Searched refs:sysnum (Results 1 – 6 of 6) sorted by relevance
/external/valgrind/main/coregrind/ |
D | m_vkiscnums.c | 49 Char* VG_(sysnum_string)(Word sysnum, SizeT n_buf, Char* buf) in VG_() 51 VG_(snprintf)(buf, n_buf, "%3ld", sysnum); in VG_() 55 Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf) in VG_() 57 return VG_(sysnum_string)(sysnum, n_buf, buf); in VG_() 64 Char* VG_(sysnum_string)(Word sysnum, SizeT n_buf, Char* buf) in VG_() 67 switch (VG_DARWIN_SYSNO_CLASS(sysnum)) { in VG_() 75 classname, VG_DARWIN_SYSNO_INDEX(sysnum)); in VG_() 79 Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf) in VG_() 81 return VG_(sysnum_string)(sysnum, n_buf, buf); in VG_()
|
/external/valgrind/main/include/ |
D | pub_tool_vkiscnums.h | 42 extern Char* VG_(sysnum_string) (Word sysnum, SizeT n_buf, Char* buf); 46 extern Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf); 50 #define VG_SYSNUM_STRING(sysnum) \ argument 51 ({ Char qq_zz_buf[32]; VG_(sysnum_string)(sysnum, 32, qq_zz_buf); }) 52 #define VG_SYSNUM_STRING_EXTRA(sysnum) \ argument 53 ({ Char qq_zz_buf[64]; VG_(sysnum_string_extra)(sysnum, 64, qq_zz_buf); })
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
D | sandbox_bpf.cc | 59 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const)); 60 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) { in ProbeEvaluator() argument 61 switch (sysnum) { in ProbeEvaluator() 80 ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) { in AllowAllEvaluator() argument 81 if (!SandboxBPF::IsValidSyscallNumber(sysnum)) { in AllowAllEvaluator() 249 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { in IsValidSyscallNumber() argument 250 return SyscallIterator::IsValid(sysnum); in IsValidSyscallNumber() 473 uint32_t sysnum = iter.Next(); in PolicySanityChecks() local 474 if (!IsDenied(policy->EvaluateSyscall(this, sysnum))) { in PolicySanityChecks() 745 uint32_t sysnum = iter.Next(); in FindRanges() local [all …]
|
D | verifier.cc | 369 uint32_t sysnum = iter.Next(); in VerifyBPF() local 377 struct arch_seccomp_data data = {static_cast<int>(sysnum), in VerifyBPF() 381 if (!(sysnum & 0x40000000u)) { in VerifyBPF() 385 if (sysnum & 0x40000000u) { in VerifyBPF() 390 ErrorCode code = policy.EvaluateSyscall(sandbox, sysnum); in VerifyBPF()
|
D | sandbox_bpf.h | 83 static bool IsValidSyscallNumber(int sysnum);
|
/external/compiler-rt/lib/msandr/ |
D | msandr.cc | 521 bool event_filter_syscall(void *drcontext, int sysnum) { in event_filter_syscall() argument 566 bool event_pre_syscall(void *drcontext, int sysnum) { in event_pre_syscall() argument 579 CHECK(sysnum == sysnum_full.number); in event_pre_syscall() 611 void event_post_syscall(void *drcontext, int sysnum) { in event_post_syscall() argument 622 CHECK(sysnum == sysnum_full.number); in event_post_syscall() 644 if (success && (sysnum == SYS_mmap IF_NOT_X64(|| sysnum == SYS_mmap2))) { in event_post_syscall()
|