Searched refs:syscall (Results 76 - 100 of 225) sorted by relevance

123456789

/external/valgrind/main/perf/
H A Dbigcode.c17 #include <sys/syscall.h>
73 syscall(__NR_cacheflush, a, FN_SIZE * n_fns, ICACHE);
/external/chromium_org/components/nacl/loader/nonsfi/
H A Dnonsfi_sandbox_unittest.cc23 #include <sys/syscall.h>
41 #include "sandbox/linux/seccomp-bpf/syscall.h"
75 syscall(999);
100 const int pid = syscall(__NR_clone, SIGCHLD, NULL);
128 BPF_ASSERT_EQ(-1, syscall(__NR_prctl, PR_SET_NAME, "foo"));
136 syscall(__NR_prctl, PR_SET_DUMPABLE, 1UL);
316 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI, 0, NULL, NULL, 0);
324 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI_PRIVATE, 0, NULL, NULL, 0);
340 syscall(__NR_futex, NULL, FUTEX_UNLOCK_PI_PRIVATE, 0, NULL, NULL, 0);
428 BPF_ASSERT_EQ(0, syscall(__NR_br
[all...]
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dbaseline_policy.cc10 #include <sys/syscall.h>
238 : fs_denied_errno_(EPERM), current_pid_(syscall(__NR_getpid)) {}
241 : fs_denied_errno_(fs_denied_errno), current_pid_(syscall(__NR_getpid)) {}
246 DCHECK_EQ(syscall(__NR_getpid), current_pid_);
250 // Sanity check that we're only called with valid syscall numbers.
254 DCHECK_EQ(syscall(__NR_getpid), current_pid_);
/external/chromium_org/sandbox/win/src/
H A Dservice_resolver_64.cc26 // 08 syscall
33 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntry
49 // 1c 0f05 syscall
58 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntryW8
78 kSyscall == service->syscall && kRetNp == service->ret);
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/
H A D_hpux.h92 #include <syscall.h>
245 #define _MD_SELECT(nfds,r,w,e,tv) syscall(SYS_select,nfds,r,w,e,tv)
248 #define _MD_POLL(fds,nfds,timeout) syscall(SYS_poll,fds,nfds,timeout)
H A D_openbsd.h38 #include <sys/syscall.h>
227 #define _MD_SELECT(nfds,r,w,e,tv) syscall(SYS_select,nfds,r,w,e,tv)
229 #define _MD_POLL(fds,nfds,timeout) syscall(SYS_poll,fds,nfds,timeout)
/external/llvm/test/MC/Mips/
H A Dmips-control-instructions.s9 # CHECK32: syscall # encoding: [0x00,0x00,0x00,0x0c]
10 # CHECK32: syscall 13396 # encoding: [0x00,0x0d,0x15,0x0c]
42 # CHECK64: syscall # encoding: [0x00,0x00,0x00,0x0c]
43 # CHECK64: syscall 13396 # encoding: [0x00,0x0d,0x15,0x0c]
75 syscall
76 syscall 0x3454
/external/linux-tools-perf/perf-3.12.0/tools/perf/
H A Dperf.h112 #include <sys/syscall.h>
170 fd = syscall(__NR_perf_event_open, attr, pid, cpu,
/external/ltrace/sysdeps/linux-gnu/x86/
H A Dtrace.c75 /* Returns 1 if syscall, 2 if sysret, 0 otherwise.
95 ret = elem->c_un.syscall;
102 && elem->c_un.syscall == *sysnum)
/external/valgrind/main/none/tests/linux/
H A Dmremap2.c11 #include <syscall.h>
146 syscall(__NR_mremap, src, 20*PAGE, newsize, flags, dst, 0 );
/external/chromium_org/base/threading/
H A Dplatform_thread_freebsd.cc20 #include <sys/syscall.h>
H A Dplatform_thread_linux.cc21 #include <sys/syscall.h>
/external/chromium_org/sandbox/linux/seccomp-bpf/
H A Ddie.cc11 #include <sys/syscall.h>
18 #include "sandbox/linux/seccomp-bpf/syscall.h"
/external/chromium_org/third_party/tcmalloc/vendor/src/
H A Dmalloc_hook_mmap_linux.h34 // syscall stubs. Unfortunately libc only exports the stubs via weak symbols
43 #include <syscall.h>
49 // 32b has a mmap2() syscall, 64b does not.
85 result = (void *)syscall(SYS_mmap2,
105 // Old syscall interface cannot handle six args, so pass in an array
108 result = (void *)syscall(SYS_mmap, args);
227 result = syscall(SYS_munmap, start, length);
/external/chromium_org/tools/traceline/traceline/
H A Dmain.cc667 cb.stosd(); // eax is the syscall number
717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ]
1133 int syscall = IntAt(pos); local
1135 "'syscall': 0x%x,\n", syscall);
1150 if (syscalls.count(syscall) == 1) {
1151 std::string sname = syscalls[syscall];
/external/compiler-rt/lib/msandr/
H A Dmsandr.cc40 #include <sys/syscall.h> /* for SYS_mmap */
689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
691 res = drsys_syscall_name(syscall, &name);
694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!"
702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
704 res = drsys_syscall_name(syscall, &name);
706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n",
719 drsys_syscall_t *syscall; local
726 res = drsys_cur_syscall(drcontext, &syscall);
729 res = drsys_syscall_number(syscall,
764 drsys_syscall_t *syscall; local
[all...]
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_platform_mac.cc32 #include <sys/syscall.h>
/external/e2fsprogs/lib/e2p/
H A Dfgetflags.c88 save_errno = syscall(SYS_fsctl, name, EXT2_IOC_GETFLAGS, &f, 0);
H A Dfsetflags.c93 return syscall(SYS_fsctl, name, EXT2_IOC_SETFLAGS, &f, 0);
/external/jemalloc/include/jemalloc/internal/
H A Djemalloc_internal_decls.h19 # include <sys/syscall.h>
/external/ltrace/sysdeps/linux-gnu/aarch64/
H A Dtrace.c39 /* The syscall instruction is:
76 && proc->callstack[d1].c_un.syscall == *sysnum)
/external/ltrace/sysdeps/linux-gnu/alpha/
H A Dtrace.c47 /* Returns 1 if syscall, 2 if sysret, 0 otherwise.
63 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
/external/valgrind/main/drd/tests/
H A Dsigalrm.c23 return syscall(__NR_gettid);
/external/valgrind/main/exp-bbv/tests/amd64-linux/
H A Dll.S14 # offsets into the results returned by the uname syscall
22 # offset into the results returned by the sysinfo syscall
134 # push $SYSCALL_UNAME # uname syscall
137 # syscall # do syscall
184 # syscall # syscall. fd in eax.
197 # syscall
201 # syscall
309 # push $SYSCALL_SYSINFO # sysinfo() syscall
[all...]
/external/valgrind/main/exp-bbv/tests/ppc32-linux/
H A Dll.S11 # offsets into the results returned by the uname syscall
159 # li 0,SYSCALL_UNAME # uname syscall
162 # sc # do syscall
200 # sc # syscall. fd in r0.
257 # li 0,SYSCALL_SYSINFO # sysinfo() syscall
310 li 0,SYSCALL_EXIT # put the exit syscall number in eax
436 li 0,SYSCALL_WRITE # write syscall
446 sc # syscall

Completed in 3304 milliseconds

123456789