/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_kmod.sh | 7 sysctl -w net.core.bpf_jit_enable=$1 2>&1 > /dev/null 8 sysctl -w net.core.bpf_jit_harden=$2 2>&1 > /dev/null 22 JE=`sysctl -n net.core.bpf_jit_enable` 23 JH=`sysctl -n net.core.bpf_jit_harden` 28 sysctl -w net.core.bpf_jit_enable=$JE 2>&1 > /dev/null 29 sysctl -w net.core.bpf_jit_harden=$JH 2>&1 > /dev/null
|
/cts/tests/tests/net/src/android/net/cts/ |
MultinetworkSysctlTest.java | 30 * Tests for multinetwork sysctl functionality. 45 // Expected mode, UID, and GID of sysctl files. 74 * e110861 net: add a sysctl to reflect the fwmark on replies 82 for (String sysctl : GLOBAL_SYSCTLS) { 83 checkSysctlPermissions(sysctl); 84 int value = Integer.parseInt(readFile(sysctl).trim()); 85 assertEquals("value of " + sysctl + ":", 1, value); 93 String sysctl = new File(interfaceDir, AUTOCONF_SYSCTL).getAbsolutePath(); local 94 checkSysctlPermissions(sysctl); 95 int value = Integer.parseInt(readFile(sysctl).trim()) [all...] |
/external/fec/ |
cpu_mode_ppc.c | 7 #include <sys/sysctl.h> 29 int error = sysctl(selectors, 2, &hasVectorUnit, &length, NULL, 0);
|
/external/autotest/client/site_tests/security_ptraceRestrictions/ |
security_ptraceRestrictions.py | 57 sysctl = "/proc/sys/kernel/yama/ptrace_scope" 58 self.check(os.path.exists(sysctl), "%s exists" % (sysctl), fatal=True) 59 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl),
|
/external/libchrome/base/process/ |
process_handle_mac.cc | 9 #include <sys/sysctl.h> 20 if (sysctl(mib, 4, &info, &length, NULL, 0) < 0) { 21 DPLOG(ERROR) << "sysctl";
|
process_iterator_mac.cc | 9 #include <sys/sysctl.h> 38 if (sysctl(mib, arraysize(mib), NULL, &len, NULL, 0) < 0) { 50 if (sysctl(mib, arraysize(mib), &kinfo_procs_[0], &len, NULL, 0) < 0) { 89 if (sysctl(mib, arraysize(mib), NULL, &data_len, NULL, 0) < 0) { 95 if (sysctl(mib, arraysize(mib), &data[0], &data_len, NULL, 0) < 0) {
|
/external/ltp/testcases/network/busy_poll/ |
busy_poll_lib.sh | 26 tst_check_cmds pkill sysctl ethtool
|
busy_poll01.sh | 30 sysctl -q -w net.core.busy_read=$busy_read_old 31 sysctl -q -w net.core.busy_poll=$busy_poll_old 33 tst_rhost_run -c "sysctl -q -w net.core.busy_read=$rbusy_read_old" 34 tst_rhost_run -c "sysctl -q -w net.core.busy_poll=$rbusy_poll_old" 40 ROD_SILENT sysctl -q -w net.core.busy_read=$value 41 ROD_SILENT sysctl -q -w net.core.busy_poll=$value 43 tst_rhost_run -s -c "sysctl -q -w net.core.busy_read=$value" 44 tst_rhost_run -s -c "sysctl -q -w net.core.busy_poll=$value"
|
busy_poll02.sh | 30 sysctl -q -w net.core.busy_poll=$busy_poll_old 31 tst_rhost_run -c "sysctl -q -w net.core.busy_poll=$rbusy_poll_old" 37 ROD_SILENT sysctl -q -w net.core.busy_poll=$value 38 tst_rhost_run -s -c "sysctl -q -w net.core.busy_poll=$value"
|
busy_poll03.sh | 30 sysctl -q -w net.core.busy_poll=$busy_poll_old 31 tst_rhost_run -c "sysctl -q -w net.core.busy_poll=$rbusy_poll_old" 37 ROD_SILENT sysctl -q -w net.core.busy_poll=$value 38 tst_rhost_run -s -c "sysctl -q -w net.core.busy_poll=$value"
|
/external/ltp/testcases/open_posix_testsuite/include/ |
ncpu.h | 27 # include <sys/sysctl.h> 48 sysctl(mib, 2, &ncpu, &len, NULL, 0);
|
/external/autotest/client/site_tests/security_ModuleLocking/ |
security_ModuleLocking.py | 180 # Check that the sysctl is either missing or set to 1. 181 sysctl = "/proc/sys/kernel/chromiumos/module_locking" 182 if os.path.exists(sysctl): 183 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl)) 198 # If the sysctl exists, verify that it will disable the restriction. 199 if os.path.exists(sysctl): 201 open(sysctl, "w").write("0\n") 202 self.check(open(sysctl).read() == '0\n', "%s disabled" % (sysctl)) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/ |
sysctl.h | 44 #include <linux/sysctl.h> 67 extern int sysctl (int *__name, int __nlen, void *__oldval,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/ |
sysctl.h | 44 #include <linux/sysctl.h> 67 extern int sysctl (int *__name, int __nlen, void *__oldval,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/ |
sysctl.h | 44 #include <linux/sysctl.h> 67 extern int sysctl (int *__name, int __nlen, void *__oldval,
|
/prebuilts/go/darwin-x86/src/ |
race.bash | 19 if sysctl machdep.cpu.extfeatures | grep -qv EM64T; then
|
/prebuilts/go/linux-x86/src/ |
race.bash | 19 if sysctl machdep.cpu.extfeatures | grep -qv EM64T; then
|
/external/autotest/client/site_tests/kernel_FirmwareRequest/ |
kernel_FirmwareRequest.py | 24 sysctl = "/proc/sys/kernel/chromiumos/module_locking" 27 if os.path.exists(sysctl): 28 open(sysctl, "w").write(value) 30 raise error.TestNAError("module locking sysctl not available; may not be able to load test FW")
|
/external/ltp/testcases/kernel/syscalls/sysctl/ |
sysctl04.c | 25 * Testcase to check that sysctl(2) sets errno to ENOTDIR 28 * 1. Call sysctl(2) with sc_nlen set to 0, and expect ENOTDIR to be set. 29 * 2. Call sysctl(2) with sc_nlen greater than CTL_MAXNAME, and expect 53 #include <linux/sysctl.h> 62 int sysctl(int *name, int nlen, void *oldval, size_t * oldlenp, function 110 TEST(sysctl(name, 0, osname, &osnamelth, 0, 0)); 164 "This test needs a kernel that has sysctl syscall.");
|
sysctl05.c | 25 * Testcase to check that sysctl(2) sets errno to EFAULT 28 * 1. Call sysctl(2) with the address of sc_oldname outside the address 30 * 2. Call sysctl(2) with the address of sc_oldval outside the address 53 #include <linux/sysctl.h> 64 int sysctl(int *name, int nlen, void *oldval, size_t * oldlenp, function 120 TEST(sysctl(testcases[i].name, testcases[i].size, 125 tst_resm(TFAIL, "sysctl(2) returned unexpected " 136 tst_resm(TFAIL, "sysctl(2) returned unexpected " 140 tst_resm(TPASS, "sysctl(2) set errno correctly " 191 "This test needs a kernel that has sysctl syscall.") [all...] |
sysctl03.c | 25 * Testcase to check that sysctl(2) sets errno to EPERM correctly. 28 * a. Call sysctl(2) as a root user, and attempt to write data 31 * b. Call sysctl(2) as a non-root user, and attempt to write data 36 * behavior of sysctl(2) isn't properly documented, as discussed in detail in 70 #include <linux/sysctl.h> 80 int sysctl(int *name, int nlen, void *oldval, size_t * oldlenp, function 126 TEST(sysctl(name, ARRAY_SIZE(name), 0, 0, osname, osnamelth)); 129 tst_resm(TFAIL, "sysctl(2) succeeded unexpectedly"); 159 TEST(sysctl(name, ARRAY_SIZE(name), 0, 0, osname, osnamelth)); 213 "This test needs a kernel that has sysctl syscall.") [all...] |
/external/ltp/testcases/network/multicast/mc_cmds/ |
mc_cmds | 39 val=$(sysctl -n $knob) 41 ROD sysctl -q ${knob}=0 84 [ "$knob_changed" ] && sysctl -q ${knob}=1
|
/external/libunwind/src/ |
os-freebsd.c | 28 #include <sys/sysctl.h> 66 error = sysctl(mib, 3, NULL, &len, NULL, 0); 74 error = sysctl(mib, 3, buf, &len, NULL, 0); 107 error = sysctl(mib, 4, NULL, &len, NULL, 0); 113 error = sysctl(mib, 4, NULL, &len, NULL, 0); 125 error = sysctl(mib, 4, buf, &len, NULL, 0);
|
/external/linux-kselftest/android/ |
Android.kselftest.mk | 126 # Sysctl 127 module_prebuilt := sysctl/run_numerictests 128 module_src_files := sysctl/run_numerictests 131 module_prebuilt := sysctl/run_stringtests 132 module_src_files := sysctl/run_stringtests 135 module_prebuilt := sysctl/common_tests 136 module_src_files := sysctl/common_tests
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_procmaps_freebsd.cc | 20 #include <sys/sysctl.h> 36 int Err = sysctl(Mib, 4, NULL, &Size, NULL, 0); 43 Err = sysctl(Mib, 4, VmMap, &Size, NULL, 0);
|