/external/u-boot/arch/sandbox/dts/ |
D | sandbox.dts | 8 model = "sandbox"; 23 compatible = "google,cros-ec-sandbox"; 37 /* Information for sandbox */ 51 compatible = "sandbox,eth"; 57 compatible = "sandbox,eth-raw"; 63 compatible = "sandbox,eth-raw"; 70 compatible = "sandbox,gpio"; 73 sandbox,gpio-count = <20>; 78 compatible = "sandbox,gpio"; 81 sandbox,gpio-count = <10>; [all …]
|
D | sandbox64.dts | 8 model = "sandbox"; 23 compatible = "google,cros-ec-sandbox"; 37 /* Information for sandbox */ 51 compatible = "sandbox,eth"; 57 compatible = "sandbox,eth-raw"; 63 compatible = "sandbox,eth-raw"; 70 compatible = "sandbox,gpio"; 73 sandbox,gpio-count = <20>; 78 compatible = "sandbox,gpio"; 81 sandbox,gpio-count = <10>; [all …]
|
D | test.dts | 4 model = "sandbox"; 5 compatible = "sandbox"; 69 compatible = "sandbox,phy"; 74 compatible = "sandbox,phy"; 143 compatible = "sandbox,clk"; 148 compatible = "sandbox,clk-test"; 156 compatible = "sandbox,eth"; 162 compatible = "sandbox,eth"; 168 compatible = "sandbox,eth"; 174 compatible = "sandbox,eth"; [all …]
|
/external/ltp/testscripts/ |
D | test_fs_bind.sh | 83 sandbox="${TMPDIR}/sandbox" 103 mkdir "${sandbox}" >& /dev/null 104 if [ ! -d "${sandbox}" -o ! -x "${sandbox}" ]; then 105 tst_brkm TBROK true "$0: failed to make directory \"${sandbox}\"" 109 mount --bind "${sandbox}" "${sandbox}" >& /dev/null 111 tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${sandbox}\"" 115 mount --make-private "${sandbox}" >& /dev/null 117 tst_brkm TBROK true "$0: failed to make private mountpoint on directory \"${sandbox}\"" 124 pushd "${sandbox}" > /dev/null && { 162 …mount --make-shared "${sandbox}" > /dev/null 2>&1 || "${FS_BIND_ROOT}/bin/smount" "${sandbox}" sha… [all …]
|
/external/python/setuptools/setuptools/tests/ |
D | test_sandbox.py | 9 import setuptools.sandbox 14 with setuptools.sandbox.DirectorySandbox(str(tmpdir)): 32 setuptools.sandbox._execfile(target, vars(namespace)) 39 setuptools.sandbox._execfile(str(setup_py), globals()) 44 with setuptools.sandbox.ExceptionSaver(): 48 with setuptools.sandbox.ExceptionSaver() as saved_exc: 60 with setuptools.sandbox.ExceptionSaver() as saved_exc: 70 with setuptools.sandbox.ExceptionSaver() as saved_exc: 81 with setuptools.sandbox.ExceptionSaver() as saved_exc: 84 with pytest.raises(setuptools.sandbox.UnpickleableException) as caught: [all …]
|
/external/u-boot/board/sandbox/ |
D | MAINTAINERS | 4 F: board/sandbox/ 5 F: include/configs/sandbox.h 12 F: board/sandbox/ 13 F: include/configs/sandbox.h 19 F: board/sandbox/ 20 F: include/configs/sandbox.h 26 F: board/sandbox/ 33 F: board/sandbox/ 34 F: include/configs/sandbox.h
|
D | README.sandbox | 9 The 'sandbox' architecture is designed to allow U-Boot to run under Linux on 14 of the sandbox U-Boot. The purpose of running U-Boot under Linux is to test 20 The board name is 'sandbox' but the vendor name is unset, so there is a 21 single board in board/sandbox. 26 There are two versions of the sandbox: One using 32-bit-wide integers, and one 29 default, the sandbox it built for a 32-bit host. The sandbox using 64-bit-wide 38 To run sandbox U-Boot use something like: 46 build sandbox without SDL (i.e. no display/keyboard support) by removing 47 the CONFIG_SANDBOX_SDL line in include/configs/sandbox.h or using: 52 U-Boot will start on your computer, showing a sandbox emulation of the serial [all …]
|
/external/u-boot/arch/sandbox/ |
D | Kconfig | 5 default "sandbox" 8 default "sandbox" 11 default "sandbox" 19 bool "Enable SPL for sandbox" 24 default "sandbox" if !SANDBOX_SPL 27 prompt "Run sandbox on 32/64-bit host" 32 on a 64-bit host. If you want to run sandbox on
|
D | Makefile | 3 head-y := arch/sandbox/cpu/start.o 5 libs-y += arch/sandbox/cpu/ 6 libs-y += arch/sandbox/lib/
|
/external/u-boot/doc/device-tree-bindings/pmic/ |
D | sandbox.txt | 4 - drivers/power/pmic/sandbox.c (for parent device) 5 - drivers/power/regulator/sandbox.c (for child regulators) 10 - doc/device-tree-bindings/regulator/sandbox.txt 13 - compatible: "sandbox,pmic" 17 - compatible: "sandbox,i2c-pmic" 28 compatible = "sandbox,pmic"; 33 compatible = "sandbox,i2c-pmic";
|
/external/selinux/sandbox/ |
D | Makefile | 10 SHAREDIR ?= $(PREFIX)/share/sandbox 15 all: sandbox seunshare sandboxX.sh start 21 install -m 755 sandbox $(DESTDIR)$(BINDIR) 23 install -m 644 sandbox.8 $(DESTDIR)$(MANDIR)/man8/ 26 install -m 644 sandbox.5 $(DESTDIR)$(MANDIR)/man5/ 41 install -m 644 sandbox.conf $(DESTDIR)$(SYSCONFDIR)/sandbox
|
/external/u-boot/tools/dtoc/ |
D | dtoc_test_simple.dts | 15 compatible = "sandbox,spl-test"; 28 compatible = "sandbox,spl-test"; 40 compatible = "sandbox,spl-test"; 46 compatible = "sandbox,spl-test.2"; 50 compatible = "sandbox,i2c-test"; 55 compatible = "sandbox,pmic-test";
|
/external/syzkaller/pkg/host/ |
D | host_linux.go | 25 func isSupported(c *prog.Syscall, sandbox string) (bool, string) { 27 return isSupportedSyzkall(sandbox, c) 37 return isSupportedMount(c, sandbox) 129 func isSupportedSyzkall(sandbox string, c *prog.Syscall) (bool, string) { 157 return onlySandboxNoneOrNamespace(sandbox) 182 if ok, reason := onlySandboxNone(sandbox); !ok { 194 if ok, reason := onlySandboxNone(sandbox); !ok { 203 return onlySandboxNone(sandbox) 208 func onlySandboxNone(sandbox string) (bool, string) { 209 if syscall.Getuid() != 0 || sandbox != "none" { [all …]
|
/external/syzkaller/pkg/runtest/ |
D | run.go | 125 for sandbox := range ctx.EnabledCalls { 126 sandboxes = append(sandboxes, sandbox) 141 for _, sandbox := range sandboxes { 142 name := fmt.Sprintf("%v %v", file.Name(), sandbox) 144 if !ctx.EnabledCalls[sandbox][call.Meta] { 154 "sandbox=" + sandbox: true, 163 if sandbox == "" { 173 req, err := ctx.createSyzTest(p, sandbox, threaded, cov) 198 req, err := ctx.createCTest(p, sandbox, threaded, times) 300 func (ctx *Context) createSyzTest(p *prog.Prog, sandbox string, threaded, cov bool) (*RunRequest, e… [all …]
|
/external/syzkaller/sys/linux/test/ |
D | cgroup | 2 # This inherently does not work with sandbox="" because sandbox does part of setup. 3 # TODO(dvyukov): sandbox=setuid has some permissions setup problems. 4 # requires: -sandbox= -sandbox=setuid -C,norepeat
|
/external/syzkaller/pkg/report/testdata/gvisor/report/ |
D | 13 | 1 TITLE: FATAL ERROR: error getting processes for container: error executing in sandbox: EOF 9 …89 64365 x:0] FATAL ERROR: error getting processes for container: error executing in sandbox: EOF 10 error getting processes for container: error executing in sandbox: EOF 11 …ROR: error running container: err waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-0": EOF 12 error running container: err waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-0": EOF
|
D | 11 | 1 TITLE: FATAL ERROR: error getting processes for container: error executing in sandbox: EOF 6 …97 9726 x:0] FATAL ERROR: error getting processes for container: error executing in sandbox: EOF 7 error getting processes for container: error executing in sandbox: EOF
|
/external/robolectric-shadows/junit/src/main/java/org/robolectric/internal/ |
D | SandboxTestRunner.java | 199 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { 210 sandbox.replaceShadowMap(shadowMap); 212 sandbox.configure(createClassHandler(shadowMap, sandbox), getInterceptors()); 225 Sandbox sandbox = getSandbox(method); 230 configureSandbox(sandbox, method); 233 Thread.currentThread().setContextClassLoader(sandbox.getRobolectricClassLoader()); 236 Class bootstrappedTestClass = sandbox.bootstrappedClass(getTestClass().getJavaClass()); 252 beforeTest(sandbox, method, bootstrappedMethod); 292 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro… 342 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) {
|
/external/u-boot/doc/SPI/ |
D | README.sandbox-spi | 4 U-Boot supports SPI and SPI flash emulation in sandbox. This must be enabled 9 $ make O=sandbox sandbox_config 10 $ make O=sandbox 11 $ ./sandbox/u-boot --spi_sf 0:0:W25Q128:b/chromeos_peach/out/image.bin 23 $ ./b/sandbox/u-boot --spi_sf 0:0:W25Q128:b/chromeos_peach/out/image.bin \ 63 Note that the sandbox SPI implementation was written by Mike Frysinger
|
/external/syzkaller/syz-fuzzer/ |
D | testing.go | 24 sandbox string member 147 sandboxes := []string{args.sandbox} 156 for _, sandbox := range sandboxes { 157 enabledCalls, disabledCalls, err := buildCallList(args.target, args.enabledCalls, sandbox) 161 res.EnabledCalls[sandbox] = enabledCalls 162 res.DisabledCalls[sandbox] = disabledCalls 251 func buildCallList(target *prog.Target, enabledCalls []int, sandbox string) ( 266 _, unsupported, err := host.DetectSupportedSyscalls(target, sandbox)
|
/external/u-boot/test/ |
D | README | 11 To run most tests on sandbox, type this: 22 allows test to be executed without needing target hardware. The 'sandbox' 30 either on sandbox or on real hardware. It relies on the U-Boot console to 34 You can run the tests on sandbox with: 36 ./test/py/test.py --bd sandbox --build 38 This will produce HTML output in build-sandbox/test-log.html 80 - If you are adding a new uclass, add a sandbox driver and a test that uses it
|
/external/syzkaller/vm/kvm/ |
D | kvm.go | 47 sandbox string member 101 sandbox := fmt.Sprintf("syz-%v", index) 104 sandbox: sandbox, 105 sandboxPath: filepath.Join(os.Getenv("HOME"), ".lkvm", sandbox), 117 out, err := osutil.Command(inst.cfg.Lkvm, "setup", sandbox).CombinedOutput() 133 "--disk", inst.sandbox,
|
/external/u-boot/doc/device-tree-bindings/regulator/ |
D | sandbox.txt | 4 - drivers/power/pmic/sandbox.c (as parent I/O device) 5 - drivers/power/regulator/sandbox.c (for child regulators) 10 - doc/device-tree-bindings/pmic/sandbox.txt 16 The sandbox PMIC can support: ldo1, ldo2, buck1, buck2.
|
/external/u-boot/doc/device-tree-bindings/serial/ |
D | sandbox-serial.txt | 3 The sandbox serial device is an emulated device which displays its output 7 compatible: "sandbox,serial" 10 sandbox,text-colour: If present, this is the colour of the console text.
|
/external/u-boot/doc/uImage.FIT/ |
D | sign-images.its | 11 arch = "sandbox"; 24 data = /incbin/("sandbox-kernel.dtb"); 26 arch = "sandbox";
|