Home
last modified time | relevance | path

Searched refs:storage (Results 1 – 25 of 273) sorted by relevance

1234567891011

/system/nvram/core/
Dpersistence.cpp46 storage::Status EncodeObject(const Object& object, Blob* blob) { in EncodeObject()
53 return storage::Status::kStorageError; in EncodeObject()
55 return storage::Status::kSuccess; in EncodeObject()
67 storage::Status DecodeObject(const Blob& blob, Object* object) { in DecodeObject()
74 return storage::Status::kStorageError; in DecodeObject()
76 return storage::Status::kSuccess; in DecodeObject()
99 storage::Status LoadHeader(NvramHeader* header) { in LoadHeader()
101 storage::Status status = storage::LoadHeader(&blob); in LoadHeader()
102 if (status != storage::Status::kSuccess) { in LoadHeader()
108 storage::Status StoreHeader(const NvramHeader& header) { in StoreHeader()
[all …]
Dnvram_manager.cpp28 using namespace nvram::storage;
93 storage::Status SanitizeStorageStatus(storage::Status status) { in SanitizeStorageStatus()
95 case storage::Status::kSuccess: in SanitizeStorageStatus()
96 return storage::Status::kSuccess; in SanitizeStorageStatus()
97 case storage::Status::kNotFound: in SanitizeStorageStatus()
98 return storage::Status::kNotFound; in SanitizeStorageStatus()
99 case storage::Status::kStorageError: in SanitizeStorageStatus()
100 return storage::Status::kStorageError; in SanitizeStorageStatus()
103 return storage::Status::kStorageError; in SanitizeStorageStatus()
352 case storage::Status::kStorageError: in DeleteSpace()
[all …]
/system/nvram/hal/
Dfake_nvram_storage.cpp65 nvram::storage::Status DeleteFile(const char* name) { in DeleteFile()
68 return nvram::storage::Status::kNotFound; in DeleteFile()
71 return nvram::storage::Status::kStorageError; in DeleteFile()
74 return nvram::storage::Status::kSuccess; in DeleteFile()
78 nvram::storage::Status LoadFile(const char* name, nvram::Blob* blob) { in LoadFile()
83 return nvram::storage::Status::kNotFound; in LoadFile()
86 return nvram::storage::Status::kStorageError; in LoadFile()
92 return nvram::storage::Status::kStorageError; in LoadFile()
97 return nvram::storage::Status::kStorageError; in LoadFile()
102 return nvram::storage::Status::kStorageError; in LoadFile()
[all …]
/system/nvram/core/tests/
Dnvram_manager_test.cpp36 storage::Clear(); in NvramManagerTest()
44 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in SetupHeader()
85 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F()
87 ASSERT_EQ(storage::Status::kSuccess, storage::LoadSpace(1, &space_blob)); in TEST_F()
89 ASSERT_EQ(storage::Status::kSuccess, storage::StoreSpace(1, space_blob)); in TEST_F()
96 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreHeader(header)); in TEST_F()
98 ASSERT_EQ(storage::Status::kSuccess, storage::LoadHeader(&header_blob)); in TEST_F()
100 ASSERT_EQ(storage::Status::kSuccess, storage::StoreHeader(header_blob)); in TEST_F()
125 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(1, space)); in TEST_F()
127 ASSERT_EQ(storage::Status::kSuccess, persistence::StoreSpace(2, space)); in TEST_F()
[all …]
Dfake_storage.h23 namespace storage {
/system/nvram/core/include/nvram/core/
Dpersistence.h131 storage::Status LoadHeader(NvramHeader* header);
134 storage::Status StoreHeader(const NvramHeader& header);
137 storage::Status LoadSpace(uint32_t index, NvramSpace* space);
140 storage::Status StoreSpace(uint32_t index, const NvramSpace& space);
143 storage::Status DeleteSpace(uint32_t index);
Dstorage.h27 namespace storage {
/system/chre/platform/shared/include/chre/platform/shared/
Dmemory.h103 auto *storage = static_cast<T *>(memoryAllocDram(sizeof(T))); in memoryAllocDram() local
104 if (storage != nullptr) { in memoryAllocDram()
105 new (storage) T(std::forward<Args>(args)...); in memoryAllocDram()
108 return storage; in memoryAllocDram()
/system/sepolicy/prebuilts/api/30.0/private/
Dapp.te8 # Apps can cause selinux denials by accessing CE storage
9 # and/or external storage. In either case, the selinux denial is
11 # storage isn't ready. Many apps handle the failure appropriately.
13 # Apps cannot access external storage before it becomes available.
16 # that apps are attempting to access encrypted storage before
18 # allowed to write to CE storage before it's available.
39 # Don't allow regular apps access to storage configuration properties.
/system/logging/liblog/
Dlog_event_list.cpp45 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member
56 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in init_context()
65 memcpy(context->storage, msg, len); in init_parser_context()
155 auto* event_list = reinterpret_cast<android_event_list_t*>(&context->storage[context->pos]); in android_log_write_list_begin()
177 auto* event_int = reinterpret_cast<android_event_int_t*>(&context->storage[context->pos]); in android_log_write_int32()
197 auto* event_long = reinterpret_cast<android_event_long_t*>(&context->storage[context->pos]); in android_log_write_int64()
225 auto* event_string = reinterpret_cast<android_event_string_t*>(&context->storage[context->pos]); in android_log_write_string8_len()
252 auto* event_float = reinterpret_cast<android_event_float_t*>(&context->storage[context->pos]); in android_log_write_float32()
277 context->storage[context->list[context->list_nest_depth]] = in android_log_write_list_end()
301 context->storage[1] = context->count[0]; in android_log_write_list()
[all …]
/system/chre/util/include/chre/util/
Dmemory_impl.h114 T *storage = nullptr; in memoryAlloc() local
116 storage = memoryAlignedAlloc<T>(); in memoryAlloc()
118 storage = static_cast<T *>(memoryAlloc(sizeof(T))); in memoryAlloc()
121 if (storage != nullptr) { in memoryAlloc()
122 new (storage) T(std::forward<Args>(args)...); in memoryAlloc()
125 return storage; in memoryAlloc()
Darray_queue.h268 ArrayQueueExternalStorage(ElementType *storage, size_t capacity) in ArrayQueueExternalStorage() argument
269 : mData(storage), kCapacity(capacity) {} in ArrayQueueExternalStorage()
312 ArrayQueueExt(ElementType *storage, size_t capacity) in ArrayQueueExt() argument
315 storage, capacity) {} in ArrayQueueExt()
/system/core/libstats/push_compat/
Dstats_event_list.c38 uint8_t storage[LOGGER_ENTRY_MAX_PAYLOAD]; member
63 context->storage[context->pos + 0] = EVENT_TYPE_LIST; in reset_log_context()
83 context->storage[1] = context->count[0]; in stats_write_list()
85 msg = (const char*)context->storage; in stats_write_list()
232 context->storage[context->pos + 0] = EVENT_TYPE_STRING; in android_log_write_char_array()
233 copy4LE(&context->storage[context->pos + 1], len); in android_log_write_char_array()
235 memcpy(&context->storage[context->pos + 5], value, len); in android_log_write_char_array()
/system/sepolicy/prebuilts/api/32.0/private/
Dapp.te26 # Apps can cause selinux denials by accessing CE storage
27 # and/or external storage. In either case, the selinux denial is
29 # storage isn't ready. Many apps handle the failure appropriately.
31 # Apps cannot access external storage before it becomes available.
34 # that apps are attempting to access encrypted storage before
36 # allowed to write to CE storage before it's available.
60 # Don't allow regular apps access to storage configuration properties.
/system/sepolicy/prebuilts/api/31.0/private/
Dapp.te25 # Apps can cause selinux denials by accessing CE storage
26 # and/or external storage. In either case, the selinux denial is
28 # storage isn't ready. Many apps handle the failure appropriately.
30 # Apps cannot access external storage before it becomes available.
33 # that apps are attempting to access encrypted storage before
35 # allowed to write to CE storage before it's available.
59 # Don't allow regular apps access to storage configuration properties.
/system/core/libutils/include/utils/
DVectorImpl.h102 virtual void do_construct(void* storage, size_t num) const = 0;
103 virtual void do_destroy(void* storage, size_t num) const = 0;
113 inline void _do_construct(void* storage, size_t num) const;
114 inline void _do_destroy(void* storage, size_t num) const;
DSortedVector.h145 virtual void do_construct(void* storage, size_t num) const;
146 virtual void do_destroy(void* storage, size_t num) const;
257 UTILS_VECTOR_NO_CFI void SortedVector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument
258 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct()
262 void SortedVector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument
263 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
DVector.h214 virtual void do_construct(void* storage, size_t num) const;
215 virtual void do_destroy(void* storage, size_t num) const;
397 UTILS_VECTOR_NO_CFI void Vector<TYPE>::do_construct(void* storage, size_t num) const { in do_construct() argument
398 construct_type( reinterpret_cast<TYPE*>(storage), num ); in do_construct()
402 void Vector<TYPE>::do_destroy(void* storage, size_t num) const { in do_destroy() argument
403 destroy_type( reinterpret_cast<TYPE*>(storage), num ); in do_destroy()
/system/nvram/
DREADME.md9 require a trusted storage location for critical data that an attacker can't
29 Note that the reference implementation leaves persistent storage to be handled
30 by the embedding code, which needs to provide an implementation of the storage
32 [system/nvram/core/include/nvram/core/storage.h](core/include/nvram/core/storage.h).
/system/core/libcutils/
Dnative_handle.cpp86 native_handle_t* native_handle_init(char* storage, int numFds, int numInts) { in native_handle_init() argument
87 if ((uintptr_t)storage % alignof(native_handle_t)) { in native_handle_init()
92 native_handle_t* handle = (native_handle_t*)storage; in native_handle_init()
/system/vold/
DAndroid.bp164 "android.hardware.health.storage@1.0",
165 "android.hardware.health.storage-V1-ndk",
197 "android.hardware.health.storage@1.0",
198 "android.hardware.health.storage-V1-ndk",
/system/core/fs_mgr/
DREADME.overlayfs.md18 _adb remount_ commands, which set up backing storage for a writable file
68 for backing storage. eg: if booting off system_a+vendor_a, use system_b.
78 - Backing storage requires more space than immutable storage, as backing is
98 storage by running either either _fastboot flashall_ or _adb enable-verity_.
109 - The backing storage is treated fragile, if anything else has
110 issue with the space taken, the backing storage will be cleared
124 - Backing storage will be discarded or ignored on errors, leading
/system/tools/hidl/test/error_test/enum_storage/1.0/
Drequired_error1 Must explicitly specify enum storage type
/system/sepolicy/prebuilts/api/33.0/public/
Dvold.te40 # For formatting adoptable storage devices
47 # Get/set file-based encryption policies on dirs in /data and adoptable storage,
93 # Manage locations where storage is mounted
97 # Access to storage that backs emulated FUSE daemons for migration optimization
112 # Allow mounting of storage devices
124 # Allow to create and mount expanded storage
206 # Allow vold to use wake locks. Needed for idle maintenance and moving storage.
217 # talk to health storage HAL
/system/sepolicy/microdroid/system/private/
Dencryptedstore.te1 # encryptedstore is a program that provides (encrypted) storage solution in a VM based on dm-crypt
24 # For formatting encrypted storage device

1234567891011