HomeSort by relevance Sort by last modified time
    Searched full:syscall (Results 201 - 225 of 3446) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/strace/tests/
signalfd.test 3 # Check signalfd4 syscall decoding.
stat.c 5 #include <sys/syscall.h>
vfork-f.test 3 # Check how strace -f follows vfork syscall.
fcntl.test 9 syscall=${ME_%.test}
10 run_strace -a8 -e$syscall $args > "$OUT"
times-fail.c 7 #include <sys/syscall.h>
12 if (syscall(__NR_times, 0x42) != -1)
  /prebuilts/go/darwin-x86/src/crypto/rand/
eagain.go 11 "syscall"
18 // unixIsEAGAIN reports whether err is a syscall.EAGAIN wrapped in a PathError.
22 if errno, ok := pe.Err.(syscall.Errno); ok && errno == syscall.EAGAIN {
  /prebuilts/go/darwin-x86/src/net/
file_windows.go 9 "syscall"
14 return nil, syscall.EWINDOWS
19 return nil, syscall.EWINDOWS
24 return nil, syscall.EWINDOWS
tcpsockopt_posix.go 11 "syscall"
19 return os.NewSyscallError("setsockopt", syscall.SetsockoptInt(fd.sysfd, syscall.IPPROTO_TCP, syscall.TCP_NODELAY, boolint(noDelay)))
sock_cloexec.go 14 "syscall"
20 s, err := socketFunc(family, sotype|syscall.SOCK_NONBLOCK|syscall.SOCK_CLOEXEC, proto)
31 case syscall.EPROTONOSUPPORT, syscall.EINVAL:
34 // See ../syscall/exec_unix.go for description of ForkLock.
35 syscall.ForkLock.RLock()
38 syscall.CloseOnExec(s)
40 syscall.ForkLock.RUnlock()
44 if err = syscall.SetNonblock(s, true); err != nil
    [all...]
sys_cloexec.go 14 "syscall"
20 // See ../syscall/exec_unix.go for description of ForkLock.
21 syscall.ForkLock.RLock()
24 syscall.CloseOnExec(s)
26 syscall.ForkLock.RUnlock()
30 if err = syscall.SetNonblock(s, true); err != nil {
39 func accept(s int) (int, syscall.Sockaddr, error) {
40 // See ../syscall/exec_unix.go for description of ForkLock.
41 // It is probably okay to hold the lock across syscall.Accept
47 syscall.CloseOnExec(ns
    [all...]
  /prebuilts/go/darwin-x86/src/net/internal/socktest/
main_test.go 13 "syscall"
38 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} {
39 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
52 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} {
53 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
  /prebuilts/go/linux-x86/src/crypto/rand/
eagain.go 11 "syscall"
18 // unixIsEAGAIN reports whether err is a syscall.EAGAIN wrapped in a PathError.
22 if errno, ok := pe.Err.(syscall.Errno); ok && errno == syscall.EAGAIN {
  /prebuilts/go/linux-x86/src/net/
file_windows.go 9 "syscall"
14 return nil, syscall.EWINDOWS
19 return nil, syscall.EWINDOWS
24 return nil, syscall.EWINDOWS
tcpsockopt_posix.go 11 "syscall"
19 return os.NewSyscallError("setsockopt", syscall.SetsockoptInt(fd.sysfd, syscall.IPPROTO_TCP, syscall.TCP_NODELAY, boolint(noDelay)))
sock_cloexec.go 14 "syscall"
20 s, err := socketFunc(family, sotype|syscall.SOCK_NONBLOCK|syscall.SOCK_CLOEXEC, proto)
31 case syscall.EPROTONOSUPPORT, syscall.EINVAL:
34 // See ../syscall/exec_unix.go for description of ForkLock.
35 syscall.ForkLock.RLock()
38 syscall.CloseOnExec(s)
40 syscall.ForkLock.RUnlock()
44 if err = syscall.SetNonblock(s, true); err != nil
    [all...]
sys_cloexec.go 14 "syscall"
20 // See ../syscall/exec_unix.go for description of ForkLock.
21 syscall.ForkLock.RLock()
24 syscall.CloseOnExec(s)
26 syscall.ForkLock.RUnlock()
30 if err = syscall.SetNonblock(s, true); err != nil {
39 func accept(s int) (int, syscall.Sockaddr, error) {
40 // See ../syscall/exec_unix.go for description of ForkLock.
41 // It is probably okay to hold the lock across syscall.Accept
47 syscall.CloseOnExec(ns
    [all...]
  /prebuilts/go/linux-x86/src/net/internal/socktest/
main_test.go 13 "syscall"
38 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} {
39 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
52 for _, family := range []int{syscall.AF_INET, syscall.AF_INET6} {
53 socketFunc(family, syscall.SOCK_STREAM, syscall.IPPROTO_TCP)
  /prebuilts/go/darwin-x86/src/os/
types_windows.go 9 "syscall"
16 sys syscall.Win32FileAttributeData
34 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_DIRECTORY != 0 {
37 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_READONLY != 0 {
42 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_REPARSE_POINT != 0 {
52 // Sys returns syscall.Win32FileAttributeData for file fs.
62 pathp, err := syscall.UTF16PtrFromString(fs.path)
66 h, err := syscall.CreateFile(pathp, 0, 0, nil, syscall.OPEN_EXISTING, syscall.FILE_FLAG_BACKUP_SEMANTICS, 0
    [all...]
  /prebuilts/go/linux-x86/src/os/
types_windows.go 9 "syscall"
16 sys syscall.Win32FileAttributeData
34 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_DIRECTORY != 0 {
37 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_READONLY != 0 {
42 if fs.sys.FileAttributes&syscall.FILE_ATTRIBUTE_REPARSE_POINT != 0 {
52 // Sys returns syscall.Win32FileAttributeData for file fs.
62 pathp, err := syscall.UTF16PtrFromString(fs.path)
66 h, err := syscall.CreateFile(pathp, 0, 0, nil, syscall.OPEN_EXISTING, syscall.FILE_FLAG_BACKUP_SEMANTICS, 0
    [all...]
  /prebuilts/go/darwin-x86/src/os/signal/
signal_test.go 16 "syscall"
36 Notify(c, syscall.SIGHUP)
41 syscall.Kill(syscall.Getpid(), syscall.SIGHUP)
42 waitSig(t, c, syscall.SIGHUP)
50 syscall.Kill(syscall.Getpid(), syscall.SIGWINCH)
51 waitSig(t, c1, syscall.SIGWINCH
    [all...]
  /prebuilts/go/linux-x86/src/os/signal/
signal_test.go 16 "syscall"
36 Notify(c, syscall.SIGHUP)
41 syscall.Kill(syscall.Getpid(), syscall.SIGHUP)
42 waitSig(t, c, syscall.SIGHUP)
50 syscall.Kill(syscall.Getpid(), syscall.SIGWINCH)
51 waitSig(t, c1, syscall.SIGWINCH
    [all...]
  /external/libchrome/sandbox/linux/seccomp-bpf/
syscall_unittest.cc 5 #include "sandbox/linux/seccomp-bpf/syscall.h"
13 #include <sys/syscall.h>
45 TEST(Syscall, InvalidCallReturnsENOSYS) {
46 EXPECT_EQ(-ENOSYS, Syscall::InvalidCall());
49 TEST(Syscall, WellKnownEntryPoint) {
50 // Test that Syscall::Call(-1) is handled specially. Don't do this on ARM,
51 // where syscall(-1) crashes with SIGILL. Not running the test is fine, as we
54 EXPECT_NE(Syscall::Call(-1), syscall(-1));
57 // If possible, test that Syscall::Call(-1) returns the address righ
    [all...]
  /external/iproute2/examples/bpf/
bpf_sys.h 4 #include <sys/syscall.h>
20 return syscall(__NR_bpf, BPF_MAP_LOOKUP_ELEM, &attr, sizeof(attr));
  /external/strace/linux/sparc/
gen.pl 7 ($i1, $i2, $i3, $syscall, $syscall_name) = split;
9 $name[$index++] = $syscall;
14 ($i1, $n, $pr, $syscall) = split;
15 $par{$syscall} = $n;
16 $prr{$syscall} = $pr;
22 ($i1, $n, $pr, $syscall) = split;
23 $par{$syscall} = $n;
24 $prr{$syscall} = $pr;
  /external/valgrind/memcheck/tests/darwin/
mkfifo.c 4 #include <sys/syscall.h>
16 return syscall(SYS_mkfifo, path);

Completed in 1313 milliseconds

1 2 3 4 5 6 7 891011>>