/external/strace/ |
fadvise.c | 43 printfd(tcp, tcp->u_arg[0]); 44 argn = printllval(tcp, ", %lld", 1); 45 tprintf(", %ld, ", tcp->u_arg[argn++]); 46 printxval(advise, tcp->u_arg[argn], "POSIX_FADV_???"); 55 printfd(tcp, tcp->u_arg[0]); 56 argn = printllval(tcp, ", %lld, ", 1); 57 argn = printllval(tcp, "%lld, ", argn); 59 printxval(advise, tcp->u_arg[1], "POSIX_FADV_???") [all...] |
io.c | 37 if (entering(tcp)) { 38 printfd(tcp, tcp->u_arg[0]); 41 if (syserror(tcp)) 42 printaddr(tcp->u_arg[1]); 44 printstr(tcp, tcp->u_arg[1], tcp->u_rval); 45 tprintf(", %lu", tcp->u_arg[2]); 52 printfd(tcp, tcp->u_arg[0]) [all...] |
syslog.c | 48 int type = tcp->u_arg[0]; 50 if (entering(tcp)) { 60 if (entering(tcp)) 64 printaddr(tcp->u_arg[1]); 65 tprintf(", %lu", tcp->u_arg[2]); 70 if (syserror(tcp)) 71 printaddr(tcp->u_arg[1]); 73 printstr(tcp, tcp->u_arg[1], tcp->u_rval) [all...] |
reboot.c | 9 printflags(bootflags1, tcp->u_arg[0], "LINUX_REBOOT_MAGIC_???"); 11 printflags(bootflags2, tcp->u_arg[1], "LINUX_REBOOT_MAGIC_???"); 13 printflags(bootflags3, tcp->u_arg[2], "LINUX_REBOOT_CMD_???"); 14 if (tcp->u_arg[2] == (long) LINUX_REBOOT_CMD_RESTART2) { 16 printstr(tcp, tcp->u_arg[3], -1);
|
epoll.c | 38 tprintf("%d", (int) tcp->u_arg[0]); 47 printflags(epollflags, tcp->u_arg[0], "EPOLL_???"); 73 printfd(tcp, tcp->u_arg[0]); 75 printxval(epollctls, tcp->u_arg[1], "EPOLL_CTL_???"); 77 printfd(tcp, tcp->u_arg[2]); 80 if (EPOLL_CTL_DEL == tcp->u_arg[1]) 81 printaddr(tcp->u_arg[3]); 82 else if (!umove_or_printaddr(tcp, tcp->u_arg[3], &ev) [all...] |
or1k_atomic.c | 47 printxval(atomic_ops, tcp->u_arg[0], "???"); 48 switch(tcp->u_arg[0]) { 50 tprintf(", 0x%lx, 0x%lx", tcp->u_arg[1], tcp->u_arg[2]); 53 tprintf(", 0x%lx, %#lx, %#lx", tcp->u_arg[1], tcp->u_arg[2], 54 tcp->u_arg[3]); 63 tprintf(", 0x%lx, %#lx", tcp->u_arg[1], tcp->u_arg[2]); 67 tprintf(", 0x%lx", tcp->u_arg[1]) [all...] |
sigaltstack.c | 44 print_stack_t(struct tcb *tcp, unsigned long addr) 48 if (umove_or_printaddr(tcp, addr, &ss)) 60 if (entering(tcp)) { 61 print_stack_t(tcp, tcp->u_arg[0]); 64 print_stack_t(tcp, tcp->u_arg[1]);
|
ipc_sem.c | 56 tprint_sembuf_array(struct tcb *tcp, const long addr, const unsigned long count) 62 if (abbrev(tcp)) 69 else if (!umove_or_printaddr(tcp, addr, &sb)) { 77 if (umove_or_printaddr(tcp, addr + i * sizeof(sb), &sb)) 96 tprintf("%lu, ", tcp->u_arg[0]); 97 if (indirect_ipccall(tcp)) { 98 tprint_sembuf_array(tcp, tcp->u_arg[3], tcp->u_arg[1]); 100 tprint_sembuf_array(tcp, tcp->u_arg[1], tcp->u_arg[2]) [all...] |
prctl.c | 66 print_prctl_args(struct tcb *tcp, const unsigned int first) 70 for (i = first; i < tcp->s_ent->nargs; ++i) 71 tprintf(", %#lx", tcp->u_arg[i]); 78 if (entering(tcp)) 79 printxval(prctl_options, tcp->u_arg[0], "PR_???"); 81 switch (tcp->u_arg[0]) { 93 if (entering(tcp)) 96 printnum_int(tcp, tcp->u_arg[1], "%u"); 100 if (entering(tcp)) [all...] |
sched.c | 39 if (entering(tcp)) { 40 tprintf("%d", (int) tcp->u_arg[0]); 41 } else if (!syserror(tcp)) { 42 tcp->auxstr = xlookup(schedulers, tcp->u_rval); 43 if (tcp->auxstr != NULL) 51 tprintf("%d, ", (int) tcp->u_arg[0]); 52 printxval(schedulers, tcp->u_arg[1], "SCHED_???"); 54 printnum_int(tcp, tcp->u_arg[2], "%d") [all...] |
eventfd.c | 38 do_eventfd(struct tcb *tcp, int flags_arg) 40 tprintf("%u", (unsigned int) tcp->u_arg[0]); 43 printflags(efd_flags, tcp->u_arg[flags_arg], "EFD_???"); 51 return do_eventfd(tcp, -1); 56 return do_eventfd(tcp, 1);
|
fallocate.c | 14 printfd(tcp, tcp->u_arg[0]); 18 printflags(falloc_flags, tcp->u_arg[1], "FALLOC_FL_???"); 22 argn = printllval(tcp, "%llu, ", 2); 25 printllval(tcp, "%llu", argn);
|
ldt.c | 41 print_user_desc(struct tcb *tcp, const long addr) 45 if (umove_or_printaddr(tcp, addr, &desc)) 70 tprintf("%ld, ", tcp->u_arg[0]); 71 if (tcp->u_arg[2] != sizeof(struct user_desc)) 72 printaddr(tcp->u_arg[1]); 74 print_user_desc(tcp, tcp->u_arg[1]); 75 tprintf(", %lu", tcp->u_arg[2]); 82 if (entering(tcp)) { 83 print_user_desc(tcp, tcp->u_arg[0]) [all...] |
lseek.c | 44 * which means that on x32 we need to use tcp->ext_arg[N] to get offset argument. 53 printfd(tcp, tcp->u_arg[0]); 55 /* tcp->ext_arg is not initialized for i386 personality */ 57 offset = tcp->u_arg[1]; 60 offset = tcp->ext_arg[1]; 61 whence = tcp->u_arg[2]; 76 printfd(tcp, tcp->u_arg[0]); 77 offset = tcp->u_arg[1] [all...] |
perf.c | 39 printaddr(tcp->u_arg[0]); 41 (int) tcp->u_arg[1], 42 (int) tcp->u_arg[2], 43 (int) tcp->u_arg[3]); 44 printflags(perf_event_open_flags, tcp->u_arg[4], "PERF_FLAG_???");
|
file_handle.c | 42 const long addr = tcp->u_arg[2]; 44 if (entering(tcp)) { 46 print_dirfd(tcp, tcp->u_arg[0]); 49 printpath(tcp, tcp->u_arg[1]); 53 if (umove_or_printaddr(tcp, addr, &h)) { 57 printaddr(tcp->u_arg[3]); 61 printflags(at_flags, tcp->u_arg[4], "AT_???"); 68 * Abusing tcp->auxstr as a temporary storage [all...] |
/external/strace/linux/alpha/ |
arch_getrval2.c | 2 getrval2(struct tcb *tcp) 5 if (upeek(tcp->pid, 20, &r20) < 0)
|
/external/strace/linux/ia64/ |
get_scno.c | 3 arch_get_scno(struct tcb *tcp) 5 tcp->scno = ia64_ia32mode ? ia64_regs.gr[0] : ia64_regs.gr[15];
|
/external/strace/linux/sh/ |
arch_getrval2.c | 2 getrval2(struct tcb *tcp) 5 if (upeek(tcp->pid, 4*(REG_REG0+1), &val) < 0)
|
/external/strace/linux/aarch64/ |
get_error.c | 6 get_error(struct tcb *tcp, const bool check_errno) 8 if (tcp->currpers == 1) { 9 arm_get_error(tcp, check_errno); 14 tcp->u_rval = -1; 15 tcp->u_error = -aarch64_regs.regs[0]; 17 tcp->u_rval = aarch64_regs.regs[0];
|
/external/parameter-framework/asio-1.10.6/include/asio/ip/ |
tcp.hpp | 2 // ip/tcp.hpp 31 /// Encapsulates the flags needed for TCP. 33 * The asio::ip::tcp class contains flags necessary for TCP sockets. 42 class tcp class in namespace:asio::ip 45 /// The type of a TCP endpoint. 46 typedef basic_endpoint<tcp> endpoint; 48 /// Construct to represent the IPv4 TCP protocol. 49 static tcp v4() 51 return tcp(ASIO_OS_DEF(AF_INET)) 131 explicit tcp(int protocol_family) function in class:asio::ip::tcp [all...] |
/external/strace/linux/sparc/ |
get_syscall_args.c | 3 get_syscall_args(struct tcb *tcp) 5 tcp->u_arg[0] = sparc_regs.u_regs[U_REG_O0 + 0]; 6 tcp->u_arg[1] = sparc_regs.u_regs[U_REG_O0 + 1]; 7 tcp->u_arg[2] = sparc_regs.u_regs[U_REG_O0 + 2]; 8 tcp->u_arg[3] = sparc_regs.u_regs[U_REG_O0 + 3]; 9 tcp->u_arg[4] = sparc_regs.u_regs[U_REG_O0 + 4]; 10 tcp->u_arg[5] = sparc_regs.u_regs[U_REG_O0 + 5];
|
/external/strace/linux/m68k/ |
arch_sigreturn.c | 2 arch_sigreturn(struct tcb *tcp) 6 if (upeek(tcp->pid, 4*PT_USP, &addr) < 0) 9 if (umove(tcp, addr + 2 * sizeof(int), &addr) < 0) 14 if (umove(tcp, addr, &mask[0]) < 0) 19 if (umoven(tcp, addr, sizeof(mask) - sizeof(long), &mask[1]) < 0)
|
/external/strace/linux/sparc64/ |
get_scno.c | 3 arch_get_scno(struct tcb *tcp) 8 trap = ptrace(PTRACE_PEEKTEXT, tcp->pid, (char *)sparc_regs.tpc, 0); 15 update_personality(tcp, 0); 19 update_personality(tcp, 1); 23 tcp->scno = sparc_regs.u_regs[U_REG_G1];
|
/external/strace/linux/x86_64/ |
get_error.c | 2 get_error(struct tcb *tcp, const bool check_errno) 18 tcp->u_rval = -1; 19 tcp->u_error = -rax; 21 tcp->u_rval = rax; 23 /* tcp->u_rval contains a truncated value */ 24 tcp->u_lrval = rax;
|