Home
last modified time | relevance | path

Searched refs:syscall (Results 1 – 8 of 8) sorted by relevance

/kernel/trace/
Dtrace_syscalls.c80 find_syscall_meta(unsigned long syscall) in find_syscall_meta() argument
89 kallsyms_lookup(syscall, NULL, NULL, NULL, str); in find_syscall_meta()
109 const char *get_syscall_name(int syscall) in get_syscall_name() argument
113 entry = syscall_nr_to_meta(syscall); in get_syscall_name()
129 int i, syscall; in print_syscall_enter() local
132 syscall = trace->nr; in print_syscall_enter()
133 entry = syscall_nr_to_meta(syscall); in print_syscall_enter()
174 int syscall; in print_syscall_exit() local
178 syscall = trace->nr; in print_syscall_exit()
179 entry = syscall_nr_to_meta(syscall); in print_syscall_exit()
Dtrace.h1659 const char *get_syscall_name(int syscall);
1662 static inline const char *get_syscall_name(int syscall) in get_syscall_name() argument
DKconfig283 Basic tracer to catch the syscall entry and exit events.
551 bool "Run selftest on syscall events"
554 This option will also enable testing every syscall event.
/kernel/bpf/
DMakefile3 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o
/kernel/
Dauditfilter.c197 int audit_match_class(int class, unsigned syscall) in audit_match_class() argument
199 if (unlikely(syscall >= AUDIT_BITMASK_SIZE * 32)) in audit_match_class()
203 return classes[class][AUDIT_WORD(syscall)] & AUDIT_BIT(syscall); in audit_match_class()
Dseccomp.c506 static void seccomp_send_sigsys(int syscall, int reason) in seccomp_send_sigsys() argument
515 info.si_syscall = syscall; in seccomp_send_sigsys()
Daudit.h231 extern int audit_match_class(int class, unsigned syscall);
Dauditsc.c2410 void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument
2419 signr, syscall_get_arch(), syscall, in __audit_seccomp()