Searched refs:execute (Results 1 – 25 of 62) sorted by relevance
123
/system/netd/server/ |
D | IptablesRestoreControllerTest.cpp | 103 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain() 116 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain() 151 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() 156 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F() 157 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F() 159 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 173 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F() 175 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F() 184 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 198 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() [all …]
|
D | IptablesRestoreController.h | 35 int execute(const IptablesTarget target, const std::string& commands); 38 int execute(const IptablesTarget target, const std::string& commands, std::string *output);
|
/system/sepolicy/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
D | postinstall.te | 11 # Allow postinstall to read and execute directories and files in the same 17 # Allow postinstall to execute the shell or other system executables.
|
D | update_engine_common.te | 22 # Allow update_engine_common to read and execute postinstall_file. 29 # to execute those.
|
D | neverallow_macros | 5 define(`no_x_file_perms', `{ execute execute_no_trans }')
|
D | mediadrmserver.te | 28 # mediadrmserver should never execute any executable without a
|
D | cppreopts.te | 14 # Allow cppreopts to execute itself using #!/system/bin/sh
|
D | install_recovery.te | 8 # Needs to execute /system/bin/sh
|
D | domain.te | 102 allow domain system_file:file { execute read open getattr }; 109 allow domain vendor_file_type:file { execute read open getattr }; 118 # Everyone can read and execute all same process HALs 120 allow domain same_process_hal_file:file { execute read open getattr }; 125 allow domain vndk_sp_file:file { execute read open getattr }; 136 # in order to lookup vendor libraries. The execute permission 142 allow { domain -coredomain } vendor_file_type:file { read open getattr execute }; 364 }:file execute; 370 } { fs_type -rootfs }:file execute; 372 …domain { cache_file cache_backup_file cache_private_backup_file cache_recovery_file }:file execute; [all …]
|
D | hal_audio.te | 30 # Should never execute any executable without a domain transition
|
D | hal_camera.te | 28 # hal_camera should never execute any executable without a
|
D | mediametrics.te | 24 # mediametrics should never execute any executable without a
|
D | otapreopt_slot.te | 22 # Allow cppreopts to execute itself using #!/system/bin/sh
|
D | sdcardd.te | 42 neverallow init sdcardd_exec:file execute;
|
D | cameraserver.te | 35 # cameraserver should never execute any executable without a
|
/system/sepolicy/private/ |
D | ephemeral_app.te | 40 neverallow ephemeral_app app_data_file:file { execute execute_no_trans }; 52 # execute gpu_device 53 neverallow ephemeral_app gpu_device:chr_file execute;
|
D | untrusted_app_all.te | 28 # to their sandbox directory and then execute. 35 allow untrusted_app_all asec_public_file:file { execute execmod }; 100 # Allow untrusted apps read / execute access to /vendor/app for there can 105 allow untrusted_app_all vendor_app_file:file { open getattr read execute };
|
D | dumpstate.te | 13 allow dumpstate dumpstate_tmpfs:file execute;
|
D | netutils_wrapper.te | 8 allow netutils_wrapper system_file:file { execute execute_no_trans };
|
D | webview_zygote.te | 16 allow webview_zygote apk_data_file:file { r_file_perms execute }; 33 allow webview_zygote dalvikcache_data_file:file { r_file_perms execute };
|
/system/core/libmemunreachable/ |
D | ProcessMappings.h | 27 bool execute; member
|
D | ProcessMappings.cpp | 54 mapping.execute = true; in ProcessMappings()
|
/system/bt/service/doc/ |
D | IBluetoothGattClient.txt | 171 * with address |device_address|. If |execute| is true, then a request will be 172 * sent to execute the queued writes, else a request will be sent to abort the 175 * be used to asynchronously report the result of the execute write request. 179 in boolean execute);
|
123