Home
last modified time | relevance | path

Searched refs:execute (Results 1 – 25 of 164) sorted by relevance

1234567

/device/linaro/bootloader/edk2/BaseTools/Source/Python/UPT/Core/
DIpiDb.py48 self.Conn.execute("PRAGMA page_size=4096")
49 self.Conn.execute("PRAGMA synchronous=OFF")
76 self.Cur.execute(SqlCommand)
96 self.Cur.execute(SqlCommand)
106 self.Cur.execute(SqlCommand)
118 self.Cur.execute(SqlCommand)
131 self.Cur.execute(SqlCommand)
144 self.Cur.execute(SqlCommand)
155 self.Cur.execute(SqlCommand)
265 self.Cur.execute(SqlCommand)
[all …]
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Table/
DTable.py39 self.Cur.execute(SqlCommand)
57 self.Cur.execute(SqlCommand)
71 self.Cur.execute(SqlCommand)
82 self.Cur.execute(SqlCommand)
117 self.Cur.execute(SqlCommand)
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Ecc/MetaFileWorkspace/
DMetaDataTable.py65 self.Cur.execute(SqlCommand)
79 self.Cur.execute(SqlCommand)
88 self.Cur.execute(SqlCommand)
100 self.Cur.execute(SqlCommand)
112 Record = self.Cur.execute(SqlCommand).fetchall()
117 Record = self.Cur.execute(SqlCommand).fetchall()
140 self.Cur.execute(SqlCommand)
213 self.Cur.execute(SqlCommand)
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Workspace/
DMetaDataTable.py65 self.Cur.execute(SqlCommand)
79 self.Cur.execute(SqlCommand)
88 self.Cur.execute(SqlCommand)
99 self.Cur.execute(SqlCommand)
109 Record = self.Cur.execute(SqlCommand).fetchall()
114 Record = self.Cur.execute(SqlCommand).fetchall()
137 self.Cur.execute(SqlCommand)
333 self.Cur.execute(SqlCommand)
/device/google/cuttlefish/host/commands/assemble_cvd/
Ddata_image.cc23 int fsck_status = cvd::execute({fsck_path, "-y", "-f", data_image}); in ForceFsckImage()
54 int resize_status = cvd::execute({resize_path, data_image}); in ResizeImage()
86 cvd::execute({"/sbin/mkfs.ext4", image}); in CreateBlankImage()
89 cvd::execute({make_f2fs_path, "-t", image_fmt, image, "-g", "android"}); in CreateBlankImage()
97 cvd::execute({newfs_msdos_path, "-F", "32", "-m", "0xf8", "-a", "4088", in CreateBlankImage()
/device/linaro/poplar/sepolicy/
Dshell.te2 allow shell vendor_file:file { execute getattr open read execute_no_trans };
3 # allow shell vendor_toolbox_exec:file { execute getattr };
/device/generic/uml/sepolicy/
Dinit_eth0.te9 allow init_eth0 shell_exec:file { execute getattr read };
10 allow init_eth0 toolbox_exec:file { execute execute_no_trans getattr open read };
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Ecc/
DDatabase.py83 self.Conn.execute("PRAGMA page_size=4096")
84 self.Conn.execute("PRAGMA synchronous=OFF")
224 self.Cur.execute(SqlCommand)
241 self.Cur.execute(SqlCommand)
246 self.Cur.execute(SqlCommand)
257 self.Cur.execute(SqlCommand)
262 self.Cur.execute(SqlCommand)
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/sockets/
Drpythond.py33 reply = execute(request)
37 def execute(request): function
/device/google/wahoo/sepolicy/vendor/
Dtango_core.te17 # Allow access to necessary vendor libraries to execute Hexagon code
19 allow tango_core hexagon_halide_file:file { execute read open getattr };
Dgoogle_camera_app.te40 # Allow GoogleCamera access to necessary vendor libraries to execute
43 allow google_camera_app hexagon_halide_file:file { execute read open getattr };
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/command/
Dinstall_egg_info.py37 self.execute(os.unlink,(self.target,),"Removing "+target)
39 self.execute(os.makedirs, (self.install_dir,),
/device/linaro/bootloader/edk2/EdkShellBinPkg/
DReadMe.txt9 …To generate Minimum Shell, execute: "build -a IA32 -a X64 -a IPF -p EdkShellPkg\EdkShellPkg.dsc -m…
10 …To generate Full Shell, execute: "build -a IA32 -a X64 -a IPF -p EdkShellPkg\EdkShellPkg.dsc -m Sh…
12 …To generate them, execute: "build -a IA32 -a X64 -a IPF -p EdkShellPkg\EdkShellPkg.dsc -m Shell\XX…
/device/google/sunfish-sepolicy/vendor/google/
Dgoogle_camera_app.te15 # to their sandbox directory and then execute.
16 allow google_camera_app privapp_data_file:file { r_file_perms execute };
17 allow google_camera_app app_data_file:file { r_file_perms execute };
18 auditallow google_camera_app app_data_file:file execute;
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Common/
DDatabase.py49 self.Conn.execute("PRAGMA page_size=8192")
50 self.Conn.execute("PRAGMA synchronous=OFF")
/device/google/cuttlefish/guest/monitoring/cuttlefish_service/java/com/android/google/gce/gceservice/
DGceWifiManager.java63 public synchronized int execute() { in execute() method in GceWifiManager
99 public synchronized int execute() { in execute() method in GceWifiManager.MonitorWifiJob
DJobBase.java53 public abstract int execute(); in execute() method in JobBase
/device/google/coral-sepolicy/vendor/google/
Dgoogle_camera_app.te15 # to their sandbox directory and then execute.
16 allow google_camera_app privapp_data_file:file { r_file_perms execute };
17 allow google_camera_app app_data_file:file { r_file_perms execute };
18 auditallow google_camera_app app_data_file:file execute;
/device/mediatek/wembley-sepolicy/prebuilts/api/26.0/plat_private/
Dem_svr.te55 allow em_svr shell_exec:file { getattr execute read open execute_no_trans };
59 allow em_svr toolbox_exec:file { getattr execute read open execute_no_trans };
/device/linaro/bootloader/edk2/MdePkg/Library/PeiServicesTablePointerLib/
DPeiServicesTablePointerLib.uni5 // PEI Services Table from a global variable. Not available to modules that execute from
22 …PEI Services Table from a global variable. Not available to modules that execute from read-only me…
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/
DDxeTcg2PhysicalPresenceLib.uni4 // This library will check and execute TPM 2.0 request from OS or BIOS. The request may
25 #string STR_MODULE_DESCRIPTION #language en-US "This library will check and execute TPM 2.…
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTrEEPhysicalPresenceLib/
DDxeTrEEPhysicalPresenceLib.uni4 // This library will check and execute TPM 2.0 request from OS or BIOS. The request may
25 #string STR_MODULE_DESCRIPTION #language en-US "This library will check and execute TPM 2.…
/device/linaro/bootloader/edk2/ShellBinPkg/
DReadMe.txt8 To generate Full Shell, execute:
10 To generate Minimal Shell, execute:
/device/generic/goldfish/sepolicy/common/
Dsurfaceflinger.te2 allow surfaceflinger ashmem_device:chr_file execute;
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/
DDxeTcgPhysicalPresenceLib.uni4 // This library will check and execute TPM 1.2 request from OS or BIOS. The request may
26 …n for the pending TPM physical present requests. Once confirmed, it will execute the request, and …

1234567