Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 544) sorted by relevance

12345678910>>...22

/external/u-boot/arch/sandbox/dts/
Dsandbox.dts8 model = "sandbox";
23 compatible = "google,cros-ec-sandbox";
37 /* Information for sandbox */
51 compatible = "sandbox,eth";
57 compatible = "sandbox,eth-raw";
63 compatible = "sandbox,eth-raw";
70 compatible = "sandbox,gpio";
73 sandbox,gpio-count = <20>;
78 compatible = "sandbox,gpio";
81 sandbox,gpio-count = <10>;
[all …]
Dsandbox64.dts8 model = "sandbox";
23 compatible = "google,cros-ec-sandbox";
37 /* Information for sandbox */
51 compatible = "sandbox,eth";
57 compatible = "sandbox,eth-raw";
63 compatible = "sandbox,eth-raw";
70 compatible = "sandbox,gpio";
73 sandbox,gpio-count = <20>;
78 compatible = "sandbox,gpio";
81 sandbox,gpio-count = <10>;
[all …]
Dtest.dts4 model = "sandbox";
5 compatible = "sandbox";
69 compatible = "sandbox,phy";
74 compatible = "sandbox,phy";
143 compatible = "sandbox,clk";
148 compatible = "sandbox,clk-test";
156 compatible = "sandbox,eth";
162 compatible = "sandbox,eth";
168 compatible = "sandbox,eth";
174 compatible = "sandbox,eth";
[all …]
/external/ltp/testscripts/
Dtest_fs_bind.sh83 sandbox="${TMPDIR}/sandbox"
103 mkdir "${sandbox}" >& /dev/null
104 if [ ! -d "${sandbox}" -o ! -x "${sandbox}" ]; then
105 tst_brkm TBROK true "$0: failed to make directory \"${sandbox}\""
109 mount --bind "${sandbox}" "${sandbox}" >& /dev/null
111 tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${sandbox}\""
115 mount --make-private "${sandbox}" >& /dev/null
117 tst_brkm TBROK true "$0: failed to make private mountpoint on directory \"${sandbox}\""
124 pushd "${sandbox}" > /dev/null && {
162 …mount --make-shared "${sandbox}" > /dev/null 2>&1 || "${FS_BIND_ROOT}/bin/smount" "${sandbox}" sha…
[all …]
/external/python/setuptools/setuptools/tests/
Dtest_sandbox.py9 import setuptools.sandbox
14 with setuptools.sandbox.DirectorySandbox(str(tmpdir)):
32 setuptools.sandbox._execfile(target, vars(namespace))
39 setuptools.sandbox._execfile(str(setup_py), globals())
44 with setuptools.sandbox.ExceptionSaver():
48 with setuptools.sandbox.ExceptionSaver() as saved_exc:
60 with setuptools.sandbox.ExceptionSaver() as saved_exc:
70 with setuptools.sandbox.ExceptionSaver() as saved_exc:
81 with setuptools.sandbox.ExceptionSaver() as saved_exc:
84 with pytest.raises(setuptools.sandbox.UnpickleableException) as caught:
[all …]
/external/u-boot/board/sandbox/
DMAINTAINERS4 F: board/sandbox/
5 F: include/configs/sandbox.h
12 F: board/sandbox/
13 F: include/configs/sandbox.h
19 F: board/sandbox/
20 F: include/configs/sandbox.h
26 F: board/sandbox/
33 F: board/sandbox/
34 F: include/configs/sandbox.h
DREADME.sandbox9 The 'sandbox' architecture is designed to allow U-Boot to run under Linux on
14 of the sandbox U-Boot. The purpose of running U-Boot under Linux is to test
20 The board name is 'sandbox' but the vendor name is unset, so there is a
21 single board in board/sandbox.
26 There are two versions of the sandbox: One using 32-bit-wide integers, and one
29 default, the sandbox it built for a 32-bit host. The sandbox using 64-bit-wide
38 To run sandbox U-Boot use something like:
46 build sandbox without SDL (i.e. no display/keyboard support) by removing
47 the CONFIG_SANDBOX_SDL line in include/configs/sandbox.h or using:
52 U-Boot will start on your computer, showing a sandbox emulation of the serial
[all …]
/external/u-boot/arch/sandbox/
DKconfig5 default "sandbox"
8 default "sandbox"
11 default "sandbox"
19 bool "Enable SPL for sandbox"
24 default "sandbox" if !SANDBOX_SPL
27 prompt "Run sandbox on 32/64-bit host"
32 on a 64-bit host. If you want to run sandbox on
DMakefile3 head-y := arch/sandbox/cpu/start.o
5 libs-y += arch/sandbox/cpu/
6 libs-y += arch/sandbox/lib/
/external/u-boot/doc/device-tree-bindings/pmic/
Dsandbox.txt4 - drivers/power/pmic/sandbox.c (for parent device)
5 - drivers/power/regulator/sandbox.c (for child regulators)
10 - doc/device-tree-bindings/regulator/sandbox.txt
13 - compatible: "sandbox,pmic"
17 - compatible: "sandbox,i2c-pmic"
28 compatible = "sandbox,pmic";
33 compatible = "sandbox,i2c-pmic";
/external/selinux/sandbox/
DMakefile10 SHAREDIR ?= $(PREFIX)/share/sandbox
15 all: sandbox seunshare sandboxX.sh start
21 install -m 755 sandbox $(DESTDIR)$(BINDIR)
23 install -m 644 sandbox.8 $(DESTDIR)$(MANDIR)/man8/
26 install -m 644 sandbox.5 $(DESTDIR)$(MANDIR)/man5/
41 install -m 644 sandbox.conf $(DESTDIR)$(SYSCONFDIR)/sandbox
/external/u-boot/tools/dtoc/
Ddtoc_test_simple.dts15 compatible = "sandbox,spl-test";
28 compatible = "sandbox,spl-test";
40 compatible = "sandbox,spl-test";
46 compatible = "sandbox,spl-test.2";
50 compatible = "sandbox,i2c-test";
55 compatible = "sandbox,pmic-test";
/external/syzkaller/pkg/host/
Dhost_linux.go25 func isSupported(c *prog.Syscall, sandbox string) (bool, string) {
27 return isSupportedSyzkall(sandbox, c)
37 return isSupportedMount(c, sandbox)
129 func isSupportedSyzkall(sandbox string, c *prog.Syscall) (bool, string) {
157 return onlySandboxNoneOrNamespace(sandbox)
182 if ok, reason := onlySandboxNone(sandbox); !ok {
194 if ok, reason := onlySandboxNone(sandbox); !ok {
203 return onlySandboxNone(sandbox)
208 func onlySandboxNone(sandbox string) (bool, string) {
209 if syscall.Getuid() != 0 || sandbox != "none" {
[all …]
/external/syzkaller/pkg/runtest/
Drun.go125 for sandbox := range ctx.EnabledCalls {
126 sandboxes = append(sandboxes, sandbox)
141 for _, sandbox := range sandboxes {
142 name := fmt.Sprintf("%v %v", file.Name(), sandbox)
144 if !ctx.EnabledCalls[sandbox][call.Meta] {
154 "sandbox=" + sandbox: true,
163 if sandbox == "" {
173 req, err := ctx.createSyzTest(p, sandbox, threaded, cov)
198 req, err := ctx.createCTest(p, sandbox, threaded, times)
300 func (ctx *Context) createSyzTest(p *prog.Prog, sandbox string, threaded, cov bool) (*RunRequest, e…
[all …]
/external/syzkaller/sys/linux/test/
Dcgroup2 # This inherently does not work with sandbox="" because sandbox does part of setup.
3 # TODO(dvyukov): sandbox=setuid has some permissions setup problems.
4 # requires: -sandbox= -sandbox=setuid -C,norepeat
/external/syzkaller/pkg/report/testdata/gvisor/report/
D131 TITLE: FATAL ERROR: error getting processes for container: error executing in sandbox: EOF
9 …89 64365 x:0] FATAL ERROR: error getting processes for container: error executing in sandbox: EOF
10 error getting processes for container: error executing in sandbox: EOF
11 …ROR: error running container: err waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-0": EOF
12 error running container: err waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-0": EOF
D111 TITLE: FATAL ERROR: error getting processes for container: error executing in sandbox: EOF
6 …97 9726 x:0] FATAL ERROR: error getting processes for container: error executing in sandbox: EOF
7 error getting processes for container: error executing in sandbox: EOF
/external/robolectric-shadows/junit/src/main/java/org/robolectric/internal/
DSandboxTestRunner.java199 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) {
210 sandbox.replaceShadowMap(shadowMap);
212 sandbox.configure(createClassHandler(shadowMap, sandbox), getInterceptors());
225 Sandbox sandbox = getSandbox(method);
230 configureSandbox(sandbox, method);
233 Thread.currentThread().setContextClassLoader(sandbox.getRobolectricClassLoader());
236 Class bootstrappedTestClass = sandbox.bootstrappedClass(getTestClass().getJavaClass());
252 beforeTest(sandbox, method, bootstrappedMethod);
292 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro…
342 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) {
/external/u-boot/doc/SPI/
DREADME.sandbox-spi4 U-Boot supports SPI and SPI flash emulation in sandbox. This must be enabled
9 $ make O=sandbox sandbox_config
10 $ make O=sandbox
11 $ ./sandbox/u-boot --spi_sf 0:0:W25Q128:b/chromeos_peach/out/image.bin
23 $ ./b/sandbox/u-boot --spi_sf 0:0:W25Q128:b/chromeos_peach/out/image.bin \
63 Note that the sandbox SPI implementation was written by Mike Frysinger
/external/syzkaller/syz-fuzzer/
Dtesting.go24 sandbox string member
147 sandboxes := []string{args.sandbox}
156 for _, sandbox := range sandboxes {
157 enabledCalls, disabledCalls, err := buildCallList(args.target, args.enabledCalls, sandbox)
161 res.EnabledCalls[sandbox] = enabledCalls
162 res.DisabledCalls[sandbox] = disabledCalls
251 func buildCallList(target *prog.Target, enabledCalls []int, sandbox string) (
266 _, unsupported, err := host.DetectSupportedSyscalls(target, sandbox)
/external/u-boot/test/
DREADME11 To run most tests on sandbox, type this:
22 allows test to be executed without needing target hardware. The 'sandbox'
30 either on sandbox or on real hardware. It relies on the U-Boot console to
34 You can run the tests on sandbox with:
36 ./test/py/test.py --bd sandbox --build
38 This will produce HTML output in build-sandbox/test-log.html
80 - If you are adding a new uclass, add a sandbox driver and a test that uses it
/external/syzkaller/vm/kvm/
Dkvm.go47 sandbox string member
101 sandbox := fmt.Sprintf("syz-%v", index)
104 sandbox: sandbox,
105 sandboxPath: filepath.Join(os.Getenv("HOME"), ".lkvm", sandbox),
117 out, err := osutil.Command(inst.cfg.Lkvm, "setup", sandbox).CombinedOutput()
133 "--disk", inst.sandbox,
/external/u-boot/doc/device-tree-bindings/regulator/
Dsandbox.txt4 - drivers/power/pmic/sandbox.c (as parent I/O device)
5 - drivers/power/regulator/sandbox.c (for child regulators)
10 - doc/device-tree-bindings/pmic/sandbox.txt
16 The sandbox PMIC can support: ldo1, ldo2, buck1, buck2.
/external/u-boot/doc/device-tree-bindings/serial/
Dsandbox-serial.txt3 The sandbox serial device is an emulated device which displays its output
7 compatible: "sandbox,serial"
10 sandbox,text-colour: If present, this is the colour of the console text.
/external/u-boot/doc/uImage.FIT/
Dsign-images.its11 arch = "sandbox";
24 data = /incbin/("sandbox-kernel.dtb");
26 arch = "sandbox";

12345678910>>...22