/system/nvram/core/ |
D | persistence.cpp | 46 storage::Status EncodeObject(const Object& object, Blob* blob) { in EncodeObject() 53 return storage::Status::kStorageError; in EncodeObject() 55 return storage::Status::kSuccess; in EncodeObject() 67 storage::Status DecodeObject(const Blob& blob, Object* object) { in DecodeObject() 74 return storage::Status::kStorageError; in DecodeObject() 76 return storage::Status::kSuccess; in DecodeObject() 99 storage::Status LoadHeader(NvramHeader* header) { in LoadHeader() 101 storage::Status status = storage::LoadHeader(&blob); in LoadHeader() 102 if (status != storage::Status::kSuccess) { in LoadHeader() 108 storage::Status StoreHeader(const NvramHeader& header) { in StoreHeader() [all …]
|
D | nvram_manager.cpp | 28 using namespace nvram::storage; 93 storage::Status SanitizeStorageStatus(storage::Status status) { in SanitizeStorageStatus() 95 case storage::Status::kSuccess: in SanitizeStorageStatus() 96 return storage::Status::kSuccess; in SanitizeStorageStatus() 97 case storage::Status::kNotFound: in SanitizeStorageStatus() 98 return storage::Status::kNotFound; in SanitizeStorageStatus() 99 case storage::Status::kStorageError: in SanitizeStorageStatus() 100 return storage::Status::kStorageError; in SanitizeStorageStatus() 103 return storage::Status::kStorageError; in SanitizeStorageStatus() 352 case storage::Status::kStorageError: in DeleteSpace() [all …]
|
/system/nvram/hal/ |
D | fake_nvram_storage.cpp | 65 nvram::storage::Status DeleteFile(const char* name) { in DeleteFile() 68 return nvram::storage::Status::kNotFound; in DeleteFile() 71 return nvram::storage::Status::kStorageError; in DeleteFile() 74 return nvram::storage::Status::kSuccess; in DeleteFile() 78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { in LoadFile() 83 return nvram::storage::Status::kNotFound; in LoadFile() 86 return nvram::storage::Status::kStorageError; in LoadFile() 92 return nvram::storage::Status::kStorageError; in LoadFile() 97 return nvram::storage::Status::kStorageError; in LoadFile() 102 return nvram::storage::Status::kStorageError; in LoadFile() [all …]
|
/system/nvram/core/tests/ |
D | nvram_manager_test.cpp | 36 storage::Clear(); in NvramManagerTest() 44 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in SetupHeader() 85 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F() 87 ASSERT_EQ(storage::Status::kSuccess, storage::LoadSpace(1, &space_blob)); in TEST_F() 89 ASSERT_EQ(storage::Status::kSuccess, storage::StoreSpace(1, space_blob)); in TEST_F() 96 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in TEST_F() 98 ASSERT_EQ(storage::Status::kSuccess, storage::LoadHeader(&header_blob)); in TEST_F() 100 ASSERT_EQ(storage::Status::kSuccess, storage::StoreHeader(header_blob)); in TEST_F() 125 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F() 127 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(2, space)); in TEST_F() [all …]
|
D | fake_storage.h | 23 namespace storage {
|
/system/nvram/core/include/nvram/core/ |
D | persistence.h | 131 storage::Status LoadHeader(NvramHeader* header); 134 storage::Status StoreHeader(const NvramHeader& header); 137 storage::Status LoadSpace(uint32_t index, NvramSpace* space); 140 storage::Status StoreSpace(uint32_t index, const NvramSpace& space); 143 storage::Status DeleteSpace(uint32_t index);
|
D | storage.h | 27 namespace storage {
|
/system/chre/platform/shared/include/chre/platform/shared/ |
D | memory.h | 103 auto *storage = static_cast<T *>(memoryAllocDram(sizeof(T))); in memoryAllocDram() local 104 if (storage != nullptr) { in memoryAllocDram() 105 new (storage) T(std::forward<Args>(args)...); in memoryAllocDram() 108 return storage; in memoryAllocDram()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | app.te | 8 # Apps can cause selinux denials by accessing CE storage 9 # and/or external storage. In either case, the selinux denial is 11 # storage isn't ready. Many apps handle the failure appropriately. 13 # Apps cannot access external storage before it becomes available. 16 # that apps are attempting to access encrypted storage before 18 # allowed to write to CE storage before it's available. 39 # Don't allow regular apps access to storage configuration properties.
|
/system/logging/liblog/ |
D | log_event_list.cpp | 45 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member 56 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in init_context() 65 memcpy(context->storage, msg, len); in init_parser_context() 155 auto* event_list = reinterpret_cast<android_event_list_t*>(&context->storage[context->pos]); in android_log_write_list_begin() 177 auto* event_int = reinterpret_cast<android_event_int_t*>(&context->storage[context->pos]); in android_log_write_int32() 197 auto* event_long = reinterpret_cast<android_event_long_t*>(&context->storage[context->pos]); in android_log_write_int64() 225 auto* event_string = reinterpret_cast<android_event_string_t*>(&context->storage[context->pos]); in android_log_write_string8_len() 252 auto* event_float = reinterpret_cast<android_event_float_t*>(&context->storage[context->pos]); in android_log_write_float32() 277 context->storage[context->list[context->list_nest_depth]] = in android_log_write_list_end() 301 context->storage[1] = context->count[0]; in android_log_write_list() [all …]
|
/system/chre/util/include/chre/util/ |
D | memory_impl.h | 114 T *storage = nullptr; in memoryAlloc() local 116 storage = memoryAlignedAlloc<T>(); in memoryAlloc() 118 storage = static_cast<T *>(memoryAlloc(sizeof(T))); in memoryAlloc() 121 if (storage != nullptr) { in memoryAlloc() 122 new (storage) T(std::forward<Args>(args)...); in memoryAlloc() 125 return storage; in memoryAlloc()
|
D | array_queue.h | 268 ArrayQueueExternalStorage(ElementType *storage, size_t capacity) in ArrayQueueExternalStorage() argument 269 : mData(storage), kCapacity(capacity) {} in ArrayQueueExternalStorage() 312 ArrayQueueExt(ElementType *storage, size_t capacity) in ArrayQueueExt() argument 315 storage, capacity) {} in ArrayQueueExt()
|
/system/core/libstats/push_compat/ |
D | stats_event_list.c | 38 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member 63 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in reset_log_context() 83 context->storage[1] = context->count[0]; in stats_write_list() 85 msg = (const char*)context->storage; in stats_write_list() 232 context->storage[context->pos + 0] = EVENT_TYPE_STRING; in android_log_write_char_array() 233 copy4LE(&context->storage[context->pos + 1], len); in android_log_write_char_array() 235 memcpy(&context->storage[context->pos + 5], value, len); in android_log_write_char_array()
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | app.te | 26 # Apps can cause selinux denials by accessing CE storage 27 # and/or external storage. In either case, the selinux denial is 29 # storage isn't ready. Many apps handle the failure appropriately. 31 # Apps cannot access external storage before it becomes available. 34 # that apps are attempting to access encrypted storage before 36 # allowed to write to CE storage before it's available. 60 # Don't allow regular apps access to storage configuration properties.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | app.te | 25 # Apps can cause selinux denials by accessing CE storage 26 # and/or external storage. In either case, the selinux denial is 28 # storage isn't ready. Many apps handle the failure appropriately. 30 # Apps cannot access external storage before it becomes available. 33 # that apps are attempting to access encrypted storage before 35 # allowed to write to CE storage before it's available. 59 # Don't allow regular apps access to storage configuration properties.
|
/system/core/libutils/include/utils/ |
D | VectorImpl.h | 102 virtual void do_construct(void* storage, size_t num) const = 0; 103 virtual void do_destroy(void* storage, size_t num) const = 0; 113 inline void _do_construct(void* storage, size_t num) const; 114 inline void _do_destroy(void* storage, size_t num) const;
|
D | SortedVector.h | 145 virtual void do_construct(void* storage, size_t num) const; 146 virtual void do_destroy(void* storage, size_t num) const; 257 UTILS_VECTOR_NO_CFI void SortedVector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument 258 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct() 262 void SortedVector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument 263 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
|
D | Vector.h | 214 virtual void do_construct(void* storage, size_t num) const; 215 virtual void do_destroy(void* storage, size_t num) const; 397 UTILS_VECTOR_NO_CFI void Vector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument 398 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct() 402 void Vector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument 403 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
|
/system/nvram/ |
D | README.md | 9 require a trusted storage location for critical data that an attacker can't 29 Note that the reference implementation leaves persistent storage to be handled 30 by the embedding code, which needs to provide an implementation of the storage 32 [system/nvram/core/include/nvram/core/storage.h](core/include/nvram/core/storage.h).
|
/system/core/libcutils/ |
D | native_handle.cpp | 86 native_handle_t* native_handle_init(char* storage, int numFds, int numInts) { in native_handle_init() argument 87 if ((uintptr_t)storage % alignof(native_handle_t)) { in native_handle_init() 92 native_handle_t* handle = (native_handle_t*)storage; in native_handle_init()
|
/system/vold/ |
D | Android.bp | 164 "android.hardware.health.storage@1.0", 165 "android.hardware.health.storage-V1-ndk", 197 "android.hardware.health.storage@1.0", 198 "android.hardware.health.storage-V1-ndk",
|
/system/core/fs_mgr/ |
D | README.overlayfs.md | 18 _adb remount_ commands, which set up backing storage for a writable file 68 for backing storage. eg: if booting off system_a+vendor_a, use system_b. 78 - Backing storage requires more space than immutable storage, as backing is 98 storage by running either either _fastboot flashall_ or _adb enable-verity_. 109 - The backing storage is treated fragile, if anything else has 110 issue with the space taken, the backing storage will be cleared 124 - Backing storage will be discarded or ignored on errors, leading
|
/system/tools/hidl/test/error_test/enum_storage/1.0/ |
D | required_error | 1 Must explicitly specify enum storage type
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | vold.te | 40 # For formatting adoptable storage devices 47 # Get/set file-based encryption policies on dirs in /data and adoptable storage, 93 # Manage locations where storage is mounted 97 # Access to storage that backs emulated FUSE daemons for migration optimization 112 # Allow mounting of storage devices 124 # Allow to create and mount expanded storage 206 # Allow vold to use wake locks. Needed for idle maintenance and moving storage. 217 # talk to health storage HAL
|
/system/sepolicy/microdroid/system/private/ |
D | encryptedstore.te | 1 # encryptedstore is a program that provides (encrypted) storage solution in a VM based on dm-crypt 24 # For formatting encrypted storage device
|