/external/valgrind/main/perf/ |
H A D | bigcode.c | 17 #include <sys/syscall.h> 73 syscall(__NR_cacheflush, a, FN_SIZE * n_fns, ICACHE);
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
H A D | nonsfi_sandbox_unittest.cc | 23 #include <sys/syscall.h> 41 #include "sandbox/linux/seccomp-bpf/syscall.h" 75 syscall(999); 100 const int pid = syscall(__NR_clone, SIGCHLD, NULL); 128 BPF_ASSERT_EQ(-1, syscall(__NR_prctl, PR_SET_NAME, "foo")); 136 syscall(__NR_prctl, PR_SET_DUMPABLE, 1UL); 316 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI, 0, NULL, NULL, 0); 324 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI_PRIVATE, 0, NULL, NULL, 0); 340 syscall(__NR_futex, NULL, FUTEX_UNLOCK_PI_PRIVATE, 0, NULL, NULL, 0); 428 BPF_ASSERT_EQ(0, syscall(__NR_br [all...] |
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | baseline_policy.cc | 10 #include <sys/syscall.h> 238 : fs_denied_errno_(EPERM), current_pid_(syscall(__NR_getpid)) {} 241 : fs_denied_errno_(fs_denied_errno), current_pid_(syscall(__NR_getpid)) {} 246 DCHECK_EQ(syscall(__NR_getpid), current_pid_); 250 // Sanity check that we're only called with valid syscall numbers. 254 DCHECK_EQ(syscall(__NR_getpid), current_pid_);
|
/external/chromium_org/sandbox/win/src/ |
H A D | service_resolver_64.cc | 26 // 08 syscall 33 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntry 49 // 1c 0f05 syscall 58 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntryW8 78 kSyscall == service->syscall && kRetNp == service->ret);
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/ |
H A D | _hpux.h | 92 #include <syscall.h> 245 #define _MD_SELECT(nfds,r,w,e,tv) syscall(SYS_select,nfds,r,w,e,tv) 248 #define _MD_POLL(fds,nfds,timeout) syscall(SYS_poll,fds,nfds,timeout)
|
H A D | _openbsd.h | 38 #include <sys/syscall.h> 227 #define _MD_SELECT(nfds,r,w,e,tv) syscall(SYS_select,nfds,r,w,e,tv) 229 #define _MD_POLL(fds,nfds,timeout) syscall(SYS_poll,fds,nfds,timeout)
|
/external/llvm/test/MC/Mips/ |
H A D | mips-control-instructions.s | 9 # CHECK32: syscall # encoding: [0x00,0x00,0x00,0x0c] 10 # CHECK32: syscall 13396 # encoding: [0x00,0x0d,0x15,0x0c] 42 # CHECK64: syscall # encoding: [0x00,0x00,0x00,0x0c] 43 # CHECK64: syscall 13396 # encoding: [0x00,0x0d,0x15,0x0c] 75 syscall 76 syscall 0x3454
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | perf.h | 112 #include <sys/syscall.h> 170 fd = syscall(__NR_perf_event_open, attr, pid, cpu,
|
/external/ltrace/sysdeps/linux-gnu/x86/ |
H A D | trace.c | 75 /* Returns 1 if syscall, 2 if sysret, 0 otherwise. 95 ret = elem->c_un.syscall; 102 && elem->c_un.syscall == *sysnum)
|
/external/valgrind/main/none/tests/linux/ |
H A D | mremap2.c | 11 #include <syscall.h> 146 syscall(__NR_mremap, src, 20*PAGE, newsize, flags, dst, 0 );
|
/external/chromium_org/base/threading/ |
H A D | platform_thread_freebsd.cc | 20 #include <sys/syscall.h>
|
H A D | platform_thread_linux.cc | 21 #include <sys/syscall.h>
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | die.cc | 11 #include <sys/syscall.h> 18 #include "sandbox/linux/seccomp-bpf/syscall.h"
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
H A D | malloc_hook_mmap_linux.h | 34 // syscall stubs. Unfortunately libc only exports the stubs via weak symbols 43 #include <syscall.h> 49 // 32b has a mmap2() syscall, 64b does not. 85 result = (void *)syscall(SYS_mmap2, 105 // Old syscall interface cannot handle six args, so pass in an array 108 result = (void *)syscall(SYS_mmap, args); 227 result = syscall(SYS_munmap, start, length);
|
/external/chromium_org/tools/traceline/traceline/ |
H A D | main.cc | 667 cb.stosd(); // eax is the syscall number 717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ] 1133 int syscall = IntAt(pos); local 1135 "'syscall': 0x%x,\n", syscall); 1150 if (syscalls.count(syscall) == 1) { 1151 std::string sname = syscalls[syscall];
|
/external/compiler-rt/lib/msandr/ |
H A D | msandr.cc | 40 #include <sys/syscall.h> /* for SYS_mmap */ 689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 691 res = drsys_syscall_name(syscall, &name); 694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!" 702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 704 res = drsys_syscall_name(syscall, &name); 706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n", 719 drsys_syscall_t *syscall; local 726 res = drsys_cur_syscall(drcontext, &syscall); 729 res = drsys_syscall_number(syscall, 764 drsys_syscall_t *syscall; local [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_platform_mac.cc | 32 #include <sys/syscall.h>
|
/external/e2fsprogs/lib/e2p/ |
H A D | fgetflags.c | 88 save_errno = syscall(SYS_fsctl, name, EXT2_IOC_GETFLAGS, &f, 0);
|
H A D | fsetflags.c | 93 return syscall(SYS_fsctl, name, EXT2_IOC_SETFLAGS, &f, 0);
|
/external/jemalloc/include/jemalloc/internal/ |
H A D | jemalloc_internal_decls.h | 19 # include <sys/syscall.h>
|
/external/ltrace/sysdeps/linux-gnu/aarch64/ |
H A D | trace.c | 39 /* The syscall instruction is: 76 && proc->callstack[d1].c_un.syscall == *sysnum)
|
/external/ltrace/sysdeps/linux-gnu/alpha/ |
H A D | trace.c | 47 /* Returns 1 if syscall, 2 if sysret, 0 otherwise. 63 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/valgrind/main/drd/tests/ |
H A D | sigalrm.c | 23 return syscall(__NR_gettid);
|
/external/valgrind/main/exp-bbv/tests/amd64-linux/ |
H A D | ll.S | 14 # offsets into the results returned by the uname syscall 22 # offset into the results returned by the sysinfo syscall 134 # push $SYSCALL_UNAME # uname syscall 137 # syscall # do syscall 184 # syscall # syscall. fd in eax. 197 # syscall 201 # syscall 309 # push $SYSCALL_SYSINFO # sysinfo() syscall [all...] |
/external/valgrind/main/exp-bbv/tests/ppc32-linux/ |
H A D | ll.S | 11 # offsets into the results returned by the uname syscall 159 # li 0,SYSCALL_UNAME # uname syscall 162 # sc # do syscall 200 # sc # syscall. fd in r0. 257 # li 0,SYSCALL_SYSINFO # sysinfo() syscall 310 li 0,SYSCALL_EXIT # put the exit syscall number in eax 436 li 0,SYSCALL_WRITE # write syscall 446 sc # syscall
|