/prebuilts/ndk/9/platforms/android-15/arch-x86/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-16/arch-arm/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-16/arch-mips/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-16/arch-x86/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-17/arch-arm/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-17/arch-mips/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-17/arch-x86/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-18/arch-arm/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-18/arch-mips/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-18/arch-x86/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/sys/ |
wait.h | 37 #include <sys/syscall.h> 56 return (pid_t)syscall(__NR_wait4, pid, status, options, rusage);
|
/system/core/libcutils/ |
android_reboot.c | 19 #include <sys/syscall.h> 73 * no way to force the remount with the mount(2) syscall. The magic sysrq 124 ret = syscall(__NR_reboot, LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2,
|
/cts/tests/tests/security/jni/ |
android_security_cts_NativeCodeTest.cpp | 24 #include <sys/syscall.h> 53 int fd = syscall(__NR_perf_event_open, attr, 0, -1, -1, 0); 85 fd[0]=syscall(__NR_perf_event_open, &pe[0], 0, 0, -1, 0); 86 fd[1]=syscall(__NR_perf_event_open, &pe[1], 0, 0, fd[0], 0); 202 int result = syscall(__NR__sysctl, &args); 214 return (void*) syscall(__NR_mmap2, addr, len, prot, flags, fd, offset); 262 return syscall(__NR_futex, uaddr, op, val, ts, uaddr2, val3); 266 * Test for vulnerability to CVE-2014-3153, a bug in the futex() syscall that can
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy_unittest.cc | 15 #include <sys/syscall.h> 112 return syscall(__NR_clone, CLONE_PARENT_SETTID | SIGCHLD); 126 return syscall(__NR_clone, 149 pid_t pid = syscall(__NR_clone, CLONE_THREAD | SIGCHLD); 223 syscall(sysno, 0, 0, 0, 0, 0, 0); \ 253 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI, 0, NULL, NULL, 0); 261 syscall(__NR_futex, NULL, FUTEX_CMP_REQUEUE_PI_PRIVATE, 0, NULL, NULL, 0);
|
/external/chromium_org/sandbox/linux/services/ |
unix_domain_socket_unittest.cc | 9 #include <sys/syscall.h> 147 const pid_t pid = syscall(__NR_clone, CLONE_NEWPID | SIGCHLD, 0, 0, 0); 154 CHECK_EQ(1, syscall(__NR_getpid)); 181 const pid_t pid = syscall(__NR_clone, CLONE_NEWPID | SIGCHLD, 0, 0, 0); 187 const pid_t pid2 = syscall(__NR_clone, CLONE_NEWPID | SIGCHLD, 0, 0, 0); 198 CHECK_EQ(1, syscall(__NR_getpid)); 247 const pid_t pid = syscall(__NR_clone, CLONE_NEWPID | SIGCHLD, 0, 0, 0);
|
/external/chromium_org/base/ |
os_compat_android.cc | 11 #include <sys/syscall.h> 26 return syscall(__NR_utimensat, fd, NULL, NULL, 0); 40 return syscall(__NR_utimensat, fd, NULL, ts, 0);
|
/external/valgrind/main/coregrind/m_syswrap/ |
syscall-amd64-linux.S | 3 /*--- Support for doing system calls. syscall-amd64-linux.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of %eip in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in guest_state->guest_RAX. The syscall result 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a -ve error code if one of th [all...] |
syscall-mips32-linux.S | 3 /*--- Support for doing system calls. syscall-mips32-linux.S ---*/ 40 Perform a syscall for the client. This will run a syscall 43 The structure of this function is such that, if the syscall is 46 the syscall by examining the value of IP in the signal 48 thing to precisely emulate the kernel's signal/syscall 51 The syscall number is taken from the argument, even though it 52 should also be in regs->v0. The syscall result is written 55 Returns 0 if the syscall was successfully called (even if the 56 syscall itself failed), or a nonzero error code in the lowes [all...] |
/external/valgrind/main/exp-bbv/tests/x86-linux/ |
clone_test.S | 23 mov $120,%eax # clone syscall 25 # Note, clone syscall is different than the glibc implementation 91 mov $1,%eax # put exit syscall number (60) in rax
|
/art/runtime/arch/x86/ |
thread_x86.cc | 19 #include <sys/syscall.h> 87 syscall(__NR_modify_ldt, 0, &ldt[0], ldt_size); 108 CHECK_EQ(0, syscall(__NR_modify_ldt, 1, &ldt_entry, sizeof(ldt_entry))); 171 syscall(__NR_modify_ldt, 1, &ldt_entry, sizeof(ldt_entry));
|
/bionic/libc/arch-mips/bionic/ |
__bionic_clone.S | 48 syscall
|
/bionic/libc/arch-mips64/bionic/ |
vfork.S | 59 syscall
|
/cts/tests/tests/drm/jni/ |
android_drm_cts_NativeCodeTest.cpp | 20 #include <sys/syscall.h>
|