Searched refs:syscall (Results 201 - 225 of 225) sorted by last modified time

123456789

/external/chromium_org/sandbox/
H A Dseccomp_bpf.target.darwin-x86.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.darwin-x86_64.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.linux-arm.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.linux-arm64.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.linux-mips.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.linux-x86.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
H A Dseccomp_bpf.target.linux-x86_64.mk34 sandbox/linux/seccomp-bpf/syscall.cc \
/external/chromium_org/sandbox/win/src/
H A Dservice_resolver_64.cc26 // 08 syscall
33 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntry
49 // 1c 0f05 syscall
58 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntryW8
78 kSyscall == service->syscall && kRetNp == service->ret);
/external/chromium_org/sandbox/win/wow_helper/
H A Dservice64_resolver.cc43 // syscall
50 USHORT syscall; // = 0F 05 member in struct:__anon10647::ServiceEntry
269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
/external/chromium_org/media/cdm/ppapi/
H A Dcdm_logging.cc23 #include <sys/syscall.h>
57 return syscall(__NR_gettid);
/external/chromium_org/components/nacl/loader/nonsfi/
H A Dirt_futex.cc7 #include <sys/syscall.h>
40 // futex syscall takes relative timeout, but the ABI for IRT's
57 syscall(SYS_futex, addr, FUTEX_WAIT_PRIVATE, value, timeout_ptr, 0, 0));
62 syscall(SYS_futex, addr, FUTEX_WAKE_PRIVATE, nwake, 0, 0, 0), count);
H A Dirt_icache.cc8 #include <sys/syscall.h>
18 // TODO(mazda): Revisit the implementation to consider inlining the syscall
24 int result = syscall(__ARM_NR_cacheflush,
H A Dnonsfi_sandbox.cc15 #include <sys/syscall.h>
H A Dnonsfi_sandbox_sigsys_unittest.cc11 #include <sys/syscall.h>
28 syscall(sysno, 0, 0, 0, 0, 0, 0); \
H A Dnonsfi_sandbox_unittest.cc23 #include <sys/syscall.h>
41 #include "sandbox/linux/seccomp-bpf/syscall.h"
75 syscall(999);
100 const int pid = syscall(__NR_clone, SIGCHLD, NULL);
128 BPF_ASSERT_EQ(-1, syscall(__NR_prctl, PR_SET_NAME, "foo"));
136 syscall(__NR_prctl, PR_SET_DUMPABLE, 1UL);
316 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI, 0, NULL, NULL, 0);
324 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI_PRIVATE, 0, NULL, NULL, 0);
340 syscall(__NR_futex, NULL, FUTEX_UNLOCK_PI_PRIVATE, 0, NULL, NULL, 0);
428 BPF_ASSERT_EQ(0, syscall(__NR_br
[all...]
/external/chromium_org/content/common/sandbox_linux/android/
H A Dsandbox_bpf_base_policy_android.cc7 #include <sys/syscall.h>
/external/chromium_org/components/crash/browser/
H A Dcrash_handler_host_linux.cc10 #include <sys/syscall.h>
267 // namespaces also have /proc/[pid]/syscall, so we can look through
269 // read syscall with the right arguments.
272 // /proc/[pid]/syscall is formatted as follows:
286 // leader. If procfs syscall is not supported by the kernel, then
/external/chromium_org/base/files/
H A Ddir_reader_linux.h11 #include <sys/syscall.h>
59 const int r = syscall(__NR_getdents64, fd_, buf_, sizeof(buf_));
/external/chromium_org/base/
H A Dlogging.cc24 #include <sys/syscall.h>
H A Dos_compat_android.cc11 #include <sys/syscall.h>
26 return syscall(__NR_utimensat, fd, NULL, NULL, 0);
40 return syscall(__NR_utimensat, fd, NULL, ts, 0);
/external/chromium_org/base/process/
H A Dlaunch_posix.cc141 return syscall(SYS_rt_sigaction, sig, act, oact, sizeof(kernel_sigset_t));
314 pid = syscall(__NR_clone, options.clone_flags, 0, 0, 0);
H A Dprocess_util_unittest.cc476 // From .../MacOSX10.9.sdk/usr/include/sys/syscall.h
493 return syscall(SYS_change_fdguard_np, fd, guard, guardflags,
507 // The syscall is first provided in 10.9/Mavericks.
/external/chromium_org/base/threading/
H A Dplatform_thread_freebsd.cc20 #include <sys/syscall.h>
H A Dplatform_thread_linux.cc21 #include <sys/syscall.h>
H A Dplatform_thread_posix.cc27 #include <sys/syscall.h>
152 return syscall(__NR_gettid);

Completed in 440 milliseconds

123456789