/system/netd/server/ |
D | IptablesRestoreControllerTest.cpp | 114 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain() 127 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain() 162 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() 167 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F() 168 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F() 170 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 184 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F() 186 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F() 195 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 209 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() [all …]
|
D | IptablesRestoreController.h | 33 virtual int execute(const IptablesTarget target, const std::string& commands, 45 int execute(const IptablesTarget target, const std::string& commands,
|
/system/core/libmemunreachable/ |
D | ProcessMappings.h | 31 bool execute; member 35 Mapping(uintptr_t begin, uintptr_t end, bool read, bool write, bool execute, const char* name) in Mapping() 36 : begin(begin), end(end), read(read), write(write), execute(execute) { in Mapping()
|
/system/extras/perfprofd/scripts/ |
D | perf_proto_json2sqlite.py | 37 self._c.execute('''CREATE TABLE pids (id integer PRIMARY KEY AUTOINCREMENT, 39 self._c.execute('''CREATE TABLE tids (id integer PRIMARY KEY AUTOINCREMENT, 41 self._c.execute('''CREATE TABLE syms (id integer PRIMARY KEY AUTOINCREMENT, 43 self._c.execute('''CREATE TABLE dsos (id integer PRIMARY KEY AUTOINCREMENT, 45 self._c.execute('''CREATE TABLE samples (id integer PRIMARY KEY AUTOINCREMENT, 49 self._c.execute('''CREATE TABLE stacks (sample_id int not null, 82 self._c.execute("insert into {tn} values (?,?)".format(tn=table_name), (value, key)) 91 self._c.execute("insert into samples values (?,?,?)", sample) 93 self._c.execute("insert into stacks values (?,?,?,?,?)", stack)
|
/system/core/llkd/tests/ |
D | llkd_test.cpp | 63 void execute(const char* command) { in execute() function 87 execute("stop llkd-0"); in llkdSleepPeriod() 88 execute("stop llkd-1"); in llkdSleepPeriod() 92 execute((setprop + LLK_CHECK_STACK_PROPERTY + " ,SyS_openat").c_str()); in llkdSleepPeriod() 94 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " false").c_str()); in llkdSleepPeriod() 96 execute((setprop + LLK_TIMEOUT_MS_PROPERTY + " 120000").c_str()); in llkdSleepPeriod() 98 execute((setprop + KHT_TIMEOUT_PROPERTY + " 130").c_str()); in llkdSleepPeriod() 100 execute((setprop + LLK_CHECK_MS_PROPERTY + " 10000").c_str()); in llkdSleepPeriod() 103 execute((setprop + LLK_ENABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod() 106 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod() [all …]
|
/system/sepolicy/prebuilts/api/28.0/ |
D | vendor_sepolicy.cil | 476 (allow init_28_0 hal_audio_default_exec (file (read getattr map execute open))) 478 (allow hal_audio_default hal_audio_default_exec (file (read getattr map execute entrypoint open))) 485 (allow init_28_0 hal_audiocontrol_default_exec (file (read getattr map execute open))) 487 (allow hal_audiocontrol_default hal_audiocontrol_default_exec (file (read getattr map execute entry… 494 (allow init_28_0 hal_authsecret_default_exec (file (read getattr map execute open))) 496 (allow hal_authsecret_default hal_authsecret_default_exec (file (read getattr map execute entrypoin… 503 (allow init_28_0 hal_bluetooth_default_exec (file (read getattr map execute open))) 505 (allow hal_bluetooth_default hal_bluetooth_default_exec (file (read getattr map execute entrypoint … 512 (allow init_28_0 hal_bootctl_default_exec (file (read getattr map execute open))) 514 (allow hal_bootctl_default hal_bootctl_default_exec (file (read getattr map execute entrypoint open… [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
D | postinstall.te | 11 # Allow postinstall to read and execute directories and files in the same 17 # Allow postinstall to execute the shell or other system executables. 22 # Allow postinstall to execute shell in recovery.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
D | postinstall.te | 11 # Allow postinstall to read and execute directories and files in the same 17 # Allow postinstall to execute the shell or other system executables. 22 # Allow postinstall to execute shell in recovery.
|
/system/timezone/tzlookup_generator/src/test/java/com/android/libcore/timezone/tzlookup/ |
D | TzLookupGeneratorTest.java | 70 assertFalse(tzLookupGenerator.execute()); in invalidCountryZonesFile() 89 assertFalse(tzLookupGenerator.execute()); in invalidRulesVersion() 109 assertFalse(tzLookupGenerator.execute()); in countryWithNoTimeZoneMappings() 134 assertFalse(tzLookupGenerator.execute()); in countryWithDuplicateTimeZoneMappings() 157 assertFalse(tzLookupGenerator.execute()); in badDefaultId() 179 assertFalse(tzLookupGenerator.execute()); in explicitDefaultIdInvalid() 236 assertFalse(tzLookupGenerator.execute()); in countryZonesContainsNonLowercaseIsoCode() 258 assertFalse(tzLookupGenerator.execute()); in countryZonesContainsDuplicate() 278 assertFalse(tzLookupGenerator.execute()); in countryZonesAndZoneTabCountryMismatch() 300 assertFalse(tzLookupGenerator.execute()); in countryZonesAndZoneTabDisagreeOnZones() [all …]
|
/system/sepolicy/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 86 # execute gpu_device 87 neverallow ephemeral_app gpu_device:chr_file execute;
|
D | system_server_startup.te | 8 allow system_server_startup system_server_startup_tmpfs:file { execute read write open map }; 12 allow system_server_startup dalvikcache_data_file:file { r_file_perms execute };
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 86 # execute gpu_device 87 neverallow ephemeral_app gpu_device:chr_file execute;
|
D | system_server_startup.te | 8 allow system_server_startup system_server_startup_tmpfs:file { execute read write open map }; 12 allow system_server_startup dalvikcache_data_file:file { r_file_perms execute };
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app app_data_file:file {r_file_perms execute}; 54 # execute gpu_device 55 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app app_data_file:file {r_file_perms execute}; 65 # execute gpu_device 66 neverallow ephemeral_app gpu_device:chr_file execute;
|