HomeSort by relevance Sort by last modified time
    Searched full:syscalls (Results 51 - 75 of 959) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/autotest/client/site_tests/security_Minijail_seccomp/
policy-privdrop_arm 10 # Privilege-dropping syscalls.
policy-privdrop_i386 10 # Privilege-dropping syscalls.
policy-privdrop_x86_64 10 # Privilege-dropping syscalls.
  /external/strace/tests/
nsyscalls.test 3 # Check decoding of out-of-range syscalls.
unix-pair-send-recv.test 3 # Check decoding and dumping of send and recv syscalls.
unix-pair-sendto-recvfrom.test 3 # Check decoding and dumping of sendto and recvfrom syscalls.
xet_thread_area_x86.test 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
  /external/strace/tests-m32/
nsyscalls.test 3 # Check decoding of out-of-range syscalls.
unix-pair-send-recv.test 3 # Check decoding and dumping of send and recv syscalls.
unix-pair-sendto-recvfrom.test 3 # Check decoding and dumping of sendto and recvfrom syscalls.
xet_thread_area_x86.test 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
  /external/strace/tests-mx32/
nsyscalls.test 3 # Check decoding of out-of-range syscalls.
unix-pair-send-recv.test 3 # Check decoding and dumping of send and recv syscalls.
unix-pair-sendto-recvfrom.test 3 # Check decoding and dumping of sendto and recvfrom syscalls.
xet_thread_area_x86.test 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
  /external/valgrind/memcheck/tests/amd64-solaris/
scalar.c 1 /* Basic syscall test for Solaris/amd64 specific syscalls. */
  /external/autotest/client/tests/scrashme/
scrashme-git-snapshot-03-18-2010.tar.bz2 
scrashme.py 7 Runs the scrashme syscalls test suite. This test mode will exercise
8 kernel syscalls randomically, or in a sequential fashion.
14 --mode=random : pass random values in registers to random syscalls
25 --mode=capcheck: check syscalls that call capable() return -EPERM.
29 -N#: do # syscalls then exit.
  /bionic/libc/tools/
genseccomp.py 32 return set([x["name"] for x in parser.syscalls if x.get(architecture)])
54 # In SYSCALLS.TXT, there are two arm-specific syscalls whose names start
67 syscalls = []
79 syscalls.append((name, value))
81 return syscalls
84 def convert_NRs_to_ranges(syscalls):
86 syscalls = sorted(syscalls, lambda x, y: cmp(x[1], y[1]))
90 for name, value in syscalls
    [all...]
  /external/autotest/client/tests/ltp/patches/
getdents.patch 17 testcases/kernel/syscalls/getdents/getdents.h | 73 +++++++++++++++++------
18 testcases/kernel/syscalls/getdents/getdents01.c | 20 +-----
19 testcases/kernel/syscalls/getdents/getdents02.c | 27 +--------
20 testcases/kernel/syscalls/getdents/getdents03.c | 27 +--------
21 testcases/kernel/syscalls/getdents/getdents04.c | 26 +-------
24 diff --git a/testcases/kernel/syscalls/getdents/getdents.h b/testcases/kernel/syscalls/getdents/getdents.h
26 --- a/testcases/kernel/syscalls/getdents/getdents.h
27 +++ b/testcases/kernel/syscalls/getdents/getdents.h
109 diff --git a/testcases/kernel/syscalls/getdents/getdents01.c b/testcases/kernel/syscalls/getdents/getdents01.
    [all...]
sysctl.patch 4 Subject: [PATCH] syscalls/sysctl: check if __NR_sysctl is defined
11 testcases/kernel/syscalls/sysctl/sysctl01.c | 15 +++++++++++++++
12 testcases/kernel/syscalls/sysctl/sysctl03.c | 15 +++++++++++++++
13 testcases/kernel/syscalls/sysctl/sysctl04.c | 15 +++++++++++++++
14 testcases/kernel/syscalls/sysctl/sysctl05.c | 15 +++++++++++++++
17 diff --git a/testcases/kernel/syscalls/sysctl/sysctl01.c b/testcases/kernel/syscalls/sysctl/sysctl01.c
19 --- a/testcases/kernel/syscalls/sysctl/sysctl01.c
20 +++ b/testcases/kernel/syscalls/sysctl/sysctl01.c
47 diff --git a/testcases/kernel/syscalls/sysctl/sysctl03.c b/testcases/kernel/syscalls/sysctl/sysctl03.
    [all...]
  /libcore/luni/src/main/java/libcore/io/
Libcore.java 23 * Direct access to syscalls. Code should strongly prefer using {@link #os}
30 * Access to syscalls with helpful checks/guards.
  /toolchain/binutils/binutils-2.27/gas/testsuite/gas/arc/
nps400-0.d 14 Flags: 0x303, ARC700, v3 no-legacy-syscalls ABI
  /system/netd/libnetdutils/
Syscalls.cpp 21 #include "netdutils/Syscalls.h"
39 // Production implementation of Syscalls that forwards to libc syscalls.
40 class RealSyscalls final : public Syscalls {
227 Syscalls& SyscallsHolder::get() {
233 auto* syscalls = mSyscalls.load(std::memory_order_relaxed); local
234 // Common case returns existing syscalls
235 if (syscalls) {
236 return *syscalls;
240 std::unique_ptr<Syscalls> tmp(new RealSyscalls())
    [all...]
  /bionic/libc/
SECCOMP_BLACKLIST_APP.TXT 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT.
4 # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT
5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file
23 # been provided, allows the user to specify dispatch style syscalls.
31 # syscalls to modify IDs
46 # syscalls to modify times
56 # syscalls to change machine various configurations

Completed in 855 milliseconds

1 23 4 5 6 7 8 91011>>