Searched refs:exec (Results 1 – 25 of 143) sorted by relevance
123456
/system/server_configurable_flags/disaster_recovery/ |
D | flags_health_check.rc | 5 exec - system system -- /system/bin/flags_health_check BOOT_FAILURE 11 exec - system system -- /system/bin/flags_health_check UPDATABLE_CRASHING
|
/system/vold/ |
D | vdc.rc | 3 exec - root -- /system/bin/vdc --wait cryptfs mountdefaultencrypted 10 exec - root -- /system/bin/vdc --wait cryptfs enablecrypto
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | traced.te | 5 # Allow init to exec the daemon. 29 # Disallow mapping executable memory (execstack and exec are already disallowed 58 # Only init is allowed to enter the traced domain via exec()
|
D | shell.te | 43 # Allow shell binaries to exec the perfetto cmdline util and have that 45 # when exec()-d by statsd.
|
D | traced_probes.te | 4 # Allow init to exec the daemon. 65 # Disallow mapping executable memory (execstack and exec are already disallowed 97 # Only init is allowed to enter the traced_probes domain via exec()
|
/system/core/libunwindstack/tests/ |
D | ElfTestUtils.cpp | 51 std::string exec(testing::internal::GetArgvs()[0]); in TestGetFileDirectory() local 52 auto const value = exec.find_last_of('/'); in TestGetFileDirectory() 56 return exec.substr(0, value + 1) + "tests/files/"; in TestGetFileDirectory()
|
/system/apex/tests/testdata/ |
D | trigger_watchdog.rc | 4 exec -- /system/bin/log -t TriggerWatchdog "Starting trigger_watchdog" 10 exec -- /system/bin/log -t TriggerWatchdog "Rebooting once after activation" 15 exec -- /system/bin/log -t TriggerWatchdog "Checking checkpointing revert"
|
/system/core/rootdir/ |
D | asan_extract.rc | 3 exec - system system -- /system/bin/asan_extract
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | webview_zygote.te | 60 # Only setcon() transitions, no exec() based transitions, except for crash_dump. 63 # Must not exec() a program without changing domains. 64 # Having said that, exec() above is not allowed. 67 # The only way to enter this domain is for init to exec() us.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | webview_zygote.te | 64 # Only setcon() transitions, no exec() based transitions, except for crash_dump. 67 # Must not exec() a program without changing domains. 68 # Having said that, exec() above is not allowed. 71 # The only way to enter this domain is for init to exec() us.
|
/system/sepolicy/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | traced.te | 8 # Allow init to exec the daemon. 50 # Disallow mapping executable memory (execstack and exec are already disallowed 82 # Only init is allowed to enter the traced domain via exec()
|
D | apex_test_prepostinstall.te | 16 # Logwrapper exec.
|
D | traceur_app.te | 15 # To exec the perfetto cmdline client and pass it the trace config on
|
D | statsd.te | 8 # Allow to exec the perfetto cmdline client and pass it the trace config on
|
/system/extras/cppreopts/ |
D | cppreopts.rc | 30 exec - system system -- /system/bin/preloads_copy.sh /postinstall 38 exec - system system -- /system/bin/preloads_copy.sh /postinstall
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | adbd.te | 6 # Only init is allowed to enter the adbd domain via exec()
|
/system/sepolicy/private/ |
D | simpleperf.te | 2 # Entered either by the app itself exec-ing the binary, or through 4 # (runas_app, shell) can also exec this binary without a domain transition.
|
D | apex_test_prepostinstall.te | 16 # Logwrapper exec.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | simpleperf.te | 2 # Entered either by the app itself exec-ing the binary, or through 4 # (runas_app, shell) can also exec this binary without a domain transition.
|
D | apex_test_prepostinstall.te | 16 # Logwrapper exec.
|
D | traceur_app.te | 15 # To exec the perfetto cmdline client and pass it the trace config on
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | perfprofd.te | 17 # simpleperf retains perfprofd domain after exec 42 # simpleperf needs to access /proc/<pid>/exec
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | perfprofd.te | 17 # simpleperf retains perfprofd domain after exec 42 # simpleperf needs to access /proc/<pid>/exec
|
123456