Home
last modified time | relevance | path

Searched refs:syscalls (Results 1 – 11 of 11) sorted by relevance

/bionic/libc/tools/
Dgenseccomp.py38 return {x["name"] for x in parser.syscalls if x.get(architecture)}
67 def extract_priority_syscalls(syscalls, priorities): argument
70 [syscall for syscall in syscalls if syscall[0] not in priorities]
73 syscall_dict = {syscall[0]: syscall[1] for syscall in syscalls}
123 syscalls = {}
129 syscalls[name] = value
131 return syscalls
134 def convert_NRs_to_ranges(syscalls): argument
136 syscalls = sorted(syscalls, key=operator.itemgetter(1))
140 for name, value in syscalls:
[all …]
Dgensyscalls.py330 self.syscalls = []
434 self.syscalls.append(t)
455 for syscall in parser.syscalls:
481 for syscall in parser.syscalls:
Dgenfunctosyscallnrs.py16 for syscall in parser.syscalls:
/bionic/libc/
DSECCOMP_BLOCKLIST_APP.TXT5 # Any entry in the blocklist must be in the syscalls file and not be in the allowlist file
9 # Note: Some privileged syscalls are still needed in app process after fork before uid change,
13 # syscalls to modify IDs
32 # syscalls to modify times
42 # syscalls to change machine various configurations
DSECCOMP_PRIORITY.TXT6 # The syscalls below are prioritized above other syscalls when checking seccomp policy, in
DSECCOMP_BLOCKLIST_COMMON.TXT5 # Any entry in the blocklist must be in the syscalls file and not be in the allowlist file
DAndroid.bp1255 name: "syscalls-arm",
1256 out: ["syscalls-arm.S"],
1263 name: "syscalls-arm64",
1264 out: ["syscalls-arm64.S"],
1271 name: "syscalls-riscv64",
1272 out: ["syscalls-riscv64.S"],
1279 name: "syscalls-x86",
1280 out: ["syscalls-x86.S"],
1287 name: "syscalls-x86_64",
1288 out: ["syscalls-x86_64.S"],
[all …]
DSECCOMP_ALLOWLIST_COMMON.TXT43 # (Potentially) useful new syscalls which we don't yet use in bionic.
DSYSCALLS.TXT20 # been provided, allows the user to specify dispatch style syscalls.
/bionic/libc/kernel/tools/
Dupdate_all.py89 syscalls = set()
104 syscalls.add(nr_name)
113 for syscall in sorted(syscalls):
/bionic/
DREADME.md75 syscalls/
76 # The syscalls directories contain script-generated assembler files.
234 implemented in the kernel. For simple syscalls, that's just the