/bionic/tests/ |
D | signal_test.cpp | 96 TEST(signal, sigaddset_invalid) { in TEST() argument 100 TEST(signal, sigaddset64_invalid) { in TEST() argument 106 TEST(signal, sigdelset_invalid) { in TEST() argument 110 TEST(signal, sigdelset64_invalid) { in TEST() argument 116 TEST(signal, sigemptyset_invalid) { in TEST() argument 120 TEST(signal, sigemptyset64_invalid) { in TEST() argument 126 TEST(signal, sigfillset_invalid) { in TEST() argument 130 TEST(signal, sigfillset64_invalid) { in TEST() argument 136 TEST(signal, sigismember_invalid) { in TEST() argument 140 TEST(signal, sigismember64_invalid) { in TEST() argument [all …]
|
D | sys_signalfd_test.cpp | 41 static void TestSignalFd(int fd, int signal) { in TestSignalFd() argument 44 ASSERT_EQ(0, raise(signal)); in TestSignalFd() 49 ASSERT_EQ(signal, static_cast<int>(sfd_si.ssi_signo)); in TestSignalFd()
|
D | spawn_test.cpp | 445 ASSERT_NE(SIG_ERR, signal(SIGALRM, SIG_IGN)); in TEST() 446 ASSERT_NE(SIG_ERR, signal(SIGCONT, SIG_IGN)); in TEST() 483 signal(SIGRTMIN, SIG_IGN); in TEST()
|
D | fdsan_test.cpp | 54 signal(BIONIC_SIGNAL_DEBUGGER, SIG_DFL); // Disable debuggerd. in SetUp()
|
D | fenv_test.cpp | 229 signal(SIGFPE, SIG_DFL); // Disable debuggerd. in TEST()
|
/bionic/libc/bionic/ |
D | sigaction.cpp | 41 int sigaction(int signal, const struct sigaction* bionic_new_action, struct sigaction* bionic_old_a… in sigaction() argument 64 int result = __rt_sigaction(signal, in sigaction() 90 static int __sigaction64(int signal, const struct sigaction64* bionic_new, in __sigaction64() argument 106 return __rt_sigaction(signal, bionic_new ? &kernel_new : nullptr, bionic_old, in __sigaction64() 110 int sigaction(int signal, const struct sigaction* bionic_new, struct sigaction* bionic_old) { in sigaction() argument 125 int result = __sigaction64(signal, bionic_new ? &kernel_new : nullptr, &kernel_old); in sigaction() 138 int sigaction64(int signal, const struct sigaction64* bionic_new, struct sigaction64* bionic_old) { in sigaction64() argument 139 return __sigaction64(signal, bionic_new, bionic_old); in sigaction64()
|
D | fdtrack.cpp | 64 signal(BIONIC_SIGNAL_FDTRACK, [](int) {}); in __libc_init_fdtrack()
|
D | libc_init_static.cpp | 396 signal(BIONIC_SIGNAL_PROFILER, SIG_IGN); in __libc_init_profiling_handlers() 397 signal(BIONIC_SIGNAL_ART_PROFILER, SIG_IGN); in __libc_init_profiling_handlers()
|
D | android_profiling_dynamic.cpp | 72 signal(BIONIC_SIGNAL_ART_PROFILER, SIG_IGN); in __libc_init_profiling_handlers()
|
D | ndk_cruft.cpp | 244 return signal(signum, handler); in bsd_signal()
|
D | signal.cpp | 200 sighandler_t signal(int sig, sighandler_t handler) { in signal() function
|
/bionic/libc/private/ |
D | ScopedSignalBlocker.h | 39 explicit ScopedSignalBlocker(int signal) { in ScopedSignalBlocker() argument 41 sigaddset64(&set, signal); in ScopedSignalBlocker()
|
/bionic/libc/include/sys/ |
D | user.h | 94 long int signal; member 161 long int signal; 210 long int signal;
|
/bionic/docs/ |
D | EINTR.md | 5 If your code is blocked in a system call when a signal needs to be delivered, 22 Technically, yes. In practice on Android, no. Technically if a signal's 24 signal, so your code can just stay blocked in the system call it was already 28 guarantee. If any code has installed a signal handler, you need to cope with 30 host of signal handlers before your code even starts to run. (And, no, you
|
D | fdtrack.md | 16 handle unbalanced closes. This callback may be called from an async signal safe 28 its output to logcat, either use `fdtrack_dump`, or send the signal 54 interrupted by a signal 58 * Definitely async signal safe
|
D | status.md | 154 …* <signal.h> support for `sigaction64_t` and `sigset64_t` allowing LP32 access to real-time signals 187 * 5 legacy <signal.h> functions: `sighold`/`sigignore`/`sigpause`/`sigrelse`/`sigset` 209 * `sem_wait` now returns EINTR when interrupted by a signal. 217 * <signal.h> `sigqueue`, `sigtimedwait`, `sigwaitinfo`. 275 * <signal.h> `psiginfo` and `psignal`. 378 alive, and then call `kill`/`tgkill` with signal 0 (which checks 380 signal). That's still not completely safe because if you're too late 387 signal. This wasn't historically true in Android, and when we fixed this
|
D | fdsan.md | 166 signal 35 (<debuggerd signal>), code -1 (SI_QUEUE), fault addr -------- 207 signal 35 (<debuggerd signal>), code -1 (SI_QUEUE), fault addr --------
|
/bionic/libc/malloc_debug/ |
D | README.md | 117 file when the process receives the signal SIGRTMAX - 17 ( which is 47 on 124 Note that when the signal is received, the heap is not dumped until the next 129 backtrace capture is toggled when the process receives the signal 131 option is used alone, backtrace capture starts out disabled until the signal 133 backtrace capture is enabled until the signal is received. 154 prefix used for dumping files when the signal SIGRTMAX - 17 is received or when 160 on the signal will be backtrace\_dump\_prefix.**PID**.txt. The filename chosen 219 in a process. Specifically, if the signal SIGRTMAX - 16 (which is 48 on 220 Android devices). The best way to see the exact signal being used is to 225 When the signal is received, the actual unreachable check only triggers [all …]
|
/bionic/libc/kernel/uapi/drm/ |
D | etnaviv_drm.h | 99 __u16 signal; member
|
D | drm.h | 275 unsigned long signal; member
|
/bionic/libc/include/ |
D | signal.h | 67 sighandler_t _Nonnull signal(int __signal, sighandler_t _Nullable __handler);
|
/bionic/tests/headers/posix/ |
D | signal_h.c | 218 FUNCTION(signal, signal_handler_type (*f)(int, signal_handler_type)); in signal_h()
|
/bionic/libc/malloc_debug/tests/ |
D | malloc_debug_system_tests.cpp | 96 signal(SIGUSR1, [](int) { in LogReader()
|
/bionic/libc/tools/ |
D | posix-2013.txt | 950 signal
|
/bionic/libc/kernel/uapi/linux/ |
D | videodev2.h | 1060 __s32 signal; member
|