Home
last modified time | relevance | path

Searched refs:execute (Results 1 – 25 of 623) sorted by relevance

12345678910>>...25

/system/netd/server/
DIptablesRestoreControllerTest.cpp155 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain()
168 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain()
203 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
208 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F()
209 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F()
211 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
225 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F()
227 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F()
236 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
250 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
[all …]
/system/security/keystore2/src/database/
Dversioning.rs19 tx.execute( in create_or_get_version()
57 tx.execute("INSERT INTO persistent.version (id, version) VALUES(0, ?);", params![version]) in create_or_get_version()
66 .execute("UPDATE persistent.version SET version = ? WHERE id = 0;", params![new_version]) in update_version()
100 conn.execute("ATTACH DATABASE 'file::memory:' as persistent;", []).unwrap(); in upgrade_database_test()
105 tx.execute( in upgrade_database_test()
117 conn.execute( in upgrade_database_test()
132 conn.execute("DROP TABLE IF EXISTS persistent.version;", []).unwrap(); in upgrade_database_test()
133 conn.execute("DROP TABLE IF EXISTS persistent.test;", []).unwrap(); in upgrade_database_test()
134 conn.execute( in upgrade_database_test()
189 conn.execute("ATTACH DATABASE 'file::memory:' as persistent;", []).unwrap(); in create_or_get_version_new_database()
[all …]
/system/memory/libmemunreachable/
DProcessMappings.h31 bool execute; member
35 Mapping(uintptr_t begin, uintptr_t end, bool read, bool write, bool execute, const char* name) in Mapping()
36 : begin(begin), end(end), read(read), write(write), execute(execute) { in Mapping()
/system/keymint/hal/src/
Dkeymint.rs99 let rsp: GetHardwareInfoResponse = self.execute(GetHardwareInfoRequest {})?; in getHardwareInfo()
104 self.execute(AddRngEntropyRequest { data: data.to_vec() })?; in addRngEntropy()
112 let rsp: GenerateKeyResponse = self.execute(GenerateKeyRequest { in generateKey()
132 let rsp: ImportKeyResponse = self.execute(ImportKeyRequest { in importKey()
156 let rsp: ImportWrappedKeyResponse = self.execute(ImportWrappedKeyRequest { in importWrappedKey()
175 let rsp: UpgradeKeyResponse = self.execute(UpgradeKeyRequest { in upgradeKey()
187 self.execute(DeleteKeyRequest { key_blob: keyBlob.to_vec() })?; in deleteKey()
191 let _rsp: DeleteAllKeysResponse = self.execute(DeleteAllKeysRequest {})?; in deleteAllKeys()
195 let _rsp: DestroyAttestationIdsResponse = self.execute(DestroyAttestationIdsRequest {})?; in destroyAttestationIds()
205 let rsp: BeginResponse = self.execute(BeginRequest { in begin()
[all …]
Drpc.rs58 let rsp: GetRpcHardwareInfoResponse = self.execute(GetRpcHardwareInfoRequest {})?; in getHardwareInfo()
67 self.execute(GenerateEcdsaP256KeyPairRequest { test_mode: testMode })?; in generateEcdsaP256KeyPair()
81 self.execute(GenerateCertificateRequestRequest { in generateCertificateRequest()
97 self.execute(GenerateCertificateRequestV2Request { in generateCertificateRequestV2()
/system/core/llkd/tests/
Dllkd_test.cpp63 void execute(const char* command) { in execute() function
83 execute("stop llkd-0"); in llkdSleepPeriod()
84 execute("stop llkd-1"); in llkdSleepPeriod()
89 execute((setprop + LLK_CHECK_STACK_PROPERTY + " ,SyS_openat,__arm64_sys_openat").c_str()); in llkdSleepPeriod()
91 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " false").c_str()); in llkdSleepPeriod()
93 execute((setprop + LLK_TIMEOUT_MS_PROPERTY + " 120000").c_str()); in llkdSleepPeriod()
95 execute((setprop + KHT_TIMEOUT_PROPERTY + " 130").c_str()); in llkdSleepPeriod()
97 execute((setprop + LLK_CHECK_MS_PROPERTY + " 10000").c_str()); in llkdSleepPeriod()
100 execute((setprop + LLK_ENABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod()
103 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod()
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
/system/sepolicy/prebuilts/api/30.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
/system/sepolicy/prebuilts/api/29.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
/system/sepolicy/prebuilts/api/31.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
/system/sepolicy/prebuilts/api/32.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
/system/sepolicy/prebuilts/api/33.0/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
/system/sepolicy/prebuilts/api/202404/public/
Dvendor_toolbox.te2 # Non-vendor processes are not allowed to execute the binary
7 # or read, execute the vendor_toolbox file.
15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
Dasan_extract.te10 # Allow asan_extract to execute itself using #!/system/bin/sh
13 # We execute log, rm, gzip and tar.
32 allow asan_extract system_data_file:file execute;
/system/sepolicy/prebuilts/api/34.0/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
71 # execute gpu_device
72 neverallow ephemeral_app gpu_device:chr_file execute;
/system/sepolicy/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
71 # execute gpu_device
72 neverallow ephemeral_app gpu_device:chr_file execute;
Dvendor_toolbox.te2 # or read, execute the vendor_toolbox file.
10 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
/system/sepolicy/prebuilts/api/202404/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
71 # execute gpu_device
72 neverallow ephemeral_app gpu_device:chr_file execute;
/system/sepolicy/prebuilts/api/32.0/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
79 # execute gpu_device
80 neverallow ephemeral_app gpu_device:chr_file execute;
/system/sepolicy/prebuilts/api/30.0/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
83 # execute gpu_device
84 neverallow ephemeral_app gpu_device:chr_file execute;
/system/sepolicy/prebuilts/api/33.0/private/
Dephemeral_app.te23 # to their sandbox directory and then execute.
24 allow ephemeral_app privapp_data_file:file { r_file_perms execute };
25 allow ephemeral_app app_data_file:file { r_file_perms execute };
35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink };
79 # execute gpu_device
80 neverallow ephemeral_app gpu_device:chr_file execute;

12345678910>>...25