Home
last modified time | relevance | path

Searched refs:SYSCALL (Results 1 – 19 of 19) sorted by relevance

/Linux-v5.15/samples/bpf/
Dtrace_common.h6 #define SYSCALL(SYS) "__x64_" __stringify(SYS) macro
8 #define SYSCALL(SYS) "__s390x_" __stringify(SYS) macro
10 #define SYSCALL(SYS) __stringify(SYS) macro
Dmap_perf_test_kern.c105 SEC("kprobe/" SYSCALL(sys_getuid)) in SYSCALL() function
120 SEC("kprobe/" SYSCALL(sys_geteuid)) in SYSCALL() function
134 SEC("kprobe/" SYSCALL(sys_getgid)) in SYSCALL() function
148 SEC("kprobe/" SYSCALL(sys_getegid)) in SYSCALL() function
162 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
242 SEC("kprobe/" SYSCALL(sys_gettid)) in SYSCALL() function
264 SEC("kprobe/" SYSCALL(sys_getpgid)) in SYSCALL() function
277 SEC("kprobe/" SYSCALL(sys_getppid)) in SYSCALL() function
Dtrace_output_kern.c14 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
Dtest_current_task_under_cgroup_kern.c30 SEC("kprobe/" SYSCALL(sys_sync)) in SYSCALL() function
Dtest_probe_write_user_kern.c31 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
Dtracex2_kern.c81 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
/Linux-v5.15/samples/seccomp/
Dbpf-fancy.c38 SYSCALL(__NR_exit, ALLOW), in main()
39 SYSCALL(__NR_exit_group, ALLOW), in main()
40 SYSCALL(__NR_write, JUMP(&l, write_fd)), in main()
41 SYSCALL(__NR_read, JUMP(&l, read)), in main()
Dbpf-helper.h55 #define SYSCALL(nr, jt) \ macro
/Linux-v5.15/arch/sh/kernel/vsyscall/
DMakefile12 quiet_cmd_syscall = SYSCALL $@
/Linux-v5.15/arch/powerpc/include/asm/
Dsstep.h41 SYSCALL, enumerator
/Linux-v5.15/arch/s390/kernel/syscalls/
Dsyscalltbl91 * SYSCALL(64 bit syscall, 31 bit emulated syscall)
/Linux-v5.15/Documentation/x86/
Dpti.rst84 b. A "trampoline" must be used for SYSCALL entry. This
86 non-PTI SYSCALL entry code, so requires mapping fewer
158 5. Run 32-bit binaries on systems supporting the SYSCALL instruction.
/Linux-v5.15/arch/x86/kvm/
Dcpuid.c489 F(CX8) | F(APIC) | 0 /* Reserved */ | F(SYSCALL) | in kvm_set_cpu_caps()
/Linux-v5.15/tools/arch/x86/kcpuid/
Dcpuid.csv351 0x80000001, 0, EDX, 11, sysret, SYSCALL/SYSRET supported
/Linux-v5.15/Documentation/driver-api/nfc/
Dnfc-hci.rst219 - Syscall context from a userspace call (SYSCALL)
/Linux-v5.15/arch/powerpc/lib/
Dsstep.c1307 op->type = SYSCALL; in analyse_instr()
3570 case SYSCALL: /* sc */ in emulate_step()
/Linux-v5.15/arch/x86/lib/
Dx86-opcode-map.txt332 05: SYSCALL (o64)
/Linux-v5.15/tools/arch/x86/lib/
Dx86-opcode-map.txt332 05: SYSCALL (o64)
/Linux-v5.15/tools/lib/bpf/
Dlibbpf.c7993 SEC_DEF("syscall", SYSCALL,