Home
last modified time | relevance | path

Searched full:commands (Results 1 – 25 of 330) sorted by relevance

12345678910>>...14

/system/linkerconfig/devicetest/src/android/linkerconfig/gts/utils/elements/
DSection.java73 String[] commands = namespaceMatcher.group(2).split("\\."); in parseConfiguration() local
82 commands.length > 0); in parseConfiguration()
83 switch (commands[0]) { in parseConfiguration()
85 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration()
89 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration()
93 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration()
94 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration()
100 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration()
101 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration()
109 assertEquals("Invalid command : " + line, 3, commands.length); in parseConfiguration()
[all …]
/system/extras/simpleperf/doc/
Dsample_filter.md4 ranges. To filter samples, we can pass filter options to the report commands or scripts.
29 ### global time filter commands
36 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands
49 ### process time filter commands
56 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time
57 range. When these commands are used, each process has a list of time ranges, and only samples
70 ### thread time filter commands
77 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time
78 range. When these commands are used, each thread has a list of time ranges, and only samples in the
/system/chre/chpp/test/
Dapp_req_resp_test.cpp63 enum class Commands : uint16_t { enum
71 constexpr uint16_t kNumCommands = asBaseType(Commands::kNumCommands);
92 case asBaseType(Commands::kOk): in dispatchResponse()
96 appState, &outReqStates[asBaseType(Commands::kOk)], response); in dispatchResponse()
101 case asBaseType(Commands::kError): in dispatchResponse()
105 appState, &outReqStates[asBaseType(Commands::kError)], response); in dispatchResponse()
111 case asBaseType(Commands::kTimeout): in dispatchResponse()
116 appState, &outReqStates[asBaseType(Commands::kTimeout)], response); in dispatchResponse()
137 case asBaseType(Commands::kOk): { in dispatchRequest()
139 chppTimestampIncomingRequest(&inReqStates[asBaseType(Commands::kOk)], in dispatchRequest()
[all …]
Dapp_notification_test.cpp64 enum class Commands : uint16_t { enum
111 case asBaseType(Commands::kServiceNotification): in clientDispatchNotification()
158 case asBaseType(Commands::kClientNotification): in serviceDispatchNotification()
298 notification->command = asBaseType(Commands::kServiceNotification); in TEST_F()
318 notification->command = asBaseType(Commands::kClientNotification); in TEST_F()
/system/netd/server/
DStrictController.cpp154 const std::string commands = Join(commandList, '\n'); in resetChains() local
155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains()
162 // exist, put each UID's rules in a chain specific to that UID. That way, the commands we need in setUidCleartextPenalty()
167 std::vector<std::string> commands; in setUidCleartextPenalty() local
170 commands = { in setUidCleartextPenalty()
181 commands.push_back("*filter"); in setUidCleartextPenalty()
182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty()
183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty()
[all …]
DNetdNativeService.h39 // Firewall commands.
52 // Bandwidth control commands.
64 // Network and routing commands.
114 // SOCK_DIAG commands.
120 // NFLOG-related commands
127 // Tethering-related commands.
153 // Interface-related commands.
237 // Idletimer-related commands
243 // Strict-related commands
246 // Clatd-related commands
[all …]
DNetdConstants.h34 int execIptablesRestore(IptablesTarget target, const std::string& commands);
35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
75 * coexist with the commands in CommandListener.cpp. These are presumed not thread-safe because
77 * FrameworkListener that passes in commands one at a time.
DIptablesBaseTest.h33 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
34 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
37 const std::string& commands, std::string *output);
DIptablesBaseTest.cpp75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument
77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput()
87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument
88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
DIptablesRestoreController.h32 // Execute |commands| on the given |target|, and populate |output| with stdout.
33 virtual int execute(const IptablesTarget target, const std::string& commands,
45 int execute(const IptablesTarget target, const std::string& commands,
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_drm.te34 # only allow unprivileged socket ioctl commands
46 # do not allow privileged socket ioctl commands
/system/core/fastboot/fuzzy_fastboot/
DREADME.md17 commands. Furthermore, an untrustworthy or insecure bootloader means nothing that is
36 features and hooks for testing device specific commands/features
45 2. **Conformance** - Test the device properly handles well-formed fastboot commands
46 3. **UnlockPermissions** - Test commands only allowed in the unlocked state work
47 4. **LockPermissions** - Test commands only not allowed in the locked state are rejected
48 5. **Fuzz** - Test malicious and/or ill-formed commands are properly and gracefully handled
143 Vendors can extend the fastboot protocol with oem commands. This allows vendors
144 to support device/vendor specific features/commands over the fastboot protocol.
145 Fuzzy Fastboot allows testing these oem commands as well.
147 Oem commands are specefied in `<command></command>` element pairs. Each command
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dhal_drm.te39 # only allow unprivileged socket ioctl commands
51 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/33.0/public/
Dhal_drm.te45 # only allow unprivileged socket ioctl commands
57 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/31.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/32.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/core/init/
Dinit_test.cpp60 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInit() argument
71 for (const auto& command : commands) { in TestInit()
81 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInitText() argument
86 TestInit(tf.path, test_function_map, commands, action_manager, service_list); in TestInitText()
106 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
110 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
170 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
174 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
518 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
522 TestInit(start.path, test_function_map, commands, &action_manager, &service_list); in TEST()
[all …]
/system/sepolicy/prebuilts/api/202504/private/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/34.0/public/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/202404/public/
Dhal_drm.te53 # only allow unprivileged socket ioctl commands
65 # do not allow privileged socket ioctl commands
/system/media/audio_utils/include/audio_utils/
DCommandThread.h27 * CommandThread is used for serial execution of commands
62 * Returns the string of commands, separated by newlines.
85 * Returns the number of commands on the queue.
/system/sepolicy/private/
Dhal_drm.te55 # only allow unprivileged socket ioctl commands
67 # do not allow privileged socket ioctl commands
/system/connectivity/wificond/
Druntests.sh25 # NOTE We can't actually run these commands, since they rely on functions added by
32 set -x # print commands
/system/core/fastboot/
Dtask_test.cpp46 const std::vector<std::string>& commands) { in collectTasks() argument
48 for (auto& command : commands) { in collectTasks()
91 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local
94 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
162 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local
164 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
182 std::vector<std::string> commands = {"reboot bootloader", "reboot"}; in TEST_F() local
183 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
/system/sepolicy/prebuilts/api/29.0/private/
Dshell.te50 # Allow shell to run adb shell cmd stats commands. Needed for CTS.
57 # Allow shell to run adb shell cmd gpu commands.

12345678910>>...14