Home
last modified time | relevance | path

Searched refs:syscall (Results 1 – 11 of 11) sorted by relevance

/kernel/entry/
Dcommon.c38 static inline void syscall_enter_audit(struct pt_regs *regs, long syscall) in syscall_enter_audit() argument
44 audit_syscall_entry(syscall, args[0], args[1], args[2], args[3]); in syscall_enter_audit()
48 static long syscall_trace_enter(struct pt_regs *regs, long syscall, in syscall_trace_enter() argument
78 syscall = syscall_get_nr(current, regs); in syscall_trace_enter()
81 trace_sys_enter(regs, syscall); in syscall_trace_enter()
86 syscall = syscall_get_nr(current, regs); in syscall_trace_enter()
89 syscall_enter_audit(regs, syscall); in syscall_trace_enter()
91 return ret ? : syscall; in syscall_trace_enter()
95 __syscall_enter_from_user_work(struct pt_regs *regs, long syscall) in __syscall_enter_from_user_work() argument
100 syscall = syscall_trace_enter(regs, syscall, work); in __syscall_enter_from_user_work()
[all …]
/kernel/trace/
Dtrace_syscalls.c83 find_syscall_meta(unsigned long syscall) in find_syscall_meta() argument
92 kallsyms_lookup(syscall, NULL, NULL, NULL, str); in find_syscall_meta()
115 const char *get_syscall_name(int syscall) in get_syscall_name() argument
119 entry = syscall_nr_to_meta(syscall); in get_syscall_name()
135 int i, syscall; in print_syscall_enter() local
138 syscall = trace->nr; in print_syscall_enter()
139 entry = syscall_nr_to_meta(syscall); in print_syscall_enter()
180 int syscall; in print_syscall_exit() local
184 syscall = trace->nr; in print_syscall_exit()
185 entry = syscall_nr_to_meta(syscall); in print_syscall_exit()
Dtrace.h1946 const char *get_syscall_name(int syscall);
1949 static inline const char *get_syscall_name(int syscall) in get_syscall_name() argument
DKconfig531 Basic tracer to catch the syscall entry and exit events.
1027 bool "Run selftest on syscall events"
1030 This option will also enable testing every syscall event.
/kernel/
DKconfig.kexec49 bool "Verify kernel signature during kexec_file_load() syscall"
53 This option makes the kexec_file_load() syscall check for a valid
63 bool "Require a valid signature in kexec_file_load() syscall"
68 the kexec_file_load() syscall.
134 For the kexec_file_load() syscall path, specify the maximum number of
146 For the kexec_load() syscall path, CRASH_MAX_MEMORY_RANGES is part of
Dauditfilter.c189 int audit_match_class(int class, unsigned syscall) in audit_match_class() argument
191 if (unlikely(syscall >= AUDIT_BITMASK_SIZE * 32)) in audit_match_class()
195 return classes[class][AUDIT_WORD(syscall)] & AUDIT_BIT(syscall); in audit_match_class()
Daudit.h230 extern int audit_match_class(int class, unsigned syscall);
Dseccomp.c963 static inline void seccomp_log(unsigned long syscall, long signr, u32 action, in seccomp_log() argument
1003 audit_seccomp(syscall, signr, action); in seccomp_log()
Dauditsc.c3003 void audit_seccomp(unsigned long syscall, long signr, int code) in audit_seccomp() argument
3012 signr, syscall_get_arch(current), syscall, in audit_seccomp()
Dsignal.c1875 int force_sig_seccomp(int syscall, int reason, bool force_coredump) in force_sig_seccomp() argument
1885 info.si_syscall = syscall; in force_sig_seccomp()
/kernel/bpf/
DMakefile9 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o tnum.o log.o