/system/core/rootdir/etc/ |
D | ld.config.txt | 47 namespace.default.search.paths = /system/${LIB} 48 namespace.default.search.paths += /%PRODUCT%/${LIB} 49 namespace.default.search.paths += /%PRODUCT_SERVICES%/${LIB} 51 # We can't have entire /system/${LIB} as permitted paths because doing so 53 # their absolute paths (e.g. dlopen("/system/lib/vndk/libbase.so");). 58 namespace.default.permitted.paths = /system/${LIB}/drm 59 namespace.default.permitted.paths += /system/${LIB}/extractors 60 namespace.default.permitted.paths += /system/${LIB}/hw 61 namespace.default.permitted.paths += /%PRODUCT%/${LIB} 62 namespace.default.permitted.paths += /%PRODUCT_SERVICES%/${LIB} [all …]
|
D | ld.config.vndk_lite.txt | 47 namespace.default.search.paths = /system/${LIB} 48 namespace.default.search.paths += /odm/${LIB} 49 namespace.default.search.paths += /vendor/${LIB} 50 namespace.default.search.paths += /%PRODUCT%/${LIB} 51 namespace.default.search.paths += /%PRODUCT_SERVICES%/${LIB} 53 namespace.default.asan.search.paths = /data/asan/system/${LIB} 54 namespace.default.asan.search.paths += /system/${LIB} 55 namespace.default.asan.search.paths += /data/asan/odm/${LIB} 56 namespace.default.asan.search.paths += /odm/${LIB} 57 namespace.default.asan.search.paths += /data/asan/vendor/${LIB} [all …]
|
D | ld.config.legacy.txt | 24 namespace.default.search.paths = /system/${LIB} 25 namespace.default.search.paths += /product/${LIB} 26 namespace.default.search.paths += /vendor/${LIB} 27 namespace.default.search.paths += /odm/${LIB} 29 namespace.default.asan.search.paths = /data/asan/system/${LIB} 30 namespace.default.asan.search.paths += /system/${LIB} 31 namespace.default.asan.search.paths += /data/asan/product/${LIB} 32 namespace.default.asan.search.paths += /product/${LIB} 33 namespace.default.asan.search.paths += /data/asan/vendor/${LIB} 34 namespace.default.asan.search.paths += /vendor/${LIB} [all …]
|
D | ld.config.recovery.txt | 9 namespace.default.search.paths = /system/${LIB}
|
/system/core/libcutils/ |
D | fs_config_test.cpp | 75 static bool check_unique(std::vector<const char*>& paths, const std::string& config_name, in check_unique() argument 81 for (size_t idx = 0; idx < paths.size(); ++idx) { in check_unique() 83 std::string path(paths[idx]); in check_unique() 85 for (second = idx + 1; second < paths.size(); ++second) { in check_unique() 86 if (path == paths[second]) { in check_unique() 87 GTEST_LOG_(ERROR) << "duplicate paths in " << config_name << ": " << paths[idx]; in check_unique() 97 for (second = 0; second < paths.size(); ++second) { in check_unique() 98 if (path == paths[second]) { in check_unique() 100 << paths[idx] << " and " << paths[second] in check_unique() 113 for (second = 0; second < paths.size(); ++second) { in check_unique() [all …]
|
/system/vold/ |
D | IdleMaint.cpp | 85 static void addFromVolumeManager(std::list<std::string>* paths, PathTypes path_type) { in addFromVolumeManager() argument 93 paths->push_back(vol->getPath()); in addFromVolumeManager() 99 paths->push_back(std::string("/sys/fs/") + fs_type + "/" + Basename(gc_path)); in addFromVolumeManager() 106 static void addFromFstab(std::list<std::string>* paths, PathTypes path_type) { in addFromFstab() argument 134 paths->push_back(entry.mount_point); in addFromFstab() 139 paths->push_back("/sys/fs/" + entry.fs_type + "/" + Basename(gc_path)); in addFromFstab() 151 std::list<std::string> paths; in Trim() local 152 addFromFstab(&paths, PathTypes::kMountPoint); in Trim() 153 addFromVolumeManager(&paths, PathTypes::kMountPoint); in Trim() 155 for (const auto& path : paths) { in Trim() [all …]
|
D | FsCrypt.cpp | 150 const std::vector<std::string>& paths, std::string* ce_key_path) { in get_ce_key_new_path() argument 151 if (paths.empty()) { in get_ce_key_new_path() 157 if (paths[0] < candidate) { in get_ce_key_new_path() 168 const std::vector<std::string>& paths) { in fixate_user_ce_key() argument 169 for (auto const other_path : paths) { in fixate_user_ce_key() 189 auto const paths = get_ce_key_paths(directory_path); in read_and_fixate_user_ce_key() local 190 for (auto const ce_key_path : paths) { in read_and_fixate_user_ce_key() 194 fixate_user_ce_key(directory_path, ce_key_path, paths); in read_and_fixate_user_ce_key() 245 auto const paths = get_ce_key_paths(directory_path); in create_and_install_user_keys() local 247 if (!get_ce_key_new_path(directory_path, paths, &ce_key_path)) return false; in create_and_install_user_keys() [all …]
|
/system/apex/tests/testdata/ |
D | ld.config.txt | 6 namespace.default.search.paths = /apex/com.android.apex.test/${LIB} 13 namespace.sphal.search.paths = /odm/${LIB} 14 namespace.sphal.search.paths += /vendor/${LIB} 16 namespace.sphal.permitted.paths = /odm/${LIB} 17 namespace.sphal.permitted.paths += /vendor/${LIB} 33 namespace.vndk.search.paths = /odm/${LIB}/vndk-sp 34 namespace.vndk.search.paths += /vendor/${LIB}/vndk-sp 35 namespace.vndk.search.paths += /system/${LIB}/vndk-sp-Q 37 namespace.vndk.permitted.paths = /odm/${LIB}/hw 38 namespace.vndk.permitted.paths += /odm/${LIB}/egl [all …]
|
/system/apex/apexd/ |
D | apexd.h | 40 Status preinstallPackages(const std::vector<std::string>& paths) WARN_UNUSED; 41 Status postinstallPackages(const std::vector<std::string>& paths) WARN_UNUSED; 44 Status unstagePackages(const std::vector<std::string>& paths) WARN_UNUSED;
|
D | apexservice.cpp | 58 BinderStatus stagePackages(const std::vector<std::string>& paths, 60 BinderStatus unstagePackages(const std::vector<std::string>& paths) override; 78 const std::vector<std::string>& paths) override; 80 const std::vector<std::string>& paths) override; 114 BinderStatus ApexService::stagePackages(const std::vector<std::string>& paths, in stagePackages() argument 121 << android::base::Join(paths, ','); in stagePackages() 124 Status res = ::android::apex::stagePackages(paths); in stagePackages() 132 LOG(ERROR) << "Failed to stage " << android::base::Join(paths, ',') << ": " in stagePackages() 139 const std::vector<std::string>& paths) { in unstagePackages() argument 140 Status res = ::android::apex::unstagePackages(paths); in unstagePackages() [all …]
|
D | apexd.cpp | 683 RetType HandlePackages(const std::vector<std::string>& paths, Fn fn) { in HandlePackages() argument 686 for (const std::string& path : paths) { in HandlePackages() 759 const std::vector<std::string>& paths, const VerifyApexFn& verify_apex_fn) { in verifyPackages() argument 760 if (paths.empty()) { in verifyPackages() 763 LOG(DEBUG) << "verifyPackages() for " << Join(paths, ','); in verifyPackages() 775 return HandlePackages<StatusT>(paths, verify_fn); in verifyPackages() 1461 Status preinstallPackages(const std::vector<std::string>& paths) { in preinstallPackages() argument 1462 if (paths.empty()) { in preinstallPackages() 1465 LOG(DEBUG) << "preinstallPackages() for " << Join(paths, ','); in preinstallPackages() 1466 return HandlePackages<Status>(paths, PreinstallPackages); in preinstallPackages() [all …]
|
D | apex_file.h | 79 const std::vector<std::string>& paths);
|
/system/extras/simpleperf/scripts/ |
D | binary_cache_builder.py | 96 paths = filename_dict.get(filename) 97 if paths is None: 98 filename_dict[filename] = paths = [] 99 paths.append(binary) 105 paths = filename_dict.get(filename) 106 if not paths: 111 for binary in paths:
|
/system/sepolicy/tools/ |
D | checkfc.c | 240 …ic void do_compare_and_die_on_error(struct selinux_opt opts[], unsigned int backend, char *paths[]) in do_compare_and_die_on_error() argument 249 opts[1].value = paths[i]; in do_compare_and_die_on_error() 252 fprintf(stderr, "Error: could not load context file from %s\n", paths[i]); in do_compare_and_die_on_error()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_wifi.te | 22 # hal_wifi writes firmware paths to this file.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_wifi.te | 22 # hal_wifi writes firmware paths to this file.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_wifi.te | 23 # hal_wifi writes firmware paths to this file.
|
/system/sepolicy/public/ |
D | hal_wifi.te | 22 # hal_wifi writes firmware paths to this file.
|
D | simpleperf_app_runner.te | 32 # simpleperf_app_runner checks shell data paths.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_wifi.te | 22 # hal_wifi writes firmware paths to this file.
|
D | simpleperf_app_runner.te | 32 # simpleperf_app_runner checks shell data paths.
|
/system/core/adb/ |
D | adb.bash | 198 paths=$(command adb ${args[@]} shell echo '$'PATH 2> /dev/null | tr -d '\r' | tr : '\n') 199 COMMAND=$(command adb ${args[@]} shell ls $paths '2>' /dev/null | tr -d '\r' | {
|
/system/timezone/distro/installer/src/test/com/android/timezone/distro/installer/ |
D | TimeZoneDistroInstallerTest.java | 667 final List<Path> paths = new ArrayList<>(); in assertFileCount() local 672 paths.add(filePath); in assertFileCount() 677 assertEquals("Found: " + paths, expectedFiles, paths.size()); in assertFileCount()
|
/system/extras/simpleperf/demo/SimpleperfExampleWithNative/app/ |
D | CMakeLists.txt | 9 # or SHARED, and provides the relative paths to its source code.
|
/system/core/rootdir/ |
D | ueventd.rc | 21 # sysfs attributes, not on arbitrary paths.
|