/external/valgrind/main/coregrind/m_mach/ |
D | mach_traps-amd64-darwin.S | 41 syscall 62 syscall 72 syscall 82 syscall 92 syscall 102 syscall 112 syscall 122 syscall 132 syscall
|
/external/valgrind/main/memcheck/tests/linux/ |
D | Makefile.am | 16 syslog-syscall.vgtest syslog-syscall.stderr.exp \ 17 timerfd-syscall.vgtest timerfd-syscall.stderr.exp \ 29 syslog-syscall \ 30 timerfd-syscall
|
/external/valgrind/main/ |
D | README_MISSING_SYSCALL_OR_IOCTL | 6 news is that, in general, it's easy to write the missing syscall or 18 What are syscall/ioctl wrappers? What do they do? 30 1. Tell a tool what's about to happen, before the syscall takes place. A 35 2. Tell a tool what just happened, after a syscall takes place. This is 45 The syscall wrapper for time() 66 The first thing we do happens before the syscall occurs, in the PRE() function. 69 Next, the tool is told the return type of the syscall, that the syscall has 70 one argument, the type of the syscall argument and that the argument is being 82 Finally, the really important bit, after the syscall occurs, in the POST() 90 The POST() function won't be called if the syscall failed, so you [all …]
|
/external/valgrind/main/gdbserver_tests/ |
D | nlcontrolc.stdoutB.exp | 3 0x........ in syscall ... 7 4 Thread .... (tid 4 VgTs_WaitSys) 0x........ in syscall ... 8 3 Thread .... (tid 3 VgTs_WaitSys) 0x........ in syscall ... 9 2 Thread .... (tid 2 VgTs_WaitSys) 0x........ in syscall ... 10 * 1 Thread .... (tid 1 VgTs_WaitSys) 0x........ in syscall ...
|
/external/valgrind/main/exp-bbv/tests/amd64-linux/ |
D | clone_test.S | 23 mov $56,%rax # clone syscall 25 # Note, clone syscall is different than the glibc implementation 49 syscall 91 mov $60,%rax # put exit syscall number (60) in rax 92 syscall
|
D | ll.S | 14 # offsets into the results returned by the uname syscall 22 # offset into the results returned by the sysinfo syscall 134 # push $SYSCALL_UNAME # uname syscall 137 # syscall # do syscall 184 # syscall # syscall. fd in eax. 197 # syscall 201 # syscall 309 # push $SYSCALL_SYSINFO # sysinfo() syscall 312 # syscall 371 push $SYSCALL_EXIT # Put exit syscall in rax [all …]
|
D | million.S | 20 mov $60,%rax # put exit syscall number (60) in rax 21 syscall
|
/external/valgrind/main/exp-bbv/tests/x86/ |
D | million.S | 19 # syscall numbers in /usr/include/sys/syscall.h on OSX 26 inc %eax # put exit syscall number (1) in eax 31 inc %eax # put exit syscall number (1) in eax
|
/external/chromium/third_party/libevent/ |
D | epoll_sub.c | 38 return (syscall(__NR_epoll_create, size)); in epoll_create() 45 return (syscall(__NR_epoll_ctl, epfd, op, fd, event)); in epoll_ctl() 51 return (syscall(__NR_epoll_wait, epfd, events, maxevents, timeout)); in epoll_wait()
|
/external/strace/ |
D | Android.patch | 11 #include <sys/syscall.h> 105 #include <sys/syscall.h> 163 diff -r -u -d /Users/jeffbrown/Downloads/strace-4.6/syscall.c ./syscall.c 164 --- /Users/jeffbrown/Downloads/strace-4.6/syscall.c 2011-02-18 16:02:27.000000000 -0800 165 +++ ./syscall.c 2012-03-02 15:00:35.000000000 -0800 173 #include <sys/syscall.h> 177 +#include "syscall-android.h" 235 #include <sys/syscall.h> 247 +#include "syscall-android.h"
|
D | ChangeLog | 142 (sys_shutdown): Use shutdown_modes to decode 2nd syscall argument. 310 linux/sparc: move to common syscall.h 311 Rather than constantly deal with the sparc/syscall.h going stale, merge 312 the few sparc-specific pieces into the linux/syscall.h header. 314 * linux/syscall.h: Add sparc-specific pieces from sparc/syscall.h. 315 * Makefile.am (EXTRA_DIST): Remove linux/sparc/syscall.h and 316 linux/sparc64/syscall.h. 317 * linux/sparc/syscall.h, linux/sparc64/syscall.h: Deleted. 319 sparc: add new funcs to syscall.h 320 Sync missing defs from the common syscall.h here. [all …]
|
D | ChangeLog-CVS | 8 * syscall.c: Likewise. 16 * sunos4/syscall.h: Likewise. 60 * signal (sys_rt_sigtimedwait): Fix sigtimedwait syscall decoding. 114 * syscall.c (get_scno): Ditto. 126 * syscall.c (get_scno): Add support for cris. 222 * syscall.c (get_scno): Fix warnings about unused variable 'pid'. 283 * syscall.c (trace_syscall): If decode fails on syscall exit, 290 * syscall.c: Adjust printtrailer() calls accordingly. 339 * syscall.c: EABI arm does not need decode_subcall(), 344 * linux/syscallent.h: Mark sendfile(2) as network syscall. [all …]
|
D | NEWS | 26 * Added new syscall entries to match Linux 2.6.37. 32 * Fixed fetching syscall arguments on m68k. 34 * Fixed get/set_robust_list syscall numbers for powerpc. 38 * Fixed syscall flags of fstatat*, mmap, mmap2, fadvise64*, swapoff, 119 * Fixed syscall numbers for tee and sync_file_range. 124 * Marked sendfile(2) as a network syscall. 200 * Update Linux/IA64 syscall list. 201 * Fix Linux/x86-64 syscall argument extraction for 32-bit processes. 208 * Update syscall tables for Alpha, ARM, HPPA. 285 * The usual Linux syscall updates (includes 32bit uid/gid support), [all …]
|
/external/valgrind/main/memcheck/tests/ |
D | sigprocmask.c | 35 syscall(__NR_sigprocmask, SIG_SETMASK, os, NULL); in main() 43 syscall(__NR_sigprocmask, SIG_BLOCK, s, os); in main() 51 syscall(__NR_sigprocmask, SIG_BLOCK, s, os); in main()
|
/external/compiler-rt/lib/asan/ |
D | asan_linux.cc | 82 return (void *)syscall(__NR_mmap, addr, length, prot, flags, fd, offset); in asan_mmap() 84 return (void *)syscall(__NR_mmap2, addr, length, prot, flags, fd, offset); in asan_mmap() 115 int res = syscall(__NR_munmap, addr, size); in AsanUnmapOrDie() 123 return (size_t)syscall(__NR_write, fd, buf, count); in AsanWrite() 127 return syscall(__NR_open, filename, O_RDONLY); in AsanOpenReadonly() 159 return (size_t)syscall(__NR_read, fd, buf, count); in AsanRead() 163 return syscall(__NR_close, fd); in AsanClose()
|
/external/linux-tools-perf/Documentation/ |
D | perf-script-python.txt | 32 'syscall-counts' script you see when you list the available perf script 37 The syscall-counts script is a simple script, but demonstrates all the 39 of its output (syscall names are not yet supported, they will appear 43 syscall events: 73 Basically our task is to keep a per-syscall tally that gets updated 81 allowable by perf. These individual syscall events will however be 88 'id' field can be used to distinguish between individual syscall 91 For this script, we only need to know that a syscall was entered; we 102 The options basically say to collect data for every syscall event 192 # mv perf-script.py syscall-counts.py [all …]
|
/external/valgrind/main/exp-bbv/tests/x86-linux/ |
D | clone_test.S | 23 mov $120,%eax # clone syscall 25 # Note, clone syscall is different than the glibc implementation 91 mov $1,%eax # put exit syscall number (60) in rax
|
/external/webkit/Source/WebCore/plugins/win/ |
D | PaintHooks.asm | 29 syscall 44 syscall
|
/external/valgrind/main/memcheck/tests/x86-linux/ |
D | scalar.h | 16 extern long int syscall (long int __sysno, ...) __THROW; 28 #define SY res = syscall
|
/external/valgrind/main/coregrind/m_syswrap/ |
D | syscall-amd64-linux.S | 119 syscall 143 2: syscall 161 syscall
|
/external/valgrind/main/memcheck/tests/darwin/ |
D | scalar.h | 13 extern int syscall (int __sysno, ...); 31 #define SY(__NR_xxx, args...) res = syscall(__NR_xxx, ##args);
|
/external/valgrind/main/none/tests/ |
D | Makefile.am | 150 syscall-restart1.vgtest syscall-restart1.stdout.exp syscall-restart1.stderr.exp \ 151 syscall-restart2.vgtest syscall-restart2.stdout.exp syscall-restart2.stderr.exp \ 186 syscall-restart1 syscall-restart2 \
|
/external/valgrind/main/exp-bbv/tests/ppc32-linux/ |
D | ll.S | 11 # offsets into the results returned by the uname syscall 159 # li 0,SYSCALL_UNAME # uname syscall 162 # sc # do syscall 200 # sc # syscall. fd in r0.
|
/external/oprofile/daemon/ |
D | opd_cookie.c | 70 return syscall(__NR_lookup_dcookie, (unsigned long)(cookie >> 32), in lookup_dcookie() 77 return syscall(__NR_lookup_dcookie, in lookup_dcookie() 84 return syscall(__NR_lookup_dcookie, cookie, buf, size); in lookup_dcookie()
|
/external/openssh/ |
D | sandbox-systrace.c | 45 int syscall; member 158 for (j = 0; allowed_syscalls[j].syscall != -1; j++) { in ssh_sandbox_parent() 159 if (allowed_syscalls[j].syscall == i) { in ssh_sandbox_parent()
|