Searched refs:processPatternStrings (Results 1 – 5 of 5) sorted by relevance
| /cts/hostsidetests/securitybulletin/src/android/security/cts/ |
| D | CVE_2021_0439.java | 37 String processPatternStrings[] = {"system_server"}; in testPocCVE_2021_0439() local 39 processPatternStrings); in testPocCVE_2021_0439()
|
| D | CVE_2020_0226.java | 37 String processPatternStrings[] = {"surfaceflinger"}; in testPocCVE_2020_0226() local 39 processPatternStrings); in testPocCVE_2020_0226()
|
| D | TestMedia.java | 92 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13180() local 94 processPatternStrings); in testPocCVE_2017_13180() 200 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2016_2485() local 203 processPatternStrings); in testPocCVE_2016_2485() 236 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_0817() local 238 processPatternStrings); in testPocCVE_2017_0817() 410 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_0840() local 412 processPatternStrings); in testPocCVE_2017_0840() 423 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13241() local 425 processPatternStrings); in testPocCVE_2017_13241() [all …]
|
| D | CVE_2017_13194.java | 42 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13194() local 44 processPatternStrings); in testPocCVE_2017_13194()
|
| D | AdbUtils.java | 532 String pocName, ITestDevice device, String... processPatternStrings) throws Exception { in runPocAssertNoCrashes() argument 534 new TombstoneUtils.Config().setProcessPatterns(processPatternStrings)); in runPocAssertNoCrashes() 601 String binaryName, String arguments, ITestDevice device, String processPatternStrings[]) in runPocAssertNoCrashesNotVulnerable() argument 604 processPatternStrings); in runPocAssertNoCrashesNotVulnerable() 651 String processPatternStrings[]) in runPocAssertNoCrashesNotVulnerable() argument 654 inputFiles, inputFilesDestination, device, processPatternStrings); in runPocAssertNoCrashesNotVulnerable() 680 String... processPatternStrings) in runPocAssertNoCrashesNotVulnerable() argument 692 if (processPatternStrings != null) { in runPocAssertNoCrashesNotVulnerable() 693 processPatternList.addAll(Arrays.asList(processPatternStrings)); in runPocAssertNoCrashesNotVulnerable()
|