Home
last modified time | relevance | path

Searched refs:shell (Results 1 – 25 of 483) sorted by relevance

12345678910>>...20

/system/sepolicy/private/
Dshell.te1 typeattribute shell coredomain, mlstrustedsubject;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dshell.te1 typeattribute shell coredomain, mlstrustedsubject;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/extras/tests/ext4/
Dandroid_emmc_perf_tests.sh22 if ! adb shell true >/dev/null 2>&1
27 HARDWARE=`adb shell getprop ro.hardware | tr -d "\r"`
87 adb shell stop
88 adb shell stop sdcard
89 adb shell stop ril-daemon
90 adb shell stop media
91 adb shell stop drm
92 adb shell stop keystore
93 adb shell stop tf_daemon
94 adb shell stop bluetoothd
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te1 # vendor shell MUST never run as interactive or login shell.
2 # vendor shell CAN never be traisitioned to by any process, so it is
3 # only intended by shell script interpreter.
/system/sepolicy/prebuilts/api/26.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te1 # vendor shell MUST never run as interactive or login shell.
2 # vendor shell CAN never be traisitioned to by any process, so it is
3 # only intended by shell script interpreter.
/system/sepolicy/prebuilts/api/29.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/sepolicy/prebuilts/api/30.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/sepolicy/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dshell.te1 # Domain for shell processes spawned by ADB or console service.
2 type shell, domain, mlstrustedsubject;
6 net_domain(shell)
9 read_logd(shell)
10 control_logd(shell)
12 allow shell pstorefs:dir search;
13 allow shell pstorefs:file r_file_perms;
16 allow shell rootfs:dir r_dir_perms;
19 allow shell anr_data_file:dir r_dir_perms;
20 allow shell anr_data_file:file r_file_perms;
[all …]
Dvendor_shell.te7 # Use fd from shell when vendor_shell is started from shell
8 allow vendor_shell shell:fd use;
10 # adbd: allow `adb shell /vendor/bin/sh` and `adb shell` then `/vendor/bin/sh`
/system/sepolicy/prebuilts/api/29.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing_debug:dir r_dir_perms;
8 allow shell debugfs_tracing:dir r_dir_perms;
9 allow shell debugfs_tracing:file rw_file_perms;
10 allow shell debugfs_trace_marker:file getattr;
11 allow shell atrace_exec:file rx_file_perms;
14 allow shell debugfs_tracing_debug:file rw_file_perms;
18 allow shell config_gz:file r_file_perms;
[all …]
/system/extras/app-launcher/
Dapp-launcher116 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_g\
118 $adb shell "echo 2499000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_fr\
137 $adb shell "echo performance > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_governor"
138 $adb shell "echo 1833000 > /sys/devices/system/cpu/cpu$i/cpufreq/scaling_max_freq"
146 $adb shell 'echo performance > /sys/class/kgsl/kgsl-3d0/devfreq/governor'
147 $adb shell 'echo 624000000 > /sys/class/kgsl/kgsl-3d0/devfreq/max_freq'
151 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu0/online'
152 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu1/online'
153 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu2/online'
154 $adb shell 'echo 0 > /sys/devices/system/cpu/cpu3/online'
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dshell.te1 typeattribute shell coredomain;
3 # allow shell input injection
4 allow shell uhid_device:chr_file rw_file_perms;
7 allow shell debugfs_tracing:dir r_dir_perms;
8 allow shell debugfs_tracing:file rw_file_perms;
9 allow shell debugfs_trace_marker:file getattr;
10 allow shell atrace_exec:file rx_file_perms;
13 allow shell config_gz:file r_file_perms;
16 allow shell debugfs_tracing_debug:file rw_file_perms;
21 app_domain(shell)
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dshell.te1 typeattribute shell coredomain;
4 allow shell debugfs_tracing:dir r_dir_perms;
5 allow shell debugfs_tracing:file r_file_perms;
6 allow shell tracing_shell_writable:file rw_file_perms;
7 allow shell debugfs_trace_marker:file getattr;
8 allow shell atrace_exec:file rx_file_perms;
11 allow shell config_gz:file r_file_perms;
14 allow shell tracing_shell_writable_debug:file rw_file_perms;
19 app_domain(shell)
21 # allow shell to call dumpsys storaged
[all …]
/system/media/audio_utils/tests/
Dbuild_and_run_all_unit_tests.sh24 adb shell /system/bin/fdtostring_tests
29 adb shell /system/bin/primitives_tests
33 adb shell /system/bin/power_tests
37 adb shell /system/bin/channels_tests
41 adb shell /system/bin/string_tests
45 adb shell /system/bin/format_tests
49 adb shell /system/bin/simplelog_tests
53 adb shell /system/bin/statistics_tests
57 adb shell /system/bin/timestampverifier_tests
61 adb shell /system/bin/variadic_tests
[all …]
/system/extras/ioblame/
Dioblame.sh38 model=`adb shell getprop ro.product.name`
89 …block_device=`adb shell 'find /dev/block/platform -name by-name | xargs ls -l' | grep system | awk…
97 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device `
106 adb shell 'mount -o remount,background_gc=off /data'
107 …F2FS_GC_SEGMENTS_BEFORE=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'da…
113 DISKSTATS=`adb shell 'cat /proc/diskstats' | fgrep -w $block_device `
122 …F2FS_GC_SEGMENTS_AFTER=`adb shell 'cat /sys/kernel/debug/f2fs/status' | grep segments | egrep 'dat…
123 adb shell 'mount -o remount,background_gc=on /data'
160 …tracepoint_exists=`adb shell 'if [ -d /sys/kernel/debug/tracing/events/android_fs ]; then echo 0; …
165 adb shell 'echo 0 > /sys/kernel/debug/tracing/tracing_on'
[all …]
/system/extras/ANRdaemon/
DANRdaemon_get_trace.sh12 PID=$(adb $DEVICE shell "ps | grep anrd")
20 adb $DEVICE shell "kill -s SIGUSR1 $PID"
22 TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR \
26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null
30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null

12345678910>>...20