/bionic/libc/arch-arm/bionic/ |
syscall.S | 31 ENTRY(syscall) function 51 END(syscall)
|
/bionic/libc/arch-arm64/bionic/ |
syscall.S | 31 ENTRY(syscall) function 32 /* Move syscall No. from x0 to x8 */ 34 /* Move syscall parameters from x1 thru x6 to x0 thru x5 */ 43 /* check if syscall returned successfully */ 49 END(syscall)
|
/bionic/libc/arch-x86/bionic/ |
syscall.S | 2 * Generic syscall call. 15 ENTRY(syscall) function 23 # (Not all will be valid, depending on the syscall.) 50 END(syscall)
|
/bionic/libc/arch-x86_64/bionic/ |
syscall.S | 30 * Generic syscall call. 36 * %rcx: arg3 - syscall expects it at %r10 43 ENTRY(syscall) function 45 # (Not all will be valid, depending on the syscall.) 55 syscall 63 END(syscall)
|
/bionic/libc/arch-mips/bionic/ |
syscall.S | 33 * syscall has up to 6 arguments, so we need space for the extra two arguments. 37 ENTRY(syscall) function 50 syscall 61 END(syscall)
|
/development/ndk/sources/android/libportable/arch-mips/ |
syscall.c | 40 * Minimal syscall support for LTP testing. 47 * syscall() are also processed. For example, LTP only calls open() 48 * directly and never does a syscall(__NR_open, ...). 52 extern int REAL(syscall)(int, ...); 56 int WRAP(syscall)(int portable_number, ...) function 463 ALOGV("%s: Calling syscall(native_number:%d:'sync_file_range', fd:%d, " 469 ret = REAL(syscall)(native_number, fd, align_fill, offset_low, offset_high, 599 * o map the syscall into the equivalent library call: 600 * eg syscall(__NR_gettimeofday_portable, struct timeval *tv, struct timezone *tz) => 613 ALOGV("%s: Calling syscall(%d, %d, %d, %d, %d, %d, %d, %d, %d);", __func__ [all...] |
/external/chromium_org/sandbox/win/src/ |
service_resolver_64.cc | 26 // 08 syscall 33 USHORT syscall; // = 0F 05 member in struct:__anon14617::ServiceEntry 49 // 1c 0f05 syscall 58 USHORT syscall; // = 0F 05 member in struct:__anon14617::ServiceEntryW8 78 kSyscall == service->syscall && kRetNp == service->ret);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 64 __FILE__":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall "; 76 uint32_t syscall = args.nr; local 77 if (syscall >= 1024) 78 syscall = 0; 79 PrintSyscallError(syscall); 86 syscall |= ((args.args[0] & 0xffUL) << 12); 87 syscall |= ((args.args[1] & 0xffUL) << 20); 88 // Purposefully dereference the syscall as an address so it'll show up very 90 volatile char* addr = reinterpret_cast<volatile char*>(syscall); 92 // In case we hit a mapped address, hit the null page with just the syscall, [all...] |
/external/ltrace/ |
proc.h | 69 int syscall; member in union:callstack_element::__anon30402
|
handle_event.c | 147 debug(1, "[%d] event: syscall (%s [%d])", 481 struct library_symbol syscall, *libsym = NULL; local 483 const char *name = sysname(proc, elem->c_un.syscall); 484 if (init_syscall_symbol(&syscall, name) >= 0) 485 libsym = &syscall; 495 library_symbol_destroy(&syscall); 531 struct library_symbol syscall; local 532 if (init_syscall_symbol(&syscall, name) >= 0) { 535 output_left(tof, proc, &syscall); 537 summary_account_call(&syscall, *spent) [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 43 // syscall 50 USHORT syscall; // = 0F 05 member in struct:__anon14635::ServiceEntry 269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
|
/external/compiler-rt/lib/msandr/ |
msandr.cc | 40 #include <sys/syscall.h> /* for SYS_mmap */ 689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 691 res = drsys_syscall_name(syscall, &name); 694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!" 702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 704 res = drsys_syscall_name(syscall, &name); 706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n", 719 drsys_syscall_t *syscall; local 726 res = drsys_cur_syscall(drcontext, &syscall); 729 res = drsys_syscall_number(syscall, &sysnum_full) 764 drsys_syscall_t *syscall; local [all...] |
/external/chromium_org/tools/traceline/traceline/ |
main.cc | 667 cb.stosd(); // eax is the syscall number 717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ] 1133 int syscall = IntAt(pos); local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
builtin-trace.c | 362 struct syscall { struct 427 struct syscall *table; 527 static int syscall__set_arg_fmts(struct syscall *sc) 550 struct syscall *sc; 557 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc)); 605 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size, 646 static struct syscall *trace__syscall_info(struct trace *trace, 666 fprintf(trace->output, "Invalid syscall %d id, skipping (%s, %" PRIu64 ") ...\n", 683 fprintf(trace->output, "Problems reading syscall %d", id); 698 struct syscall *sc = trace__syscall_info(trace, evsel, sample) [all...] |
/external/robolectric/lib/main/ |
sqlite-jdbc-3.7.2.jar | |