Home
last modified time | relevance | path

Searched refs:syscalls (Results 1 – 25 of 28) sorted by relevance

12

/aosp12/bionic/libc/tools/
H A Dgenseccomp.py37 return {x["name"] for x in parser.syscalls if x.get(architecture)}
66 def extract_priority_syscalls(syscalls, priorities): argument
69 [syscall for syscall in syscalls if syscall[0] not in priorities]
72 syscall_dict = {syscall[0]: syscall[1] for syscall in syscalls}
117 syscalls = {}
124 syscalls[name] = value
126 return syscalls
129 def convert_NRs_to_ranges(syscalls): argument
131 syscalls = sorted(syscalls, key=operator.itemgetter(1))
135 for name, value in syscalls:
[all …]
H A Dgensyscalls.py313 self.syscalls = []
415 self.syscalls.append(t)
434 for syscall in parser.syscalls:
457 for syscall in parser.syscalls:
H A Dgenfunctosyscallnrs.py16 for syscall in parser.syscalls:
/aosp12/bionic/libc/
H A DSECCOMP_BLOCKLIST_APP.TXT5 # Any entry in the blocklist must be in the syscalls file and not be in the allowlist file
9 # Note: Some privileged syscalls are still needed in app process after fork before uid change,
13 # syscalls to modify IDs
30 # syscalls to modify times
40 # syscalls to change machine various configurations
H A DSECCOMP_PRIORITY.TXT6 # The syscalls below are prioritized above other syscalls when checking seccomp policy, in
H A DSECCOMP_BLOCKLIST_COMMON.TXT5 # Any entry in the blocklist must be in the syscalls file and not be in the allowlist file
H A DSECCOMP_ALLOWLIST_COMMON.TXT6 # syscalls needed to boot android
36 # Useful new syscalls which we don't yet use in bionic.
H A DAndroid.bp1286 name: "syscalls-arm.S",
1287 out: ["syscalls-arm.S"],
1297 name: "syscalls-arm64.S",
1298 out: ["syscalls-arm64.S"],
1308 name: "syscalls-x86.S",
1309 out: ["syscalls-x86.S"],
1319 name: "syscalls-x86_64.S",
1320 out: ["syscalls-x86_64.S"],
1334 srcs: [":syscalls-arm.S"],
1337 srcs: [":syscalls-arm64.S"],
[all …]
/aosp12/system/netd/libnetdutils/
H A DSyscalls.cpp241 auto* syscalls = mSyscalls.load(std::memory_order_relaxed); in get() local
243 if (syscalls) { in get()
244 return *syscalls; in get()
258 Syscalls& SyscallsHolder::swap(Syscalls& syscalls) { in swap() argument
259 return *mSyscalls.exchange(&syscalls); in swap()
H A DSyscallsTest.cpp47 TEST(syscalls, scopedMock) { in TEST() argument
/aosp12/bionic/libc/kernel/tools/
H A Dupdate_all.py83 syscalls = set()
98 syscalls.add(nr_name)
107 for syscall in sorted(syscalls):
/aosp12/hardware/qcom/sm8150/media/conf_files/msmnile/
H A Dcodec2.vendor.ext.policy1 # device specific syscalls
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm8150/media/conf_files/sm6150/
H A Dcodec2.vendor.ext.policy1 # device specific syscalls
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm8150/media/conf_files/atoll/
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm8150/media/conf_files/trinket/
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm7250/media/conf_files/bengal/
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm7250/media/conf_files/lito/
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/hardware/qcom/sm7250/media/conf_files/kona/
H A Dmediacodec-seccomp.policy1 # device specific syscalls
/aosp12/system/core/code_coverage/seccomp_policy/
H A Dcode_coverage.policy.def8 // includes *all* syscalls used during the coverage dumping
/aosp12/system/extras/ioshark/
H A DREADME24 -d : Preserve the delays between successive filesystem syscalls as
/aosp12/system/netd/libnetdutils/include/netdutils/
H A DSyscalls.h192 Syscalls& swap(Syscalls& syscalls);
/aosp12/bionic/
H A DREADME.md77 syscalls/
78 # The syscalls directories contain script-generated assembler files.
/aosp12/system/extras/ioblame/
H A DREADME154 path (so all filesystem reads) and filesystem write() syscalls. There

12