/binder.h> 667 * a thread that called into (e)poll is handling non-binder in binder_wakeup_thread_ilocked() 745 binder_uintptr_t ptr = fp ? fp->binder : 0; in binder_init_node_ilocked() 1569 * @t: binder transaction for t->from 1591 * @t: binder transaction for t->from 1624 * @t: binder transaction for t->from 1772 * Copy the binder object at the given offset into @object. If @u is 1984 * function if there is a chance that binder's own file descriptor 2072 node = binder_get_node(proc, fp->binder); in binder_transaction_buffer_release() [all …]
|
| /linux/rust/bindings/ |
| H A D | bindings_helper.h | 114 #include "../../drivers/android/binder/rust_binder.h" 115 #include "../../drivers/android/binder/rust_binder_events.h" 116 #include "../../drivers/android/binder/page_range_helper.h"
|
| /linux/drivers/android/binder/ |
| H A D | process.rs | 5 //! This module defines the `Process` type, which represents a process using a particular binder 8 //! The `Process` object keeps track of all of the resources that this process owns in the binder 11 //! There is one `Process` object for each binder fd that a process has opened, so processes using 12 //! several binder contexts have several `Process` objects. This ensures that the contexts are 127 /// Process is frozen and unable to service binder transactions. 198 // a thread that called into (e)poll is handling non-binder in push_work() 417 /// A process using binder. 419 /// Strictly speaking, there can be multiple of these per process. There is one for each binder fd 420 /// that a process has opened, so processes using several binder contexts have several `Process` 636 seq_print!(m, " has delivered dead binder\n"); in debug_print() [all …]
|
| H A D | node.rs | 150 /// The binder driver guarantees that oneway transactions sent to the same node are serialized, 313 /// An id that is unique across all binder nodes on the system. Used as the key in the 1121 seq_print!(m, "{}has cleared dead binder\n", prefix); in debug_print() 1123 seq_print!(m, "{}has dead binder\n", prefix); in debug_print()
|
| H A D | freeze.rs | 151 seq_print!(m, "{}has frozen binder\n", prefix); in debug_print()
|
| /linux/drivers/android/tests/ |
| H A D | binder_alloc_kunit.c | 3 * Test cases for binder allocator code. 523 kunit_err(test, "Failed to open binder alloc test driver file\n"); in binder_alloc_test_init() 571 MODULE_DESCRIPTION("Binder Alloc KUnit tests");
|
| /linux/drivers/vfio/platform/ |
| H A D | vfio_platform_private.h | 58 * These fields should be filled by the bus specific binder
|
| /linux/security/ |
| H A D | security.c | 1027 * security_binder_set_context_mgr() - Check if becoming binder ctx mgr is ok 1028 * @mgr: task credentials of current binder process 1030 * Check whether @mgr is allowed to be the binder context manager. 1040 * security_binder_transaction() - Check if a binder transaction is allowed 1044 * Check whether @from is allowed to invoke a binder transaction call to @to. 1055 * security_binder_transfer_binder() - Check if a binder transfer is allowed 1059 * Check whether @from is allowed to transfer a binder reference to @to. 1070 * security_binder_transfer_file() - Check if a binder file xfer is allowed
|
| /linux/tools/testing/selftests/filesystems/statmount/ |
| H A D | statmount_test.c | 20 "autofs", "bcachefs", "bdev", "befs", "bfs", "binder", "binfmt_misc",
|
| /linux/arch/arc/mm/ |
| H A D | tlb.c | 190 * (Android Binder ended up calling this for vma->mm != tsk->mm, in local_flush_tlb_mm()
|
| /linux/security/selinux/ |
| H A D | hooks.c | 743 !strcmp(sb->s_type->name, "binder") || in selinux_set_mnt_opts() 7052 /* This function will check the file pass through unix socket or binder to see
|
| /linux/kernel/bpf/ |
| H A D | btf.c | 6647 /* binder */
|