| /system/linkerconfig/devicetest/src/android/linkerconfig/gts/utils/elements/ | 
| D | Section.java | 73         String[] commands = namespaceMatcher.group(2).split("\\.");  in parseConfiguration()  local82                 commands.length > 0);  in parseConfiguration()
 83         switch (commands[0]) {  in parseConfiguration()
 85                 assertEquals("Invalid command : " + line, 1, commands.length);  in parseConfiguration()
 89                 assertEquals("Invalid command : " + line, 1, commands.length);  in parseConfiguration()
 93                 assertEquals("Invalid command : " + line, 2, commands.length);  in parseConfiguration()
 94                 assertEquals("Invalid command : " + line, "paths", commands[1]);  in parseConfiguration()
 100                 assertEquals("Invalid command : " + line, 2, commands.length);  in parseConfiguration()
 101                 assertEquals("Invalid command : " + line, "paths", commands[1]);  in parseConfiguration()
 109                 assertEquals("Invalid command : " + line, 3, commands.length);  in parseConfiguration()
 [all …]
 
 | 
| /system/extras/simpleperf/doc/ | 
| D | sample_filter.md | 4 ranges. To filter samples, we can pass filter options to the report commands or scripts.29 ### global time filter commands
 36 The nearest pair of GLOBAL_BEGIN and GLOBAL_END commands makes a time range. When these commands
 49 ### process time filter commands
 56 The nearest pair of PROCESS_BEGIN and PROCESS_END commands for the same process makes a time
 57 range. When these commands are used, each process has a list of time ranges, and only samples
 70 ### thread time filter commands
 77 The nearest pair of THREAD_BEGIN and THREAD_END commands for the same thread makes a time
 78 range. When these commands are used, each thread has a list of time ranges, and only samples in the
 
 | 
| /system/chre/chpp/test/ | 
| D | app_req_resp_test.cpp | 63 enum class Commands : uint16_t {  enum71 constexpr uint16_t kNumCommands = asBaseType(Commands::kNumCommands);
 92     case asBaseType(Commands::kOk):  in dispatchResponse()
 96           appState, &outReqStates[asBaseType(Commands::kOk)], response);  in dispatchResponse()
 101     case asBaseType(Commands::kError):  in dispatchResponse()
 105           appState, &outReqStates[asBaseType(Commands::kError)], response);  in dispatchResponse()
 111     case asBaseType(Commands::kTimeout):  in dispatchResponse()
 116           appState, &outReqStates[asBaseType(Commands::kTimeout)], response);  in dispatchResponse()
 137     case asBaseType(Commands::kOk): {  in dispatchRequest()
 139       chppTimestampIncomingRequest(&inReqStates[asBaseType(Commands::kOk)],  in dispatchRequest()
 [all …]
 
 | 
| D | app_notification_test.cpp | 64 enum class Commands : uint16_t {  enum111     case asBaseType(Commands::kServiceNotification):  in clientDispatchNotification()
 158     case asBaseType(Commands::kClientNotification):  in serviceDispatchNotification()
 298   notification->command = asBaseType(Commands::kServiceNotification);  in TEST_F()
 318   notification->command = asBaseType(Commands::kClientNotification);  in TEST_F()
 
 | 
| /system/netd/server/ | 
| D | StrictController.cpp | 154     const std::string commands = Join(commandList, '\n');  in resetChains()  local155     return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO;  in resetChains()
 162     // exist, put each UID's rules in a chain specific to that UID. That way, the commands we need  in setUidCleartextPenalty()
 167     std::vector<std::string> commands;  in setUidCleartextPenalty()  local
 170         commands = {  in setUidCleartextPenalty()
 181         commands.push_back("*filter");  in setUidCleartextPenalty()
 182         commands.push_back(StringPrintf(":%s -", perUidChain.c_str()));  in setUidCleartextPenalty()
 183         commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s",  in setUidCleartextPenalty()
 185         commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s",  in setUidCleartextPenalty()
 189             commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG));  in setUidCleartextPenalty()
 [all …]
 
 | 
| D | NetdNativeService.h | 39     // Firewall commands.52     // Bandwidth control commands.
 64     // Network and routing commands.
 114     // SOCK_DIAG commands.
 120     // NFLOG-related commands
 127     // Tethering-related commands.
 153     // Interface-related commands.
 237     // Idletimer-related commands
 243     // Strict-related commands
 246     // Clatd-related commands
 [all …]
 
 | 
| D | NetdConstants.h | 34 int execIptablesRestore(IptablesTarget target, const std::string& commands);35 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
 75  * coexist with the commands in CommandListener.cpp. These are presumed not thread-safe because
 77  * FrameworkListener that passes in commands one at a time.
 
 | 
| D | IptablesBaseTest.h | 33     static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);34     static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
 37                                               const std::string& commands, std::string *output);
 
 | 
| D | IptablesBaseTest.cpp | 75                                                         const std::string& commands,  in fakeExecIptablesRestoreWithOutput()  argument77     sRestoreCmds.push_back({ target, commands });  in fakeExecIptablesRestoreWithOutput()
 87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) {  in fakeExecIptablesRestore()  argument
 88     return fakeExecIptablesRestoreWithOutput(target, commands, nullptr);  in fakeExecIptablesRestore()
 
 | 
| D | IptablesRestoreController.h | 32     // Execute |commands| on the given |target|, and populate |output| with stdout.33     virtual int execute(const IptablesTarget target, const std::string& commands,
 45     int execute(const IptablesTarget target, const std::string& commands,
 
 | 
| /system/sepolicy/prebuilts/api/29.0/public/ | 
| D | hal_drm.te | 34 # only allow unprivileged socket ioctl commands46 # do not allow privileged socket ioctl commands
 
 | 
| /system/core/fastboot/fuzzy_fastboot/ | 
| D | README.md | 17 commands. Furthermore, an untrustworthy or insecure bootloader means nothing that is36 features and hooks for testing device specific commands/features
 45 2. **Conformance** - Test the device properly handles well-formed fastboot commands
 46 3. **UnlockPermissions** - Test commands only allowed in the unlocked state work
 47 4. **LockPermissions** - Test commands only not allowed in the locked state are rejected
 48 5. **Fuzz** - Test malicious and/or ill-formed commands are properly and gracefully handled
 143 Vendors can extend the fastboot protocol with oem commands. This allows vendors
 144 to support device/vendor specific features/commands over the fastboot protocol.
 145 Fuzzy Fastboot allows testing these oem commands as well.
 147 Oem commands are specefied in `<command></command>` element pairs. Each command
 [all …]
 
 | 
| /system/sepolicy/prebuilts/api/30.0/public/ | 
| D | hal_drm.te | 39 # only allow unprivileged socket ioctl commands51 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/33.0/public/ | 
| D | hal_drm.te | 45 # only allow unprivileged socket ioctl commands57 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/31.0/public/ | 
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands55 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/32.0/public/ | 
| D | hal_drm.te | 43 # only allow unprivileged socket ioctl commands55 # do not allow privileged socket ioctl commands
 
 | 
| /system/core/init/ | 
| D | init_test.cpp | 60               const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,  in TestInit()  argument71     for (const auto& command : commands) {  in TestInit()
 81                   const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,  in TestInitText()  argument
 86     TestInit(tf.path, test_function_map, commands, action_manager, service_list);  in TestInitText()
 106     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 110     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);  in TEST()
 170     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 174     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);  in TEST()
 518     std::vector<ActionManagerCommand> commands{trigger_boot};  in TEST()  local
 522     TestInit(start.path, test_function_map, commands, &action_manager, &service_list);  in TEST()
 [all …]
 
 | 
| /system/sepolicy/prebuilts/api/202504/private/ | 
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands63 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/34.0/public/ | 
| D | hal_drm.te | 51 # only allow unprivileged socket ioctl commands63 # do not allow privileged socket ioctl commands
 
 | 
| /system/sepolicy/prebuilts/api/202404/public/ | 
| D | hal_drm.te | 53 # only allow unprivileged socket ioctl commands65 # do not allow privileged socket ioctl commands
 
 | 
| /system/media/audio_utils/include/audio_utils/ | 
| D | CommandThread.h | 27  * CommandThread is used for serial execution of commands62      * Returns the string of commands, separated by newlines.
 85      * Returns the number of commands on the queue.
 
 | 
| /system/sepolicy/private/ | 
| D | hal_drm.te | 55 # only allow unprivileged socket ioctl commands67 # do not allow privileged socket ioctl commands
 
 | 
| /system/connectivity/wificond/ | 
| D | runtests.sh | 25 # NOTE We can't actually run these commands, since they rely on functions added by32 set -x # print commands
 
 | 
| /system/core/fastboot/ | 
| D | task_test.cpp | 46                                                        const std::vector<std::string>& commands) {  in collectTasks()  argument48     for (auto& command : commands) {  in collectTasks()
 91     std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img",  in TEST_F()  local
 94     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 162     std::vector<std::string> commands = {"flash dtbo", "flash --slot-other system system_other.img",  in TEST_F()  local
 164     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 182     std::vector<std::string> commands = {"reboot bootloader", "reboot"};  in TEST_F()  local
 183     std::vector<std::unique_ptr<Task>> tasks = collectTasks(fp.get(), commands);  in TEST_F()
 
 | 
| /system/sepolicy/prebuilts/api/29.0/private/ | 
| D | shell.te | 50 # Allow shell to run adb shell cmd stats commands. Needed for CTS.57 # Allow shell to run adb shell cmd gpu commands.
 
 |