| /system/linkerconfig/devicetest/src/android/linkerconfig/gts/utils/elements/ | 
| D | Section.java | 73         String[] commands = namespaceMatcher.group(2).split("\\.");  in parseConfiguration()  local82                 commands.length > 0);  in parseConfiguration()
 83         switch (commands[0]) {  in parseConfiguration()
 85                 assertEquals("Invalid command : " + line, 1, commands.length);  in parseConfiguration()
 89                 assertEquals("Invalid command : " + line, 1, commands.length);  in parseConfiguration()
 93                 assertEquals("Invalid command : " + line, 2, commands.length);  in parseConfiguration()
 94                 assertEquals("Invalid command : " + line, "paths", commands[1]);  in parseConfiguration()
 100                 assertEquals("Invalid command : " + line, 2, commands.length);  in parseConfiguration()
 101                 assertEquals("Invalid command : " + line, "paths", commands[1]);  in parseConfiguration()
 109                 assertEquals("Invalid command : " + line, 3, commands.length);  in parseConfiguration()
 [all …]
 
 | 
| /system/netd/server/ | 
| D | StrictController.cpp | 154     const std::string commands = Join(commandList, '\n');  in resetChains()  local155     return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO;  in resetChains()
 167     std::vector<std::string> commands;  in setUidCleartextPenalty()  local
 170         commands = {  in setUidCleartextPenalty()
 181         commands.push_back("*filter");  in setUidCleartextPenalty()
 182         commands.push_back(StringPrintf(":%s -", perUidChain.c_str()));  in setUidCleartextPenalty()
 183         commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s",  in setUidCleartextPenalty()
 185         commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s",  in setUidCleartextPenalty()
 189             commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG));  in setUidCleartextPenalty()
 191             commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(),  in setUidCleartextPenalty()
 [all …]
 
 | 
| D | IptablesBaseTest.cpp | 75                                                         const std::string& commands,  in fakeExecIptablesRestoreWithOutput()  argument77     sRestoreCmds.push_back({ target, commands });  in fakeExecIptablesRestoreWithOutput()
 87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) {  in fakeExecIptablesRestore()  argument
 88     return fakeExecIptablesRestoreWithOutput(target, commands, nullptr);  in fakeExecIptablesRestore()
 
 | 
| D | IptablesBaseTest.h | 33     static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);34     static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
 37                                               const std::string& commands, std::string *output);
 
 | 
| D | FirewallController.cpp | 153     std::string commands;  in makeCriticalCommands()  local156             StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n",  in makeCriticalCommands()
 160     return commands;  in makeCriticalCommands()
 
 | 
| D | NetdConstants.cpp | 37 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,  in execIptablesRestoreWithOutput()  argument39     return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output);  in execIptablesRestoreWithOutput()
 42 int execIptablesRestore(IptablesTarget target, const std::string& commands) {  in execIptablesRestore()  argument
 43     return execIptablesRestoreWithOutput(target, commands, nullptr);  in execIptablesRestore()
 
 | 
| D | TetherControllerTest.cpp | 200         ExpectedIptablesCommands commands;  in allNewNatCommands()  local205         appendAll(commands, setupFirstIPv4Commands);  in allNewNatCommands()
 208             appendAll(commands, setupFirstIPv6Commands);  in allNewNatCommands()
 211             appendAll(commands, ALERT_ADD_COMMAND);  in allNewNatCommands()
 213         appendAll(commands, startFirstNatCommands);  in allNewNatCommands()
 215         return commands;  in allNewNatCommands()
 
 | 
| D | IptablesRestoreController.h | 33     virtual int execute(const IptablesTarget target, const std::string& commands,45     int execute(const IptablesTarget target, const std::string& commands,
 
 | 
| D | BandwidthController.cpp | 267     std::string commands = Join(IPT_FLUSH_COMMANDS, '\n');  in flushCleanTables()  local268     iptablesRestoreFunction(V4V6, commands, nullptr);  in flushCleanTables()
 286     std::string commands = Join(getBasicAccountingCommands(), '\n');  in enableBandwidthControl()  local
 287     return iptablesRestoreFunction(V4V6, commands, nullptr);  in enableBandwidthControl()
 648         std::vector<std::string> commands = {  in setCostlyAlert()  local
 653         res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr);  in setCostlyAlert()
 678     std::vector<std::string> commands = {  in removeCostlyAlert()  local
 683     if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) {  in removeCostlyAlert()
 
 | 
| D | NetdConstants.h | 34 int execIptablesRestore(IptablesTarget target, const std::string& commands);35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
 
 | 
| D | StrictController.h | 49     static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
 | 
| /system/extras/simpleperf/doc/ | 
| D | sample_filter.md | 4 ranges. To filter samples, we can pass filter options to the report commands or scripts.29 ### global time filter commands
 36 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands
 49 ### process time filter commands
 56 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time
 57 range. When these commands are used, each process has a list of time ranges, and only samples
 70 ### thread time filter commands
 77 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time
 78 range. When these commands are used, each thread has a list of time ranges, and only samples in the
 
 | 
| /system/core/init/ | 
| D | init_test.cpp | 60               const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,  in TestInit()  argument71     for (const auto& command : commands) {  in TestInit()
 81                   const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,  in TestInitText()  argument
 86     TestInit(tf.path, test_function_map, commands, action_manager, service_list);  in TestInitText()
 106     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 110     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);  in TEST()
 170     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 174     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);  in TEST()
 518     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 522     TestInit(start.path, test_function_map, commands, &action_manager, &service_list);  in TEST()
 [all …]
 
 | 
| /system/core/fastboot/ | 
| D | task_test.cpp | 46                                                        const std::vector<std::string>& commands) {  in collectTasks()  argument48     for (auto& command : commands) {  in collectTasks()
 91     std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img",  in TEST_F()  local
 94     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 162     std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img",  in TEST_F()  local
 164     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 182     std::vector<std::string> commands = {"reboot bootloader", "reboot"};  in TEST_F()  local
 183     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 
 | 
| /system/tools/aidl/analyzer/ | 
| D | analyzerMain.cpp | 378 auto& commands = *new std::map<std::string, AnalyzerCommand>{388   for (const auto& command : commands) {  in printGeneralHelp()
 419   auto command = commands.find(commandName);  in helpCommandEntryPoint()
 420   if (command == commands.end()) {  in helpCommandEntryPoint()
 441     commands["list"] = listCommand;  in main()
 451   auto command = commands.find(argv[1]);  in main()
 452   if (command == commands.end()) {  in main()
 
 | 
| /system/sepolicy/prebuilts/api/29.0/public/ | 
| D | hal_drm.te | 34 # only allow unprivileged socket ioctl commands46 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/30.0/public/ | 
| D | hal_drm.te | 39 # only allow unprivileged socket ioctl commands51 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/33.0/public/ | 
| D | hal_drm.te | 45 # only allow unprivileged socket ioctl commands57 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/31.0/public/ | 
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands55 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/32.0/public/ | 
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands55 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/34.0/public/ | 
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands63 # do not allow privileged socket ioctl commands
 
 | 
| /system/vold/bench/inodeop_bench/ | 
| D | inodeop_bench.cpp | 114 void print_commands(const std::vector<Command>& commands) {  in print_commands()  argument115     for (const Command& command : commands) std::cout << command.to_string();  in print_commands()
 376     std::vector<Command> commands;  in main()  local
 389                 print_commands(commands);  in main()
 396                 commands.push_back(command);  in main()
 416     for (const Command& command : commands) {  in main()
 
 | 
| /system/sepolicy/prebuilts/api/202504/private/ | 
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands63 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/202404/public/ | 
| D | hal_drm.te | 53 # only allow unprivileged socket ioctl commands65 # do not allow privileged socket ioctl commands
 
 | 
| /system/librustutils/ | 
| D | system_properties_fuzzer.rs | 77 fuzz_target!(|commands: Vec<Command>| {78     for command in commands {
 
 |