Home
last modified time | relevance | path

Searched refs:execute (Results 1 – 25 of 62) sorted by relevance

123

/system/netd/server/
DIptablesRestoreControllerTest.cpp103 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain()
116 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain()
151 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
156 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F()
157 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F()
159 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
173 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F()
175 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F()
184 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
198 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
[all …]
DIptablesRestoreController.h35 int execute(const IptablesTarget target, const std::string& commands);
38 int execute(const IptablesTarget target, const std::string& commands, std::string *output);
/system/sepolicy/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
Dpostinstall.te11 # Allow postinstall to read and execute directories and files in the same
17 # Allow postinstall to execute the shell or other system executables.
Dupdate_engine_common.te22 # Allow update_engine_common to read and execute postinstall_file.
29 # to execute those.
Dneverallow_macros5 define(`no_x_file_perms', `{ execute execute_no_trans }')
Dmediadrmserver.te28 # mediadrmserver should never execute any executable without a
Dcppreopts.te14 # Allow cppreopts to execute itself using #!/system/bin/sh
Dinstall_recovery.te8 # Needs to execute /system/bin/sh
Ddomain.te102 allow domain system_file:file { execute read open getattr };
109 allow domain vendor_file_type:file { execute read open getattr };
118 # Everyone can read and execute all same process HALs
120 allow domain same_process_hal_file:file { execute read open getattr };
125 allow domain vndk_sp_file:file { execute read open getattr };
136 # in order to lookup vendor libraries. The execute permission
142 allow { domain -coredomain } vendor_file_type:file { read open getattr execute };
364 }:file execute;
370 } { fs_type -rootfs }:file execute;
372 …domain { cache_file cache_backup_file cache_private_backup_file cache_recovery_file }:file execute;
[all …]
Dhal_audio.te30 # Should never execute any executable without a domain transition
Dhal_camera.te28 # hal_camera should never execute any executable without a
Dmediametrics.te24 # mediametrics should never execute any executable without a
Dotapreopt_slot.te22 # Allow cppreopts to execute itself using #!/system/bin/sh
Dsdcardd.te42 neverallow init sdcardd_exec:file execute;
Dcameraserver.te35 # cameraserver should never execute any executable without a
/system/sepolicy/private/
Dephemeral_app.te40 neverallow ephemeral_app app_data_file:file { execute execute_no_trans };
52 # execute gpu_device
53 neverallow ephemeral_app gpu_device:chr_file execute;
Duntrusted_app_all.te28 # to their sandbox directory and then execute.
35 allow untrusted_app_all asec_public_file:file { execute execmod };
100 # Allow untrusted apps read / execute access to /vendor/app for there can
105 allow untrusted_app_all vendor_app_file:file { open getattr read execute };
Ddumpstate.te13 allow dumpstate dumpstate_tmpfs:file execute;
Dnetutils_wrapper.te8 allow netutils_wrapper system_file:file { execute execute_no_trans };
Dwebview_zygote.te16 allow webview_zygote apk_data_file:file { r_file_perms execute };
33 allow webview_zygote dalvikcache_data_file:file { r_file_perms execute };
/system/core/libmemunreachable/
DProcessMappings.h27 bool execute; member
DProcessMappings.cpp54 mapping.execute = true; in ProcessMappings()
/system/bt/service/doc/
DIBluetoothGattClient.txt171 * with address |device_address|. If |execute| is true, then a request will be
172 * sent to execute the queued writes, else a request will be sent to abort the
175 * be used to asynchronously report the result of the execute write request.
179 in boolean execute);

123