Home
last modified time | relevance | path

Searched refs:exec (Results 1 – 25 of 143) sorted by relevance

123456

/system/server_configurable_flags/disaster_recovery/
Dflags_health_check.rc5 exec - system system -- /system/bin/flags_health_check BOOT_FAILURE
11 exec - system system -- /system/bin/flags_health_check UPDATABLE_CRASHING
/system/vold/
Dvdc.rc3 exec - root -- /system/bin/vdc --wait cryptfs mountdefaultencrypted
10 exec - root -- /system/bin/vdc --wait cryptfs enablecrypto
/system/sepolicy/prebuilts/api/28.0/private/
Dtraced.te5 # Allow init to exec the daemon.
29 # Disallow mapping executable memory (execstack and exec are already disallowed
58 # Only init is allowed to enter the traced domain via exec()
Dshell.te43 # Allow shell binaries to exec the perfetto cmdline util and have that
45 # when exec()-d by statsd.
Dtraced_probes.te4 # Allow init to exec the daemon.
65 # Disallow mapping executable memory (execstack and exec are already disallowed
97 # Only init is allowed to enter the traced_probes domain via exec()
/system/core/libunwindstack/tests/
DElfTestUtils.cpp51 std::string exec(testing::internal::GetArgvs()[0]); in TestGetFileDirectory() local
52 auto const value = exec.find_last_of('/'); in TestGetFileDirectory()
56 return exec.substr(0, value + 1) + "tests/files/"; in TestGetFileDirectory()
/system/apex/tests/testdata/
Dtrigger_watchdog.rc4 exec -- /system/bin/log -t TriggerWatchdog "Starting trigger_watchdog"
10 exec -- /system/bin/log -t TriggerWatchdog "Rebooting once after activation"
15 exec -- /system/bin/log -t TriggerWatchdog "Checking checkpointing revert"
/system/core/rootdir/
Dasan_extract.rc3 exec - system system -- /system/bin/asan_extract
/system/sepolicy/prebuilts/api/26.0/private/
Dwebview_zygote.te60 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
63 # Must not exec() a program without changing domains.
64 # Having said that, exec() above is not allowed.
67 # The only way to enter this domain is for init to exec() us.
/system/sepolicy/prebuilts/api/27.0/private/
Dwebview_zygote.te64 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
67 # Must not exec() a program without changing domains.
68 # Having said that, exec() above is not allowed.
71 # The only way to enter this domain is for init to exec() us.
/system/sepolicy/public/
Dadbd.te6 # Only init is allowed to enter the adbd domain via exec()
/system/sepolicy/prebuilts/api/29.0/private/
Dtraced.te8 # Allow init to exec the daemon.
50 # Disallow mapping executable memory (execstack and exec are already disallowed
82 # Only init is allowed to enter the traced domain via exec()
Dapex_test_prepostinstall.te16 # Logwrapper exec.
Dtraceur_app.te15 # To exec the perfetto cmdline client and pass it the trace config on
Dstatsd.te8 # Allow to exec the perfetto cmdline client and pass it the trace config on
/system/extras/cppreopts/
Dcppreopts.rc30 exec - system system -- /system/bin/preloads_copy.sh /postinstall
38 exec - system system -- /system/bin/preloads_copy.sh /postinstall
/system/sepolicy/prebuilts/api/30.0/public/
Dadbd.te6 # Only init is allowed to enter the adbd domain via exec()
/system/sepolicy/prebuilts/api/29.0/public/
Dadbd.te6 # Only init is allowed to enter the adbd domain via exec()
/system/sepolicy/private/
Dsimpleperf.te2 # Entered either by the app itself exec-ing the binary, or through
4 # (runas_app, shell) can also exec this binary without a domain transition.
Dapex_test_prepostinstall.te16 # Logwrapper exec.
/system/sepolicy/prebuilts/api/30.0/private/
Dsimpleperf.te2 # Entered either by the app itself exec-ing the binary, or through
4 # (runas_app, shell) can also exec this binary without a domain transition.
Dapex_test_prepostinstall.te16 # Logwrapper exec.
Dtraceur_app.te15 # To exec the perfetto cmdline client and pass it the trace config on
/system/sepolicy/prebuilts/api/26.0/public/
Dperfprofd.te17 # simpleperf retains perfprofd domain after exec
42 # simpleperf needs to access /proc/<pid>/exec
/system/sepolicy/prebuilts/api/27.0/public/
Dperfprofd.te17 # simpleperf retains perfprofd domain after exec
42 # simpleperf needs to access /proc/<pid>/exec

123456