Searched defs:syscall (Results 1 - 9 of 9) sorted by relevance

/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
H A Dsigsys_handlers.cc9 #include <sys/syscall.h>
17 #include "sandbox/linux/seccomp-bpf/syscall.h"
57 // Invalid syscall values are truncated to zero.
59 // syscall number is the same as offset from base.
62 // Mips), we are truncating valid syscall values to offset from base.
65 // On MIPS syscall numbers are in different range than on x86 and ARM.
66 // Valid MIPS O32 ABI syscall __NR_syscall will be truncated to zero for
94 ":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall 4000 + ";
97 __FILE__":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall ";
110 uint32_t syscall local
[all...]
/external/chromium_org/sandbox/win/src/
H A Dservice_resolver_64.cc26 // 08 syscall
33 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntry
49 // 1c 0f05 syscall
58 USHORT syscall; // = 0F 05 member in struct:__anon10629::ServiceEntryW8
78 kSyscall == service->syscall && kRetNp == service->ret);
/external/ltrace/
H A Dproc.h69 int syscall; member in union:callstack_element::__anon26634
H A Dhandle_event.c147 debug(1, "[%d] event: syscall (%s [%d])",
481 struct library_symbol syscall, *libsym = NULL; local
483 const char *name = sysname(proc, elem->c_un.syscall);
484 if (init_syscall_symbol(&syscall, name) >= 0)
485 libsym = &syscall;
495 library_symbol_destroy(&syscall);
531 struct library_symbol syscall; local
532 if (init_syscall_symbol(&syscall, name) >= 0) {
535 output_left(tof, proc, &syscall);
537 summary_account_call(&syscall, *spen
[all...]
/external/chromium_org/sandbox/win/wow_helper/
H A Dservice64_resolver.cc43 // syscall
50 USHORT syscall; // = 0F 05 member in struct:__anon10647::ServiceEntry
269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
/external/compiler-rt/lib/msandr/
H A Dmsandr.cc40 #include <sys/syscall.h> /* for SYS_mmap */
689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
691 res = drsys_syscall_name(syscall, &name);
694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!"
702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
704 res = drsys_syscall_name(syscall, &name);
706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n",
719 drsys_syscall_t *syscall; local
726 res = drsys_cur_syscall(drcontext, &syscall);
729 res = drsys_syscall_number(syscall,
764 drsys_syscall_t *syscall; local
[all...]
/external/chromium_org/tools/traceline/traceline/
H A Dmain.cc667 cb.stosd(); // eax is the syscall number
717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ]
1133 int syscall = IntAt(pos); local
1135 "'syscall': 0x%x,\n", syscall);
1150 if (syscalls.count(syscall) == 1) {
1151 std::string sname = syscalls[syscall];
/external/linux-tools-perf/perf-3.12.0/tools/perf/
H A Dbuiltin-trace.c362 struct syscall { struct
427 struct syscall *table;
527 static int syscall__set_arg_fmts(struct syscall *sc)
550 struct syscall *sc;
557 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc));
605 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size,
646 static struct syscall *trace__syscall_info(struct trace *trace,
666 fprintf(trace->output, "Invalid syscall %d id, skipping (%s, %" PRIu64 ") ...\n",
683 fprintf(trace->output, "Problems reading syscall %d", id);
698 struct syscall *s
[all...]
/external/robolectric/lib/main/
H A Dsqlite-jdbc-3.7.2.jarMETA-INF/ META-INF/MANIFEST.MF META-INF/maven/ META-INF/maven/org. ...

Completed in 248 milliseconds