/external/autotest/client/site_tests/security_Minijail_seccomp/ |
policy-privdrop_arm | 10 # Privilege-dropping syscalls.
|
policy-privdrop_i386 | 10 # Privilege-dropping syscalls.
|
policy-privdrop_x86_64 | 10 # Privilege-dropping syscalls.
|
/external/strace/tests/ |
nsyscalls.test | 3 # Check decoding of out-of-range syscalls.
|
unix-pair-send-recv.test | 3 # Check decoding and dumping of send and recv syscalls.
|
unix-pair-sendto-recvfrom.test | 3 # Check decoding and dumping of sendto and recvfrom syscalls.
|
xet_thread_area_x86.test | 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
|
/external/strace/tests-m32/ |
nsyscalls.test | 3 # Check decoding of out-of-range syscalls.
|
unix-pair-send-recv.test | 3 # Check decoding and dumping of send and recv syscalls.
|
unix-pair-sendto-recvfrom.test | 3 # Check decoding and dumping of sendto and recvfrom syscalls.
|
xet_thread_area_x86.test | 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
|
/external/strace/tests-mx32/ |
nsyscalls.test | 3 # Check decoding of out-of-range syscalls.
|
unix-pair-send-recv.test | 3 # Check decoding and dumping of send and recv syscalls.
|
unix-pair-sendto-recvfrom.test | 3 # Check decoding and dumping of sendto and recvfrom syscalls.
|
xet_thread_area_x86.test | 3 # Check decoding of set_thread_area and get_thread_area syscalls on x86.
|
/external/valgrind/memcheck/tests/amd64-solaris/ |
scalar.c | 1 /* Basic syscall test for Solaris/amd64 specific syscalls. */
|
/external/autotest/client/tests/scrashme/ |
scrashme-git-snapshot-03-18-2010.tar.bz2 | |
scrashme.py | 7 Runs the scrashme syscalls test suite. This test mode will exercise 8 kernel syscalls randomically, or in a sequential fashion. 14 --mode=random : pass random values in registers to random syscalls 25 --mode=capcheck: check syscalls that call capable() return -EPERM. 29 -N#: do # syscalls then exit.
|
/bionic/libc/tools/ |
genseccomp.py | 32 return set([x["name"] for x in parser.syscalls if x.get(architecture)]) 54 # In SYSCALLS.TXT, there are two arm-specific syscalls whose names start 67 syscalls = [] 79 syscalls.append((name, value)) 81 return syscalls 84 def convert_NRs_to_ranges(syscalls): 86 syscalls = sorted(syscalls, lambda x, y: cmp(x[1], y[1])) 90 for name, value in syscalls [all...] |
/external/autotest/client/tests/ltp/patches/ |
getdents.patch | 17 testcases/kernel/syscalls/getdents/getdents.h | 73 +++++++++++++++++------ 18 testcases/kernel/syscalls/getdents/getdents01.c | 20 +----- 19 testcases/kernel/syscalls/getdents/getdents02.c | 27 +-------- 20 testcases/kernel/syscalls/getdents/getdents03.c | 27 +-------- 21 testcases/kernel/syscalls/getdents/getdents04.c | 26 +------- 24 diff --git a/testcases/kernel/syscalls/getdents/getdents.h b/testcases/kernel/syscalls/getdents/getdents.h 26 --- a/testcases/kernel/syscalls/getdents/getdents.h 27 +++ b/testcases/kernel/syscalls/getdents/getdents.h 109 diff --git a/testcases/kernel/syscalls/getdents/getdents01.c b/testcases/kernel/syscalls/getdents/getdents01. [all...] |
sysctl.patch | 4 Subject: [PATCH] syscalls/sysctl: check if __NR_sysctl is defined 11 testcases/kernel/syscalls/sysctl/sysctl01.c | 15 +++++++++++++++ 12 testcases/kernel/syscalls/sysctl/sysctl03.c | 15 +++++++++++++++ 13 testcases/kernel/syscalls/sysctl/sysctl04.c | 15 +++++++++++++++ 14 testcases/kernel/syscalls/sysctl/sysctl05.c | 15 +++++++++++++++ 17 diff --git a/testcases/kernel/syscalls/sysctl/sysctl01.c b/testcases/kernel/syscalls/sysctl/sysctl01.c 19 --- a/testcases/kernel/syscalls/sysctl/sysctl01.c 20 +++ b/testcases/kernel/syscalls/sysctl/sysctl01.c 47 diff --git a/testcases/kernel/syscalls/sysctl/sysctl03.c b/testcases/kernel/syscalls/sysctl/sysctl03. [all...] |
/libcore/luni/src/main/java/libcore/io/ |
Libcore.java | 23 * Direct access to syscalls. Code should strongly prefer using {@link #os} 30 * Access to syscalls with helpful checks/guards.
|
/toolchain/binutils/binutils-2.27/gas/testsuite/gas/arc/ |
nps400-0.d | 14 Flags: 0x303, ARC700, v3 no-legacy-syscalls ABI
|
/system/netd/libnetdutils/ |
Syscalls.cpp | 21 #include "netdutils/Syscalls.h" 39 // Production implementation of Syscalls that forwards to libc syscalls. 40 class RealSyscalls final : public Syscalls { 227 Syscalls& SyscallsHolder::get() { 233 auto* syscalls = mSyscalls.load(std::memory_order_relaxed); local 234 // Common case returns existing syscalls 235 if (syscalls) { 236 return *syscalls; 240 std::unique_ptr<Syscalls> tmp(new RealSyscalls()) [all...] |
/bionic/libc/ |
SECCOMP_BLACKLIST_APP.TXT | 1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 4 # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file 23 # been provided, allows the user to specify dispatch style syscalls. 31 # syscalls to modify IDs 46 # syscalls to modify times 56 # syscalls to change machine various configurations
|