/external/valgrind/main/coregrind/ |
H A D | m_vkiscnums.c | 49 HChar* VG_(sysnum_string)(Word sysnum, SizeT n_buf, HChar* buf) argument 51 VG_(snprintf)(buf, n_buf, "%3ld", sysnum); 55 HChar* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, HChar* buf) argument 57 return VG_(sysnum_string)(sysnum, n_buf, buf); 64 HChar* VG_(sysnum_string)(Word sysnum, SizeT n_buf, HChar* buf) argument 67 switch (VG_DARWIN_SYSNO_CLASS(sysnum)) { 75 classname, VG_DARWIN_SYSNO_INDEX(sysnum)); 79 HChar* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, HChar* buf) argument 81 return VG_(sysnum_string)(sysnum, n_buf, buf);
|
/external/ltrace/sysdeps/linux-gnu/aarch64/ |
H A D | trace.c | 46 syscall_p(struct process *proc, int status, int *sysnum) argument 71 *sysnum = regs.regs[8]; 76 && proc->callstack[d1].c_un.syscall == *sysnum)
|
/external/ltrace/sysdeps/linux-gnu/m68k/ |
H A D | trace.c | 50 syscall_p(struct process *proc, int status, int *sysnum) argument 56 *sysnum = ptrace(PTRACE_PEEKUSER, proc->pid, 4 * PT_ORIG_D0, 0); 57 if (*sysnum == -1) 59 if (*sysnum >= 0) { 63 proc->callstack[depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/sysdeps/linux-gnu/alpha/ |
H A D | trace.c | 50 syscall_p(struct process *proc, int status, int *sysnum) argument 59 *sysnum = 63 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) { 66 if (*sysnum >= 0 && *sysnum < 500) {
|
/external/ltrace/sysdeps/linux-gnu/cris/ |
H A D | trace.c | 50 int syscall_p(struct process *proc, int status, int *sysnum) argument 60 *sysnum =
|
/external/ltrace/sysdeps/linux-gnu/sparc/ |
H A D | trace.c | 47 syscall_p(struct process *proc, int status, int *sysnum) argument 57 *sysnum = ((proc_archdep *) proc->arch_ptr)->regs.u_regs[UREG_G0]; 60 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) { 62 } else if (*sysnum >= 0) {
|
/external/ltrace/sysdeps/linux-gnu/x86/ |
H A D | trace.c | 78 syscall_p(struct process *proc, int status, int *sysnum) argument 98 *sysnum = ret; 99 debug(DEBUG_FUNCTION, "sysnum=%ld %p %d", ret, 102 && elem->c_un.syscall == *sysnum) 105 if (*sysnum >= 0)
|
/external/ltrace/sysdeps/linux-gnu/s390/ |
H A D | trace.c | 68 syscall_p(struct process *proc, int status, int *sysnum) argument 87 *sysnum = ptrace(PTRACE_PEEKUSER, proc->pid, PT_GPR2, 0); 95 *sysnum = 101 if (*sysnum != -ENOSYS) 165 *sysnum = scno;
|
/external/ltrace/sysdeps/linux-gnu/ppc/ |
H A D | trace.c | 63 syscall_p(struct process *proc, int status, int *sysnum) argument 73 *sysnum = 78 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | verifier.cc | 318 uint32_t sysnum = iter.Next(); local 326 struct arch_seccomp_data data = {static_cast<int>(sysnum), 330 if (!(sysnum & 0x40000000u)) { 334 if (sysnum & 0x40000000u) { 339 ErrorCode code = iter.IsValid(sysnum) 340 ? policy.EvaluateSyscall(sandbox, sysnum)
|
H A D | sandbox_bpf.cc | 97 virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE { 98 switch (sysnum) { 124 virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE { 125 DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum)); 303 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { argument 304 return SyscallIterator::IsValid(sysnum); 847 uint32_t sysnum = iter.Next(); local 849 IsValidSyscallNumber(sysnum) 850 ? policy_->EvaluateSyscall(this, static_cast<int>(sysnum)) 853 ranges->push_back(Range(old_sysnum, sysnum [all...] |
/external/ltrace/ |
H A D | ltrace.h | 52 int sysnum; /* EVENT_SYSCALL, EVENT_SYSRET */ member in union:Event::__anon26629
|
H A D | handle_event.c | 59 static void callstack_push_syscall(struct process *proc, int sysnum); 67 static char *sysname(struct process *proc, int sysnum); 68 static char *arch_sysname(struct process *proc, int sysnum); 149 sysname(event->proc, event->e_un.sysnum), 150 event->e_un.sysnum); 158 sysname(event->proc, event->e_un.sysnum), 159 event->e_un.sysnum); 167 arch_sysname(event->proc, event->e_un.sysnum), 168 event->e_un.sysnum); 176 arch_sysname(event->proc, event->e_un.sysnum), 361 sysname(struct process *proc, int sysnum) argument 388 arch_sysname(struct process *proc, int sysnum) argument 770 callstack_push_syscall(struct process *proc, int sysnum) argument [all...] |
/external/ltrace/sysdeps/linux-gnu/ia64/ |
H A D | trace.c | 73 syscall_p(struct process *proc, int status, int *sysnum) argument 132 *sysnum = r15; 135 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/sysdeps/linux-gnu/metag/ |
H A D | trace.c | 67 \param sysnum 0-based syscall number. 74 syscall_p(struct process *proc, int status, int *sysnum) argument 91 *sysnum = regs.dx[0][1]; 103 if (*sysnum >= 0)
|
/external/ltrace/sysdeps/linux-gnu/mips/ |
H A D | trace.c | 75 \param sysnum 0-based syscall number. 90 syscall_p(struct process *proc, int status, int *sysnum) argument 109 *sysnum = (num & 0xFFFF) - 4000; 113 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) { 117 if (*sysnum >= 0) {
|
/external/ltrace/sysdeps/linux-gnu/arm/ |
H A D | trace.c | 65 syscall_p(struct process *proc, int status, int *sysnum) argument 86 *sysnum = r7; 89 *sysnum = insn & 0xfffff; 100 if ((*sysnum & 0xf0000) == 0xf0000) { 102 *sysnum &= ~0xf0000;
|
/external/compiler-rt/lib/msandr/ |
H A D | msandr.cc | 672 bool event_filter_syscall(void *drcontext, int sysnum) { argument 718 bool event_pre_syscall(void *drcontext, int sysnum) { argument 731 CHECK(sysnum == sysnum_full.number); 763 void event_post_syscall(void *drcontext, int sysnum) { argument 774 CHECK(sysnum == sysnum_full.number); 796 if (success && (sysnum == SYS_mmap IF_NOT_X64(|| sysnum == SYS_mmap2))) {
|
/external/ltrace/sysdeps/linux-gnu/ |
H A D | trace.c | 1130 continue_after_syscall(struct process *proc, int sysnum, int ret_p) argument
|