Searched defs:syscall (Results 1 - 8 of 8) sorted by relevance

/external/openssh/
H A Dsandbox-systrace.c25 #include <sys/syscall.h>
45 int syscall; member in struct:sandbox_policy
155 /* Set per-syscall policy */
158 for (j = 0; allowed_syscalls[j].syscall != -1; j++) {
159 if (allowed_syscalls[j].syscall == i) {
169 debug3("%s: policy: enable syscall %d", __func__, i);
/external/chromium_org/sandbox/win/src/
H A Dservice_resolver_64.cc26 // 08 syscall
33 USHORT syscall; // = 0F 05 member in struct:__anon9913::ServiceEntry
49 // 1c 0f05 syscall
58 USHORT syscall; // = 0F 05 member in struct:__anon9913::ServiceEntryW8
78 kSyscall == service->syscall && kRetNp == service->ret);
/external/chromium_org/sandbox/win/wow_helper/
H A Dservice64_resolver.cc43 // syscall
50 USHORT syscall; // = 0F 05 member in struct:__anon9930::ServiceEntry
269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
/external/compiler-rt/lib/msandr/
H A Dmsandr.cc40 #include <sys/syscall.h> /* for SYS_mmap */
538 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
540 res = drsys_syscall_name(syscall, &name);
543 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!"
551 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
553 res = drsys_syscall_name(syscall, &name);
554 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n",
567 drsys_syscall_t *syscall; local
574 res = drsys_cur_syscall(drcontext, &syscall);
577 res = drsys_syscall_number(syscall,
612 drsys_syscall_t *syscall; local
[all...]
/external/chromium_org/content/common/
H A Dsandbox_seccomp_bpf_linux.cc139 __FILE__":**CRASHING**:seccomp-bpf failure in syscall ";
147 uint32_t syscall = args.nr; local
148 if (syscall >= 1024)
149 syscall = 0;
150 PrintSyscallError(syscall);
157 syscall |= ((args.args[0] & 0xffUL) << 12);
158 syscall |= ((args.args[1] & 0xffUL) << 20);
159 // Purposefully dereference the syscall as an address so it'll show up very
161 volatile char* addr = reinterpret_cast<volatile char*>(syscall);
163 // In case we hit a mapped address, hit the null page with just the syscall,
[all...]
/external/chromium_org/tools/traceline/traceline/
H A Dmain.cc667 cb.stosd(); // eax is the syscall number
717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ]
1133 int syscall = IntAt(pos); local
1135 "'syscall': 0x%x,\n", syscall);
1150 if (syscalls.count(syscall) == 1) {
1151 std::string sname = syscalls[syscall];
/external/kernel-headers/original/linux/
H A Daudit.h56 #define AUDIT_LIST 1002 /* List syscall rules -- deprecated */
57 #define AUDIT_ADD 1003 /* Add syscall rule -- deprecated */
58 #define AUDIT_DEL 1004 /* Delete syscall rule -- deprecated */
65 #define AUDIT_ADD_RULE 1011 /* Add syscall filtering rule */
66 #define AUDIT_DEL_RULE 1012 /* Delete syscall filtering rule */
67 #define AUDIT_LIST_RULES 1013 /* List syscall filtering rules */
91 #define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */
144 #define AUDIT_FILTER_TASK 0x01 /* Apply rule at task creation (not syscall) */
145 #define AUDIT_FILTER_ENTRY 0x02 /* Apply rule at syscall entry */
147 #define AUDIT_FILTER_EXIT 0x04 /* Apply rule at syscall exi
511 audit_seccomp(unsigned long syscall, long signr, int code) argument
[all...]
/external/robolectric/lib/main/
H A Dsqlite-jdbc-3.7.2.jarMETA-INF/ META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org. ...

Completed in 267 milliseconds