Searched refs:shell (Results 1 – 25 of 324) sorted by relevance
12345678910>>...13
/system/sepolicy/prebuilts/api/28.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/extras/tests/ext4/ |
D | android_emmc_perf_tests.sh | 22 if ! adb shell true >/dev/null 2>&1 27 HARDWARE=`adb shell getprop ro.hardware | tr -d "\r"` 87 adb shell stop 88 adb shell stop sdcard 89 adb shell stop ril-daemon 90 adb shell stop media 91 adb shell stop drm 92 adb shell stop keystore 93 adb shell stop tf_daemon 94 adb shell stop bluetoothd [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 1 # vendor shell MUST never run as interactive or login shell. 2 # vendor shell CAN never be traisitioned to by any process, so it is 3 # only intended by shell script interpreter.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 1 # vendor shell MUST never run as interactive or login shell. 2 # vendor shell CAN never be traisitioned to by any process, so it is 3 # only intended by shell script interpreter.
|
/system/sepolicy/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
D | incident_helper.te | 9 allow incident_helper { shell incident incidentd dumpstate }:fd use; 10 allow incident_helper { shell incident incidentd dumpstate }:fifo_file { getattr read write }; 13 # only allow incidentd and shell to call incident_helper 14 neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execut…
|
/system/sepolicy/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
D | incident_helper.te | 9 allow incident_helper { shell incident incidentd }:fd use; 10 allow incident_helper { shell incident incidentd }:fifo_file { getattr read write }; 13 # only allow incidentd and shell to call incident_helper 14 neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execut…
|
/system/extras/app-launcher/ |
D | app-launcher | 116 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_g\ 118 $adb shell "echo 2499000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_fr\ 137 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_governor" 138 $adb shell "echo 1833000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_freq" 146 $adb shell 'echo performance > /sys/class/kgsl/kgsl-3d0/devfreq/governor' 147 $adb shell 'echo 624000000 > /sys/class/kgsl/kgsl-3d0/devfreq/max_freq' 151 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu0/online' 152 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu1/online' 153 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu2/online' 154 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu3/online' [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing:dir r_dir_perms; 8 allow shell debugfs_tracing:file rw_file_perms; 9 allow shell debugfs_trace_marker:file getattr; 10 allow shell atrace_exec:file rx_file_perms; 13 allow shell config_gz:file r_file_perms; 16 allow shell debugfs_tracing_debug:file rw_file_perms; 21 app_domain(shell) [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 4 allow shell debugfs_tracing:dir r_dir_perms; 5 allow shell debugfs_tracing:file r_file_perms; 6 allow shell tracing_shell_writable:file rw_file_perms; 7 allow shell debugfs_trace_marker:file getattr; 8 allow shell atrace_exec:file rx_file_perms; 11 allow shell config_gz:file r_file_perms; 14 allow shell tracing_shell_writable_debug:file rw_file_perms; 19 app_domain(shell) 21 # allow shell to call dumpsys storaged [all …]
|
/system/media/audio_utils/tests/ |
D | build_and_run_all_unit_tests.sh | 24 adb shell /system/bin/fdtostring_tests 29 adb shell /system/bin/primitives_tests 33 adb shell /system/bin/power_tests 37 adb shell /system/bin/channels_tests 41 adb shell /system/bin/string_tests 45 adb shell /system/bin/format_tests 49 adb shell /system/bin/simplelog_tests 53 adb shell /system/bin/statistics_tests 57 adb shell /system/bin/timestampverifier_tests 61 adb shell /system/bin/variadic_tests [all …]
|
/system/extras/ioblame/ |
D | ioblame.sh | 38 model=`adb shell getprop ro.product.name` 89 …block_device=`adb shell 'find /dev/block/platform -name by-name | xargs ls -l' | grep system | awk… 97 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device ` 106 adb shell 'mount -o remount,background_gc=off /data' 107 …F2FS_GC_SEGMENTS_BEFORE=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'da… 113 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device ` 122 …F2FS_GC_SEGMENTS_AFTER=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'dat… 123 adb shell 'mount -o remount,background_gc=on /data' 160 …tracepoint_exists=`adb shell 'if [ -d /sys/kernel/debug/tracing/events/android_fs ]; then echo 0; … 165 adb shell 'echo 0 > /sys/kernel/debug/tracing/tracing_on' [all …]
|
/system/extras/ANRdaemon/ |
D | ANRdaemon_get_trace.sh | 12 PID=$(adb $DEVICE shell "ps | grep anrd") 20 adb $DEVICE shell "kill -s SIGUSR1 $PID" 22 TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR \ 26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null 30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
|
/system/core/libnativeloader/test/ |
D | runtest.sh | 5 adb shell stop 6 adb shell start 9 adb shell am start -n android.test.app.system/android.test.app.TestActivity 10 adb shell am start -n android.test.app.vendor/android.test.app.TestActivity
|
/system/extras/ioshark/ |
D | collect-straces-ftraces.sh | 128 … adb shell "echo 1 > /sys/kernel/debug/tracing/events/android_fs/android_fs_dataread_start/enable" 129 adb shell "echo 1 > /sys/kernel/debug/tracing/tracing_on" 134 … adb shell "echo 0 > /sys/kernel/debug/tracing/events/android_fs/android_fs_dataread_start/enable" 135 adb shell "echo 0 > /sys/kernel/debug/tracing/tracing_on" 166 adb shell 'ps' | grep zygote > zygote_pids 173 adb shell "date +%s > /data/local/tmp/trace.begin ; strace -p $pid1,$pid2 -o /data/local/tmp/trace … 174 adb shell "cat /sys/kernel/debug/tracing/trace_pipe" > fstrace & 180 adb shell 'monkey -p com.android.alarmclock -p com.android.chrome -p com.android.calculator -p com.… 192 adb shell 'cd /data/local/tmp ; tar cvf trace.tar trace.*'
|
/system/core/adb/ |
D | test_device.py | 47 was_root = self.device.shell(['id', '-un'])[0].strip() == 'root' 64 was_root = self.device.shell(['id', '-un'])[0].strip() == 'root' 275 out = self.device.shell(['cat', '/proc/uptime'])[0].strip() 284 self.assertRaises(adb.ShellError, self.device.shell, ['false']) 287 out = self.device.shell(['echo', 'foo'])[0] 320 output = self.device.shell(['uname'])[0] 436 self.device.shell(proc_query) 494 stdout, _ = self.device.shell(["cat", log_path]) 530 result = self.device.shell( 535 result = self.device.shell( [all …]
|
12345678910>>...13