/external/chromium/third_party/libevent/ |
epoll_sub.c | 31 #include <sys/syscall.h> 38 return (syscall(__NR_epoll_create, size)); 45 return (syscall(__NR_epoll_ctl, epfd, op, fd, event)); 51 return (syscall(__NR_epoll_wait, epfd, events, maxevents, timeout));
|
/external/valgrind/main/exp-ptrcheck/tests/ |
pth_create.c | 8 // from the core, rather than a syscall (ie. part == Vg_CorePart instead of
|
/external/valgrind/main/memcheck/tests/ |
fwrite.stderr.exp | 0 Syscall param write(buf) points to uninitialised byte(s)
|
sigprocmask.c | 5 # include <sys/syscall.h> 37 syscall(__NR_sigprocmask, SIG_SETMASK, os, NULL); 45 syscall(__NR_sigprocmask, SIG_BLOCK, s, os); 53 syscall(__NR_sigprocmask, SIG_BLOCK, s, os);
|
filter_stderr | 27 # syscall name. 30 # appears in some of the syscall parameter names (eg "act->sa_handler"). 31 perl -p -0 -e 's/(Syscall param[^\n<]*\n)( (at|by)[^\n]*\n)+/$1 ...\n/gs' |
|
erringfds.stderr.exp | 2 Warning: invalid file descriptor -1 in syscall read()
|
/external/valgrind/main/memcheck/tests/darwin/ |
aio.stderr.exp | 2 Warning: invalid file descriptor -1 in syscall aio_read() 3 Syscall param aio_read(aiocbp->aio_buf) points to unaddressable byte(s) 10 Syscall param aio_write(aiocbp->aio_buf) points to unaddressable byte(s)
|
/external/valgrind/main/none/tests/amd64/ |
bug156404-amd64.c | 3 extended down to the lowest valid address when a syscall happens. 11 #include <sys/syscall.h> 28 "\tmovl $"__NR_READLINK",%eax\n" // syscall number
|
/external/valgrind/main/coregrind/m_syswrap/ |
syscall-x86-linux.S | 3 /*--- Support for doing system calls. syscall-x86-linux.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of %eip in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in regs->m_eax. The syscall result is written 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a nonzero error code in the lowes [all...] |
syscall-ppc32-aix5.S | 3 /*--- Support for doing system calls. syscall-ppc32-aix5.S ---*/ 14 in syscall-ppc32-linux.S. 45 Perform a syscall for the client. This will run a syscall 48 The structure of this function is such that, if the syscall is 51 the syscall by examining the value of NIP in the signal 53 thing to precisely emulate the kernel's signal/syscall 56 The syscall number is taken from the argument, even though it 57 should also be in R2 in guest_state. The syscall result is written 60 Returns 0 if the syscall was successfully called (even if th [all...] |
syscall-ppc64-aix5.S | 3 /*--- Support for doing system calls. syscall-ppc64-aix5.S ---*/ 14 in syscall-ppc32-linux.S. 45 Perform a syscall for the client. This will run a syscall 48 The structure of this function is such that, if the syscall is 51 the syscall by examining the value of NIP in the signal 53 thing to precisely emulate the kernel's signal/syscall 56 The syscall number is taken from the argument, even though it 57 should also be in R2 in guest_state. The syscall result is written 60 Returns 0 if the syscall was successfully called (even if th [all...] |
syscall-ppc32-linux.S | 3 /*--- Support for doing system calls. syscall-ppc32-linux.S ---*/ 39 Perform a syscall for the client. This will run a syscall 42 The structure of this function is such that, if the syscall is 45 the syscall by examining the value of NIP in the signal 47 thing to precisely emulate the kernel's signal/syscall 50 The syscall number is taken from the argument, even though it 51 should also be in regs->m_gpr[0]. The syscall result is written 54 Returns 0 if the syscall was successfully called (even if the 55 syscall itself failed), or a nonzero error code in the lowes [all...] |
syscall-ppc64-linux.S | 3 /*--- Support for doing system calls. syscall-ppc64-linux.S ---*/ 39 Perform a syscall for the client. This will run a syscall 42 The structure of this function is such that, if the syscall is 45 the syscall by examining the value of NIP in the signal 47 thing to precisely emulate the kernel's signal/syscall 50 The syscall number is taken from the argument, even though it 51 should also be in regs->m_gpr[0]. The syscall result is written 54 Returns 0 if the syscall was successfully called (even if the 55 syscall itself failed), or a nonzero error code in the lowes [all...] |
syscall-x86-darwin.S | 3 /*--- Support for doing system calls. syscall-x86-darwin.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of %eip in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in regs->m_eax. The syscall result is written 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a -ve error code if one of th [all...] |
syswrap-main.c | 90 * perform the syscall, usually by passing it along to the kernel 94 syscall-$PLATFORM.S does the tricky bit of passing a syscall to the 99 whenever a client thread wants to do a syscall. The following is a 105 * First, it rounds up the syscall number and args (which is a 122 The pre-wrapper may choose to 'do' the syscall itself, and 125 Success(N) -- syscall is already complete, with success; 128 Fail(N) -- syscall is already complete, with failure; 142 * If the pre-outcome is HandToKernel, the syscall is duly handed 168 The post wrapper is passed the adulterated syscall args (struc [all...] |
syscall-arm-linux.S | 3 /*--- Support for doing system calls. syscall-arm-linux.S ---*/ 39 Perform a syscall for the client. This will run a syscall 42 The structure of this function is such that, if the syscall is 45 the syscall by examining the value of IP in the signal 47 thing to precisely emulate the kernel's signal/syscall 50 The syscall number is taken from the argument, even though it 51 should also be in regs->m_R7. The syscall result is written 54 Returns 0 if the syscall was successfully called (even if the 55 syscall itself failed), or a nonzero error code in the lowes [all...] |
/external/valgrind/main/memcheck/tests/x86-linux/ |
scalar.h | 8 #include <sys/syscall.h> 16 extern long int syscall (long int __sysno, ...) __THROW; 18 // Thorough syscall scalar arg checking. Also serves as thorough checking 19 // for (very) basic syscall use. Generally not trying to do anything 28 #define SY res = syscall
|
scalar.stderr.exp | 13 Syscall param (syscallno) contains uninitialised byte(s) 16 Syscall param read(fd) contains uninitialised byte(s) 19 Syscall param read(buf) contains uninitialised byte(s) 22 Syscall param read(count) contains uninitialised byte(s) 25 Syscall param read(buf) points to unaddressable byte(s) 32 Syscall param write(fd) contains uninitialised byte(s) 35 Syscall param write(buf) contains uninitialised byte(s) 38 Syscall param write(count) contains uninitialised byte(s) 41 Syscall param write(buf) points to unaddressable byte(s) 48 Syscall param open(filename) contains uninitialised byte(s [all...] |
/external/valgrind/main/coregrind/m_mach/ |
mach_traps-amd64-darwin.S | 41 syscall 52 // syscall 62 syscall 72 syscall 82 syscall 92 syscall 102 syscall 112 syscall 122 syscall 132 syscall [all...] |
/external/valgrind/main/coregrind/ |
Makefile.in | 211 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-x86-linux.$(OBJEXT) \ 212 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-amd64-linux.$(OBJEXT) \ 213 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-ppc32-linux.$(OBJEXT) \ 214 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-ppc64-linux.$(OBJEXT) \ 215 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-arm-linux.$(OBJEXT) \ 216 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-ppc32-aix5.$(OBJEXT) \ 217 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-ppc64-aix5.$(OBJEXT) \ 218 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-x86-darwin.$(OBJEXT) \ 219 libcoregrind_@VGCONF_ARCH_PRI@_@VGCONF_OS@_a-syscall-amd64-darwin.$(OBJEXT) \ 298 m_syswrap/syscall-x86-linux.S m_syswrap/syscall-amd64-linux.S [all...] |
m_syscall.c | 38 Building syscall return values. 43 /* Make a SysRes value from a syscall return value. This is 51 Linux uses a negative return value to indicate syscall errors, 59 syscall returns a value in -1 .. -4095 as a valid result so we can 241 UNIX style of syscall. */ 269 /* Incoming args (syscall number + up to 6 args) come on the stack. 272 The syscall number goes in %eax. The args are passed to the syscall in 273 the regs %ebx, %ecx, %edx, %esi, %edi, %ebp, ie. the kernel's syscall 309 /* Incoming args (syscall number + up to 6 args) come in %rdi, %rsi [all...] |
/external/strace/strace/linux/x86_64/ |
gentab.pl | 2 #generate syscall table from a template file (usually the master i386 syscall 50 open(S,$ARGV[1]) || die "cannot open syscall file $ARGV[1]\n";
|
/external/valgrind/main/exp-bbv/tests/x86-linux/ |
clone_test.S | 23 mov $120,%eax # clone syscall 25 # Note, clone syscall is different than the glibc implementation 91 mov $1,%eax # put exit syscall number (60) in rax
|
/bionic/libc/arch-sh/bionic/ |
syscall.S | 31 .type syscall, @function 32 .globl syscall 36 * Current implementation assumes that the all syscall 39 syscall: label
|
/external/valgrind/main/docs/html/ |
dist.readme-missing.html | 29 news?is?that,?in?general,?it's?easy?to?write?the?missing?syscall?or<br> 41 What?are?syscall/ioctl?wrappers???What?do?they?do?<br> 51 Syscall?and?ioctl?wrappers?have?two?jobs:?<br> 53 1.?Tell?a?tool?what's?about?to?happen,?before?the?syscall?takes?place.??A<br> 58 2.?Tell?a?tool?what?just?happened,?after?a?syscall?takes?place.??This?is<br> 68 The?syscall?wrapper?for?time()<br> 89 The?first?thing?we?do?happens?before?the?syscall?occurs,?in?the?PRE()?function.<br> 92 Next,?the?tool?is?told?the?return?type?of?the?syscall,?that?the?syscall?has<br> 93 one?argument,?the?type?of?the?syscall?argument?and?that?the?argument?is?being<br [all...] |