/glibc-2.36/sysdeps/unix/sysv/linux/ |
D | tst-pkey.c | 41 static int keys[key_count]; variable 77 saved_rights[i] = pkey_get (keys[i]); in check_page_access() 106 TEST_COMPARE (sigsegv_pkey, keys[page]); in check_page_access() 108 TEST_COMPARE (pkey_set (keys[i], saved_rights[i]), 0); in check_page_access() 122 TEST_VERIFY (pkey_get (keys[i]) == PKEY_DISABLE_ACCESS in sigusr1_handler() 123 || pkey_get (keys[i]) == i); in sigusr1_handler() 140 result->access_rights[i] = pkey_get (keys[i]); in get_thread_func() 193 keys[0] = pkey_alloc (0, 0); in do_test() 194 if (keys[0] < 0) in do_test() 208 TEST_COMPARE (pkey_get (keys[0]), 0); in do_test() [all …]
|
D | tst-glibcsyscalls.py | 48 for name in glibc_constants.keys() & kernel_constants.keys(): 56 for name in glibc_constants.keys() - set(glibc_names.syscalls): 61 for name in glibc_constants.keys() - kernel_constants.keys(): 69 for name in kernel_constants.keys() - glibc_constants.keys(): 74 for name in kernel_constants.keys() - glibc_constants.keys():
|
D | update-syscall-lists.py | 86 merged = names_list.merge(kernel_constants.keys())
|
/glibc-2.36/sysdeps/pthread/ |
D | tst-key1.c | 39 pthread_key_t *keys = alloca (max * sizeof (pthread_key_t)); in do_test() local 43 if (pthread_key_create (&keys[i], NULL) != 0) in do_test() 52 if (pthread_setspecific (keys[i], (const void *) (i + 100l)) != 0) in do_test() 61 if (pthread_getspecific (keys[i]) != (void *) (i + 100l)) in do_test() 67 if (pthread_key_delete (keys[i]) != 0) in do_test() 75 if (pthread_key_create (&keys[0], NULL) != 0) in do_test() 81 if (pthread_key_delete (keys[0]) != 0) in do_test()
|
D | tst-tsd6.c | 9 static pthread_key_t keys[NKEYS]; variable 19 void *p = pthread_getspecific (keys[i]); in tf() 21 pthread_setspecific (keys[i], (void *) keys); in tf() 40 if (pthread_key_create (&keys[i], NULL) != 0) in do_test()
|
D | tst-key4.c | 30 static pthread_key_t *keys; variable 38 if (pthread_setspecific (keys[i], (void *) (long int) (i + 1)) != 0) in tf1() 53 if (pthread_getspecific (keys[i]) != NULL) in tf2() 66 keys = alloca (max * sizeof (pthread_key_t)); in do_test() 70 if (pthread_key_create (&keys[i], NULL) != 0) in do_test()
|
D | tst-key2.c | 72 pthread_key_t keys[N]; in do_test() local 76 if (pthread_key_create (&keys[i], fcts[i]) != 0) in do_test() 83 if (pthread_create (&th, NULL, tf, &keys[1]) != 0) in do_test() 108 if (pthread_key_delete (keys[i]) != 0) in do_test()
|
D | tst-key3.c | 81 pthread_key_t keys[N]; in do_test() local 85 if (pthread_key_create (&keys[i], fcts[i]) != 0) in do_test() 98 if (pthread_create (&th, NULL, tf, &keys[1]) != 0) in do_test() 142 if (pthread_key_delete (keys[i]) != 0) in do_test()
|
/glibc-2.36/nptl_db/ |
D | td_ta_tsd_iter.c | 29 void *keys; in td_ta_tsd_iter() local 51 keys = __alloca (keys_nb); in td_ta_tsd_iter() 55 if (ps_pdread (ta->ph, addr, keys, keys_nb) != PS_OK) in td_ta_tsd_iter() 62 err = DB_GET_FIELD_LOCAL (seq, ta, keys, pthread_key_struct, seq, 0); in td_ta_tsd_iter() 67 err = DB_GET_FIELD_LOCAL (destr, ta, keys, pthread_key_struct, in td_ta_tsd_iter() 76 keys += keys_elemsize; in td_ta_tsd_iter()
|
/glibc-2.36/misc/ |
D | bug18240.c | 38 char *keys[100]; in test_size() local 41 if (asprintf (keys + i, "%d", i) < 0) in test_size() 46 ENTRY e = { keys[i], (char *) "value" }; in test_size() 49 printf ("error: hsearch (\"%s\"): %m\n", keys[i]); in test_size() 56 free (keys[i]); in test_size()
|
/glibc-2.36/benchtests/scripts/ |
D | compare_bench.py | 75 for func in pts1['functions'].keys(): 76 for var in pts1['functions'][func].keys(): 87 if 'timings' not in pts1['functions'][func][var].keys() or \ 88 'timings' not in pts2['functions'][func][var].keys(): 132 for func in bench1['functions'].keys(): 133 for var in bench1['functions'][func].keys(): 136 if u'timings' not in bench1['functions'][func][var].keys():
|
D | import_bench.py | 105 for func in bench['functions'].keys(): 106 for k in bench['functions'][func].keys(): 107 if 'timings' not in bench['functions'][func][k].keys():
|
D | compare_strings.py | 65 xkeys = results.keys() 95 for f in results['functions'].keys(): 141 % (ke, ', '.join([a for a in res.keys() if a != 'timings'])))
|
/glibc-2.36/stdlib/ |
D | tst-arc4random-stats.c | 44 static struct key keys[key_count]; variable 55 memset (&keys, 0xcc, sizeof (keys)); in find_stuck_bytes() 62 if (func (keys[key].data)) in find_stuck_bytes() 77 ++byte_counts[pos][keys[key].data[pos]]; in find_stuck_bytes()
|
/glibc-2.36/math/ |
D | gen-libm-test.py | 190 for fn in d.keys(): 192 for f in sorted(d[fn].keys())] 196 out_list = [out_data[fn_order] for fn_order in sorted(out_data.keys())] 209 for fn in sorted(ulps_dict.keys()): 425 for k in sorted(ROUNDING_MAP.keys()): 455 this_tests = sorted(auto_tests[fn][rm_name].keys()) 490 for flag in sorted(FLAGS_SIMPLE.keys()): 494 for exc in sorted(EXC_EXPECTED.keys()): 624 all_platforms = sorted(all_ulps.keys())
|
/glibc-2.36/scripts/ |
D | move-symbol-to-libc.py | 109 old_versions = set(versym.version for versym in old_symbols.keys()) 119 new_versions = set(versym.version for versym in new_symbols.keys())
|
D | build-many-glibcs.py | 535 for name in sorted(self.configs.keys()): 741 configs = sorted(self.configs.keys()) 751 configs = sorted(self.glibc_configs.keys()) 760 configs = sorted(self.glibc_configs.keys()) 806 for k in default_versions.keys(): 820 for k in default_versions.keys(): 829 for k in sorted(default_versions.keys()): 1053 all_tests = set(old_build_results.keys()) | set(build_results.keys()) 1192 changes_list = sorted(changes.keys()) 1202 versions_list = sorted(versions.keys())
|
D | glibc_shared_code.py | 63 for k in r.keys():
|
D | glibcextract.py | 170 for name in sorted(macros_2.keys()):
|
/glibc-2.36/manual/ |
D | platform.texi | 449 @code{OSPKE} -- OS has set CR4.PKE to enable protection keys. 484 @code{PKS} -- Protection keys for supervisor-mode pages. 487 @code{PKU} -- Protection keys for user-mode pages.
|
D | crypt.texi | 73 @c The MD5, SHA256 and SHA512 implementations will malloc on long keys, 216 instance, encryption keys should be chosen at random, and the ``salt''
|
D | memory.texi | 3075 using @dfn{memory protection keys}. These restrictions work as follows: 3081 during memory accesses. New keys can be allocated with the 3102 access rights associated with newly allocated keys. 3106 but the access rights for other protection keys are unspecified. 3126 keys, the @code{pkey_mprotect} call can usually be skipped. In this 3148 protection keys and it is not necessary to change the the access rights 3175 The system does not implement memory protection keys. 3182 The system does not implement memory protection keys or runs in a mode 3183 in which memory protection keys are disabled. 3186 All available protection keys already have been allocated. [all …]
|
D | search.texi | 326 Entries of the hashing table and keys for the search are defined using 337 use the NUL character always and solely to terminate keys. It is not 338 possible to handle general binary data for keys.
|
D | argp.texi | 382 other times with special reserved keys, such as @code{ARGP_KEY_ARG} for 394 argument. Other special keys always have a zero @var{arg}. 542 returned by the parser for @code{ARGP_KEY_INIT}. Other keys can occur 1007 of the special keys with names beginning with @samp{ARGP_KEY_HELP_}
|
/glibc-2.36/resolv/ |
D | README | 10 for things as dynamic DNS updates and TSIG keys isn't included. If
|