/development/tools/axl/ |
README.txt | 0 TCP and HTTP tests
|
/external/strace/ |
io.c | 50 sys_read(struct tcb *tcp) 52 if (entering(tcp)) { 53 printfd(tcp, tcp->u_arg[0]); 56 if (syserror(tcp)) 57 tprintf("%#lx", tcp->u_arg[1]); 59 printstr(tcp, tcp->u_arg[1], tcp->u_rval); 60 tprintf(", %lu", tcp->u_arg[2]) [all...] |
file.c | 388 print_dirfd(struct tcb *tcp, int fd) 394 printfd(tcp, fd); 459 decode_open(struct tcb *tcp, int offset) 461 if (entering(tcp)) { 462 printpath(tcp, tcp->u_arg[offset]); 465 tprint_open_modes(tcp->u_arg[offset + 1]); 466 if (tcp->u_arg[offset + 1] & O_CREAT) { 468 tprintf(", %#lo", tcp->u_arg[offset + 2]); 475 sys_open(struct tcb *tcp) [all...] |
ipc.c | 76 extern void printsigevent(struct tcb *tcp, long arg); 167 int sys_msgget(tcp) 168 struct tcb *tcp; 170 if (entering(tcp)) { 171 if (tcp->u_arg[0]) 172 tprintf("%#lx", tcp->u_arg[0]); 176 if (printflags(resource_flags, tcp->u_arg[1] & ~0777, NULL) != 0) 178 tprintf("%#lo", tcp->u_arg[1] & 0777); 192 indirect_ipccall(tcp) 193 struct tcb *tcp; [all...] |
time.c | 58 tprint_timeval32(struct tcb *tcp, const struct timeval32 *tv) 64 tprint_timeval(struct tcb *tcp, const struct timeval *tv) 71 printtv_bitness(struct tcb *tcp, long addr, enum bitness_t bitness, int special) 75 else if (!verbose(tcp)) 88 if ((rc = umove(tcp, addr, &tv)) >= 0) { 96 tprint_timeval32(tcp, &tv); 101 if ((rc = umove(tcp, addr, &tv)) >= 0) { 109 tprint_timeval(tcp, &tv); 118 sprinttv(struct tcb *tcp, long addr, enum bitness_t bitness, char *buf) 122 else if (!verbose(tcp)) [all...] |
mem.c | 60 sys_brk(tcp) 61 struct tcb *tcp; 63 if (entering(tcp)) { 64 tprintf("%#lx", tcp->u_arg[0]); 75 sys_sbrk(tcp) 76 struct tcb *tcp; 78 if (entering(tcp)) { 79 tprintf("%lu", tcp->u_arg[0]); 236 print_mmap(struct tcb *tcp, long *u_arg, long long offset) 238 if (entering(tcp)) { [all...] |
system.c | 128 sys_mount(struct tcb *tcp) 130 if (entering(tcp)) { 132 unsigned long flags = tcp->u_arg[3]; 143 printpath(tcp, tcp->u_arg[0]); 146 printpath(tcp, tcp->u_arg[1]); 149 if (ignore_type && tcp->u_arg[2]) 150 tprintf("%#lx", tcp->u_arg[2]); 152 printstr(tcp, tcp->u_arg[2], -1) [all...] |
net.c | 47 #include <netinet/tcp.h> 1200 printsock(struct tcb *tcp, long addr, int addrlen) 1226 if (!verbose(tcp)) { 1235 if (umoven(tcp, addr, addrlen, addrbuf.pad) < 0) { 1251 printpathn(tcp, addr + 2, strlen(addrbuf.sau.sun_path)); 1254 printpathn(tcp, addr + 3, strlen(addrbuf.sau.sun_path + 1)); 1335 printstr(tcp, (long) &((struct sockaddr *) addr)->sa_data, 1354 printcmsghdr(struct tcb *tcp, unsigned long addr, unsigned long len) 1358 if (cmsg == NULL || umoven(tcp, addr, len, (char *) cmsg) < 0) { 1405 do_msghdr(struct tcb *tcp, struct msghdr *msg [all...] |
bjm.c | 103 sys_query_module(struct tcb *tcp) 105 if (entering(tcp)) { 106 printstr(tcp, tcp->u_arg[0], -1); 108 printxval(which, tcp->u_arg[1], "QM_???"); 113 if (!verbose(tcp) || syserror(tcp) || 114 umove(tcp, tcp->u_arg[4], &ret) < 0) { 115 tprintf("%#lx, %lu, %#lx", tcp->u_arg[2] [all...] |
syscall.c | 474 dumpio(struct tcb *tcp) 476 if (syserror(tcp)) 478 if (tcp->u_arg[0] < 0 || tcp->u_arg[0] >= MAX_QUALS) 480 if (tcp->scno < 0 || tcp->scno >= nsyscalls) 482 if (sysent[tcp->scno].sys_func == printargs) 484 if (qual_flags[tcp->u_arg[0]] & QUAL_READ) { 485 if (sysent[tcp->scno].sys_func == sys_read || 486 sysent[tcp->scno].sys_func == sys_pread | [all...] |
desc.c | 235 printflock(struct tcb *tcp, long addr, int getlk) 250 if (umove(tcp, addr, &fl32) < 0) { 268 if (umove(tcp, addr, &fl) < 0) { 288 printflock64(struct tcb *tcp, long addr, int getlk) 292 if (umove(tcp, addr, &fl) < 0) { 309 sys_fcntl(struct tcb *tcp) 311 if (entering(tcp)) { 312 printfd(tcp, tcp->u_arg[0]); 314 printxval(fcntlcmds, tcp->u_arg[1], "F_???") [all...] |
signal.c | 299 copy_sigset_len(tcp, addr, s, len) 300 struct tcb *tcp; 308 if (umoven(tcp, addr, len, (char *)s) < 0) 315 #define copy_sigset(tcp, addr, s) copy_sigset_len(tcp, addr, s, sizeof(long)) 317 #define copy_sigset(tcp, addr, s) copy_sigset_len(tcp, addr, s, sizeof(sigset_t)) 402 print_sigset(struct tcb *tcp, long addr, int rt) 408 else if (copy_sigset(tcp, addr, &ss) < 0) 856 * Check process TCP for the disposition of signal SIG [all...] |
process.c | 284 sys_prctl(tcp) 285 struct tcb *tcp; 289 if (entering(tcp)) { 290 printxval(prctl_options, tcp->u_arg[0], "PR_???"); 291 switch (tcp->u_arg[0]) { 298 tprintf(", %lu", tcp->u_arg[1]); 307 tprintf(", %lu", tcp->u_arg[1]); 316 tprintf(", %s", unalignctl_string(tcp->u_arg[1])); 321 tprintf(", %#lx", tcp->u_arg[1]); 326 tprintf(", %lu", tcp->u_arg[1]) [all...] |
scsi.c | 16 print_sg_io_buffer(struct tcb *tcp, unsigned char *addr, int len) 26 umoven(tcp, (unsigned long) addr, allocated, (char *) buf) < 0) { 40 print_sg_io_req(struct tcb *tcp, struct sg_io_hdr *sg_io) 46 print_sg_io_buffer(tcp, sg_io->cmdp, sg_io->cmd_len); 56 printstr(tcp, (unsigned long) sg_io->dxferp, 63 print_sg_io_res(struct tcb *tcp, struct sg_io_hdr *sg_io) 68 printstr(tcp, (unsigned long) sg_io->dxferp, 75 print_sg_io_buffer(tcp, sg_io->sbp, sg_io->sb_len_wr); 84 scsi_ioctl(struct tcb *tcp, long code, long arg) 88 if (entering(tcp)) { [all...] |
resource.c | 127 print_rlimit32(struct tcb *tcp) 134 if (umove(tcp, tcp->u_arg[1], &rlim) < 0) 148 sys_getrlimit(struct tcb *tcp) 152 if (entering(tcp)) { 153 printxval(resources, tcp->u_arg[0], "RLIMIT_???"); 157 if (syserror(tcp) || !verbose(tcp)) 158 tprintf("%#lx", tcp->u_arg[1]); 161 print_rlimit32(tcp); [all...] |
stream.c | 80 printstrbuf(tcp, sbp, getting) 81 struct tcb *tcp; 92 printstr(tcp, (unsigned long) sbp->buf, sbp->len); 98 printstrbufarg(tcp, arg, getting) 99 struct tcb *tcp; 107 else if (umove(tcp, arg, &buf) < 0) 110 printstrbuf(tcp, &buf, getting); 115 sys_putmsg(tcp) 116 struct tcb *tcp; 120 if (entering(tcp)) { [all...] |
block.c | 92 print_blkpg_req(struct tcb *tcp, struct blkpg_ioctl_arg *blkpg) 102 if (umove(tcp, (long) blkpg->data, &p) < 0) 113 block_ioctl(struct tcb *tcp, long code, long arg) 119 if (entering(tcp)) 126 if (entering(tcp)) { 128 if (umove(tcp, arg, &val) < 0) 137 if (exiting(tcp)) { 139 if (syserror(tcp) || umove(tcp, arg, &val) < 0) 151 if (exiting(tcp)) { [all...] |
/external/srec/config/en.us/ |
run-liveaudio.sh | 1 /system/bin/SRecTestAudio -parfile baseline11k.par -tcp tcp/recognize_10_live.tcp
|
run-change-sample-rate2.sh | 1 /system/bin/SRecTest -parfile baseline11k.par -tcp tcp/change_sample_rate2.tcp -datapath wave/ >out_SHIP_change_sample_rate2.txt 2>&1
|
run-set-get-param.sh | 1 /system/bin/SRecTest -parfile baseline11k.par -tcp tcp/set_get_param.tcp -datapath wave/ >out_SHIP_set_get_param.txt 2>&1
|
/external/iptables/extensions/ |
libxt_tcpmss.man | 1 This matches the TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the MSS is only negotiated during the TCP handshake at connection startup time. 4 Match a given TCP MSS value or range.
|
libipt_ECN.man | 4 \fB\-\-ecn\-tcp\-remove\fP 5 Remove all ECN bits from the TCP header. Of course, it can only be used 7 \fB\-p tcp\fP.
|
libxt_TCPOPTSTRIP.man | 1 This target will strip TCP options off a TCP packet. (It will actually replace 2 them by NO-OPs.) As such, you will need to add the \fB\-p tcp\fP parameters. 5 Strip the given option(s). The options may be specified by TCP option number or
|
libipt_ecn.man | 1 This allows you to match the ECN bits of the IPv4 and TCP header. ECN is the Explicit Congestion Notification mechanism as specified in RFC3168 3 [\fB!\fP] \fB\-\-ecn\-tcp\-cwr\fP 4 This matches if the TCP ECN CWR (Congestion Window Received) bit is set. 6 [\fB!\fP] \fB\-\-ecn\-tcp\-ece\fP 7 This matches if the TCP ECN ECE (ECN Echo) bit is set.
|
/external/sepolicy/ |
port_contexts | 2 # portcon tcp 80 u:object_r:http_port:s0
|