Searched refs:shell (Results 1 – 25 of 483) sorted by relevance
12345678910>>...20
/system/sepolicy/private/ |
D | shell.te | 1 typeattribute shell coredomain, mlstrustedsubject; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | shell.te | 1 typeattribute shell coredomain, mlstrustedsubject; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/extras/tests/ext4/ |
D | android_emmc_perf_tests.sh | 22 if ! adb shell true >/dev/null 2>&1 27 HARDWARE=`adb shell getprop ro.hardware | tr -d "\r"` 87 adb shell stop 88 adb shell stop sdcard 89 adb shell stop ril-daemon 90 adb shell stop media 91 adb shell stop drm 92 adb shell stop keystore 93 adb shell stop tf_daemon 94 adb shell stop bluetoothd [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 1 # vendor shell MUST never run as interactive or login shell. 2 # vendor shell CAN never be traisitioned to by any process, so it is 3 # only intended by shell script interpreter.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 1 # vendor shell MUST never run as interactive or login shell. 2 # vendor shell CAN never be traisitioned to by any process, so it is 3 # only intended by shell script interpreter.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/sepolicy/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | shell.te | 1 # Domain for shell processes spawned by ADB or console service. 2 type shell, domain, mlstrustedsubject; 6 net_domain(shell) 9 read_logd(shell) 10 control_logd(shell) 12 allow shell pstorefs:dir search; 13 allow shell pstorefs:file r_file_perms; 16 allow shell rootfs:dir r_dir_perms; 19 allow shell anr_data_file:dir r_dir_perms; 20 allow shell anr_data_file:file r_file_perms; [all …]
|
D | vendor_shell.te | 7 # Use fd from shell when vendor_shell is started from shell 8 allow vendor_shell shell:fd use; 10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing_debug:dir r_dir_perms; 8 allow shell debugfs_tracing:dir r_dir_perms; 9 allow shell debugfs_tracing:file rw_file_perms; 10 allow shell debugfs_trace_marker:file getattr; 11 allow shell atrace_exec:file rx_file_perms; 14 allow shell debugfs_tracing_debug:file rw_file_perms; 18 allow shell config_gz:file r_file_perms; [all …]
|
/system/extras/app-launcher/ |
D | app-launcher | 116 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_g\ 118 $adb shell "echo 2499000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_fr\ 137 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_governor" 138 $adb shell "echo 1833000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_freq" 146 $adb shell 'echo performance > /sys/class/kgsl/kgsl-3d0/devfreq/governor' 147 $adb shell 'echo 624000000 > /sys/class/kgsl/kgsl-3d0/devfreq/max_freq' 151 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu0/online' 152 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu1/online' 153 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu2/online' 154 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu3/online' [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 3 # allow shell input injection 4 allow shell uhid_device:chr_file rw_file_perms; 7 allow shell debugfs_tracing:dir r_dir_perms; 8 allow shell debugfs_tracing:file rw_file_perms; 9 allow shell debugfs_trace_marker:file getattr; 10 allow shell atrace_exec:file rx_file_perms; 13 allow shell config_gz:file r_file_perms; 16 allow shell debugfs_tracing_debug:file rw_file_perms; 21 app_domain(shell) [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | shell.te | 1 typeattribute shell coredomain; 4 allow shell debugfs_tracing:dir r_dir_perms; 5 allow shell debugfs_tracing:file r_file_perms; 6 allow shell tracing_shell_writable:file rw_file_perms; 7 allow shell debugfs_trace_marker:file getattr; 8 allow shell atrace_exec:file rx_file_perms; 11 allow shell config_gz:file r_file_perms; 14 allow shell tracing_shell_writable_debug:file rw_file_perms; 19 app_domain(shell) 21 # allow shell to call dumpsys storaged [all …]
|
/system/media/audio_utils/tests/ |
D | build_and_run_all_unit_tests.sh | 24 adb shell /system/bin/fdtostring_tests 29 adb shell /system/bin/primitives_tests 33 adb shell /system/bin/power_tests 37 adb shell /system/bin/channels_tests 41 adb shell /system/bin/string_tests 45 adb shell /system/bin/format_tests 49 adb shell /system/bin/simplelog_tests 53 adb shell /system/bin/statistics_tests 57 adb shell /system/bin/timestampverifier_tests 61 adb shell /system/bin/variadic_tests [all …]
|
/system/extras/ioblame/ |
D | ioblame.sh | 38 model=`adb shell getprop ro.product.name` 89 …block_device=`adb shell 'find /dev/block/platform -name by-name | xargs ls -l' | grep system | awk… 97 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device ` 106 adb shell 'mount -o remount,background_gc=off /data' 107 …F2FS_GC_SEGMENTS_BEFORE=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'da… 113 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device ` 122 …F2FS_GC_SEGMENTS_AFTER=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'dat… 123 adb shell 'mount -o remount,background_gc=on /data' 160 …tracepoint_exists=`adb shell 'if [ -d /sys/kernel/debug/tracing/events/android_fs ]; then echo 0; … 165 adb shell 'echo 0 > /sys/kernel/debug/tracing/tracing_on' [all …]
|
/system/extras/ANRdaemon/ |
D | ANRdaemon_get_trace.sh | 12 PID=$(adb $DEVICE shell "ps | grep anrd") 20 adb $DEVICE shell "kill -s SIGUSR1 $PID" 22 TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR \ 26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null 30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
|
12345678910>>...20