/cts/hostsidetests/securitybulletin/src/android/security/cts/ |
D | HostsideMainlineModuleDetector.java | 47 String logcat = AdbUtils.runCommandLine("logcat -d -s MainlineModuleDetector:I", in getPlayManagedModules() local 50 "Found logcat output: " + logcat); in getPlayManagedModules() 51 Matcher matcher = Pattern.compile("Play managed modules are: <(.*?)>").matcher(logcat); in getPlayManagedModules()
|
D | Poc20_11.java | 44 String logcat = AdbUtils.runCommandLine("logcat -d", getDevice()); in testPocCVE_2020_0437() local 45 assertNotMatches("CellBroadcastContentProvider: failed to mark broadcast read", logcat); in testPocCVE_2020_0437()
|
D | Poc16_05.java | 37 String logcat = AdbUtils.runCommandLine("logcat -d", getDevice()); in testPocCVE_2016_2460() local 38 assertNotMatchesMultiLine("IGraphicBufferProducer_Info is Leaked", logcat); in testPocCVE_2016_2460()
|
D | Poc18_07.java | 54 String logcat = AdbUtils.runCommandLine("logcat -d", getDevice()); in testPocCVE_2017_18275() local 57 logcat); in testPocCVE_2017_18275()
|
D | Poc16_04.java | 36 String logcat = AdbUtils.runCommandLine("logcat -d", getDevice()); in testPocCVE_2016_2419() local 37 assertNotMatchesMultiLine("IOMX_InfoLeak b26323455", logcat); in testPocCVE_2016_2419()
|
D | CVE_2021_0965.java | 50 String logcat = AdbUtils.runCommandLine("logcat -d AndroidRuntime:E *:S", getDevice()); in testPocCVE_2021_0965() local 52 assertFalse(pattern.matcher(logcat).find()); in testPocCVE_2021_0965()
|
D | CVE_2021_0478.java | 67 String logcat = AdbUtils.runCommandLine("logcat -d *:S AndroidRuntime:E", device); in testPocCVE_2021_0478() local 68 assertNotMatches(crashPattern, logcat); in testPocCVE_2021_0478()
|
D | Poc16_11.java | 37 String logcat = AdbUtils.runCommandLine("logcat -d", getDevice()); in testPocCVE_2012_6702() local 38 assertNotMatchesMultiLine("fail: encountered same random values!", logcat); in testPocCVE_2012_6702()
|
D | CVE_2021_0591.java | 71 String logcat = in testPocCVE_2021_0591() local 77 assertThat(message, pattern.matcher(logcat).find(), is(false)); in testPocCVE_2021_0591()
|
D | CVE_2021_0523.java | 95 String logcat = AdbUtils.runCommandLine("logcat -d *:S AndroidRuntime:E", device); in testPocCVE_2021_0523() local 97 assertThat(crashPattern, pattern.matcher(logcat).find(), is(false)); in testPocCVE_2021_0523()
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
D | AppSecurityPreparer.java | 58 try (InputStreamSource logcat = device.getLogcatDump()) { in setUp() 59 mLogger.testLog("AppSecurityPrep_failed_create_user", LogDataType.LOGCAT, logcat); in setUp()
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
D | CrossProfileAppsHostSideTest.java | 315 final String logcat; in readLogcat() local 317 logcat = StreamUtil.getStringFromSource(logcatStream); in readLogcat() 320 return logcat; in readLogcat()
|
D | ManagedProfileCrossProfileTest.java | 585 final String logcat; in readLogcat() local 587 logcat = StreamUtil.getStringFromSource(logcatStream); in readLogcat() 590 return logcat; in readLogcat()
|
/cts/tests/tests/os/src/android/os/cts/ |
D | AppHibernationUtils.kt | 72 val logcat = Logcat() in <lambda>() constant 77 val mark = logcat.mark(tag) in <lambda>() 83 logcat.assertLogcatContainsInOrder("*:*", 30_000, in <lambda>()
|
/cts/hostsidetests/gputools/src/android/gputools/cts/ |
D | CtsRootlessGpuDebugHostTest.java | 248 String logcat = getDevice().executeShellCommand( in scanLog() local 253 Scanner apkIn = new Scanner(logcat); in scanLog()
|
/cts/apps/CameraITS/utils/ |
D | its_session_utils.py | 238 logcat = proc.stdout 240 line = logcat.readline().strip()
|