/external/valgrind/main/memcheck/tests/ |
H A D | leak-segv-jmp.c | 8 #include <sys/syscall.h> 13 // Refer to this file for syscall convention. 59 " syscall\n" 81 " sc\n" /* syscall: sets %cr0.so on error */ 154 "syscall\n" 164 // Ensure the file compiles even if the syscall nr is not defined. 220 // to mprotect the pages : as this syscall will not be seen
|
/external/chromium_org/sandbox/linux/services/ |
H A D | broker_process.cc | 11 #include <sys/syscall.h> 52 return syscall(__NR_openat, AT_FDCWD, pathname, flags, mode); 418 // policy. Write the syscall return value (-errno) to |write_pickle|. 440 // Write the syscall return value (-errno) to |write_pickle| and append
|
/external/chromium_org/tools/cygprofile/ |
H A D | cygprofile.cc | 10 #include <sys/syscall.h> 56 return syscall(__NR_gettid);
|
/external/qemu/util/ |
H A D | qemu-thread-posix.c | 24 #include <sys/syscall.h> 281 #define futex(...) syscall(__NR_futex, __VA_ARGS__)
|
/external/valgrind/main/coregrind/ |
H A D | m_trampoline.S | 169 syscall 177 syscall 187 syscall 197 syscall 958 syscall 1141 syscall 1148 syscall 1198 syscall
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | sandbox_bpf.cc | 20 #include <sys/syscall.h> 39 #include "sandbox/linux/seccomp-bpf/syscall.h" 116 if (syscall(__NR_getpid) < 0 && errno == EPERM) { 117 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); 139 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); 203 // any state other than the syscall arguments. 494 // the thread group are all handled atomically by this syscall. 495 const int rv = syscall( 626 int rv = syscall(__NR_seccomp, SECCOMP_SET_MODE_FILTER, 679 // 2. If the policy involves unsafe traps, check if the syscall wa [all...] |
H A D | trap.cc | 10 #include <sys/syscall.h> 19 #include "sandbox/linux/seccomp-bpf/syscall.h" 161 // When indirect syscall (syscall(__NR_foo, ...)) is made on Mips, the 163 // real number of a syscall (__NR_foo) is in SECCOMP_PARM1(ctx) 188 // Mips supports up to eight arguments for syscall.
|
/external/e2fsprogs/misc/ |
H A D | e4defrag.c | 42 #include <sys/syscall.h> 204 return syscall(__NR_fadvise64_64, fd, offset, len, advise); 228 return syscall(__NR_sync_file_range, fd, offset, length, flag); 230 return syscall(__NR_sync_file_range2, fd, flag, offset, length); 236 #warning Using locally defined fallocate syscall interface. 252 return syscall(__NR_fallocate, fd, mode, offset, len);
|
/external/chromium_org/base/process/ |
H A D | launch_posix.cc | 141 return syscall(SYS_rt_sigaction, sig, act, oact, sizeof(kernel_sigset_t)); 314 pid = syscall(__NR_clone, options.clone_flags, 0, 0, 0);
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
H A D | nonsfi_sandbox_sigsys_unittest.cc | 11 #include <sys/syscall.h> 28 syscall(sysno, 0, 0, 0, 0, 0, 0); \
|
H A D | nonsfi_sandbox.cc | 15 #include <sys/syscall.h>
|
/external/chromium_org/ppapi/native_client/tests/breakpad_crash_test/ |
H A D | nacl.scons | 71 # This tests a crash that occurs inside a syscall handler.
|
/external/chromium_org/third_party/tcmalloc/chromium/src/base/ |
H A D | sysinfo.cc | 93 # include <sys/syscall.h> 96 # define safeopen(filename, mode) syscall(SYS_open, filename, mode) 101 # define saferead(fd, buffer, size) syscall(SYS_read, fd, buffer, size) 106 # define safeclose(fd) syscall(SYS_close, fd)
|
/external/chromium_org/third_party/tcmalloc/vendor/src/base/ |
H A D | sysinfo.cc | 88 # include <sys/syscall.h> 91 # define safeopen(filename, mode) syscall(SYS_open, filename, mode) 96 # define saferead(fd, buffer, size) syscall(SYS_read, fd, buffer, size) 101 # define safeclose(fd) syscall(SYS_close, fd)
|
/external/compiler-rt/lib/asan/ |
H A D | asan_linux.cc | 29 #include <sys/syscall.h>
|
/external/libhevc/common/ |
H A D | ithread.c | 437 i4_sys_res = syscall(__NR_sched_setaffinity, pid, sizeof(i4_mask), &i4_mask); 442 //perror("Error in setaffinity syscall PERROR : "); 443 //LOG_ERROR("Error in the syscall setaffinity: mask=0x%x err=0x%x", i4_mask, i4_sys_res);
|
/external/ltrace/sysdeps/linux-gnu/mips/ |
H A D | trace.c | 75 \param sysnum 0-based syscall number. 76 \return 1 if syscall, 2 if sysret, 0 otherwise. 82 the pc points at the instruction just after the mips "syscall" 101 On a mips, syscall looks like: 102 24040fa1 li v0, 0x0fa1 # 4001 --> _exit syscall 103 0000000c syscall 110 /* if it is a syscall, return 1 or 2 */ 113 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) { 295 \param type Function/syscall call or return. 310 - syscall parameter [all...] |
/external/ltrace/testsuite/ltrace.main/ |
H A D | parameters.c | 9 #include <sys/syscall.h>
|
/external/qemu/ |
H A D | os-posix.c | 44 #include <sys/syscall.h>
|
/external/strace/ |
H A D | Android.mk | 73 syscall.c \
|
/external/chromium_org/sandbox/ |
H A D | seccomp_bpf.target.darwin-arm.mk | 34 sandbox/linux/seccomp-bpf/syscall.cc \
|
H A D | seccomp_bpf.target.darwin-arm64.mk | 34 sandbox/linux/seccomp-bpf/syscall.cc \
|
H A D | seccomp_bpf.target.darwin-mips.mk | 34 sandbox/linux/seccomp-bpf/syscall.cc \
|
H A D | seccomp_bpf.target.darwin-x86.mk | 34 sandbox/linux/seccomp-bpf/syscall.cc \
|
H A D | seccomp_bpf.target.darwin-x86_64.mk | 34 sandbox/linux/seccomp-bpf/syscall.cc \
|