Home
last modified time | relevance | path

Searched refs:sysnum (Results 1 – 6 of 6) sorted by relevance

/external/valgrind/main/coregrind/
Dm_vkiscnums.c49 Char* VG_(sysnum_string)(Word sysnum, SizeT n_buf, Char* buf) in VG_()
51 VG_(snprintf)(buf, n_buf, "%3ld", sysnum); in VG_()
55 Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf) in VG_()
57 return VG_(sysnum_string)(sysnum, n_buf, buf); in VG_()
64 Char* VG_(sysnum_string)(Word sysnum, SizeT n_buf, Char* buf) in VG_()
67 switch (VG_DARWIN_SYSNO_CLASS(sysnum)) { in VG_()
75 classname, VG_DARWIN_SYSNO_INDEX(sysnum)); in VG_()
79 Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf) in VG_()
81 return VG_(sysnum_string)(sysnum, n_buf, buf); in VG_()
/external/valgrind/main/include/
Dpub_tool_vkiscnums.h42 extern Char* VG_(sysnum_string) (Word sysnum, SizeT n_buf, Char* buf);
46 extern Char* VG_(sysnum_string_extra)(Word sysnum, SizeT n_buf, Char* buf);
50 #define VG_SYSNUM_STRING(sysnum) \ argument
51 ({ Char qq_zz_buf[32]; VG_(sysnum_string)(sysnum, 32, qq_zz_buf); })
52 #define VG_SYSNUM_STRING_EXTRA(sysnum) \ argument
53 ({ Char qq_zz_buf[64]; VG_(sysnum_string_extra)(sysnum, 64, qq_zz_buf); })
/external/chromium_org/sandbox/linux/seccomp-bpf/
Dsandbox_bpf.cc59 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const));
60 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) { in ProbeEvaluator() argument
61 switch (sysnum) { in ProbeEvaluator()
80 ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) { in AllowAllEvaluator() argument
81 if (!SandboxBPF::IsValidSyscallNumber(sysnum)) { in AllowAllEvaluator()
249 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { in IsValidSyscallNumber() argument
250 return SyscallIterator::IsValid(sysnum); in IsValidSyscallNumber()
473 uint32_t sysnum = iter.Next(); in PolicySanityChecks() local
474 if (!IsDenied(policy->EvaluateSyscall(this, sysnum))) { in PolicySanityChecks()
745 uint32_t sysnum = iter.Next(); in FindRanges() local
[all …]
Dverifier.cc369 uint32_t sysnum = iter.Next(); in VerifyBPF() local
377 struct arch_seccomp_data data = {static_cast<int>(sysnum), in VerifyBPF()
381 if (!(sysnum & 0x40000000u)) { in VerifyBPF()
385 if (sysnum & 0x40000000u) { in VerifyBPF()
390 ErrorCode code = policy.EvaluateSyscall(sandbox, sysnum); in VerifyBPF()
Dsandbox_bpf.h83 static bool IsValidSyscallNumber(int sysnum);
/external/compiler-rt/lib/msandr/
Dmsandr.cc521 bool event_filter_syscall(void *drcontext, int sysnum) { in event_filter_syscall() argument
566 bool event_pre_syscall(void *drcontext, int sysnum) { in event_pre_syscall() argument
579 CHECK(sysnum == sysnum_full.number); in event_pre_syscall()
611 void event_post_syscall(void *drcontext, int sysnum) { in event_post_syscall() argument
622 CHECK(sysnum == sysnum_full.number); in event_post_syscall()
644 if (success && (sysnum == SYS_mmap IF_NOT_X64(|| sysnum == SYS_mmap2))) { in event_post_syscall()