Searched refs:syscall (Results 1 – 8 of 8) sorted by relevance
/kernel/trace/ |
D | trace_syscalls.c | 80 find_syscall_meta(unsigned long syscall) in find_syscall_meta() argument 89 kallsyms_lookup(syscall, NULL, NULL, NULL, str); in find_syscall_meta() 109 const char *get_syscall_name(int syscall) in get_syscall_name() argument 113 entry = syscall_nr_to_meta(syscall); in get_syscall_name() 129 int i, syscall; in print_syscall_enter() local 132 syscall = trace->nr; in print_syscall_enter() 133 entry = syscall_nr_to_meta(syscall); in print_syscall_enter() 174 int syscall; in print_syscall_exit() local 178 syscall = trace->nr; in print_syscall_exit() 179 entry = syscall_nr_to_meta(syscall); in print_syscall_exit()
|
D | trace.h | 1659 const char *get_syscall_name(int syscall); 1662 static inline const char *get_syscall_name(int syscall) in get_syscall_name() argument
|
D | Kconfig | 283 Basic tracer to catch the syscall entry and exit events. 551 bool "Run selftest on syscall events" 554 This option will also enable testing every syscall event.
|
/kernel/bpf/ |
D | Makefile | 3 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o
|
/kernel/ |
D | auditfilter.c | 197 int audit_match_class(int class, unsigned syscall) in audit_match_class() argument 199 if (unlikely(syscall >= AUDIT_BITMASK_SIZE * 32)) in audit_match_class() 203 return classes[class][AUDIT_WORD(syscall)] & AUDIT_BIT(syscall); in audit_match_class()
|
D | seccomp.c | 506 static void seccomp_send_sigsys(int syscall, int reason) in seccomp_send_sigsys() argument 515 info.si_syscall = syscall; in seccomp_send_sigsys()
|
D | audit.h | 231 extern int audit_match_class(int class, unsigned syscall);
|
D | auditsc.c | 2410 void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument 2419 signr, syscall_get_arch(), syscall, in __audit_seccomp()
|