/prebuilt/darwin-x86/toolchain/arm-linux-androideabi-4.4.x/share/gdb/syscalls/ |
gdb-syscalls.dtd | 7 <!-- The root element of a syscall info is <syscalls-info>. --> 9 <!ELEMENT syscalls-info (syscall*)> 11 <!ELEMENT syscall EMPTY> 12 <!ATTLIST syscall
|
/prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/share/gdb/syscalls/ |
gdb-syscalls.dtd | 7 <!-- The root element of a syscall info is <syscalls-info>. --> 9 <!ELEMENT syscalls-info (syscall*)> 11 <!ELEMENT syscall EMPTY> 12 <!ATTLIST syscall
|
/prebuilt/linux-x86/toolchain/arm-linux-androideabi-4.4.x/share/gdb/syscalls/ |
gdb-syscalls.dtd | 7 <!-- The root element of a syscall info is <syscalls-info>. --> 9 <!ELEMENT syscalls-info (syscall*)> 11 <!ELEMENT syscall EMPTY> 12 <!ATTLIST syscall
|
/external/strace/strace/linux/sparc/ |
gen.pl | 7 ($i1, $i2, $i3, $syscall, $syscall_name) = split; 9 $name[$index++] = $syscall; 14 ($i1, $n, $pr, $syscall) = split; 15 $par{$syscall} = $n; 16 $prr{$syscall} = $pr; 22 ($i1, $n, $pr, $syscall) = split; 23 $par{$syscall} = $n; 24 $prr{$syscall} = $pr;
|
/external/libgsm/inc/ |
config.h | 17 #define HAS_FSTAT 1 /* fstat syscall */ 18 #define HAS_FCHMOD 1 /* fchmod syscall */ 19 #define HAS_CHMOD 1 /* chmod syscall */ 20 #define HAS_FCHOWN 1 /* fchown syscall */ 21 #define HAS_CHOWN 1 /* chown syscall */
|
/external/valgrind/main/memcheck/tests/ |
execve.stderr.exp | 0 Syscall param execve(filename) points to unaddressable byte(s) 5 Syscall param execve(argv[i]) points to unaddressable byte(s) 9 Syscall param execve(envp[i]) points to unaddressable byte(s)
|
execve2.stderr.exp | 0 Syscall param execve(filename) points to unaddressable byte(s)
|
buflen_check.stderr.exp | 0 Syscall param socketcall.getsockname(name) points to unaddressable byte(s) 5 Syscall param socketcall.getsockname(namelen_in) points to unaddressable byte(s)
|
writev.stderr.exp | 2 Syscall param writev(vector[...]) points to unaddressable byte(s) 7 Syscall param writev(vector) points to unaddressable byte(s) 12 Syscall param readv(vector) points to unaddressable byte(s)
|
badpoll.stderr.exp | 0 Syscall param poll(ufds.fd) points to uninitialised byte(s) 7 Syscall param poll(ufds.reventss) points to unaddressable byte(s)
|
/external/valgrind/main/memcheck/tests/linux/ |
capget.c | 5 #include <unistd.h> /* syscall() */ 6 #include <sys/syscall.h> /* __NR_capget */ 18 syscall_result = syscall(__NR_capget, &h, &d);
|
Makefile.am | 15 timerfd-syscall timerfd-syscall.stderr.exp \ 26 timerfd-syscall
|
sigqueue.c | 8 #include <syscall.h> 32 syscall(__NR_rt_sigqueueinfo, getpid(), SIGWINCH, si);
|
/external/valgrind/main/memcheck/tests/x86-linux/ |
scalar_supp.c | 3 #include <sys/syscall.h> 14 // - the syscall number itself is undefined (but we know it's 18 syscall(pi[0]+__NR_write, pi[0], pc[0], pi[0]+1);
|
/bionic/libc/arch-x86/bionic/ |
syscall.S | 2 * Generic syscall call. 12 * and make the syscall. 18 .type syscall, @function 19 .globl syscall 22 syscall: label
|
/bionic/libc/ |
README | 25 Bionic provides the gensyscalls.py Python script to automatically generate syscall 26 stubs from the list defined in the file SYSCALLS.TXT. You can thus add a new syscall 30 - add a new line describing your syscall, it should look like: 34 - in the event where you want to differentiate the syscall function from its entry name, 39 - additionally, if the syscall number is different between ARM and x86, use: 43 - a syscall number can be -1 to indicate that the syscall is not implemented on 51 You can also use the 'checksyscalls.py' script to check that all the syscall
|
/external/valgrind/main/ |
README_MISSING_SYSCALL_OR_IOCTL | 6 news is that, in general, it's easy to write the missing syscall or 18 What are syscall/ioctl wrappers? What do they do? 28 Syscall and ioctl wrappers have two jobs: 30 1. Tell a tool what's about to happen, before the syscall takes place. A 35 2. Tell a tool what just happened, after a syscall takes place. This is 45 The syscall wrapper for time() 66 The first thing we do happens before the syscall occurs, in the PRE() function. 69 Next, the tool is told the return type of the syscall, that the syscall has 70 one argument, the type of the syscall argument and that the argument is bein [all...] |
/external/strace/ |
arm-eabi.patch | 4 * syscall.c (get_scno): Handle ARM EABI. 27 Index: strace/syscall.c 29 --- strace.orig/syscall.c 2006-03-30 17:36:14.000000000 -0500 30 +++ strace/syscall.c 2006-03-30 17:44:16.000000000 -0500 36 - fprintf(stderr, "syscall: unknown syscall trap 0x%08lx\n", 40 + /* Handle the EABI syscall convention. We do not 49 + fprintf(stderr, "syscall: unknown syscall trap 0x%08lx\n", 55 - * Fixup the syscall numbe [all...] |
/external/valgrind/main/exp-ptrcheck/tests/ |
syscall.stderr.exp | 2 Warning: invalid file descriptor -1 in syscall write() 3 Syscall param write(buf) is non-contiguous 5 by 0x........: main (syscall.c:32) 10 by 0x........: main (syscall.c:20) 14 Warning: invalid file descriptor -1 in syscall write() 16 Syscall param write(buf) is non-contiguous 18 by 0x........: main (syscall.c:33) 24 by 0x........: main (syscall.c:20) 27 Warning: invalid file descriptor -1 in syscall write() 29 Syscall param write(buf) is non-contiguou [all...] |
/external/valgrind/main/coregrind/m_syswrap/ |
syscall-amd64-linux.S | 3 /*--- Support for doing system calls. syscall-amd64-linux.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of %eip in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in guest_state->guest_RAX. The syscall result 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a -ve error code if one of th [all...] |
syscall-amd64-darwin.S | 3 /*--- Support for doing system calls. syscall-amd64-darwin.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of %eip in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in guest_state->guest_RAX. The syscall result 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a -ve error code if one of th [all...] |
/external/valgrind/main/exp-bbv/tests/x86/ |
million.S | 19 # syscall numbers in /usr/include/sys/syscall.h on OSX 26 inc %eax # put exit syscall number (1) in eax 31 inc %eax # put exit syscall number (1) in eax
|
/external/valgrind/main/exp-bbv/tests/amd64-linux/ |
clone_test.S | 23 mov $56,%rax # clone syscall 25 # Note, clone syscall is different than the glibc implementation 49 syscall 91 mov $60,%rax # put exit syscall number (60) in rax 92 syscall
|
million.S | 20 mov $60,%rax # put exit syscall number (60) in rax 21 syscall
|
/bionic/libc/arch-arm/bionic/ |
syscall.S | 33 .type syscall,#function 34 .globl syscall 41 syscall: label 61 syscall: label
|