HomeSort by relevance Sort by last modified time
    Searched full:syscall (Results 26 - 50 of 551) sorted by null

12 3 4 5 6 7 8 91011>>

  /prebuilt/darwin-x86/toolchain/arm-linux-androideabi-4.4.x/share/gdb/syscalls/
gdb-syscalls.dtd 7 <!-- The root element of a syscall info is <syscalls-info>. -->
9 <!ELEMENT syscalls-info (syscall*)>
11 <!ELEMENT syscall EMPTY>
12 <!ATTLIST syscall
  /prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/share/gdb/syscalls/
gdb-syscalls.dtd 7 <!-- The root element of a syscall info is <syscalls-info>. -->
9 <!ELEMENT syscalls-info (syscall*)>
11 <!ELEMENT syscall EMPTY>
12 <!ATTLIST syscall
  /prebuilt/linux-x86/toolchain/arm-linux-androideabi-4.4.x/share/gdb/syscalls/
gdb-syscalls.dtd 7 <!-- The root element of a syscall info is <syscalls-info>. -->
9 <!ELEMENT syscalls-info (syscall*)>
11 <!ELEMENT syscall EMPTY>
12 <!ATTLIST syscall
  /external/strace/strace/linux/sparc/
gen.pl 7 ($i1, $i2, $i3, $syscall, $syscall_name) = split;
9 $name[$index++] = $syscall;
14 ($i1, $n, $pr, $syscall) = split;
15 $par{$syscall} = $n;
16 $prr{$syscall} = $pr;
22 ($i1, $n, $pr, $syscall) = split;
23 $par{$syscall} = $n;
24 $prr{$syscall} = $pr;
  /external/libgsm/inc/
config.h 17 #define HAS_FSTAT 1 /* fstat syscall */
18 #define HAS_FCHMOD 1 /* fchmod syscall */
19 #define HAS_CHMOD 1 /* chmod syscall */
20 #define HAS_FCHOWN 1 /* fchown syscall */
21 #define HAS_CHOWN 1 /* chown syscall */
  /external/valgrind/main/memcheck/tests/
execve.stderr.exp 0 Syscall param execve(filename) points to unaddressable byte(s)
5 Syscall param execve(argv[i]) points to unaddressable byte(s)
9 Syscall param execve(envp[i]) points to unaddressable byte(s)
execve2.stderr.exp 0 Syscall param execve(filename) points to unaddressable byte(s)
buflen_check.stderr.exp 0 Syscall param socketcall.getsockname(name) points to unaddressable byte(s)
5 Syscall param socketcall.getsockname(namelen_in) points to unaddressable byte(s)
writev.stderr.exp 2 Syscall param writev(vector[...]) points to unaddressable byte(s)
7 Syscall param writev(vector) points to unaddressable byte(s)
12 Syscall param readv(vector) points to unaddressable byte(s)
badpoll.stderr.exp 0 Syscall param poll(ufds.fd) points to uninitialised byte(s)
7 Syscall param poll(ufds.reventss) points to unaddressable byte(s)
  /external/valgrind/main/memcheck/tests/linux/
capget.c 5 #include <unistd.h> /* syscall() */
6 #include <sys/syscall.h> /* __NR_capget */
18 syscall_result = syscall(__NR_capget, &h, &d);
Makefile.am 15 timerfd-syscall timerfd-syscall.stderr.exp \
26 timerfd-syscall
sigqueue.c 8 #include <syscall.h>
32 syscall(__NR_rt_sigqueueinfo, getpid(), SIGWINCH, si);
  /external/valgrind/main/memcheck/tests/x86-linux/
scalar_supp.c 3 #include <sys/syscall.h>
14 // - the syscall number itself is undefined (but we know it's
18 syscall(pi[0]+__NR_write, pi[0], pc[0], pi[0]+1);
  /bionic/libc/arch-x86/bionic/
syscall.S 2 * Generic syscall call.
12 * and make the syscall.
18 .type syscall, @function
19 .globl syscall
22 syscall: label
  /bionic/libc/
README 25 Bionic provides the gensyscalls.py Python script to automatically generate syscall
26 stubs from the list defined in the file SYSCALLS.TXT. You can thus add a new syscall
30 - add a new line describing your syscall, it should look like:
34 - in the event where you want to differentiate the syscall function from its entry name,
39 - additionally, if the syscall number is different between ARM and x86, use:
43 - a syscall number can be -1 to indicate that the syscall is not implemented on
51 You can also use the 'checksyscalls.py' script to check that all the syscall
  /external/valgrind/main/
README_MISSING_SYSCALL_OR_IOCTL 6 news is that, in general, it's easy to write the missing syscall or
18 What are syscall/ioctl wrappers? What do they do?
28 Syscall and ioctl wrappers have two jobs:
30 1. Tell a tool what's about to happen, before the syscall takes place. A
35 2. Tell a tool what just happened, after a syscall takes place. This is
45 The syscall wrapper for time()
66 The first thing we do happens before the syscall occurs, in the PRE() function.
69 Next, the tool is told the return type of the syscall, that the syscall has
70 one argument, the type of the syscall argument and that the argument is bein
    [all...]
  /external/strace/
arm-eabi.patch 4 * syscall.c (get_scno): Handle ARM EABI.
27 Index: strace/syscall.c
29 --- strace.orig/syscall.c 2006-03-30 17:36:14.000000000 -0500
30 +++ strace/syscall.c 2006-03-30 17:44:16.000000000 -0500
36 - fprintf(stderr, "syscall: unknown syscall trap 0x%08lx\n",
40 + /* Handle the EABI syscall convention. We do not
49 + fprintf(stderr, "syscall: unknown syscall trap 0x%08lx\n",
55 - * Fixup the syscall numbe
    [all...]
  /external/valgrind/main/exp-ptrcheck/tests/
syscall.stderr.exp 2 Warning: invalid file descriptor -1 in syscall write()
3 Syscall param write(buf) is non-contiguous
5 by 0x........: main (syscall.c:32)
10 by 0x........: main (syscall.c:20)
14 Warning: invalid file descriptor -1 in syscall write()
16 Syscall param write(buf) is non-contiguous
18 by 0x........: main (syscall.c:33)
24 by 0x........: main (syscall.c:20)
27 Warning: invalid file descriptor -1 in syscall write()
29 Syscall param write(buf) is non-contiguou
    [all...]
  /external/valgrind/main/coregrind/m_syswrap/
syscall-amd64-linux.S 3 /*--- Support for doing system calls. syscall-amd64-linux.S ---*/
40 Perform a syscall for the client. This will run a syscall
43 The structure of this function is such that, if the syscall is
46 the syscall by examining the value of %eip in the signal
48 thing to precisely emulate the kernel's signal/syscall
51 The syscall number is taken from the argument, even though it
52 should also be in guest_state->guest_RAX. The syscall result
55 Returns 0 if the syscall was successfully called (even if the
56 syscall itself failed), or a -ve error code if one of th
    [all...]
syscall-amd64-darwin.S 3 /*--- Support for doing system calls. syscall-amd64-darwin.S ---*/
40 Perform a syscall for the client. This will run a syscall
43 The structure of this function is such that, if the syscall is
46 the syscall by examining the value of %eip in the signal
48 thing to precisely emulate the kernel's signal/syscall
51 The syscall number is taken from the argument, even though it
52 should also be in guest_state->guest_RAX. The syscall result
55 Returns 0 if the syscall was successfully called (even if the
56 syscall itself failed), or a -ve error code if one of th
    [all...]
  /external/valgrind/main/exp-bbv/tests/x86/
million.S 19 # syscall numbers in /usr/include/sys/syscall.h on OSX
26 inc %eax # put exit syscall number (1) in eax
31 inc %eax # put exit syscall number (1) in eax
  /external/valgrind/main/exp-bbv/tests/amd64-linux/
clone_test.S 23 mov $56,%rax # clone syscall
25 # Note, clone syscall is different than the glibc implementation
49 syscall
91 mov $60,%rax # put exit syscall number (60) in rax
92 syscall
million.S 20 mov $60,%rax # put exit syscall number (60) in rax
21 syscall
  /bionic/libc/arch-arm/bionic/
syscall.S 33 .type syscall,#function
34 .globl syscall
41 syscall: label
61 syscall: label

Completed in 410 milliseconds

12 3 4 5 6 7 8 91011>>