HomeSort by relevance Sort by last modified time
    Searched defs:syscall (Results 1 - 15 of 15) sorted by null

  /bionic/libc/arch-arm/bionic/
syscall.S 31 ENTRY(syscall) function
51 END(syscall)
  /bionic/libc/arch-arm64/bionic/
syscall.S 31 ENTRY(syscall) function
32 /* Move syscall No. from x0 to x8 */
34 /* Move syscall parameters from x1 thru x6 to x0 thru x5 */
43 /* check if syscall returned successfully */
49 END(syscall)
  /bionic/libc/arch-x86/bionic/
syscall.S 2 * Generic syscall call.
15 ENTRY(syscall) function
23 # (Not all will be valid, depending on the syscall.)
50 END(syscall)
  /bionic/libc/arch-x86_64/bionic/
syscall.S 30 * Generic syscall call.
36 * %rcx: arg3 - syscall expects it at %r10
43 ENTRY(syscall) function
45 # (Not all will be valid, depending on the syscall.)
55 syscall
63 END(syscall)
  /bionic/libc/arch-mips/bionic/
syscall.S 33 * syscall has up to 6 arguments, so we need space for the extra two arguments.
37 ENTRY(syscall) function
50 syscall
61 END(syscall)
  /development/ndk/sources/android/libportable/arch-mips/
syscall.c 40 * Minimal syscall support for LTP testing.
47 * syscall() are also processed. For example, LTP only calls open()
48 * directly and never does a syscall(__NR_open, ...).
52 extern int REAL(syscall)(int, ...);
56 int WRAP(syscall)(int portable_number, ...) function
463 ALOGV("%s: Calling syscall(native_number:%d:'sync_file_range', fd:%d, "
469 ret = REAL(syscall)(native_number, fd, align_fill, offset_low, offset_high,
599 * o map the syscall into the equivalent library call:
600 * eg syscall(__NR_gettimeofday_portable, struct timeval *tv, struct timezone *tz) =>
613 ALOGV("%s: Calling syscall(%d, %d, %d, %d, %d, %d, %d, %d, %d);", __func__
    [all...]
  /external/chromium_org/sandbox/win/src/
service_resolver_64.cc 26 // 08 syscall
33 USHORT syscall; // = 0F 05 member in struct:__anon14617::ServiceEntry
49 // 1c 0f05 syscall
58 USHORT syscall; // = 0F 05 member in struct:__anon14617::ServiceEntryW8
78 kSyscall == service->syscall && kRetNp == service->ret);
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
sigsys_handlers.cc 64 __FILE__":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall ";
76 uint32_t syscall = args.nr; local
77 if (syscall >= 1024)
78 syscall = 0;
79 PrintSyscallError(syscall);
86 syscall |= ((args.args[0] & 0xffUL) << 12);
87 syscall |= ((args.args[1] & 0xffUL) << 20);
88 // Purposefully dereference the syscall as an address so it'll show up very
90 volatile char* addr = reinterpret_cast<volatile char*>(syscall);
92 // In case we hit a mapped address, hit the null page with just the syscall,
    [all...]
  /external/ltrace/
proc.h 69 int syscall; member in union:callstack_element::__anon30402
handle_event.c 147 debug(1, "[%d] event: syscall (%s [%d])",
481 struct library_symbol syscall, *libsym = NULL; local
483 const char *name = sysname(proc, elem->c_un.syscall);
484 if (init_syscall_symbol(&syscall, name) >= 0)
485 libsym = &syscall;
495 library_symbol_destroy(&syscall);
531 struct library_symbol syscall; local
532 if (init_syscall_symbol(&syscall, name) >= 0) {
535 output_left(tof, proc, &syscall);
537 summary_account_call(&syscall, *spent)
    [all...]
  /external/chromium_org/sandbox/win/wow_helper/
service64_resolver.cc 43 // syscall
50 USHORT syscall; // = 0F 05 member in struct:__anon14635::ServiceEntry
269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
  /external/compiler-rt/lib/msandr/
msandr.cc 40 #include <sys/syscall.h> /* for SYS_mmap */
689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
691 res = drsys_syscall_name(syscall, &name);
694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!"
702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local
704 res = drsys_syscall_name(syscall, &name);
706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n",
719 drsys_syscall_t *syscall; local
726 res = drsys_cur_syscall(drcontext, &syscall);
729 res = drsys_syscall_number(syscall, &sysnum_full)
764 drsys_syscall_t *syscall; local
    [all...]
  /external/chromium_org/tools/traceline/traceline/
main.cc 667 cb.stosd(); // eax is the syscall number
717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ]
1133 int syscall = IntAt(pos); local
    [all...]
  /external/linux-tools-perf/perf-3.12.0/tools/perf/
builtin-trace.c 362 struct syscall { struct
427 struct syscall *table;
527 static int syscall__set_arg_fmts(struct syscall *sc)
550 struct syscall *sc;
557 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc));
605 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size,
646 static struct syscall *trace__syscall_info(struct trace *trace,
666 fprintf(trace->output, "Invalid syscall %d id, skipping (%s, %" PRIu64 ") ...\n",
683 fprintf(trace->output, "Problems reading syscall %d", id);
698 struct syscall *sc = trace__syscall_info(trace, evsel, sample)
    [all...]
  /external/robolectric/lib/main/
sqlite-jdbc-3.7.2.jar 

Completed in 370 milliseconds