/external/strace/tests/ |
signalfd.test | 3 # Check signalfd4 syscall decoding.
|
stat.c | 5 #include <sys/syscall.h>
|
vfork-f.test | 3 # Check how strace -f follows vfork syscall.
|
fcntl.test | 9 syscall=${ME_%.test} 10 run_strace -a8 -e$syscall $args > "$OUT"
|
times-fail.c | 7 #include <sys/syscall.h> 12 if (syscall(__NR_times, 0x42) != -1)
|
/prebuilts/go/darwin-x86/src/crypto/rand/ |
eagain.go | 11 "syscall" 18 // unixIsEAGAIN reports whether err is a syscall.EAGAIN wrapped in a PathError. 22 if errno, ok := pe.Err.(syscall.Errno); ok && errno == syscall.EAGAIN {
|
/prebuilts/go/darwin-x86/src/net/ |
file_windows.go | 9 "syscall" 14 return nil, syscall.EWINDOWS 19 return nil, syscall.EWINDOWS 24 return nil, syscall.EWINDOWS
|
tcpsockopt_posix.go | 11 "syscall" 19 return os.NewSyscallError("setsockopt", syscall.SetsockoptInt(fd.sysfd, syscall.IPPROTO_TCP, syscall.TCP_NODELAY, boolint(noDelay)))
|
sock_cloexec.go | 14 "syscall" 20 s, err := socketFunc(family, sotype|syscall.SOCK_NONBLOCK|syscall.SOCK_CLOEXEC, proto) 31 case syscall.EPROTONOSUPPORT, syscall.EINVAL: 34 // See ../syscall/exec_unix.go for description of ForkLock. 35 syscall.ForkLock.RLock() 38 syscall.CloseOnExec(s) 40 syscall.ForkLock.RUnlock() 44 if err = syscall.SetNonblock(s, true); err != nil [all...] |
sys_cloexec.go | 14 "syscall" 20 // See ../syscall/exec_unix.go for description of ForkLock. 21 syscall.ForkLock.RLock() 24 syscall.CloseOnExec(s) 26 syscall.ForkLock.RUnlock() 30 if err = syscall.SetNonblock(s, true); err != nil { 39 func accept(s int) (int, syscall.Sockaddr, error) { 40 // See ../syscall/exec_unix.go for description of ForkLock. 41 // It is probably okay to hold the lock across syscall.Accept 47 syscall.CloseOnExec(ns [all...] |
/prebuilts/go/darwin-x86/src/net/internal/socktest/ |
main_test.go | 13 "syscall" 38 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} { 39 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP) 52 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} { 53 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
|
/prebuilts/go/linux-x86/src/crypto/rand/ |
eagain.go | 11 "syscall" 18 // unixIsEAGAIN reports whether err is a syscall.EAGAIN wrapped in a PathError. 22 if errno, ok := pe.Err.(syscall.Errno); ok && errno == syscall.EAGAIN {
|
/prebuilts/go/linux-x86/src/net/ |
file_windows.go | 9 "syscall" 14 return nil, syscall.EWINDOWS 19 return nil, syscall.EWINDOWS 24 return nil, syscall.EWINDOWS
|
tcpsockopt_posix.go | 11 "syscall" 19 return os.NewSyscallError("setsockopt", syscall.SetsockoptInt(fd.sysfd, syscall.IPPROTO_TCP, syscall.TCP_NODELAY, boolint(noDelay)))
|
sock_cloexec.go | 14 "syscall" 20 s, err := socketFunc(family, sotype|syscall.SOCK_NONBLOCK|syscall.SOCK_CLOEXEC, proto) 31 case syscall.EPROTONOSUPPORT, syscall.EINVAL: 34 // See ../syscall/exec_unix.go for description of ForkLock. 35 syscall.ForkLock.RLock() 38 syscall.CloseOnExec(s) 40 syscall.ForkLock.RUnlock() 44 if err = syscall.SetNonblock(s, true); err != nil [all...] |
sys_cloexec.go | 14 "syscall" 20 // See ../syscall/exec_unix.go for description of ForkLock. 21 syscall.ForkLock.RLock() 24 syscall.CloseOnExec(s) 26 syscall.ForkLock.RUnlock() 30 if err = syscall.SetNonblock(s, true); err != nil { 39 func accept(s int) (int, syscall.Sockaddr, error) { 40 // See ../syscall/exec_unix.go for description of ForkLock. 41 // It is probably okay to hold the lock across syscall.Accept 47 syscall.CloseOnExec(ns [all...] |
/prebuilts/go/linux-x86/src/net/internal/socktest/ |
main_test.go | 13 "syscall" 38 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} { 39 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP) 52 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} { 53 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
|
/prebuilts/go/darwin-x86/src/os/ |
types_windows.go | 9 "syscall" 16 sys syscall.Win32FileAttributeData 34 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_DIRECTORY != 0 { 37 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_READONLY != 0 { 42 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_REPARSE_POINT != 0 { 52 // Sys returns syscall.Win32FileAttributeData for file fs. 62 pathp, err := syscall.UTF16PtrFromString(fs.path) 66 h, err := syscall.CreateFile(pathp, 0, 0, nil, syscall.OPEN_EXISTING, syscall.FILE_FLAG_BACKUP_SEMANTICS, 0 [all...] |
/prebuilts/go/linux-x86/src/os/ |
types_windows.go | 9 "syscall" 16 sys syscall.Win32FileAttributeData 34 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_DIRECTORY != 0 { 37 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_READONLY != 0 { 42 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_REPARSE_POINT != 0 { 52 // Sys returns syscall.Win32FileAttributeData for file fs. 62 pathp, err := syscall.UTF16PtrFromString(fs.path) 66 h, err := syscall.CreateFile(pathp, 0, 0, nil, syscall.OPEN_EXISTING, syscall.FILE_FLAG_BACKUP_SEMANTICS, 0 [all...] |
/prebuilts/go/darwin-x86/src/os/signal/ |
signal_test.go | 16 "syscall" 36 Notify(c, syscall.SIGHUP) 41 syscall.Kill(syscall.Getpid(), syscall.SIGHUP) 42 waitSig(t, c, syscall.SIGHUP) 50 syscall.Kill(syscall.Getpid(), syscall.SIGWINCH) 51 waitSig(t, c1, syscall.SIGWINCH [all...] |
/prebuilts/go/linux-x86/src/os/signal/ |
signal_test.go | 16 "syscall" 36 Notify(c, syscall.SIGHUP) 41 syscall.Kill(syscall.Getpid(), syscall.SIGHUP) 42 waitSig(t, c, syscall.SIGHUP) 50 syscall.Kill(syscall.Getpid(), syscall.SIGWINCH) 51 waitSig(t, c1, syscall.SIGWINCH [all...] |
/external/libchrome/sandbox/linux/seccomp-bpf/ |
syscall_unittest.cc | 5 #include "sandbox/linux/seccomp-bpf/syscall.h" 13 #include <sys/syscall.h> 45 TEST(Syscall, InvalidCallReturnsENOSYS) { 46 EXPECT_EQ(-ENOSYS, Syscall::InvalidCall()); 49 TEST(Syscall, WellKnownEntryPoint) { 50 // Test that Syscall::Call(-1) is handled specially. Don't do this on ARM, 51 // where syscall(-1) crashes with SIGILL. Not running the test is fine, as we 54 EXPECT_NE(Syscall::Call(-1), syscall(-1)); 57 // If possible, test that Syscall::Call(-1) returns the address righ [all...] |
/external/iproute2/examples/bpf/ |
bpf_sys.h | 4 #include <sys/syscall.h> 20 return syscall(__NR_bpf, BPF_MAP_LOOKUP_ELEM, &attr, sizeof(attr));
|
/external/strace/linux/sparc/ |
gen.pl | 7 ($i1, $i2, $i3, $syscall, $syscall_name) = split; 9 $name[$index++] = $syscall; 14 ($i1, $n, $pr, $syscall) = split; 15 $par{$syscall} = $n; 16 $prr{$syscall} = $pr; 22 ($i1, $n, $pr, $syscall) = split; 23 $par{$syscall} = $n; 24 $prr{$syscall} = $pr;
|
/external/valgrind/memcheck/tests/darwin/ |
mkfifo.c | 4 #include <sys/syscall.h> 16 return syscall(SYS_mkfifo, path);
|