OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:sysnum
(Results
1 - 7
of
7
) sorted by null
/external/valgrind/main/include/
pub_tool_vkiscnums.h
42
extern Char* VG_(sysnum_string) (Word
sysnum
, SizeT n_buf, Char* buf);
46
extern Char* VG_(sysnum_string_extra)(Word
sysnum
, SizeT n_buf, Char* buf);
50
#define VG_SYSNUM_STRING(
sysnum
) \
51
({ Char qq_zz_buf[32]; VG_(sysnum_string)(
sysnum
, 32, qq_zz_buf); })
52
#define VG_SYSNUM_STRING_EXTRA(
sysnum
) \
53
({ Char qq_zz_buf[64]; VG_(sysnum_string_extra)(
sysnum
, 64, qq_zz_buf); })
/external/valgrind/main/coregrind/
m_vkiscnums.c
49
Char* VG_(sysnum_string)(Word
sysnum
, SizeT n_buf, Char* buf)
51
VG_(snprintf)(buf, n_buf, "%3ld",
sysnum
);
55
Char* VG_(sysnum_string_extra)(Word
sysnum
, SizeT n_buf, Char* buf)
57
return VG_(sysnum_string)(
sysnum
, n_buf, buf);
64
Char* VG_(sysnum_string)(Word
sysnum
, SizeT n_buf, Char* buf)
67
switch (VG_DARWIN_SYSNO_CLASS(
sysnum
)) {
75
classname, VG_DARWIN_SYSNO_INDEX(
sysnum
));
79
Char* VG_(sysnum_string_extra)(Word
sysnum
, SizeT n_buf, Char* buf)
81
return VG_(sysnum_string)(
sysnum
, n_buf, buf);
/external/chromium_org/sandbox/linux/seccomp-bpf/
sandbox_bpf.cc
66
ErrorCode ProbeEvaluator(Sandbox *, int
sysnum
, void *) __attribute__((const));
67
ErrorCode ProbeEvaluator(Sandbox *, int
sysnum
, void *) {
68
switch (
sysnum
) {
87
ErrorCode AllowAllEvaluator(Sandbox *, int
sysnum
, void *) {
88
if (!Sandbox::IsValidSyscallNumber(
sysnum
)) {
186
ErrorCode RedirectToUserspaceEvalWrapper(Sandbox *sandbox, int
sysnum
,
195
ErrorCode err = evaluator.first(sandbox,
sysnum
, evaluator.second);
241
bool Sandbox::IsValidSyscallNumber(int
sysnum
) {
242
return SyscallIterator::IsValid(
sysnum
);
465
uint32_t
sysnum
= iter.Next()
local
720
uint32_t
sysnum
= iter.Next();
local
[
all
...]
verifier.cc
373
uint32_t
sysnum
= iter.Next();
local
381
struct arch_seccomp_data data = { static_cast<int>(
sysnum
),
385
if (!(
sysnum
& 0x40000000u)) {
389
if (
sysnum
& 0x40000000u) {
394
ErrorCode code = evaluate_syscall(sandbox,
sysnum
, aux);
sandbox_bpf.h
55
// ErrorCode (Sandbox *sb, int
sysnum
, void *aux);
84
static bool IsValidSyscallNumber(int
sysnum
);
/external/compiler-rt/lib/msandr/
msandr.cc
521
bool event_filter_syscall(void *drcontext, int
sysnum
) {
566
bool event_pre_syscall(void *drcontext, int
sysnum
) {
579
CHECK(
sysnum
== sysnum_full.number);
611
void event_post_syscall(void *drcontext, int
sysnum
) {
622
CHECK(
sysnum
== sysnum_full.number);
644
if (success && (
sysnum
== SYS_mmap IF_NOT_X64(||
sysnum
== SYS_mmap2))) {
/sdk/emulator/qtools/
armdis.cpp
612
uint32_t
sysnum
= insn & 0x00ffffff;
local
614
sprintf(ptr, "swi%s 0x%x", cond_to_str(cond),
sysnum
);
Completed in 218 milliseconds