Home
last modified time | relevance | path

Searched defs:syscall (Results 1 – 25 of 50) sorted by relevance

12

/external/sandboxed-api/sandboxed_api/sandbox2/
Dnotify.h53 virtual void EventSyscallViolation(const Syscall& syscall, in EventSyscallViolation()
60 virtual bool EventSyscallTrap(const Syscall& syscall) { return false; } in EventSyscallTrap()
76 virtual TraceAction EventSyscallTrace(const Syscall& syscall) { in EventSyscallTrace()
88 virtual void EventSyscallReturn(const Syscall& syscall, in EventSyscallReturn()
Dsyscall_test.cc35 Syscall syscall(Syscall::GetHostArch(), __NR_read, args); in TEST() local
58 Syscall syscall; in TEST() local
Dregs.cc132 auto syscall = user_regs_.orig_rax; in ToSyscall() local
140 auto syscall = user_regs_.orig_rax & 0xFFFFFFFF; in ToSyscall() local
Dsyscall_defs.cc79 data_, syscall, [](const SyscallTable::Entry& entry, int syscall) { in GetEntry()
104 int syscall, const uint64_t values[], pid_t pid) const { in GetArgumentsDescription()
Dregs_test.cc86 Syscall syscall = regs.ToSyscall(sapi::host_cpu::Architecture()); in TEST() local
Dmonitor_ptrace.cc652 void PtraceMonitor::ActionProcessSyscall(Regs* regs, const Syscall& syscall) { in ActionProcessSyscall()
695 Regs* regs, const Syscall& syscall, ViolationType violation_type) { in ActionProcessSyscallViolation()
738 Syscall syscall = regs.ToSyscall(syscall_arch); in EventPtraceSeccomp() local
Dnotify_test.cc60 bool EventSyscallTrap(const Syscall& syscall) override { in EventSyscallTrap()
/external/ltp/android/tools/
Dcki_coverage.py203 def ltp_test_special_cases(self, syscall, test): argument
332 def syscall_arch_string(self, syscall, arch): argument
420 def add_syscall(self, cki, syscall, arch): argument
431 def delete_syscall(self, cki, syscall): argument
/external/ltp/metadata/tests/
Dmacro_str.c.json2 "syscall": "syscall(\"foo\")", string
/external/crosvm/jail/seccomp/
Ddetect_duplication.py26 syscall = l.split()[0] variable
/external/rust/crates/mio/src/sys/unix/
Dmod.rs5 macro_rules! syscall { macro
/external/rust/crates/p9/src/
Dlib.rs20 macro_rules! syscall { macro
/external/rust/crates/rustix/src/backend/linux_raw/arch/
Dmod.rs71 macro_rules! syscall { macro
/external/rust/crates/vmm-sys-util/src/
Dlib.rs24 pub mod syscall; module
/external/rust/crates/rustix/src/
Dweak.rs149 macro_rules! syscall { macro
165 macro_rules! syscall { macro
/external/trusty/musl/src/misc/
Dsyscall.c8 long syscall(long n, ...) in syscall() function
/external/musl/src/misc/
Dsyscall.c8 long syscall(long n, ...) in syscall() function
/external/crosvm/base/src/sys/unix/
Dmod.rs34 macro_rules! syscall { macro
/external/bcc/tools/
Dstatsnoop.py128 def try_attach_syscall_probes(syscall): argument
Dsyscount.py84 syscall = bytes(args.syscall, 'utf-8') variable
/external/llvm-libc/include/llvm-libc-macros/linux/
Dunistd-macros.h28 #define syscall(...) __syscall_helper(__VA_ARGS__, 0, 1, 2, 3, 4, 5, 6) macro
/external/ltp/testcases/kernel/syscalls/set_thread_area/
Dset_thread_area01.c39 int syscall; member
/external/minijail/tools/
Dgenerate_seccomp_policy.py147 def get_seccomp_bpf_filter(syscall, entry): argument
/external/bcc/src/python/bcc/
Dperf.py151 syscall = libc.syscall # not declaring vararg types variable in Perf
/external/grpc-grpc/test/core/iomgr/
Derror_test.cc176 const char* syscall = "syscall name"; in TEST() local

12