Home
last modified time | relevance | path

Searched refs:SYSCALL (Results 1 – 22 of 22) sorted by relevance

/Linux-v6.1/samples/bpf/
Dtrace_common.h6 #define SYSCALL(SYS) "__x64_" __stringify(SYS) macro
8 #define SYSCALL(SYS) "__s390x_" __stringify(SYS) macro
10 #define SYSCALL(SYS) __stringify(SYS) macro
Dmap_perf_test_kern.c105 SEC("kprobe/" SYSCALL(sys_getuid)) in SYSCALL() function
123 SEC("kprobe/" SYSCALL(sys_geteuid)) in SYSCALL() function
140 SEC("kprobe/" SYSCALL(sys_getgid)) in SYSCALL() function
157 SEC("kprobe/" SYSCALL(sys_getegid)) in SYSCALL() function
174 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
254 SEC("kprobe/" SYSCALL(sys_gettid)) in SYSCALL() function
276 SEC("kprobe/" SYSCALL(sys_getpgid)) in SYSCALL() function
289 SEC("kprobe/" SYSCALL(sys_getppid)) in SYSCALL() function
Dtrace_output_kern.c14 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
Dtest_current_task_under_cgroup_kern.c30 SEC("kprobe/" SYSCALL(sys_sync)) in SYSCALL() function
Dtest_probe_write_user_kern.c31 SEC("kprobe/" SYSCALL(sys_connect)) in SYSCALL() function
Dtracex2_kern.c81 SEC("kprobe/" SYSCALL(sys_write)) in SYSCALL() function
/Linux-v6.1/samples/seccomp/
Dbpf-fancy.c38 SYSCALL(__NR_exit, ALLOW), in main()
39 SYSCALL(__NR_exit_group, ALLOW), in main()
40 SYSCALL(__NR_write, JUMP(&l, write_fd)), in main()
41 SYSCALL(__NR_read, JUMP(&l, read)), in main()
Dbpf-helper.h55 #define SYSCALL(nr, jt) \ macro
/Linux-v6.1/arch/sh/kernel/vsyscall/
DMakefile12 quiet_cmd_syscall = SYSCALL $@
/Linux-v6.1/arch/powerpc/include/asm/
Dsstep.h41 SYSCALL, enumerator
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/
Dlibbpf_probes.c107 CASE(SYSCALL, sys_bpf, true), in test_libbpf_probe_helpers()
/Linux-v6.1/arch/s390/kernel/syscalls/
Dsyscalltbl91 * SYSCALL(64 bit syscall, 31 bit emulated syscall)
/Linux-v6.1/Documentation/x86/
Dpti.rst84 b. A "trampoline" must be used for SYSCALL entry. This
86 non-PTI SYSCALL entry code, so requires mapping fewer
158 5. Run 32-bit binaries on systems supporting the SYSCALL instruction.
/Linux-v6.1/Documentation/translations/zh_CN/loongarch/
Dintroduction.rst248 SYSCALL BREAK CPUCFG NOP IDLE ERTN(ERET) DBCL(DBGCALL) RDTIMEL.W RDTIMEH.W RDTIME.D
/Linux-v6.1/Documentation/driver-api/nfc/
Dnfc-hci.rst219 - Syscall context from a userspace call (SYSCALL)
/Linux-v6.1/Documentation/loongarch/
Dintroduction.rst281 SYSCALL BREAK CPUCFG NOP IDLE ERTN(ERET) DBCL(DBGCALL) RDTIMEL.W RDTIMEH.W RDTIME.D
/Linux-v6.1/tools/arch/x86/kcpuid/
Dcpuid.csv351 0x80000001, 0, EDX, 11, sysret, SYSCALL/SYSRET supported
/Linux-v6.1/arch/x86/kvm/
Dcpuid.c682 F(CX8) | F(APIC) | 0 /* Reserved */ | F(SYSCALL) | in kvm_set_cpu_caps()
/Linux-v6.1/arch/powerpc/lib/
Dsstep.c1378 op->type = SYSCALL; in analyse_instr()
3641 case SYSCALL: /* sc */ in emulate_step()
/Linux-v6.1/arch/x86/lib/
Dx86-opcode-map.txt332 05: SYSCALL (o64)
/Linux-v6.1/tools/arch/x86/lib/
Dx86-opcode-map.txt332 05: SYSCALL (o64)
/Linux-v6.1/tools/lib/bpf/
Dlibbpf.c8498 SEC_DEF("syscall", SYSCALL, 0, SEC_SLEEPABLE),