/external/strace/tests/ |
net.test | 3 # Check how network syscalls are traced.
|
uio.test | 3 # Check how pread/pwrite and preadv/pwritev syscalls are traced.
|
/external/strace/tests-m32/ |
caps-abbrev.test | 3 # Check capget/capset syscalls decoding.
|
caps.test | 3 # Check capget/capset syscalls decoding.
|
filter-unavailable.test | 3 # check that <unavailable> syscalls are filtered properly
|
ipc.sh | 3 # Check decoding of ipc syscalls
|
ipc_msgbuf.test | 3 # Check msgget, msgsnd, msgrcv, msgctl syscalls decoding.
|
net.test | 3 # Check how network syscalls are traced.
|
uio.test | 3 # Check how pread/pwrite and preadv/pwritev syscalls are traced.
|
/external/strace/tests-mx32/ |
caps-abbrev.test | 3 # Check capget/capset syscalls decoding.
|
caps.test | 3 # Check capget/capset syscalls decoding.
|
filter-unavailable.test | 3 # check that <unavailable> syscalls are filtered properly
|
ipc.sh | 3 # Check decoding of ipc syscalls
|
ipc_msgbuf.test | 3 # Check msgget, msgsnd, msgrcv, msgctl syscalls decoding.
|
net.test | 3 # Check how network syscalls are traced.
|
uio.test | 3 # Check how pread/pwrite and preadv/pwritev syscalls are traced.
|
/external/autotest/client/tests/scrashme/ |
control | 11 Runs the scrashme syscalls test suite. This test mode will exercise 12 kernel syscalls randomically, or in a sequential fashion.
|
/prebuilts/gdb/darwin-x86/share/gdb/syscalls/ |
gdb-syscalls.dtd | 7 <!-- The root element of a syscall info is <syscalls-info>. --> 9 <!ELEMENT syscalls-info (syscall*)>
|
/prebuilts/gdb/linux-x86/share/gdb/syscalls/ |
gdb-syscalls.dtd | 7 <!-- The root element of a syscall info is <syscalls-info>. --> 9 <!ELEMENT syscalls-info (syscall*)>
|
/external/ltp/ |
gen.bp | 113 srcs: ["testcases/kernel/syscalls/acct/acct01.c"], 136 srcs: ["testcases/kernel/syscalls/umount2/umount2_01.c"], 146 srcs: ["testcases/kernel/syscalls/rename/rename05.c"], 156 srcs: ["testcases/kernel/syscalls/umount2/umount2_03.c"], 198 srcs: ["testcases/kernel/syscalls/wait4/wait401.c"], 221 srcs: ["testcases/kernel/syscalls/madvise/madvise01.c"], 231 srcs: ["testcases/kernel/syscalls/linkat/linkat01.c"], 292 srcs: ["testcases/kernel/syscalls/utimes/utimes01.c"], 302 srcs: ["testcases/kernel/syscalls/wait4/wait402.c"], 312 srcs: ["testcases/kernel/syscalls/ioctl/ioctl05.c"] [all...] |
/external/fio/os/ |
os-linux-syscall.h | 6 /* Linux syscalls for x86 */ 30 /* Linux syscalls for x86_64 */ 61 /* Linux syscalls for ppc */ 78 /* Linux syscalls for ia64 */ 102 /* Linux syscalls for alpha */ 119 /* Linux syscalls for s390 */ 143 /* Linux syscalls for sparc */ 167 /* Linux syscalls for sparc64 */ 191 /* Linux syscalls for arm */ 215 /* Linux syscalls for mips * [all...] |
/external/autotest/client/tests/ltp/patches/ |
kill-ipc.patch | 12 testcases/kernel/syscalls/kill/Makefile | 2 +- 15 diff --git a/testcases/kernel/syscalls/kill/Makefile b/testcases/kernel/syscalls/kill/Makefile 17 --- a/testcases/kernel/syscalls/kill/Makefile 18 +++ b/testcases/kernel/syscalls/kill/Makefile
|
/bionic/libc/ |
SECCOMP_WHITELIST_GLOBAL.TXT | 2 # combination with SYSCALLS.TXT, SECCOMP_BLACKLIST.TXT and 7 # See the description at the top of SYSCALLS.TXT for an explanation of the 12 # syscalls needed to boot android
|
SECCOMP_BLACKLIST_COMMON.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 4 # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file 23 # been provided, allows the user to specify dispatch style syscalls.
|
/external/autotest/client/site_tests/security_Minijail_seccomp/ |
control | 13 Fail if either seccomp_filter fails to block syscalls or if allowed syscalls
|