Home
last modified time | relevance | path

Searched refs:SYSCALL (Results 1 – 19 of 19) sorted by relevance

/linux/samples/bpf/
A Dmap_perf_test_kern.c105 SEC("kprobe/" SYSCALL(sys_getuid)) in SYSCALL() function
120 SEC("kprobe/" SYSCALL(sys_geteuid)) in SYSCALL() function
134 SEC("kprobe/" SYSCALL(sys_getgid)) in SYSCALL() function
148 SEC("kprobe/" SYSCALL(sys_getegid)) in SYSCALL() function
162 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
242 SEC("kprobe/" SYSCALL(sys_gettid)) in SYSCALL() function
264 SEC("kprobe/" SYSCALL(sys_getpgid)) in SYSCALL() function
277 SEC("kprobe/" SYSCALL(sys_getppid)) in SYSCALL() function
A Dtrace_common.h6 #define SYSCALL(SYS) "__x64_" __stringify(SYS) macro
8 #define SYSCALL(SYS) "__s390x_" __stringify(SYS) macro
10 #define SYSCALL(SYS) __stringify(SYS) macro
A Dtrace_output_kern.c14 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
A Dtest_current_task_under_cgroup_kern.c30 SEC("kprobe/" SYSCALL(sys_sync)) in SYSCALL() function
A Dtest_probe_write_user_kern.c31 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
A Dtracex2_kern.c81 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
/linux/samples/seccomp/
A Dbpf-fancy.c38 SYSCALL(__NR_exit, ALLOW), in main()
39 SYSCALL(__NR_exit_group, ALLOW), in main()
40 SYSCALL(__NR_write, JUMP(&l, write_fd)), in main()
41 SYSCALL(__NR_read, JUMP(&l, read)), in main()
A Dbpf-helper.h55 #define SYSCALL(nr, jt) \ macro
/linux/arch/sh/kernel/vsyscall/
A DMakefile12 quiet_cmd_syscall = SYSCALL $@
/linux/arch/powerpc/include/asm/
A Dsstep.h41 SYSCALL, enumerator
/linux/arch/s390/kernel/syscalls/
A Dsyscalltbl91 * SYSCALL(64 bit syscall, 31 bit emulated syscall)
/linux/Documentation/x86/
A Dpti.rst84 b. A "trampoline" must be used for SYSCALL entry. This
86 non-PTI SYSCALL entry code, so requires mapping fewer
158 5. Run 32-bit binaries on systems supporting the SYSCALL instruction.
/linux/arch/x86/kvm/
A Dcpuid.c532 F(CX8) | F(APIC) | 0 /* Reserved */ | F(SYSCALL) | in kvm_set_cpu_caps()
/linux/tools/arch/x86/kcpuid/
A Dcpuid.csv351 0x80000001, 0, EDX, 11, sysret, SYSCALL/SYSRET supported
/linux/Documentation/driver-api/nfc/
A Dnfc-hci.rst219 - Syscall context from a userspace call (SYSCALL)
/linux/arch/powerpc/lib/
A Dsstep.c1390 op->type = SYSCALL; in analyse_instr()
3653 case SYSCALL: /* sc */ in emulate_step()
/linux/arch/x86/lib/
A Dx86-opcode-map.txt332 05: SYSCALL (o64)
/linux/tools/arch/x86/lib/
A Dx86-opcode-map.txt332 05: SYSCALL (o64)
/linux/tools/lib/bpf/
A Dlibbpf.c8328 SEC_DEF("syscall", SYSCALL, 0, SEC_SLEEPABLE),

Completed in 54 milliseconds