Home
last modified time | relevance | path

Searched refs:si_call_addr (Results 1 – 8 of 8) sorted by relevance

/Linux-v5.4/arch/x86/kernel/
Dsignal_compat.c154 BUILD_BUG_ON(offsetof(siginfo_t, si_call_addr) != 0x10); in signal_compat_build_tests()
157 BUILD_BUG_ON(offsetof(compat_siginfo_t, si_call_addr) != 0x0C); in signal_compat_build_tests()
/Linux-v5.4/include/uapi/asm-generic/
Dsiginfo.h160 #define si_call_addr _sifields._sigsys._call_addr macro
/Linux-v5.4/fs/
Dsignalfd.c154 new.ssi_call_addr = (long) kinfo->si_call_addr; in signalfd_copyinfo()
/Linux-v5.4/Documentation/userspace-api/
Dseccomp_filter.rst106 task without executing the system call. ``siginfo->si_call_addr``
324 - A return value of ``SECCOMP_RET_TRAP`` will set a ``si_call_addr`` pointing to
345 ``SECCOMP_RET_TRAP``, use ``siginfo->si_call_addr``.) Do not check any other
/Linux-v5.4/kernel/
Dsignal.c3312 new.si_call_addr = ptr_to_compat(from->si_call_addr); in __copy_siginfo_to_user32()
3394 to->si_call_addr = compat_ptr(from->si_call_addr); in post_copy_siginfo_from_user32()
4542 CHECK_OFFSET(si_call_addr); in siginfo_buildtime_checks()
Dseccomp.c595 info->si_call_addr = (void __user *)KSTK_EIP(current); in seccomp_init_siginfo()
/Linux-v5.4/arch/m68k/kernel/
Dsignal.c631 BUILD_BUG_ON(offsetof(siginfo_t, si_call_addr) != 0x0c); in siginfo_build_tests()
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c1005 &(TRAP_info.si_call_addr); in TEST_F()