/system/sepolicy/tests/ |
D | fix_policies.sh | 22 directory=$1 28 find "$directory" -name "*.te" -print0 | xargs -0 sed -i 's/-\s*isolated_app_all/-isolated_app/g' 31 find "$directory" -name "*.te" -print0 | xargs -0 sed -i 's/-\s*isolated_app/-isolated_app_all/g'
|
/system/teeui/tools/framebufferizer/src/com/android/framebufferizer/utils/ |
D | Config.java | 86 File directory = new File(fileDir); in saveConfiguration() local 87 directory.mkdirs(); in saveConfiguration() 88 File file = new File(directory, fileName); in saveConfiguration() 106 File directory = new File(fileDir); in createLockFile() local 107 directory.mkdirs(); in createLockFile() 108 File file = new File(directory, fileLock); in createLockFile()
|
/system/chre/host/common/ |
D | preloaded_nanoapp_loader.cc | 62 std::string directory; in getPreloadedNanoappIds() local 64 if (!getPreloadedNanoappsFromConfigFile(mConfigPath, directory, in getPreloadedNanoappIds() 69 std::string headerFileName = directory + "/" + nanoappName + ".napp_header"; in getPreloadedNanoappIds() 83 std::string directory; in loadPreloadedNanoapps() local 86 if (!getPreloadedNanoappsFromConfigFile(mConfigPath, directory, nanoapps)) { in loadPreloadedNanoapps() 96 std::string headerFilename = directory + "/" + nanoapps[i] + ".napp_header"; in loadPreloadedNanoapps() 97 std::string nanoappFilename = directory + "/" + nanoapps[i] + ".so"; in loadPreloadedNanoapps()
|
D | daemon_base.cc | 91 std::string directory; in loadPreloadedNanoapps() local 94 kPreloadedNanoappsConfigPath, directory, nanoapps); in loadPreloadedNanoapps() 101 loadPreloadedNanoapp(directory, nanoapps[i], i); in loadPreloadedNanoapps() 105 void ChreDaemonBase::loadPreloadedNanoapp(const std::string &directory, in loadPreloadedNanoapp() argument 110 std::string headerFile = directory + "/" + name + ".napp_header"; in loadPreloadedNanoapp()
|
/system/extras/libfscrypt/ |
D | fscrypt.cpp | 303 bool EnsurePolicy(const EncryptionPolicy& policy, const std::string& directory) { in EnsurePolicy() argument 343 if (policy.options.dusize_4k && GetFilesystemBlockSize(directory) != 4096) { in EnsurePolicy() 354 android::base::unique_fd fd(open(directory.c_str(), O_DIRECTORY | O_NOFOLLOW | O_CLOEXEC)); in EnsurePolicy() 356 PLOG(ERROR) << "Failed to open directory " << directory; in EnsurePolicy() 375 LOG(ERROR) << "Failed to set encryption policy of " << directory << " to " in EnsurePolicy() 378 log_ls(directory.c_str()); in EnsurePolicy() 384 LOG(INFO) << "Verified that " << directory << " has the encryption policy " in EnsurePolicy() 387 LOG(INFO) << "Encryption policy of " << directory << " set to " in EnsurePolicy()
|
/system/sepolicy/tools/ |
D | sepolicy_cleanup_check.sh | 56 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 72 if [ -n "`$adb_cmd shell ls -lZ $path < /dev/null |& grep "No such file or directory"`" ]; then 91 if [ -n "`$adb_cmd shell ls -lZ "$path" < /dev/null |& grep "No such file or directory"`" ]; then
|
/system/apex/tests/testdata/sharedlibs/ |
D | README.md | 3 This directory contains APEX packages used for testing the platform support for 7 Due to the peculiarity of the build needs, this directory contains prebuilt
|
/system/sepolicy/microdroid/system/private/ |
D | encryptedstore.te | 9 # encryptedstore require access to block device directory to map dm-crypt 34 # encryptedstore to mount on tmpfs bases directory (/mnt/) 41 # chmod the root directory
|
/system/core/init/ |
D | ueventd.cpp | 134 void GenerateRestoreCon(const std::string& directory); 183 void ColdBoot::GenerateRestoreCon(const std::string& directory) { in GenerateRestoreCon() argument 184 std::unique_ptr<DIR, decltype(&closedir)> dir(opendir(directory.c_str()), &closedir); in GenerateRestoreCon() 187 PLOG(WARNING) << "opendir " << directory.c_str(); in GenerateRestoreCon() 199 std::string fullpath = directory + "/" + dent->d_name; in GenerateRestoreCon()
|
D | devices.cpp | 230 std::string directory = Dirname(path); in FindPlatformDevice() local 232 while (directory != "/" && directory != ".") { in FindPlatformDevice() 234 if (Realpath(directory + "/subsystem", &subsystem_link_path) && in FindPlatformDevice() 238 directory.erase(0, sysfs_mount_point_.size()); in FindPlatformDevice() 239 *platform_device_path = directory; in FindPlatformDevice() 247 directory = Dirname(path); in FindPlatformDevice()
|
/system/sepolicy/private/ |
D | compos_fd_server.te | 7 # Allow creating new files and directories in the staging directory. 11 # Allow creating new files and directories in the artifacts directory.
|
D | composd.te | 15 # Prepare staging directory for odrefresh 20 # Delete files or enable fs-verity in the odrefresh target directory
|
D | rs.te | 11 # Read files from the app home directory. 15 # Cleanup app_exec_data_file files in the app home directory.
|
/system/nfc/src/fuzzers/ |
D | README.md | 3 This directory contains a couple NFC fuzzers targeting different part of the 53 current working directory set to the fuzzer directory. You can also source 71 directory ($ANDROID_BUILD_TOP/system/nfc/src/fuzzers/nci), all you need is 86 4. Archiving all the logs into a directory named by the crashing function
|
D | fuzz.sh | 135 …$ANDROID_BUILD_TOP/prebuilts/gdb/linux-x86/bin/gdb --directory=$ANDROID_BUILD_TOP -ex "target remo… 141 …lcov --directory ./coverage --base-directory $ANDROID_BUILD_TOP --gcov-tool $(pwd)/../llvm-gcov --…
|
/system/core/healthd/testdata/empty/ |
D | ensure_directory_creation.txt | 1 File is placed to ensure directory is created on the device.
|
/system/extras/module_ndk_libs/ |
D | README.md | 1 This directory contains the NDK libraries and headers for native libraries in
|
/system/timezone/testing/data/ |
D | README | 1 This directory contains data files for testing time zone updates and the tools used to
|
/system/teeui/test/example_config/ |
D | README | 4 Include the following three files in a new directory that you would want to run 85 The current directory contains a test_main.cpp that initiates the localization 87 Make a copy of the cpp file (found in this directory) and place it in the 88 test configuration directory you will run the test from.
|
/system/update_engine/update_payload_key/ |
D | README | 1 This directory contains the public half of the payload signing key. This is
|
/system/core/cli-test/ |
D | README.md | 22 data anywhere except in the `files/` subdirectory of the directory containing 62 the scenes to rewrite the test files directory to `$FILES` because otherwise any 63 path in the output would depend on the temporary directory used to run the test.) 89 * There's currently no way (other than the `files/` directory) to share repeated
|
/system/security/ondevice-signing/ |
D | odsign_main.cpp | 99 int removeDirectory(const std::string& directory) { in removeDirectory() argument 101 auto num_removed = std::filesystem::remove_all(directory, ec); in removeDirectory() 103 LOG(ERROR) << "Can't remove " << directory << ": " << ec.message(); in removeDirectory() 107 LOG(INFO) << "Removed " << num_removed << " entries from " << directory; in removeDirectory() 113 bool directoryHasContent(const std::string& directory) { in directoryHasContent() argument 115 return std::filesystem::is_directory(directory, ec) && in directoryHasContent() 116 !std::filesystem::is_empty(directory, ec); in directoryHasContent()
|
/system/extras/cppreopts/ |
D | cppreopts.rc | 29 # Optional script to copy additional preloaded content to data directory 37 # Optional script to copy additional preloaded content to data directory
|
/system/libziparchive/cli-tests/ |
D | zipinfo.test | 4 # handling, and that scans the whole central directory immediately. Not only 34 name: zipinfo directory
|
/system/sepolicy/public/ |
D | vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|