/system/sepolicy/microdroid/system/private/ |
D | file.te | 1 allow fs_type self:filesystem associate; 2 allow cgroup tmpfs:filesystem associate; 3 allow cgroup_v2 tmpfs:filesystem associate; 4 allow debugfs_type { debugfs debugfs_tracing debugfs_tracing_debug }:filesystem associate; 5 allow dev_type tmpfs:filesystem associate; 6 allow encryptedstore_file encryptedstore_fs:filesystem associate; 7 allow extra_apk_file zipfusefs:filesystem associate; 8 allow file_type labeledfs:filesystem associate; 9 allow file_type tmpfs:filesystem associate; 10 allow file_type rootfs:filesystem associate; [all …]
|
D | authfs.te | 1 # authfs is a FUSE-based filesystem to support "remote" file access normally 16 allow authfs fuse:filesystem relabelfrom; 17 allow authfs authfs_fuse:filesystem { mount relabelfrom relabelto };
|
D | authfs_service.te | 3 # (a FUSE based filesystem). The service then can pass file descriptor on authfs 15 # Allow mounting the FUSE filesystem. 29 allow authfs_service authfs_fuse:filesystem unmount;
|
D | zipfuse.te | 29 allow zipfuse fuse:filesystem relabelfrom; 30 allow zipfuse zipfusefs:filesystem { mount relabelfrom relabelto }; 34 allow system_file zipfusefs:filesystem associate;
|
D | su.te | 20 dontaudit su fs_type:filesystem *; 32 dontaudit su unlabeled:filesystem *;
|
/system/sepolicy/private/ |
D | file.te | 181 allow fs_type self:filesystem associate; 182 allow cgroup tmpfs:filesystem associate; 183 allow cgroup_v2 tmpfs:filesystem associate; 184 allow cgroup_rc_file tmpfs:filesystem associate; 185 allow sysfs_type sysfs:filesystem associate; 186 allow debugfs_type { debugfs debugfs_tracing debugfs_tracing_debug }:filesystem associate; 187 allow file_type labeledfs:filesystem associate; 188 allow file_type tmpfs:filesystem associate; 189 allow file_type rootfs:filesystem associate; 190 allow dev_type tmpfs:filesystem associate; [all …]
|
D | fsck.te | 28 # checked filesystem is currently mounted. 41 # To determine if it is safe to run fsck on a filesystem, e2fsck 42 # must first determine if the filesystem is mounted. To do that, 45 # device, comparing the major and minor numbers to the filesystem 46 # passed in on the command line. If there is a match, then the filesystem
|
D | fsck_untrusted.te | 16 # To determine if it is safe to run fsck on a filesystem, e2fsck 17 # must first determine if the filesystem is mounted. To do that, 20 # device, comparing the major and minor numbers to the filesystem 21 # passed in on the command line. If there is a match, then the filesystem
|
D | fuseblkd.te | 12 # Permissions for the fuseblk filesystem. 14 allow fuseblkd fuseblk:filesystem { mount unmount };
|
D | userdata_sysdev.te | 1 allow userdata_sysdev sysfs:filesystem associate;
|
D | rootdisk_sysdev.te | 1 allow rootdisk_sysdev sysfs:filesystem associate;
|
/system/apex/apexd/ |
D | apexd_utils.h | 49 namespace fs = std::filesystem; in WalkDir() 67 namespace fs = std::filesystem; in ReadDir() 122 std::filesystem::remove_all(file, ec); in DeleteDirContent() 132 namespace fs = std::filesystem; in DeleteDir() 143 namespace fs = std::filesystem; in PathExists() 190 namespace fs = std::filesystem; in GetSubdirs() 191 auto filter_fn = [](const std::filesystem::directory_entry& entry) { in GetSubdirs() 210 [&suffix_list](const std::filesystem::directory_entry& entry) { in FindFilesBySuffix() 267 namespace fs = std::filesystem; in MoveDir() 300 auto value = std::filesystem::file_size(file_path, ec); in GetFileSize()
|
/system/update_engine/common/ |
D | prefs.cc | 195 std::filesystem::path source_directory(prefs_dir_.value()); in CreateTemporaryPrefs() 196 std::filesystem::path destination_directory(GetTemporaryDir()); in CreateTemporaryPrefs() 198 if (!std::filesystem::exists(source_directory)) { in CreateTemporaryPrefs() 203 std::filesystem::copy(source_directory, destination_directory); in CreateTemporaryPrefs() 209 std::filesystem::path destination_directory(GetTemporaryDir()); in DeleteTemporaryPrefs() 211 if (std::filesystem::exists(destination_directory)) { in DeleteTemporaryPrefs() 212 return std::filesystem::remove_all(destination_directory); in DeleteTemporaryPrefs() 235 if (!std::filesystem::exists(prefs_dir_.value())) { in Init() 238 if (std::filesystem::exists(GetTemporaryDir())) { in Init() 243 if (std::filesystem::exists(GetTemporaryDir())) { in Init() [all …]
|
/system/memory/libmeminfo/libelf64/ |
D | iter.cpp | 27 for (const std::filesystem::directory_entry& dir_entry : in ForEachElf64FromDir() 28 std::filesystem::recursive_directory_iterator(path)) { in ForEachElf64FromDir()
|
/system/memory/libmeminfo/libmemevents/ |
D | memevents_test.cpp | 44 namespace fs = std::filesystem; 55 static const std::filesystem::path sysrq_trigger_path = "proc/sysrq-trigger"; 153 ASSERT_TRUE(std::filesystem::exists(MEM_EVENTS_AMS_OOM_MARK_VICTIM_TP)) in TEST_F() 161 ASSERT_TRUE(std::filesystem::exists(MEM_EVENTS_LMKD_VMSCAN_DR_BEGIN_TP)) in TEST_F() 163 ASSERT_TRUE(std::filesystem::exists(MEM_EVENTS_LMKD_VMSCAN_DR_END_TP)) in TEST_F() 165 ASSERT_TRUE(std::filesystem::exists(MEM_EVENTS_LMKD_VMSCAN_KSWAPD_WAKE_TP)) in TEST_F() 167 ASSERT_TRUE(std::filesystem::exists(MEM_EVENTS_LMKD_VMSCAN_KSWAPD_SLEEP_TP)) in TEST_F() 176 ASSERT_TRUE(std::filesystem::exists(testBpfSkfilterProgPaths[i])) in TEST_F() 187 ASSERT_TRUE(std::filesystem::exists(bpfRbsPaths[i])) in TEST_F() 671 if (!std::filesystem::exists(sysrq_trigger_path)) in SetUpTestSuite() [all …]
|
/system/security/ondevice-signing/ |
D | VerityUtils.cpp | 182 auto it = std::filesystem::recursive_directory_iterator(path, ec); in addFilesToVerityRecursive() 183 for (auto end = std::filesystem::recursive_directory_iterator(); it != end; it.increment(ec)) { in addFilesToVerityRecursive() 211 auto it = std::filesystem::recursive_directory_iterator(path, ec); in verifyAllFilesInVerity() 212 auto end = std::filesystem::recursive_directory_iterator(); in verifyAllFilesInVerity() 239 auto it = std::filesystem::recursive_directory_iterator(directory_path, ec); in verifyAllFilesUsingCompOs() 240 for (auto end = std::filesystem::recursive_directory_iterator(); it != end; it.increment(ec)) { in verifyAllFilesUsingCompOs()
|
/system/nfc/utils/test/ |
D | config_test.cc | 22 const std::filesystem::path kConfigFile = 23 std::filesystem::temp_directory_path() / "test_config.conf"; 67 std::filesystem::remove(kConfigFile); in TearDown()
|
/system/core/fastboot/ |
D | vendor_boot_img_utils_test.cpp | 68 Result<uint64_t> FileSize(borrowed_fd fd, std::filesystem::path path) { in FileSize() 75 Result<std::string> ReadStartOfFdToString(borrowed_fd fd, std::filesystem::path path) { in ReadStartOfFdToString() 142 std::filesystem::path abs_path_; 165 TestFileHandle(const std::filesystem::path& rel_path) in TestFileHandle() 166 : abs_path_(std::move(std::filesystem::path(GetExecutableDirectory()) / rel_path)) {} in TestFileHandle() 169 virtual android::base::Result<borrowed_fd> Transform(const std::filesystem::path& abs_path, 175 ReadOnlyTestFileHandle(const std::filesystem::path& rel_path) : TestFileHandle(rel_path) {} in ReadOnlyTestFileHandle() 179 android::base::Result<borrowed_fd> Transform(const std::filesystem::path&, in Transform() 188 ReadWriteTestFileHandle(const std::filesystem::path& rel_path) : TestFileHandle(rel_path) {} in ReadWriteTestFileHandle() 193 android::base::Result<borrowed_fd> Transform(const std::filesystem::path& abs_path, in Transform()
|
/system/security/fsverity_init/ |
D | fsverity_init.cpp | 63 if (!std::filesystem::exists(dir)) { in LoadKeyFromDirectory() 67 for (const auto& entry : std::filesystem::directory_iterator(dir)) { in LoadKeyFromDirectory()
|
/system/extras/partition_tools/ |
D | dynamic_partitions_device_info.proto | 35 /** Total size of the filesystem. */ 37 /** Used space of the filesystem. */ 39 /** Name of the filesystem. */
|
/system/incremental_delivery/incfs/include/ |
D | MountRegistry.h | 78 static Mounts load(base::borrowed_fd fd, std::string_view filesystem); 79 bool loadFrom(base::borrowed_fd fd, std::string_view filesystem); 104 MountRegistry(std::string_view filesystem = {});
|
/system/incremental_delivery/incfs/ |
D | MountRegistry.cpp | 204 MountRegistry::MountRegistry(std::string_view filesystem) in MountRegistry() argument 205 : mFilesystem(filesystem.empty() ? INCFS_NAME : filesystem), in MountRegistry() 324 bool MountRegistry::Mounts::loadFrom(base::borrowed_fd fd, std::string_view filesystem) { in loadFrom() argument 344 if (!name.starts_with(filesystem)) { in loadFrom() 419 LOG(INFO) << "[incfs] Loaded " << filesystem << " mount info: " << roots.size() in loadFrom() 434 auto MountRegistry::Mounts::load(base::borrowed_fd mountInfo, std::string_view filesystem) in load() argument 437 res.loadFrom(mountInfo, filesystem); in load()
|
/system/memory/libmemtrack/ |
D | memtrack_test.cpp | 51 for (auto& de : std::filesystem::directory_iterator("/proc")) { in main() 52 if (!std::filesystem::is_directory(de.status())) { in main()
|
/system/unwinding/libunwindstack/benchmarks/ |
D | OfflineUnwindBenchmarks.cpp | 113 std::filesystem::path path; in BenchmarkOfflineUnwindMultipleSamples() 114 if (std::filesystem::is_symlink(name.c_str())) { in BenchmarkOfflineUnwindMultipleSamples() 115 path = std::filesystem::read_symlink(name.c_str()); in BenchmarkOfflineUnwindMultipleSamples() 117 path = std::filesystem::current_path(); in BenchmarkOfflineUnwindMultipleSamples()
|
/system/unwinding/libunwindstack/utils/ |
D | OfflineUnwindUtils.cpp | 63 namespace fs = std::filesystem; in DecompressFiles() 87 namespace fs = std::filesystem; in CreateLinks() 218 cwd_ = std::filesystem::current_path(); in Init() 225 if (!std::filesystem::exists(offline_files_full_path)) { in Init() 300 std::filesystem::current_path(std::filesystem::path(samples_.at(sample_name).offline_files_path)); in ChangeToSampleDirectory() 316 if (!std::filesystem::exists(sample_frames_path)) { in GetExpectedNumFrames() 354 for (const auto& file : std::filesystem::directory_iterator(sample.offline_files_path)) { in CreateProcessMemory()
|