/system/extras/tools/ |
D | check_elf_alignment.sh | 34 dir="${1}" 38 if ! [ -f "${dir}" -o -d "${dir}" ]; then 39 echo "Invalid file: ${dir}" >&2 43 if [[ "${dir}" == *.apk ]]; then 48 zipalign -v -c -P 16 4 "${dir}" | egrep 'lib/arm64-v8a|lib/x86_64|Verification' 58 dir_filename=$(basename "${dir}") 60 unzip "${dir}" lib/* -d "${tmp}" >/dev/null 2>&1 61 dir="${tmp}" 64 if [[ "${dir}" == *.apex ]]; then 67 dir_filename=$(basename "${dir}") [all …]
|
/system/chre/build/ |
D | nanopb.mk | 134 $(V)mkdir -p $(dir $@) 137 --proto_path=$(abspath $(dir $<)) \ 148 $(V)mkdir -p $(dir $@) 151 --proto_path=$(abspath $(dir $<)) \ 205 --out-dir=$(PW_RPC_GEN_PATH)/py/pw_rpc/internal \ 206 --compile-dir=$(dir $<) --sources $(PW_RPC_GENERATOR_PROTO) \ 210 --out-dir=$(PW_RPC_GEN_PATH)/$(dir $<) \ 212 --compile-dir=$(dir $<) --sources $(PW_RPC_GENERATOR_PROTO) \ 226 COMMON_CFLAGS += $(addprefix -I$(PW_RPC_GEN_PATH)/, $(abspath $(dir $(PW_RPC_SRCS)))) 328 --out-dir=$(PW_RPC_GEN_PATH)/$(dir $<) --compile-dir=$(dir $<) --language nanopb \ [all …]
|
/system/core/init/ |
D | fscrypt_init_extensions.cpp | 44 static void delete_dir_contents(const std::string& dir) { in delete_dir_contents() argument 45 char* const paths[2] = {const_cast<char*>(dir.c_str()), nullptr}; in delete_dir_contents() 53 if (dir == cur->fts_path) { in delete_dir_contents() 106 static bool EnsurePolicyOrLog(const EncryptionPolicy& policy, const std::string& dir) { in EnsurePolicyOrLog() argument 107 if (!EnsurePolicy(policy, dir)) { in EnsurePolicyOrLog() 110 LOG(ERROR) << "Setting " << ref_hex << " policy on " << dir << " failed!"; in EnsurePolicyOrLog() 116 static bool SetPolicyOn(const std::string& ref_basename, const std::string& dir) { in SetPolicyOn() argument 119 if (!EnsurePolicyOrLog(policy, dir)) return false; in SetPolicyOn() 124 const std::string& dir) { in FscryptSetDirectoryPolicy() argument 128 if (SetPolicyOn(ref_basename, dir) || action == FscryptAction::kAttempt) { in FscryptSetDirectoryPolicy() [all …]
|
/system/extras/tests/storage/ |
D | opentest.c | 31 char *dir; in main() local 41 dir = argv[1]; in main() 49 if (stat(dir, &statbuf)) { in main() 50 fprintf(stderr, "Cannot stat %s\n", dir); in main() 55 fprintf(stderr, "%s is not a directory!\n", dir); in main() 59 if (access(dir, R_OK | W_OK)) { in main() 60 fprintf(stderr, "No access to %s\n", dir); in main() 70 if (chdir(dir)) { in main() 71 fprintf(stderr, "Cannot chdir to %s\n", dir); in main()
|
/system/sepolicy/private/ |
D | sdcardd.te | 3 type_transition sdcardd system_data_file:{ dir file } media_rw_data_file; 5 allow sdcardd cgroup:dir create_dir_perms; 6 allow sdcardd cgroup_v2:dir create_dir_perms; 8 allow sdcardd rootfs:dir mounton; # TODO: deprecated in M 10 allow sdcardd tmpfs:dir r_dir_perms; 11 allow sdcardd mnt_media_rw_file:dir r_dir_perms; 12 allow sdcardd storage_file:dir search; 13 allow sdcardd storage_stub_file:dir { search mounton }; 17 allow sdcardd { sdcard_type fuse }:dir create_dir_perms; 20 allow sdcardd media_rw_data_file:dir create_dir_perms; [all …]
|
D | bug_map | 3 gmscore_app system_data_file dir b/146166941 8 init nativetest_data_file dir b/77873135 9 init pstorefs dir b/77873135 10 init shell_data_file dir b/77873135 15 isolated_app privapp_data_file dir b/119596573 16 isolated_app app_data_file dir b/120394782 20 mediaprovider mnt_media_rw_file dir b/77925342 21 mediaprovider shell_data_file dir b/77925342 23 platform_app nfc_data_file dir b/74331887 24 platform_app system_data_file dir b/306090533
|
D | vold_prepare_subdirs.te | 20 }:dir { open read write add_name remove_name rmdir relabelfrom }; 37 }:dir { create_dir_perms relabelto }; 54 allow vold_prepare_subdirs apex_mnt_dir:dir { open read }; 55 allow vold_prepare_subdirs mnt_expand_file:dir search; 56 allow vold_prepare_subdirs user_profile_data_file:dir { search getattr relabelfrom }; 57 allow vold_prepare_subdirs user_profile_root_file:dir { search getattr relabelfrom relabelto }; 64 }:dir { 75 type_transition vold_prepare_subdirs storage_area_app_dir:dir storage_area_dir; 79 allowxperm vold_prepare_subdirs storage_area_dir:dir ioctl FS_IOC_SET_ENCRYPTION_POLICY; 86 }:dir ioctl FS_IOC_SET_ENCRYPTION_POLICY; [all …]
|
D | otapreopt_chroot.te | 7 allow otapreopt_chroot postinstall_file:dir { search mounton }; 8 allow otapreopt_chroot apex_mnt_dir:dir mounton; 9 allow otapreopt_chroot device:dir mounton; 10 allow otapreopt_chroot linkerconfig_file:dir mounton; 11 allow otapreopt_chroot rootfs:dir mounton; 12 allow otapreopt_chroot sysfs:dir mounton; 13 allow otapreopt_chroot system_data_root_file:dir mounton; 14 allow otapreopt_chroot system_file:dir mounton; 15 allow otapreopt_chroot vendor_file:dir mounton; 20 allow otapreopt_chroot block_device:dir search; [all …]
|
D | vold.te | 23 type_transition vold storage_file:dir storage_stub_file; 24 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file; 66 allow vold storage_area_app_dir:dir search; 69 allow vold storage_area_dir:dir { 81 allow vold storage_area_key_file:dir create_dir_perms; 89 }:dir { 96 allow vold cache_file:dir r_dir_perms; 135 allowxperm vold { fs_type file_type }:dir ioctl FITRIM; 139 allowxperm vold data_file_type:dir ioctl { 164 allow vold block_device:dir create_dir_perms; [all …]
|
D | installd.te | 30 allow installd rollback_data_file:dir create_dir_perms; 45 allow installd staging_data_file:dir { open read add_name remove_name rename rmdir search write get… 53 allow installd sdk_sandbox_system_data_file:dir { create_dir_perms relabelfrom }; 63 allow installd dalvikcache_data_file:dir relabelto; 67 allow installd apk_data_file:dir { create_dir_perms relabelfrom }; 73 allow installd apk_tmp_file:dir { relabelfrom create_dir_perms }; 74 allow installd oemfs:dir r_dir_perms; 76 allow installd cgroup:dir create_dir_perms; 77 allow installd cgroup_v2:dir create_dir_perms; 78 allow installd mnt_expand_file:dir { search getattr }; [all …]
|
D | derive_classpath.te | 8 allow derive_classpath apex_mnt_dir:dir r_dir_perms; 9 allow derive_classpath vendor_apex_metadata_file:dir r_dir_perms; 12 allow derive_classpath environ_system_data_file:dir rw_dir_perms; 16 allow derive_classpath unlabeled:dir search; 19 # - Read the ota's apex dir 20 allow derive_classpath postinstall_apex_mnt_dir:dir r_dir_perms; 22 allow derive_classpath postinstall_dexopt:dir search;
|
D | traced_probes.te | 14 allow traced_probes debugfs_tracing:dir r_dir_perms; 20 allow traced_probes debugfs_tracing_instances:dir search; 21 allow traced_probes debugfs_mm_events_tracing:dir search; 27 allow traced_probes debugfs_tracing_debug:dir r_dir_perms; 53 allow traced_probes system_file:dir { open read }; 58 allow traced_probes apk_data_file:dir { getattr open read search }; 59 allow traced_probes { apex_art_data_file apex_module_data_file }:dir { getattr open read search }; 60 allow traced_probes dalvikcache_data_file:dir { getattr open read search }; 63 allow traced_probes system_data_file:dir { open read }; 65 allow traced_probes system_app_data_file:dir { getattr open read search }; [all …]
|
D | fastbootd.te | 38 allow fastbootd dm_user_device:dir r_dir_perms; 62 allow fastbootd functionfs:dir search; 72 allow fastbootd device:dir r_dir_perms; 74 # For dev/block/by-name dir 75 allow fastbootd block_device:dir r_dir_perms; 98 allow fastbootd {rootfs tmpfs}:dir mounton; 99 allow fastbootd metadata_file:dir { search getattr mounton }; 100 allow fastbootd gsi_metadata_file_type:dir rw_dir_perms; 115 allow fastbootd rootfs:dir r_dir_perms; 119 allow fastbootd sysfs_dt_firmware_android:dir r_dir_perms; [all …]
|
D | zygote.te | 24 allow zygote appdomain:dir { getattr search }; 36 allow zygote system_data_file:dir r_dir_perms; 40 allow zygote mnt_expand_file:dir getattr; 43 allow zygote dalvikcache_data_file:dir create_dir_perms; 50 allow zygote resourcecache_data_file:dir rw_dir_perms; 59 allow zygote apex_module_data_file:dir search; 62 allow zygote apex_art_data_file:dir { getattr search }; 81 }:dir { mounton search }; 85 allow zygote mirror_data_file:dir search; 90 allow zygote mnt_expand_file:dir { open read search }; [all …]
|
D | aconfigd.te | 13 allow aconfigd metadata_file:dir search; 18 }:dir create_dir_perms; 30 allow aconfigd shell_data_file:dir search; 39 allow aconfigd vendor_aconfig_storage_file:dir r_dir_perms; 41 # allow aconfigd to read /apex dir 42 allow aconfigd apex_mnt_dir:dir r_dir_perms;
|
D | toolbox.te | 6 allow toolbox virtualizationservice_data_file:dir { rmdir rw_dir_perms }; 12 dontaudit toolbox virtualizationservice_data_file:dir setattr; 25 allow toolbox block_device:dir search; 29 allow toolbox system_data_root_file:dir { remove_name write }; 30 allow toolbox system_data_file:dir { rmdir rw_dir_perms }; 34 allow toolbox media_userdir_file:dir { r_dir_perms setattr }; 35 allowxperm toolbox media_userdir_file:dir ioctl { FS_IOC_SETFLAGS FS_IOC_GETFLAGS };
|
D | platform_app.te | 14 allow platform_app shell_data_file:dir search; 19 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms; 21 allow platform_app apk_private_data_file:dir search; 23 allow platform_app asec_apk_file:dir create_dir_perms; 27 allow platform_app media_rw_data_file:dir create_dir_perms; 31 allow platform_app cache_file:dir create_dir_perms; 36 allow platform_app mnt_media_rw_file:dir r_dir_perms; 37 allow platform_app sdcard_type:dir create_dir_perms; 41 allow platform_app rootfs:dir getattr; 64 auditallow platform_app proc_net_type:{ dir file lnk_file } { getattr open read }; [all …]
|
/system/vold/ |
D | KeyStorage.cpp | 211 static bool CommitUpgradedKey(Keystore& keystore, const std::string& dir) { in CommitUpgradedKey() argument 212 auto blob_file = dir + "/" + kFn_keymaster_key_blob; in CommitUpgradedKey() 213 auto upgraded_blob_file = dir + "/" + kFn_keymaster_key_blob_upgraded; in CommitUpgradedKey() 223 if (!FsyncDirectory(dir)) return false; in CommitUpgradedKey() 241 for (auto& dir : key_dirs_to_commit) { in DeferredCommitKeystoreKeys() local 242 LOG(INFO) << "Committing upgraded Keystore key for " << dir; in DeferredCommitKeystoreKeys() 243 CommitUpgradedKey(keystore, dir); in DeferredCommitKeystoreKeys() 251 static bool IsKeyCommitPending(const std::string& dir) { in IsKeyCommitPending() argument 253 if (IsSameFile(dir, dir_to_commit)) return true; in IsKeyCommitPending() 261 static void ScheduleKeyCommit(const std::string& dir) { in ScheduleKeyCommit() argument [all …]
|
/system/bpf/loader/ |
D | BpfLoader.cpp | 79 .dir = "/system/etc/bpf/", 86 .dir = "/system/etc/bpf/uprobestats/", 93 .dir = "/vendor/etc/bpf/", 102 DIR* dir; in loadAllElfObjects() local 105 if ((dir = opendir(location.dir)) != NULL) { in loadAllElfObjects() 106 while ((ent = readdir(dir)) != NULL) { in loadAllElfObjects() 110 string progPath(location.dir); in loadAllElfObjects() 122 closedir(dir); in loadAllElfObjects() 153 ALOGE("=== CRITICAL FAILURE LOADING BPF PROGRAMS FROM %s ===", location.dir); in main()
|
/system/update_engine/payload_generator/ |
D | erofs_iterate.h | 53 .ctx.dir = &root_dir, .ctx.pnid = sbi->root_nid, in erofs_iterate_root_dir() 56 const auto parent_dir = ctx->ctx.dir; in erofs_iterate_root_dir() 57 const auto sbi = ctx->ctx.dir->sbi; in erofs_iterate_root_dir() 68 struct erofs_inode dir { in erofs_iterate_root_dir() struct 71 if (const int err = erofs_read_inode_from_disk(&dir); err) { in erofs_iterate_root_dir() 76 ctx->ctx.dir = &dir; in erofs_iterate_root_dir() 82 ctx->ctx.dir = parent_dir; in erofs_iterate_root_dir()
|
/system/core/libmodprobe/ |
D | libmodprobe_test.cpp | 141 TemporaryDir dir; in TEST() local 142 auto dir_path = std::string(dir.path); in TEST() 158 *i = dir.path + *i; in TEST() 161 Modprobe m({dir.path}, "modules.load", false); in TEST() 166 *i = dir.path + *i; in TEST() 181 *i = dir.path + *i; in TEST() 191 Modprobe m2({dir.path}); in TEST() 200 *i = dir.path + *i; in TEST() 211 TemporaryDir dir; in TEST() local 212 auto dir_path = std::string(dir.path); in TEST() [all …]
|
/system/linkerconfig/modules/ |
D | configuration.cc | 30 for (const auto& [dir, section] : dir_to_section_list_) { in WriteConfig() 31 auto it = resolved_dirs.find(dir); in WriteConfig() 33 LOG(WARNING) << "Binary path " << dir << " already found from " in WriteConfig() 37 resolved_dirs[dir] = section; in WriteConfig() 38 writer.WriteLine("dir." + section + " = " + dir); in WriteConfig()
|
/system/sepolicy/ |
D | treble_sepolicy_tests_for_release.mk | 27 built_$(version)_plat_sepolicy_cil := $(call intermediates-dir-for,ETC,$(version)_plat_policy.cil)/… 29 $(version)_mapping.cil := $(call intermediates-dir-for,ETC,plat_$(version).cil)/plat_$(version).cil 31 $(call intermediates-dir-for,ETC,$(version).ignore.cil)/$(version).ignore.cil 35 $(call intermediates-dir-for,ETC,system_ext_$(version).cil)/system_ext_$(version).cil 37 …$(call intermediates-dir-for,ETC,system_ext_$(version).ignore.cil)/system_ext_$(version).ignore.cil 41 $(call intermediates-dir-for,ETC,product_$(version).cil)/product_$(version).cil 43 $(call intermediates-dir-for,ETC,product_$(version).ignore.cil)/product_$(version).ignore.cil 54 mkdir -p $(dir $@) 68 @mkdir -p $(dir $@)
|
/system/core/libcutils/ |
D | fs_config.cpp | 250 static int fs_config_open(int dir, int which, const char* target_out_path) { in fs_config_open() argument 261 if (asprintf(&name, "%.*s%s", (int)len, target_out_path, conf[which][dir]) != -1) { in fs_config_open() 267 fd = TEMP_FAILURE_RETRY(open(conf[which][dir], O_RDONLY)); in fs_config_open() 284 static bool fs_config_cmp(bool dir, const char* prefix, size_t len, const char* path, size_t plen) { in fs_config_cmp() argument 290 if (dir) { in fs_config_cmp() 327 bool get_fs_config(const char* path, bool dir, const char* target_out_path, in get_fs_config() argument 341 int fd = fs_config_open(dir, which, target_out_path); in get_fs_config() 349 ALOGE("%s len is corrupted", conf[which][dir]); in get_fs_config() 354 ALOGE("%s out of memory", conf[which][dir]); in get_fs_config() 359 ALOGE("%s prefix is truncated", conf[which][dir]); in get_fs_config() [all …]
|
/system/libvintf/ |
D | VintfFm.cpp | 205 auto dir = argv[0]; in main() local 208 return update(vintfFsFactory, dir, current); in main() 210 return check(vintfFsFactory, dir); in main() 213 int VintfFm::update(const FsFactory& vintfFsFactory, const std::string& dir, Level level) { in update() argument 225 if (!dumpMatrix(*manifest, dir, level)) { in update() 232 int VintfFm::check(const FsFactory& vintfFsFactory, const std::string& dir) { in check() argument 233 auto frozenMatrices = loadMatrices(dir); in check() 263 bool VintfFm::dumpMatrix(const HalManifest& frameworkManifest, const std::string& dir, in dumpMatrix() argument 266 std::string path = dir + "/" + to_string(level) + ".xml"; in dumpMatrix() 275 std::optional<VintfFm::FrozenMatrices> VintfFm::loadMatrices(const std::string& dir) { in loadMatrices() argument [all …]
|