Home
last modified time | relevance | path

Searched refs:commands (Results 1 – 25 of 175) sorted by relevance

1234567

/system/netd/server/
DStrictController.cpp154 const std::string commands = Join(commandList, '\n'); in resetChains() local
155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains()
167 std::vector<std::string> commands; in setUidCleartextPenalty() local
170 commands = { in setUidCleartextPenalty()
181 commands.push_back("*filter"); in setUidCleartextPenalty()
182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty()
183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty()
191 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), in setUidCleartextPenalty()
[all …]
DIptablesBaseTest.h33 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
34 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
37 const std::string& commands, std::string *output);
DIptablesBaseTest.cpp75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument
77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput()
87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument
88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
DFirewallController.cpp158 std::string commands; in makeCriticalCommands() local
161 StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n", in makeCriticalCommands()
165 return commands; in makeCriticalCommands()
DNetdConstants.cpp37 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, in execIptablesRestoreWithOutput() argument
39 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output); in execIptablesRestoreWithOutput()
42 int execIptablesRestore(IptablesTarget target, const std::string& commands) { in execIptablesRestore() argument
43 return execIptablesRestoreWithOutput(target, commands, nullptr); in execIptablesRestore()
DTetherControllerTest.cpp200 ExpectedIptablesCommands commands; in allNewNatCommands() local
205 appendAll(commands, setupFirstIPv4Commands); in allNewNatCommands()
208 appendAll(commands, setupFirstIPv6Commands); in allNewNatCommands()
211 appendAll(commands, ALERT_ADD_COMMAND); in allNewNatCommands()
213 appendAll(commands, startFirstNatCommands); in allNewNatCommands()
215 return commands; in allNewNatCommands()
DIptablesRestoreController.h33 virtual int execute(const IptablesTarget target, const std::string& commands,
45 int execute(const IptablesTarget target, const std::string& commands,
DNetdConstants.h34 int execIptablesRestore(IptablesTarget target, const std::string& commands);
35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
DBandwidthController.cpp269 std::string commands = Join(IPT_FLUSH_COMMANDS, '\n'); in flushCleanTables() local
270 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables()
288 std::string commands = Join(getBasicAccountingCommands(), '\n'); in enableBandwidthControl() local
289 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl()
678 std::vector<std::string> commands = { in setCostlyAlert() local
683 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert()
708 std::vector<std::string> commands = { in removeCostlyAlert() local
713 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert()
DStrictController.h49 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
/system/extras/simpleperf/doc/
Dsample_filter.md4 ranges. To filter samples, we can pass filter options to the report commands or scripts.
28 ### global time filter commands
35 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands
48 ### process time filter commands
55 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time
56 range. When these commands are used, each process has a list of time ranges, and only samples
69 ### thread time filter commands
76 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time
77 range. When these commands are used, each thread has a list of time ranges, and only samples in the
/system/nfc/src/rust/nci/
Dapi.rs30 commands: Option<CommandSender>, field
46 NciApi { commands: None, callback: None, hal_events: None, nfc_data } in new()
72 self.commands = Some(nci.commands); in nfc_enable()
97 if let Some(cmd) = self.commands.take() { in nfc_disable()
121 if let Some(cmd) = self.commands.as_mut() { in nfc_init()
180 if let Some(cmd) = self.commands.as_mut() { in nfc_set_config()
219 if let Some(cmd) = self.commands.as_mut() { in nfc_get_config()
Dnci.rs46 let commands = CommandSender { cmd_tx }; in init() localVariable
52 Nci { hal_events, commands, out_data_ext, in_data_ext } in init()
60 pub commands: CommandSender, field
/system/core/init/
Dinit_test.cpp60 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInit() argument
72 for (const auto& command : commands) { in TestInit()
82 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInitText() argument
87 TestInit(tf.path, test_function_map, commands, action_manager, service_list); in TestInitText()
107 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
111 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
171 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
175 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
517 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
521 TestInit(start.path, test_function_map, commands, &action_manager, &service_list); in TEST()
[all …]
/system/core/fastboot/
Dtask_test.cpp44 const std::vector<std::string>& commands) { in collectTasks() argument
46 for (auto& command : commands) { in collectTasks()
62 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local
65 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
/system/tools/aidl/analyzer/
DanalyzerMain.cpp329 auto& commands = *new std::map<std::string, AnalyzerCommand>{
339 for (const auto& command : commands) { in printGeneralHelp()
370 auto command = commands.find(commandName); in helpCommandEntryPoint()
371 if (command == commands.end()) { in helpCommandEntryPoint()
392 commands["list"] = listCommand; in main()
402 auto command = commands.find(argv[1]); in main()
403 if (command == commands.end()) { in main()
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_drm.te34 # only allow unprivileged socket ioctl commands
46 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/30.0/public/
Dhal_drm.te39 # only allow unprivileged socket ioctl commands
51 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/33.0/public/
Dhal_drm.te45 # only allow unprivileged socket ioctl commands
57 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/31.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/32.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/34.0/public/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/sepolicy/public/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/librustutils/
Dsystem_properties_fuzzer.rs77 fuzz_target!(|commands: Vec<Command>| {
78 for command in commands {
/system/vold/bench/inodeop_bench/
Dinodeop_bench.cpp114 void print_commands(const std::vector<Command>& commands) { in print_commands() argument
115 for (const Command& command : commands) std::cout << command.to_string(); in print_commands()
376 std::vector<Command> commands; in main() local
389 print_commands(commands); in main()
396 commands.push_back(command); in main()
416 for (const Command& command : commands) { in main()

1234567