/system/netd/server/ |
D | IptablesRestoreControllerTest.cpp | 155 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain() 168 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain() 203 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() 208 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F() 209 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F() 211 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 225 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) << in TEST_F() 227 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) << in TEST_F() 236 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F() 250 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F() [all …]
|
/system/memory/libmemunreachable/ |
D | ProcessMappings.h | 31 bool execute; member 35 Mapping(uintptr_t begin, uintptr_t end, bool read, bool write, bool execute, const char* name) in Mapping() 36 : begin(begin), end(end), read(read), write(write), execute(execute) { in Mapping()
|
/system/security/keystore2/src/database/ |
D | versioning.rs | 19 tx.execute( in create_or_get_version() 59 tx.execute("INSERT INTO persistent.version (id, version) VALUES(0, ?);", params![version]) in create_or_get_version() 68 .execute("UPDATE persistent.version SET version = ? WHERE id = 0;", params![new_version]) in update_version() 102 conn.execute("ATTACH DATABASE 'file::memory:' as persistent;", NO_PARAMS).unwrap(); in upgrade_database_test() 107 tx.execute( in upgrade_database_test() 119 conn.execute( in upgrade_database_test() 134 conn.execute("DROP TABLE IF EXISTS persistent.version;", NO_PARAMS).unwrap(); in upgrade_database_test() 135 conn.execute("DROP TABLE IF EXISTS persistent.test;", NO_PARAMS).unwrap(); in upgrade_database_test() 136 conn.execute( in upgrade_database_test() 191 conn.execute("ATTACH DATABASE 'file::memory:' as persistent;", NO_PARAMS).unwrap(); in create_or_get_version_new_database() [all …]
|
/system/core/llkd/tests/ |
D | llkd_test.cpp | 63 void execute(const char* command) { in execute() function 83 execute("stop llkd-0"); in llkdSleepPeriod() 84 execute("stop llkd-1"); in llkdSleepPeriod() 89 execute((setprop + LLK_CHECK_STACK_PROPERTY + " ,SyS_openat,__arm64_sys_openat").c_str()); in llkdSleepPeriod() 91 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " false").c_str()); in llkdSleepPeriod() 93 execute((setprop + LLK_TIMEOUT_MS_PROPERTY + " 120000").c_str()); in llkdSleepPeriod() 95 execute((setprop + KHT_TIMEOUT_PROPERTY + " 130").c_str()); in llkdSleepPeriod() 97 execute((setprop + LLK_CHECK_MS_PROPERTY + " 10000").c_str()); in llkdSleepPeriod() 100 execute((setprop + LLK_ENABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod() 103 execute((setprop + LLK_ENABLE_WRITEABLE_PROPERTY + " true").c_str()); in llkdSleepPeriod() [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | vendor_toolbox.te | 2 # Non-vendor processes are not allowed to execute the binary 7 # or read, execute the vendor_toolbox file. 15 } vendor_toolbox_exec:file { entrypoint execute execute_no_trans };
|
D | asan_extract.te | 10 # Allow asan_extract to execute itself using #!/system/bin/sh 13 # We execute log, rm, gzip and tar. 32 allow asan_extract system_data_file:file execute;
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 79 # execute gpu_device 80 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/sepolicy/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 79 # execute gpu_device 80 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 83 # execute gpu_device 84 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 79 # execute gpu_device 80 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 79 # execute gpu_device 80 neverallow ephemeral_app gpu_device:chr_file execute;
|
/system/timezone/input_tools/android/tzlookup_generator/src/test/java/com/android/libcore/timezone/tzlookup/ |
D | TzLookupGeneratorTest.java | 76 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in invalidCountryZonesFile() 96 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in invalidRulesVersion() 117 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in countryWithNoTimeZoneMappings() 143 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in countryWithDuplicateTimeZoneMappings() 167 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in badDefaultId() 190 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in shouldFail_whenExplicitDefaultIdBelongsToOtherCountry() 250 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in countryZonesContainsNonLowercaseIsoCode() 273 assertFalse(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in countryZonesContainsDuplicate() 293 assertTrue(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in shouldNotFail_whenCountryZonesAndZoneTabCountryMismatch() 310 assertTrue(tzLookupGenerator.execute(false /* validateAllIanaIdsAreMapped */)); in shouldNotFail_whenCountryZonesAndZoneTabDisagreeOnZones() [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | ephemeral_app.te | 23 # to their sandbox directory and then execute. 24 allow ephemeral_app privapp_data_file:file { r_file_perms execute }; 25 allow ephemeral_app app_data_file:file { r_file_perms execute }; 35 allow ephemeral_app app_exec_data_file:file { r_file_perms execute unlink }; 86 # execute gpu_device 87 neverallow ephemeral_app gpu_device:chr_file execute;
|