/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | sigsys_handlers.cc | 9 #include <sys/syscall.h> 17 #include "sandbox/linux/seccomp-bpf/syscall.h" 57 // Invalid syscall values are truncated to zero. 59 // syscall number is the same as offset from base. 62 // Mips), we are truncating valid syscall values to offset from base. 65 // On MIPS syscall numbers are in different range than on x86 and ARM. 66 // Valid MIPS O32 ABI syscall __NR_syscall will be truncated to zero for 94 ":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall 4000 + "; 97 __FILE__":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall "; 110 uint32_t syscall local [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | service_resolver_64.cc | 26 // 08 syscall 33 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntry 49 // 1c 0f05 syscall 58 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntryW8 78 kSyscall == service->syscall && kRetNp == service->ret);
|
/external/ltrace/ |
H A D | proc.h | 69 int syscall; member in union:callstack_element::__anon26634
|
H A D | handle_event.c | 147 debug(1, "[%d] event: syscall (%s [%d])", 481 struct library_symbol syscall, *libsym = NULL; local 483 const char *name = sysname(proc, elem->c_un.syscall); 484 if (init_syscall_symbol(&syscall, name) >= 0) 485 libsym = &syscall; 495 library_symbol_destroy(&syscall); 531 struct library_symbol syscall; local 532 if (init_syscall_symbol(&syscall, name) >= 0) { 535 output_left(tof, proc, &syscall); 537 summary_account_call(&syscall, *spen [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
H A D | service64_resolver.cc | 43 // syscall 50 USHORT syscall; // = 0F 05 member in struct:__anon10647::ServiceEntry 269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
|
/external/compiler-rt/lib/msandr/ |
H A D | msandr.cc | 40 #include <sys/syscall.h> /* for SYS_mmap */ 689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 691 res = drsys_syscall_name(syscall, &name); 694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!" 702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 704 res = drsys_syscall_name(syscall, &name); 706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n", 719 drsys_syscall_t *syscall; local 726 res = drsys_cur_syscall(drcontext, &syscall); 729 res = drsys_syscall_number(syscall, 764 drsys_syscall_t *syscall; local [all...] |
/external/chromium_org/tools/traceline/traceline/ |
H A D | main.cc | 667 cb.stosd(); // eax is the syscall number 717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ] 1133 int syscall = IntAt(pos); local 1135 "'syscall': 0x%x,\n", syscall); 1150 if (syscalls.count(syscall) == 1) { 1151 std::string sname = syscalls[syscall];
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
H A D | builtin-trace.c | 362 struct syscall { struct 427 struct syscall *table; 527 static int syscall__set_arg_fmts(struct syscall *sc) 550 struct syscall *sc; 557 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc)); 605 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size, 646 static struct syscall *trace__syscall_info(struct trace *trace, 666 fprintf(trace->output, "Invalid syscall %d id, skipping (%s, %" PRIu64 ") ...\n", 683 fprintf(trace->output, "Problems reading syscall %d", id); 698 struct syscall *s [all...] |
/external/robolectric/lib/main/ |
H A D | sqlite-jdbc-3.7.2.jar | META-INF/ META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org. ... |