/bionic/libc/arch-arm/bionic/ |
syscall.S | 31 ENTRY(syscall) function 51 END(syscall)
|
/bionic/libc/arch-arm64/bionic/ |
syscall.S | 31 ENTRY(syscall) function 32 /* Move syscall No. from x0 to x8 */ 34 /* Move syscall parameters from x1 thru x6 to x0 thru x5 */ 43 /* check if syscall returned successfully */ 49 END(syscall)
|
/bionic/libc/arch-x86/bionic/ |
syscall.S | 2 * Generic syscall call. 15 ENTRY(syscall) function 23 # (Not all will be valid, depending on the syscall.) 50 END(syscall)
|
/bionic/libc/arch-x86_64/bionic/ |
syscall.S | 30 * Generic syscall call. 36 * %rcx: arg3 - syscall expects it at %r10 43 ENTRY(syscall) function 45 # (Not all will be valid, depending on the syscall.) 55 syscall 63 END(syscall)
|
/bionic/libc/arch-mips/bionic/ |
syscall.S | 33 * syscall has up to 6 arguments, so we need space for the extra two arguments. 37 ENTRY(syscall) function 50 syscall 61 END(syscall)
|
/development/ndk/sources/android/libportable/arch-mips/ |
syscall.c | 40 * Minimal syscall support for LTP testing. 47 * syscall() are also processed. For example, LTP only calls open() 48 * directly and never does a syscall(__NR_open, ...). 52 extern int REAL(syscall)(int, ...); 56 int WRAP(syscall)(int portable_number, ...) function 463 ALOGV("%s: Calling syscall(native_number:%d:'sync_file_range', fd:%d, " 469 ret = REAL(syscall)(native_number, fd, align_fill, offset_low, offset_high, 599 * o map the syscall into the equivalent library call: 600 * eg syscall(__NR_gettimeofday_portable, struct timeval *tv, struct timezone *tz) => 613 ALOGV("%s: Calling syscall(%d, %d, %d, %d, %d, %d, %d, %d, %d);", __func__ [all...] |
/external/chromium_org/sandbox/win/src/ |
service_resolver_64.cc | 26 // 08 syscall 33 USHORT syscall; // = 0F 05 member in struct:__anon15254::ServiceEntry 49 // 1c 0f05 syscall 58 USHORT syscall; // = 0F 05 member in struct:__anon15254::ServiceEntryW8 78 kSyscall == service->syscall && kRetNp == service->ret);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
sigsys_handlers.cc | 9 #include <sys/syscall.h> 17 #include "sandbox/linux/seccomp-bpf/syscall.h" 57 // Invalid syscall values are truncated to zero. 59 // syscall number is the same as offset from base. 62 // Mips), we are truncating valid syscall values to offset from base. 65 // On MIPS syscall numbers are in different range than on x86 and ARM. 66 // Valid MIPS O32 ABI syscall __NR_syscall will be truncated to zero for 94 ":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall 4000 + "; 97 __FILE__":**CRASHING**:" SECCOMP_MESSAGE_COMMON_CONTENT " in syscall "; 110 uint32_t syscall = SyscallNumberToOffsetFromBase(args.nr) local [all...] |
/external/ltrace/ |
proc.h | 69 int syscall; member in union:callstack_element::__anon31245
|
handle_event.c | 147 debug(1, "[%d] event: syscall (%s [%d])", 481 struct library_symbol syscall, *libsym = NULL; local 483 const char *name = sysname(proc, elem->c_un.syscall); 484 if (init_syscall_symbol(&syscall, name) >= 0) 485 libsym = &syscall; 495 library_symbol_destroy(&syscall); 531 struct library_symbol syscall; local 532 if (init_syscall_symbol(&syscall, name) >= 0) { 535 output_left(tof, proc, &syscall); 537 summary_account_call(&syscall, *spent) [all...] |
/external/chromium_org/sandbox/win/wow_helper/ |
service64_resolver.cc | 43 // syscall 50 USHORT syscall; // = 0F 05 member in struct:__anon15272::ServiceEntry 269 kSyscall != function_code.syscall || kRetNp != function_code.ret)
|
/external/compiler-rt/lib/msandr/ |
msandr.cc | 40 #include <sys/syscall.h> /* for SYS_mmap */ 689 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 691 res = drsys_syscall_name(syscall, &name); 694 dr_printf("SANITY: syscall '%s' arg %d writes %llu bytes memory?!" 702 drsys_syscall_t *syscall = (drsys_syscall_t *)user_data; local 704 res = drsys_syscall_name(syscall, &name); 706 dr_printf("drsyscall: syscall '%s' arg %d wrote range [%p, %p)\n", 719 drsys_syscall_t *syscall; local 726 res = drsys_cur_syscall(drcontext, &syscall); 729 res = drsys_syscall_number(syscall, &sysnum_full) 764 drsys_syscall_t *syscall; local [all...] |
/external/chromium_org/tools/traceline/traceline/ |
main.cc | 667 cb.stosd(); // eax is the syscall number 717 // [ syscall num ] [ saved edi ] [ real rets ] [ args ] [ retval ] [ ts ] 1133 int syscall = IntAt(pos); local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/ |
builtin-trace.c | 362 struct syscall { struct 427 struct syscall *table; 527 static int syscall__set_arg_fmts(struct syscall *sc) 550 struct syscall *sc; 557 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc)); 605 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size, 646 static struct syscall *trace__syscall_info(struct trace *trace, 666 fprintf(trace->output, "Invalid syscall %d id, skipping (%s, %" PRIu64 ") ...\n", 683 fprintf(trace->output, "Problems reading syscall %d", id); 698 struct syscall *sc = trace__syscall_info(trace, evsel, sample) [all...] |
/external/robolectric/lib/main/ |
sqlite-jdbc-3.7.2.jar | |