Home
last modified time | relevance | path

Searched refs:nargs (Results 1 – 5 of 5) sorted by relevance

/kernel/
Dauditsc.c1275 int nargs = context->socketcall.nargs; in show_special() local
1276 audit_log_format(ab, "nargs=%d", nargs); in show_special()
1277 for (i = 0; i < nargs; i++) in show_special()
2415 int __audit_socketcall(int nargs, unsigned long *args) in __audit_socketcall() argument
2419 if (nargs <= 0 || nargs > AUDITSC_ARGS || !args) in __audit_socketcall()
2422 context->socketcall.nargs = nargs; in __audit_socketcall()
2423 memcpy(context->socketcall.args, args, nargs * sizeof(unsigned long)); in __audit_socketcall()
Daudit.h147 int nargs; member
/kernel/bpf/
Dbtf.c4942 u32 i, nargs; in btf_distill_func_proto() local
4956 nargs = btf_type_vlen(func); in btf_distill_func_proto()
4957 if (nargs >= MAX_BPF_FUNC_ARGS) { in btf_distill_func_proto()
4960 tname, nargs); in btf_distill_func_proto()
4972 for (i = 0; i < nargs; i++) { in btf_distill_func_proto()
4973 if (i == nargs - 1 && args[i].type == 0) { in btf_distill_func_proto()
4994 m->nr_args = nargs; in btf_distill_func_proto()
5155 u32 i, nargs, btf_id; in btf_check_func_arg_match() local
5185 nargs = btf_type_vlen(t); in btf_check_func_arg_match()
5186 if (nargs > 5) { in btf_check_func_arg_match()
[all …]
/kernel/trace/
Dtrace_uprobe.c339 alloc_trace_uprobe(const char *group, const char *event, int nargs, bool is_ret) in alloc_trace_uprobe() argument
344 tu = kzalloc(SIZEOF_TRACE_UPROBE(nargs), GFP_KERNEL); in alloc_trace_uprobe()
Dtrace_kprobe.c263 int nargs, bool is_return) in alloc_trace_kprobe() argument
268 tk = kzalloc(SIZEOF_TRACE_KPROBE(nargs), GFP_KERNEL); in alloc_trace_kprobe()