/external/autotest/client/tests/ltp/patches/ |
D | sysctl.patch | 4 Subject: [PATCH] syscalls/sysctl: check if __NR_sysctl is defined 11 testcases/kernel/syscalls/sysctl/sysctl01.c | 15 +++++++++++++++ 12 testcases/kernel/syscalls/sysctl/sysctl03.c | 15 +++++++++++++++ 13 testcases/kernel/syscalls/sysctl/sysctl04.c | 15 +++++++++++++++ 14 testcases/kernel/syscalls/sysctl/sysctl05.c | 15 +++++++++++++++ 17 diff --git a/testcases/kernel/syscalls/sysctl/sysctl01.c b/testcases/kernel/syscalls/sysctl/sysctl0… 19 --- a/testcases/kernel/syscalls/sysctl/sysctl01.c 20 +++ b/testcases/kernel/syscalls/sysctl/sysctl01.c 22 #include <linux/sysctl.h> 31 static int sysctl(int *name, int nlen, void *oldval, size_t * oldlenp, [all …]
|
/external/autotest/client/site_tests/security_ModuleLocking/ |
D | security_ModuleLocking.py | 181 sysctl = "/proc/sys/kernel/chromiumos/module_locking" 182 if os.path.exists(sysctl): 183 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl)) 199 if os.path.exists(sysctl): 201 open(sysctl, "w").write("0\n") 202 self.check(open(sysctl).read() == '0\n', "%s disabled" % (sysctl)) 213 open(sysctl, "w").write("1\n") 214 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl))
|
/external/valgrind/coregrind/m_syswrap/ |
D | syswrap-xen.c | 565 PRE(sysctl) { in PRE() argument 566 struct vki_xen_sysctl *sysctl = (struct vki_xen_sysctl *)ARG1; in PRE() local 568 PRINT("__HYPERVISOR_sysctl ( %u )", sysctl->cmd); in PRE() 578 if (!sysctl) in PRE() 581 switch (sysctl->interface_version) in PRE() 590 "__HYPERVISOR_sysctl", sysctl->interface_version); in PRE() 596 (Addr)&sysctl->u._union._field, \ in PRE() 597 sizeof(sysctl->u._union._field)) in PRE() 601 switch (sysctl->cmd) { in PRE() 610 if (sysctl->u.readconsole.incremental) in PRE() [all …]
|
/external/autotest/client/site_tests/security_ptraceRestrictions/ |
D | security_ptraceRestrictions.py | 57 sysctl = "/proc/sys/kernel/yama/ptrace_scope" 58 self.check(os.path.exists(sysctl), "%s exists" % (sysctl), fatal=True) 59 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl),
|
/external/dhcpcd-6.8.2/dhcpcd-hooks/ |
D | 30-hostname | 28 elif sysctl kern.hostname >/dev/null 2>&1; then 29 sysctl -n kern.hostname 30 elif sysctl kernel.hostname >/dev/null 2>&1; then 31 sysctl -n kernel.hostname 43 elif sysctl kern.hostname >/dev/null 2>&1; then 44 sysctl -w "kern.hostname=$1" 45 elif sysctl kernel.hostname >/dev/null 2>&1; then 46 sysctl -w "kernel.hostname=$1"
|
/external/libunwind/src/ |
D | os-freebsd.c | 66 error = sysctl(mib, 3, NULL, &len, NULL, 0); in get_pid_by_tid() 74 error = sysctl(mib, 3, buf, &len, NULL, 0); in get_pid_by_tid() 107 error = sysctl(mib, 4, NULL, &len, NULL, 0); in map_create_list() 113 error = sysctl(mib, 4, NULL, &len, NULL, 0); in map_create_list() 125 error = sysctl(mib, 4, buf, &len, NULL, 0); in map_create_list()
|
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
D | security_HardlinkRestrictions.py | 174 sysctl = "/proc/sys/fs/protected_hardlinks" 175 if (not os.path.exists(sysctl)): 177 sysctl = "/proc/sys/kernel/yama/protected_nonaccess_hardlinks" 178 self.check(os.path.exists(sysctl), "%s exists" % (sysctl), fatal=True) 179 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl),
|
/external/libchrome/base/process/ |
D | process_iterator_mac.cc | 38 if (sysctl(mib, arraysize(mib), NULL, &len, NULL, 0) < 0) { in ProcessIterator() 50 if (sysctl(mib, arraysize(mib), &kinfo_procs_[0], &len, NULL, 0) < 0) { in ProcessIterator() 89 if (sysctl(mib, arraysize(mib), NULL, &data_len, NULL, 0) < 0) { in CheckForNextProcess() 95 if (sysctl(mib, arraysize(mib), &data[0], &data_len, NULL, 0) < 0) { in CheckForNextProcess()
|
D | process_handle_mac.cc | 20 if (sysctl(mib, 4, &info, &length, NULL, 0) < 0) { in GetParentProcessId()
|
/external/autotest/client/site_tests/kernel_FirmwareRequest/ |
D | kernel_FirmwareRequest.py | 24 sysctl = "/proc/sys/kernel/chromiumos/module_locking" 27 if os.path.exists(sysctl): 28 open(sysctl, "w").write(value)
|
/external/autotest/client/site_tests/security_SymlinkRestrictions/ |
D | security_SymlinkRestrictions.py | 247 sysctl = "/proc/sys/fs/protected_symlinks" 248 if (not os.path.exists(sysctl)): 250 sysctl = "/proc/sys/kernel/yama/protected_sticky_symlinks" 251 self.check(os.path.exists(sysctl), "%s exists" % (sysctl), fatal=True) 252 self.check(open(sysctl).read() == '1\n', "%s enabled" % (sysctl),
|
/external/libmicrohttpd/m4/ |
D | ax_count_cpus.m4 | 38 AS_IF([test -x /usr/sbin/sysctl],[ 39 sysctl_a=`/usr/sbin/sysctl -a 2>/dev/null| grep -c hw.cpu` 41 CPU_COUNT=`/usr/sbin/sysctl -n hw.ncpu`
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_procmaps_freebsd.cc | 36 int Err = sysctl(Mib, 4, NULL, &Size, NULL, 0); in ReadProcMaps() 43 Err = sysctl(Mib, 4, VmMap, &Size, NULL, 0); in ReadProcMaps()
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | p2p-action-udhcp.sh | 58 sysctl net.ipv4.ip_forward=1 65 sysctl net.ipv4.ip_forward=0
|
D | p2p-action.sh | 85 sysctl net.ipv4.ip_forward=1 92 sysctl net.ipv4.ip_forward=0
|
/external/libunwind/tests/ |
D | crasher.c | 62 error = sysctl(mib, 4, NULL, &len, NULL, 0); in write_maps() 69 error = sysctl(mib, 4, buf, &len, NULL, 0); in write_maps()
|
/external/v8/src/base/ |
D | sys-info.cc | 36 if (sysctl(mib, arraysize(mib), &ncpu, &len, NULL, 0) != 0) { in NumberOfProcessors() 60 if (sysctl(mib, arraysize(mib), &memsize, &len, NULL, 0) != 0) { in AmountOfPhysicalMemory()
|
/external/libchrome/base/debug/ |
D | debugger_posix.cc | 96 if (sysctl(mib, arraysize(mib), NULL, &info_size, NULL, 0) < 0) in BeingDebugged() 102 int sysctl_result = sysctl(mib, arraysize(mib), &info, &info_size, NULL, 0); in BeingDebugged()
|
/external/llvm/utils/buildit/ |
D | build_llvm | 95 SYSCTL=`sysctl -n hw.activecpu` 290 SYSCTL=`sysctl -n hw.activecpu` 294 SYSCTL=`sysctl -n hw.ncpu`
|
/external/iproute2/doc/ |
D | arpd.sgml | 44 as kernel helper (i.e. with <tt/app_solicit/ enabled in <tt/sysctl/ 70 In this case <tt/arpd/ does not adjust <tt/sysctl/ parameters, 77 <tt/sysctl/ parameters, when receives <tt/SIGINT/ or <tt/SIGTERM/. 80 database and leave <tt/sysctl/ parameters in an unpredictable state.
|
/external/libevent/ |
D | arc4random.c | 191 if (0 != sysctl(mib, 3, &buf[len], &n, NULL, 0)) in arc4_seed_sysctl_linux() 225 if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) { in arc4_seed_sysctl_bsd() 230 if (sysctl(mib, 2, &buf[len], &n, NULL, 0) == -1) in arc4_seed_sysctl_bsd()
|
/external/iptables/extensions/ |
D | libxt_connbytes.man | 14 always return false. The "net.netfilter.nf_conntrack_acct" sysctl flag controls 16 flows will not be gaining/losing a/the accounting structure when be sysctl flag
|
/external/mesa3d/src/gallium/auxiliary/util/ |
D | u_cpu_detect.c | 115 err = sysctl(sels, 2, &has_vu, &len, NULL, 0); in check_os_altivec_support() 246 sysctl(mib, 2, &ncpu, &len, NULL, 0); in util_cpu_detect()
|
/external/curl/ |
D | MacOSX-Framework | 91 make -j `sysctl -n hw.logicalcpu_max` 120 make -j `sysctl -n hw.logicalcpu_max`
|
/external/fec/ |
D | cpu_mode_ppc.c | 29 int error = sysctl(selectors, 2, &hasVectorUnit, &length, NULL, 0); in find_cpu_mode()
|