| /system/linkerconfig/devicetest/src/android/linkerconfig/gts/utils/elements/ |
| D | Section.java | 73 String[] commands = namespaceMatcher.group(2).split("\\."); in parseConfiguration() local 82 commands.length > 0); in parseConfiguration() 83 switch (commands[0]) { in parseConfiguration() 85 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration() 89 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration() 93 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration() 94 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration() 100 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration() 101 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration() 109 assertEquals("Invalid command : " + line, 3, commands.length); in parseConfiguration() [all …]
|
| /system/extras/simpleperf/doc/ |
| D | sample_filter.md | 4 ranges. To filter samples, we can pass filter options to the report commands or scripts. 29 ### global time filter commands 36 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands 49 ### process time filter commands 56 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time 57 range. When these commands are used, each process has a list of time ranges, and only samples 70 ### thread time filter commands 77 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time 78 range. When these commands are used, each thread has a list of time ranges, and only samples in the
|
| /system/chre/chpp/test/ |
| D | app_req_resp_test.cpp | 63 enum class Commands : uint16_t { enum 71 constexpr uint16_t kNumCommands = asBaseType(Commands::kNumCommands); 92 case asBaseType(Commands::kOk): in dispatchResponse() 96 appState, &outReqStates[asBaseType(Commands::kOk)], response); in dispatchResponse() 101 case asBaseType(Commands::kError): in dispatchResponse() 105 appState, &outReqStates[asBaseType(Commands::kError)], response); in dispatchResponse() 111 case asBaseType(Commands::kTimeout): in dispatchResponse() 116 appState, &outReqStates[asBaseType(Commands::kTimeout)], response); in dispatchResponse() 137 case asBaseType(Commands::kOk): { in dispatchRequest() 139 chppTimestampIncomingRequest(&inReqStates[asBaseType(Commands::kOk)], in dispatchRequest() [all …]
|
| D | app_notification_test.cpp | 64 enum class Commands : uint16_t { enum 111 case asBaseType(Commands::kServiceNotification): in clientDispatchNotification() 158 case asBaseType(Commands::kClientNotification): in serviceDispatchNotification() 298 notification->command = asBaseType(Commands::kServiceNotification); in TEST_F() 318 notification->command = asBaseType(Commands::kClientNotification); in TEST_F()
|
| /system/netd/server/ |
| D | StrictController.cpp | 154 const std::string commands = Join(commandList, '\n'); in resetChains() local 155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains() 162 // exist, put each UID's rules in a chain specific to that UID. That way, the commands we need in setUidCleartextPenalty() 167 std::vector<std::string> commands; in setUidCleartextPenalty() local 170 commands = { in setUidCleartextPenalty() 181 commands.push_back("*filter"); in setUidCleartextPenalty() 182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty() 183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty() 185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty() 189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty() [all …]
|
| D | NetdNativeService.h | 39 // Firewall commands. 52 // Bandwidth control commands. 64 // Network and routing commands. 114 // SOCK_DIAG commands. 120 // NFLOG-related commands 127 // Tethering-related commands. 153 // Interface-related commands. 237 // Idletimer-related commands 243 // Strict-related commands 246 // Clatd-related commands [all …]
|
| D | NetdConstants.h | 34 int execIptablesRestore(IptablesTarget target, const std::string& commands); 35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, 75 * coexist with the commands in CommandListener.cpp. These are presumed not thread-safe because 77 * FrameworkListener that passes in commands one at a time.
|
| D | IptablesBaseTest.h | 33 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands); 34 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, 37 const std::string& commands, std::string *output);
|
| D | IptablesBaseTest.cpp | 75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument 77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput() 87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument 88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
|
| D | IptablesRestoreController.h | 32 // Execute |commands| on the given |target|, and populate |output| with stdout. 33 virtual int execute(const IptablesTarget target, const std::string& commands, 45 int execute(const IptablesTarget target, const std::string& commands,
|
| /system/sepolicy/prebuilts/api/29.0/public/ |
| D | hal_drm.te | 34 # only allow unprivileged socket ioctl commands 46 # do not allow privileged socket ioctl commands
|
| /system/core/fastboot/fuzzy_fastboot/ |
| D | README.md | 17 commands. Furthermore, an untrustworthy or insecure bootloader means nothing that is 36 features and hooks for testing device specific commands/features 45 2. **Conformance** - Test the device properly handles well-formed fastboot commands 46 3. **UnlockPermissions** - Test commands only allowed in the unlocked state work 47 4. **LockPermissions** - Test commands only not allowed in the locked state are rejected 48 5. **Fuzz** - Test malicious and/or ill-formed commands are properly and gracefully handled 143 Vendors can extend the fastboot protocol with oem commands. This allows vendors 144 to support device/vendor specific features/commands over the fastboot protocol. 145 Fuzzy Fastboot allows testing these oem commands as well. 147 Oem commands are specefied in `<command></command>` element pairs. Each command [all …]
|
| /system/sepolicy/prebuilts/api/30.0/public/ |
| D | hal_drm.te | 39 # only allow unprivileged socket ioctl commands 51 # do not allow privileged socket ioctl commands
|
| /system/sepolicy/prebuilts/api/33.0/public/ |
| D | hal_drm.te | 45 # only allow unprivileged socket ioctl commands 57 # do not allow privileged socket ioctl commands
|
| /system/sepolicy/prebuilts/api/31.0/public/ |
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands 55 # do not allow privileged socket ioctl commands
|
| /system/sepolicy/prebuilts/api/32.0/public/ |
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands 55 # do not allow privileged socket ioctl commands
|
| /system/core/init/ |
| D | init_test.cpp | 60 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInit() argument 71 for (const auto& command : commands) { in TestInit() 81 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInitText() argument 86 TestInit(tf.path, test_function_map, commands, action_manager, service_list); in TestInitText() 106 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 110 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST() 170 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 174 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST() 518 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 522 TestInit(start.path, test_function_map, commands, &action_manager, &service_list); in TEST() [all …]
|
| /system/sepolicy/prebuilts/api/202504/private/ |
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands 63 # do not allow privileged socket ioctl commands
|
| /system/sepolicy/prebuilts/api/34.0/public/ |
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands 63 # do not allow privileged socket ioctl commands
|
| /system/sepolicy/prebuilts/api/202404/public/ |
| D | hal_drm.te | 53 # only allow unprivileged socket ioctl commands 65 # do not allow privileged socket ioctl commands
|
| /system/media/audio_utils/include/audio_utils/ |
| D | CommandThread.h | 27 * CommandThread is used for serial execution of commands 62 * Returns the string of commands, separated by newlines. 85 * Returns the number of commands on the queue.
|
| /system/sepolicy/private/ |
| D | hal_drm.te | 55 # only allow unprivileged socket ioctl commands 67 # do not allow privileged socket ioctl commands
|
| /system/connectivity/wificond/ |
| D | runtests.sh | 25 # NOTE We can't actually run these commands, since they rely on functions added by 32 set -x # print commands
|
| /system/core/fastboot/ |
| D | task_test.cpp | 46 const std::vector<std::string>& commands) { in collectTasks() argument 48 for (auto& command : commands) { in collectTasks() 91 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local 94 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F() 162 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local 164 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F() 182 std::vector<std::string> commands = {"reboot bootloader", "reboot"}; in TEST_F() local 183 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
|
| /system/sepolicy/prebuilts/api/29.0/private/ |
| D | shell.te | 50 # Allow shell to run adb shell cmd stats commands. Needed for CTS. 57 # Allow shell to run adb shell cmd gpu commands.
|