/system/nvram/core/ |
D | persistence.cpp | 46 storage::Status EncodeObject(const Object& object, Blob* blob) { in EncodeObject() 53 return storage::Status::kStorageError; in EncodeObject() 55 return storage::Status::kSuccess; in EncodeObject() 67 storage::Status DecodeObject(const Blob& blob, Object* object) { in DecodeObject() 74 return storage::Status::kStorageError; in DecodeObject() 76 return storage::Status::kSuccess; in DecodeObject() 99 storage::Status LoadHeader(NvramHeader* header) { in LoadHeader() 101 storage::Status status = storage::LoadHeader(&blob); in LoadHeader() 102 if (status != storage::Status::kSuccess) { in LoadHeader() 108 storage::Status StoreHeader(const NvramHeader& header) { in StoreHeader() [all …]
|
D | nvram_manager.cpp | 28 using namespace nvram::storage; 93 storage::Status SanitizeStorageStatus(storage::Status status) { in SanitizeStorageStatus() 95 case storage::Status::kSuccess: in SanitizeStorageStatus() 96 return storage::Status::kSuccess; in SanitizeStorageStatus() 97 case storage::Status::kNotFound: in SanitizeStorageStatus() 98 return storage::Status::kNotFound; in SanitizeStorageStatus() 99 case storage::Status::kStorageError: in SanitizeStorageStatus() 100 return storage::Status::kStorageError; in SanitizeStorageStatus() 103 return storage::Status::kStorageError; in SanitizeStorageStatus() 352 case storage::Status::kStorageError: in DeleteSpace() [all …]
|
/system/nvram/hal/ |
D | fake_nvram_storage.cpp | 65 nvram::storage::Status DeleteFile(const char* name) { in DeleteFile() 68 return nvram::storage::Status::kNotFound; in DeleteFile() 71 return nvram::storage::Status::kStorageError; in DeleteFile() 74 return nvram::storage::Status::kSuccess; in DeleteFile() 78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { in LoadFile() 83 return nvram::storage::Status::kNotFound; in LoadFile() 86 return nvram::storage::Status::kStorageError; in LoadFile() 92 return nvram::storage::Status::kStorageError; in LoadFile() 97 return nvram::storage::Status::kStorageError; in LoadFile() 102 return nvram::storage::Status::kStorageError; in LoadFile() [all …]
|
/system/nvram/core/tests/ |
D | nvram_manager_test.cpp | 36 storage::Clear(); in NvramManagerTest() 44 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in SetupHeader() 85 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F() 87 ASSERT_EQ(storage::Status::kSuccess, storage::LoadSpace(1, &space_blob)); in TEST_F() 89 ASSERT_EQ(storage::Status::kSuccess, storage::StoreSpace(1, space_blob)); in TEST_F() 96 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in TEST_F() 98 ASSERT_EQ(storage::Status::kSuccess, storage::LoadHeader(&header_blob)); in TEST_F() 100 ASSERT_EQ(storage::Status::kSuccess, storage::StoreHeader(header_blob)); in TEST_F() 125 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F() 127 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(2, space)); in TEST_F() [all …]
|
D | fake_storage.h | 23 namespace storage {
|
/system/nvram/core/include/nvram/core/ |
D | persistence.h | 131 storage::Status LoadHeader(NvramHeader* header); 134 storage::Status StoreHeader(const NvramHeader& header); 137 storage::Status LoadSpace(uint32_t index, NvramSpace* space); 140 storage::Status StoreSpace(uint32_t index, const NvramSpace& space); 143 storage::Status DeleteSpace(uint32_t index);
|
D | storage.h | 27 namespace storage {
|
/system/chre/platform/shared/include/chre/platform/shared/ |
D | memory.h | 103 auto *storage = static_cast<T *>(memoryAllocDram(sizeof(T))); in memoryAllocDram() local 104 if (storage != nullptr) { in memoryAllocDram() 105 new (storage) T(std::forward<Args>(args)...); in memoryAllocDram() 108 return storage; in memoryAllocDram()
|
/system/logging/liblog/ |
D | log_event_list.cpp | 45 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member 56 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in init_context() 65 memcpy(context->storage, msg, len); in init_parser_context() 155 auto* event_list = reinterpret_cast<android_event_list_t*>(&context->storage[context->pos]); in android_log_write_list_begin() 177 auto* event_int = reinterpret_cast<android_event_int_t*>(&context->storage[context->pos]); in android_log_write_int32() 197 auto* event_long = reinterpret_cast<android_event_long_t*>(&context->storage[context->pos]); in android_log_write_int64() 225 auto* event_string = reinterpret_cast<android_event_string_t*>(&context->storage[context->pos]); in android_log_write_string8_len() 252 auto* event_float = reinterpret_cast<android_event_float_t*>(&context->storage[context->pos]); in android_log_write_float32() 277 context->storage[context->list[context->list_nest_depth]] = in android_log_write_list_end() 301 context->storage[1] = context->count[0]; in android_log_write_list() [all …]
|
/system/core/libstats/push_compat/ |
D | stats_event_list.c | 38 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member 63 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in reset_log_context() 83 context->storage[1] = context->count[0]; in stats_write_list() 85 msg = (const char*)context->storage; in stats_write_list() 232 context->storage[context->pos + 0] = EVENT_TYPE_STRING; in android_log_write_char_array() 233 copy4LE(&context->storage[context->pos + 1], len); in android_log_write_char_array() 235 memcpy(&context->storage[context->pos + 5], value, len); in android_log_write_char_array()
|
/system/chre/util/include/chre/util/ |
D | memory_impl.h | 124 T *storage = nullptr; in memoryAlloc() local 126 storage = memoryAlignedAlloc<T>(); in memoryAlloc() 128 storage = static_cast<T *>(memoryAlloc(sizeof(T))); in memoryAlloc() 131 if (storage != nullptr) { in memoryAlloc() 132 new (storage) T(std::forward<Args>(args)...); in memoryAlloc() 135 return storage; in memoryAlloc()
|
D | array_queue.h | 313 ArrayQueueExternalStorage(ElementType *storage, size_t capacity) in ArrayQueueExternalStorage() argument 314 : mData(storage), kCapacity(capacity) {} in ArrayQueueExternalStorage() 357 ArrayQueueExt(ElementType *storage, size_t capacity) in ArrayQueueExt() argument 360 storage, capacity) {} in ArrayQueueExt()
|
/system/sepolicy/private/ |
D | mlstrustedsubject.te | 32 -vold # encryption of storage areas 33 -vold_prepare_subdirs # creation of storage area directories 59 -vold # encryption of storage area directories 60 -vold_prepare_subdirs # creation of storage area directories
|
D | vold.te | 21 # Newly created storage dirs are always treated as mount stubs to prevent us 68 # verify the ownership of storage areas 77 # when a storage area is created (with `openStorageArea`), vold creates the key 78 # and when a storage area is deleted (with `deleteStorageArea`), vold deletes the key 130 # For formatting adoptable storage devices 137 # Get/set file-based encryption policies on dirs in /data and adoptable storage, 171 # Manage locations where storage is mounted 175 # Access to storage that backs emulated FUSE daemons for migration optimization 190 # Allow mounting of storage devices 202 # Allow to create and mount expanded storage [all …]
|
/system/core/libutils/include/utils/ |
D | VectorImpl.h | 102 virtual void do_construct(void* storage, size_t num) const = 0; 103 virtual void do_destroy(void* storage, size_t num) const = 0; 113 inline void _do_construct(void* storage, size_t num) const; 114 inline void _do_destroy(void* storage, size_t num) const;
|
D | SortedVector.h | 145 virtual void do_construct(void* storage, size_t num) const; 146 virtual void do_destroy(void* storage, size_t num) const; 257 UTILS_VECTOR_NO_CFI void SortedVector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument 258 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct() 262 void SortedVector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument 263 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
|
D | Vector.h | 211 virtual void do_construct(void* storage, size_t num) const; 212 virtual void do_destroy(void* storage, size_t num) const; 385 UTILS_VECTOR_NO_CFI void Vector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument 386 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct() 390 void Vector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument 391 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
|
/system/core/libutils/binder/include/utils/ |
D | VectorImpl.h | 102 virtual void do_construct(void* storage, size_t num) const = 0; 103 virtual void do_destroy(void* storage, size_t num) const = 0; 113 inline void _do_construct(void* storage, size_t num) const; 114 inline void _do_destroy(void* storage, size_t num) const;
|
D | Vector.h | 211 virtual void do_construct(void* storage, size_t num) const; 212 virtual void do_destroy(void* storage, size_t num) const; 385 UTILS_VECTOR_NO_CFI void Vector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument 386 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct() 390 void Vector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument 391 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
|
/system/nvram/ |
D | README.md | 9 require a trusted storage location for critical data that an attacker can't 29 Note that the reference implementation leaves persistent storage to be handled 30 by the embedding code, which needs to provide an implementation of the storage 32 [system/nvram/core/include/nvram/core/storage.h](core/include/nvram/core/storage.h).
|
/system/core/libcutils/ |
D | native_handle.cpp | 86 native_handle_t* native_handle_init(char* storage, int numFds, int numInts) { in native_handle_init() argument 87 if ((uintptr_t)storage % alignof(native_handle_t)) { in native_handle_init() 92 native_handle_t* handle = (native_handle_t*)storage; in native_handle_init()
|
/system/core/fs_mgr/ |
D | README.overlayfs.md | 18 _adb remount_ commands, which set up backing storage for a writable file 68 for backing storage. eg: if booting off system_a+vendor_a, use system_b. 78 - Backing storage requires more space than immutable storage, as backing is 98 storage by running either either _fastboot flashall_ or _adb enable-verity_. 109 - The backing storage is treated fragile, if anything else has 110 issue with the space taken, the backing storage will be cleared 124 - Backing storage will be discarded or ignored on errors, leading
|
/system/tools/hidl/test/error_test/enum_storage/1.0/ |
D | required_error | 1 Must explicitly specify enum storage type
|
/system/server_configurable_flags/aconfigd/ |
D | new_aconfig_storage.aconfig | 7 description: "This flag controls if aconfig storage daemon is turned on"
|
D | aconfigd.proto | 46 // new storage notification 81 // reset all storage 89 // list storage
|