Home
last modified time | relevance | path

Searched refs:commands (Results 1 – 25 of 215) sorted by relevance

123456789

/system/linkerconfig/devicetest/src/android/linkerconfig/gts/utils/elements/
DSection.java73 String[] commands = namespaceMatcher.group(2).split("\\."); in parseConfiguration() local
82 commands.length > 0); in parseConfiguration()
83 switch (commands[0]) { in parseConfiguration()
85 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration()
89 assertEquals("Invalid command : " + line, 1, commands.length); in parseConfiguration()
93 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration()
94 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration()
100 assertEquals("Invalid command : " + line, 2, commands.length); in parseConfiguration()
101 assertEquals("Invalid command : " + line, "paths", commands[1]); in parseConfiguration()
109 assertEquals("Invalid command : " + line, 3, commands.length); in parseConfiguration()
[all …]
/system/netd/server/
DStrictController.cpp154 const std::string commands = Join(commandList, '\n'); in resetChains() local
155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains()
167 std::vector<std::string> commands; in setUidCleartextPenalty() local
170 commands = { in setUidCleartextPenalty()
181 commands.push_back("*filter"); in setUidCleartextPenalty()
182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty()
183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty()
191 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), in setUidCleartextPenalty()
[all …]
DIptablesBaseTest.cpp75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument
77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput()
87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument
88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
DIptablesBaseTest.h33 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
34 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
37 const std::string& commands, std::string *output);
DFirewallController.cpp153 std::string commands; in makeCriticalCommands() local
156 StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n", in makeCriticalCommands()
160 return commands; in makeCriticalCommands()
DNetdConstants.cpp37 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, in execIptablesRestoreWithOutput() argument
39 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output); in execIptablesRestoreWithOutput()
42 int execIptablesRestore(IptablesTarget target, const std::string& commands) { in execIptablesRestore() argument
43 return execIptablesRestoreWithOutput(target, commands, nullptr); in execIptablesRestore()
DTetherControllerTest.cpp200 ExpectedIptablesCommands commands; in allNewNatCommands() local
205 appendAll(commands, setupFirstIPv4Commands); in allNewNatCommands()
208 appendAll(commands, setupFirstIPv6Commands); in allNewNatCommands()
211 appendAll(commands, ALERT_ADD_COMMAND); in allNewNatCommands()
213 appendAll(commands, startFirstNatCommands); in allNewNatCommands()
215 return commands; in allNewNatCommands()
DIptablesRestoreController.h33 virtual int execute(const IptablesTarget target, const std::string& commands,
45 int execute(const IptablesTarget target, const std::string& commands,
DBandwidthController.cpp267 std::string commands = Join(IPT_FLUSH_COMMANDS, '\n'); in flushCleanTables() local
268 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables()
286 std::string commands = Join(getBasicAccountingCommands(), '\n'); in enableBandwidthControl() local
287 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl()
648 std::vector<std::string> commands = { in setCostlyAlert() local
653 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert()
678 std::vector<std::string> commands = { in removeCostlyAlert() local
683 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert()
DNetdConstants.h34 int execIptablesRestore(IptablesTarget target, const std::string& commands);
35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
DStrictController.h49 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
/system/extras/simpleperf/doc/
Dsample_filter.md4 ranges. To filter samples, we can pass filter options to the report commands or scripts.
29 ### global time filter commands
36 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands
49 ### process time filter commands
56 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time
57 range. When these commands are used, each process has a list of time ranges, and only samples
70 ### thread time filter commands
77 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time
78 range. When these commands are used, each thread has a list of time ranges, and only samples in the
/system/core/init/
Dinit_test.cpp60 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInit() argument
71 for (const auto& command : commands) { in TestInit()
81 const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, in TestInitText() argument
86 TestInit(tf.path, test_function_map, commands, action_manager, service_list); in TestInitText()
106 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
110 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
170 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
174 TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); in TEST()
518 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
522 TestInit(start.path, test_function_map, commands, &action_manager, &service_list); in TEST()
[all …]
/system/core/fastboot/
Dtask_test.cpp46 const std::vector<std::string>& commands) { in collectTasks() argument
48 for (auto& command : commands) { in collectTasks()
91 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local
94 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
162 std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img", in TEST_F() local
164 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
182 std::vector<std::string> commands = {"reboot bootloader", "reboot"}; in TEST_F() local
183 std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands); in TEST_F()
/system/tools/aidl/analyzer/
DanalyzerMain.cpp378 auto& commands = *new std::map<std::string, AnalyzerCommand>{
388 for (const auto& command : commands) { in printGeneralHelp()
419 auto command = commands.find(commandName); in helpCommandEntryPoint()
420 if (command == commands.end()) { in helpCommandEntryPoint()
441 commands["list"] = listCommand; in main()
451 auto command = commands.find(argv[1]); in main()
452 if (command == commands.end()) { in main()
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_drm.te34 # only allow unprivileged socket ioctl commands
46 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/30.0/public/
Dhal_drm.te39 # only allow unprivileged socket ioctl commands
51 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/33.0/public/
Dhal_drm.te45 # only allow unprivileged socket ioctl commands
57 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/31.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/32.0/public/
Dhal_drm.te43 # only allow unprivileged socket ioctl commands
55 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/34.0/public/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/vold/bench/inodeop_bench/
Dinodeop_bench.cpp114 void print_commands(const std::vector<Command>& commands) { in print_commands() argument
115 for (const Command& command : commands) std::cout << command.to_string(); in print_commands()
376 std::vector<Command> commands; in main() local
389 print_commands(commands); in main()
396 commands.push_back(command); in main()
416 for (const Command& command : commands) { in main()
/system/sepolicy/prebuilts/api/202504/private/
Dhal_drm.te51 # only allow unprivileged socket ioctl commands
63 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/202404/public/
Dhal_drm.te53 # only allow unprivileged socket ioctl commands
65 # do not allow privileged socket ioctl commands
/system/librustutils/
Dsystem_properties_fuzzer.rs77 fuzz_target!(|commands: Vec<Command>| {
78 for command in commands {

123456789