Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 18 of 18) sorted by relevance

/device/google/cuttlefish/host/commands/process_sandboxer/
Dpolicies.cpp31 const HostInfo& host, std::string_view executable) { in PolicyForExecutable() argument
40 if (auto it = builders.find(executable); it != builders.end()) { in PolicyForExecutable()
46 LOG(FATAL) << "No policy defined for '" << executable << "'"; in PolicyForExecutable()
/device/google/cuttlefish/common/libs/utils/
Dsubprocess.h162 Command(std::string executable, SubprocessStopper stopper = KillSubprocess);
175 Command& SetExecutable(std::string executable) & { in SetExecutable() argument
176 executable_ = std::move(executable); in SetExecutable()
179 Command SetExecutable(std::string executable) && { in SetExecutable() argument
180 return std::move(SetExecutable(executable)); in SetExecutable()
Dsubprocess.cpp313 Command::Command(std::string executable, SubprocessStopper stopper) in Command() argument
318 command_.emplace_back(std::move(executable)); in Command()
484 const char* executable = executable_ ? executable_->c_str() : cmd[0]; in Start() local
486 rval = execvpe(executable, const_cast<char* const*>(cmd.data()), in Start()
489 rval = execve(executable, const_cast<char* const*>(cmd.data()), in Start()
495 LOG(ERROR) << "exec of " << cmd[0] << " with path \"" << executable in Start()
/device/generic/car/emulator/usbpt/bluetooth/usb_modeswitch/
DLICENSE135 under Section 2) in object code or executable form under the terms of
152 received the program in object code or executable form with such
156 making modifications to it. For an executable work, complete source
159 control compilation and installation of the executable. However, as a
163 operating system on which the executable runs, unless that component
164 itself accompanies the executable.
166 If distribution of executable or object code is made by offering
/device/generic/car/emulator/usbpt/usbip-service/
DCOPYING135 under Section 2) in object code or executable form under the terms of
152 received the program in object code or executable form with such
156 making modifications to it. For an executable work, complete source
159 control compilation and installation of the executable. However, as a
163 operating system on which the executable runs, unless that component
164 itself accompanies the executable.
166 If distribution of executable or object code is made by offering
/device/google/cuttlefish/shared/swiftshader/sepolicy/
Dsystem_server.te1 # TODO(b/65201432): Swiftshader needs to create executable memory.
Dsurfaceflinger.te1 # TODO(b/65201432): Swiftshader needs to create executable memory.
Dzygote.te1 # TODO(b/65201432): Swiftshader needs to create executable memory.
Dbootanim.te1 # TODO(b/65201432): Swiftshader needs to create executable memory.
/device/linaro/dragonboard/shared/graphics/swangle/sepolicy/
Dsw_execmem.te1 # TODO(b/65201432): Swiftshader needs to create executable memory.
/device/google/cuttlefish/host/commands/console_forwarder/
DREADME.md4 executable runs to forward data from a serial console to a virtual terminal
/device/google/cuttlefish/host/commands/start/
DREADME.md6 The `cvd_internal_start` executable used to be named `launch_cvd`, and is still
/device/google/zumapro-sepolicy/legacy/zuma/vendor/
Dmediacodec_google.te22 # mediacodec_google should never execute any executable without a domain transition
/device/google/zuma-sepolicy/vendor/
Dmediacodec_google.te23 # mediacodec_google should never execute any executable without a domain transition
/device/google/gs201-sepolicy/whitechapel_pro/
Dmediacodec_google.te23 # mediacodec_google should never execute any executable without a domain transition
/device/google/gs-common/mediacodec/samsung/sepolicy/
Dmediacodec_samsung.te28 # mediacodec_samsung should never execute any executable without a domain transition
/device/generic/goldfish/fvpbase/
DREADME.md136 variable to the path to the model executable (it should end with something like
/device/google/trout/tools/tracing/proto/
Dperfetto_trace.proto6056 // executable memory is mapped as executable only.
6063 // | read | executable
7300 // Paths to executable files.