/aosp_15_r20/bionic/libc/tools/ |
H A D | gensyscalls.py | 225 def add_footer(pointer_length, stub, syscall): argument 233 def arm_genstub(syscall): argument 240 def arm64_genstub(syscall): argument 244 def riscv64_genstub(syscall): argument 248 def x86_genstub(syscall): argument 279 def x86_genstub_socketcall(syscall): argument 317 def x86_64_genstub(syscall): argument
|
/aosp_15_r20/external/sandboxed-api/sandboxed_api/sandbox2/ |
H A D | notify.h | 53 virtual void EventSyscallViolation(const Syscall& syscall, in EventSyscallViolation() 60 virtual bool EventSyscallTrap(const Syscall& syscall) { return false; } in EventSyscallTrap() 76 virtual TraceAction EventSyscallTrace(const Syscall& syscall) { in EventSyscallTrace() 88 virtual void EventSyscallReturn(const Syscall& syscall, in EventSyscallReturn()
|
H A D | syscall_test.cc | 35 Syscall syscall(Syscall::GetHostArch(), __NR_read, args); in TEST() local 58 Syscall syscall; in TEST() local
|
H A D | regs.cc | 132 auto syscall = user_regs_.orig_rax; in ToSyscall() local 140 auto syscall = user_regs_.orig_rax & 0xFFFFFFFF; in ToSyscall() local
|
H A D | monitor_ptrace.cc | 652 void PtraceMonitor::ActionProcessSyscall(Regs* regs, const Syscall& syscall) { in ActionProcessSyscall() 695 Regs* regs, const Syscall& syscall, ViolationType violation_type) { in ActionProcessSyscallViolation() 738 Syscall syscall = regs.ToSyscall(syscall_arch); in EventPtraceSeccomp() local
|
H A D | syscall_defs.cc | 79 data_, syscall, [](const SyscallTable::Entry& entry, int syscall) { in GetEntry() 104 int syscall, const uint64_t values[], pid_t pid) const { in GetArgumentsDescription()
|
/aosp_15_r20/test/dittosuite/src/ |
H A D | utils.cpp | 28 int64_t GetFileSize(SyscallInterface& syscall, int fd) { in GetFileSize() 36 std::string GetFilePath(SyscallInterface& syscall, int fd) { in GetFilePath() 44 bool FileExists(SyscallInterface& syscall, const std::string& path_name) { in FileExists()
|
/aosp_15_r20/external/ltp/android/tools/ |
H A D | cki_coverage.py | 203 def ltp_test_special_cases(self, syscall, test): argument 332 def syscall_arch_string(self, syscall, arch): argument 420 def add_syscall(self, cki, syscall, arch): argument 431 def delete_syscall(self, cki, syscall): argument
|
/aosp_15_r20/system/extras/ioshark/ |
H A D | compile_ioshark.c | 221 get_syscall(char *buf, char *syscall) in get_syscall() 510 map_syscall(char *syscall) in map_syscall() 525 char syscall[512]; in main() local
|
/aosp_15_r20/test/dittosuite/include/ditto/ |
H A D | multithreading_utils.h | 43 SchedAttr(SyscallInterface& syscall) : syscall_(syscall) {} in SchedAttr() 57 SchedAffinity(SyscallInterface& syscall) : syscall_(syscall) {} in SchedAffinity()
|
/aosp_15_r20/external/rust/android-crates-io/crates/rustix/src/ |
D | weak.rs | 147 macro_rules! syscall { macro 163 macro_rules! syscall { macro
|
/aosp_15_r20/test/dittosuite/ |
H A D | dittotrace.cpp | 48 Syscall syscall; in ProcessLine() local 150 for (const auto& syscall : syscalls) { in main() local
|
/aosp_15_r20/prebuilts/go/linux-x86/src/syscall/ |
D | syscall_darwin.go | 13 package syscall package 327 func syscall(fn, a1, a2, a3 uintptr) (r1, r2 uintptr, err Errno) func
|
D | syscall_openbsd_libc.go | 7 package syscall package 56 func syscall(fn, a1, a2, a3 uintptr) (r1, r2 uintptr, err Errno) func
|
D | linkname_unix.go | 7 package syscall package
|
D | linkname_openbsd.go | 7 package syscall package
|
D | linkname_darwin.go | 5 package syscall package
|
D | linkname_libc.go | 7 package syscall package
|
D | syscall_openbsd1.go | 7 package syscall package
|
D | linkname_bsd.go | 7 package syscall package
|
D | badlinkname_unix.go | 7 package syscall package
|
D | syscall_solarisonly.go | 7 package syscall package
|
D | flock_linux_32bit.go | 7 package syscall package
|
/aosp_15_r20/external/rust/android-crates-io/crates/mio/src/sys/unix/ |
D | mod.rs | 5 macro_rules! syscall { macro
|
/aosp_15_r20/external/ltp/metadata/tests/ |
H A D | macro_str.c.json | 2 "syscall": "syscall(\"foo\")", string
|