Home
last modified time | relevance | path

Searched refs:shell (Results 1 – 25 of 324) sorted by relevance

12345678910>>...13

/system/sepolicy/prebuilts/api/28.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/extras/tests/ext4/
Dandroid_emmc_perf_tests.sh22 if ! adb shell true >/dev/null 2>&1
27 HARDWARE=`adb shell getprop ro.hardware | tr -d "\r"`
87 adb shell stop
88 adb shell stop sdcard
89 adb shell stop ril-daemon
90 adb shell stop media
91 adb shell stop drm
92 adb shell stop keystore
93 adb shell stop tf_daemon
94 adb shell stop bluetoothd
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te1 # vendor shell MUST never run as interactive or login shell.
2 # vendor shell CAN never be traisitioned to by any process, so it is
3 # only intended by shell script interpreter.
/system/sepolicy/prebuilts/api/26.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te1 # vendor shell MUST never run as interactive or login shell.
2 # vendor shell CAN never be traisitioned to by any process, so it is
3 # only intended by shell script interpreter.
/system/sepolicy/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/sepolicy/prebuilts/api/29.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/sepolicy/prebuilts/api/29.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
Dincident_helper.te9 allow incident_helper { shell incident incidentd dumpstate }:fd use;
10 allow incident_helper { shell incident incidentd dumpstate }:fifo_file { getattr read write };
13 # only allow incidentd and shell to call incident_helper
14 neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execut…
/system/sepolicy/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
Dincident_helper.te9 allow incident_helper { shell incident incidentd }:fd use;
10 allow incident_helper { shell incident incidentd }:fifo_file { getattr read write };
13 # only allow incidentd and shell to call incident_helper
14 neverallow { domain -incidentd -incident_helper -shell } incident_helper_exec:file { execute execut…
/system/extras/app-launcher/
Dapp-launcher116 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_g\
118 $adb shell "echo 2499000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_fr\
137 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_governor"
138 $adb shell "echo 1833000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_freq"
146 $adb shell 'echo performance > /sys/class/kgsl/kgsl-3d0/devfreq/governor'
147 $adb shell 'echo 624000000 > /sys/class/kgsl/kgsl-3d0/devfreq/max_freq'
151 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu0/online'
152 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu1/online'
153 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu2/online'
154 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu3/online'
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing:dir r_dir_perms;
8 allow shell debugfs_tracing:file rw_file_perms;
9 allow shell debugfs_trace_marker:file getattr;
10 allow shell atrace_exec:file rx_file_perms;
13 allow shell config_gz:file r_file_perms;
16 allow shell debugfs_tracing_debug:file rw_file_perms;
21 app_domain(shell)
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dshell.te1 typeattribute shell coredomain;
4 allow shell debugfs_tracing:dir r_dir_perms;
5 allow shell debugfs_tracing:file r_file_perms;
6 allow shell tracing_shell_writable:file rw_file_perms;
7 allow shell debugfs_trace_marker:file getattr;
8 allow shell atrace_exec:file rx_file_perms;
11 allow shell config_gz:file r_file_perms;
14 allow shell tracing_shell_writable_debug:file rw_file_perms;
19 app_domain(shell)
21 # allow shell to call dumpsys storaged
[all …]
/system/media/audio_utils/tests/
Dbuild_and_run_all_unit_tests.sh24 adb shell /system/bin/fdtostring_tests
29 adb shell /system/bin/primitives_tests
33 adb shell /system/bin/power_tests
37 adb shell /system/bin/channels_tests
41 adb shell /system/bin/string_tests
45 adb shell /system/bin/format_tests
49 adb shell /system/bin/simplelog_tests
53 adb shell /system/bin/statistics_tests
57 adb shell /system/bin/timestampverifier_tests
61 adb shell /system/bin/variadic_tests
[all …]
/system/extras/ioblame/
Dioblame.sh38 model=`adb shell getprop ro.product.name`
89 …block_device=`adb shell 'find /dev/block/platform -name by-name | xargs ls -l' | grep system | awk…
97 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device `
106 adb shell 'mount -o remount,background_gc=off /data'
107 …F2FS_GC_SEGMENTS_BEFORE=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'da…
113 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device `
122 …F2FS_GC_SEGMENTS_AFTER=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'dat…
123 adb shell 'mount -o remount,background_gc=on /data'
160 …tracepoint_exists=`adb shell 'if [ -d /sys/kernel/debug/tracing/events/android_fs ]; then echo 0; …
165 adb shell 'echo 0 > /sys/kernel/debug/tracing/tracing_on'
[all …]
/system/extras/ANRdaemon/
DANRdaemon_get_trace.sh12 PID=$(adb $DEVICE shell "ps | grep anrd")
20 adb $DEVICE shell "kill -s SIGUSR1 $PID"
22 TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR \
26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null
30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
/system/core/libnativeloader/test/
Druntest.sh5 adb shell stop
6 adb shell start
9 adb shell am start -n android.test.app.system/android.test.app.TestActivity
10 adb shell am start -n android.test.app.vendor/android.test.app.TestActivity
/system/extras/ioshark/
Dcollect-straces-ftraces.sh128 … adb shell "echo 1 > /sys/kernel/debug/tracing/events/android_fs/android_fs_dataread_start/enable"
129 adb shell "echo 1 > /sys/kernel/debug/tracing/tracing_on"
134 … adb shell "echo 0 > /sys/kernel/debug/tracing/events/android_fs/android_fs_dataread_start/enable"
135 adb shell "echo 0 > /sys/kernel/debug/tracing/tracing_on"
166 adb shell 'ps' | grep zygote > zygote_pids
173 adb shell "date +%s > /data/local/tmp/trace.begin ; strace -p $pid1,$pid2 -o /data/local/tmp/trace …
174 adb shell "cat /sys/kernel/debug/tracing/trace_pipe" > fstrace &
180 adb shell 'monkey -p com.android.alarmclock -p com.android.chrome -p com.android.calculator -p com.…
192 adb shell 'cd /data/local/tmp ; tar cvf trace.tar trace.*'
/system/core/adb/
Dtest_device.py47 was_root = self.device.shell(['id', '-un'])[0].strip() == 'root'
64 was_root = self.device.shell(['id', '-un'])[0].strip() == 'root'
275 out = self.device.shell(['cat', '/proc/uptime'])[0].strip()
284 self.assertRaises(adb.ShellError, self.device.shell, ['false'])
287 out = self.device.shell(['echo', 'foo'])[0]
320 output = self.device.shell(['uname'])[0]
436 self.device.shell(proc_query)
494 stdout, _ = self.device.shell(["cat", log_path])
530 result = self.device.shell(
535 result = self.device.shell(
[all …]

12345678910>>...13