/linux-4.1.27/arch/x86/um/shared/sysdep/ |
D | stub_32.h | 15 static inline long stub_syscall0(long syscall) in stub_syscall0() argument 19 __asm__ volatile ("int $0x80" : "=a" (ret) : "0" (syscall)); in stub_syscall0() 24 static inline long stub_syscall1(long syscall, long arg1) in stub_syscall1() argument 28 __asm__ volatile ("int $0x80" : "=a" (ret) : "0" (syscall), "b" (arg1)); in stub_syscall1() 33 static inline long stub_syscall2(long syscall, long arg1, long arg2) in stub_syscall2() argument 37 __asm__ volatile ("int $0x80" : "=a" (ret) : "0" (syscall), "b" (arg1), in stub_syscall2() 43 static inline long stub_syscall3(long syscall, long arg1, long arg2, long arg3) in stub_syscall3() argument 47 __asm__ volatile ("int $0x80" : "=a" (ret) : "0" (syscall), "b" (arg1), in stub_syscall3() 53 static inline long stub_syscall4(long syscall, long arg1, long arg2, long arg3, in stub_syscall4() argument 58 __asm__ volatile ("int $0x80" : "=a" (ret) : "0" (syscall), "b" (arg1), in stub_syscall4() [all …]
|
D | stub_64.h | 18 static inline long stub_syscall0(long syscall) in stub_syscall0() argument 24 : "0" (syscall) : __syscall_clobber ); in stub_syscall0() 29 static inline long stub_syscall2(long syscall, long arg1, long arg2) in stub_syscall2() argument 35 : "0" (syscall), "D" (arg1), "S" (arg2) : __syscall_clobber ); in stub_syscall2() 40 static inline long stub_syscall3(long syscall, long arg1, long arg2, long arg3) in stub_syscall3() argument 46 : "0" (syscall), "D" (arg1), "S" (arg2), "d" (arg3) in stub_syscall3() 52 static inline long stub_syscall4(long syscall, long arg1, long arg2, long arg3, in stub_syscall4() argument 59 : "0" (syscall), "D" (arg1), "S" (arg2), "d" (arg3), in stub_syscall4() 66 static inline long stub_syscall5(long syscall, long arg1, long arg2, long arg3, in stub_syscall5() argument 73 : "0" (syscall), "D" (arg1), "S" (arg2), "d" (arg3), in stub_syscall5()
|
D | syscalls_32.h | 13 #define EXECUTE_SYSCALL(syscall, regs) \ argument 15 (*sys_call_table[syscall]))(SYSCALL_ARGS(®s->regs))
|
D | syscalls_64.h | 17 #define EXECUTE_SYSCALL(syscall, regs) \ argument 19 (*sys_call_table[syscall]))(UPT_SYSCALL_ARG1(®s->regs), \
|
D | ptrace.h | 62 long syscall; member 68 #define UPT_SYSCALL_NR(r) ((r)->syscall)
|
/linux-4.1.27/arch/um/os-Linux/skas/ |
D | mem.c | 53 unsigned long * syscall; in do_syscall_stub() local 84 syscall = (unsigned long *)((unsigned long)data + data[0]); in do_syscall_stub() 87 syscall[0], ret, syscall[7]); in do_syscall_stub() 90 syscall[1], syscall[2], syscall[3], in do_syscall_stub() 91 syscall[4], syscall[5], syscall[6]); in do_syscall_stub() 110 long run_syscall_stub(struct mm_id * mm_idp, int syscall, in run_syscall_stub() argument 119 *stack++ = syscall; in run_syscall_stub()
|
/linux-4.1.27/arch/um/kernel/skas/ |
D | syscall.c | 19 int syscall; in handle_syscall() local 32 syscall = UPT_SYSCALL_NR(r); in handle_syscall() 33 if ((syscall >= NR_SYSCALLS) || (syscall < 0)) in handle_syscall() 35 else result = EXECUTE_SYSCALL(syscall, regs); in handle_syscall()
|
D | Makefile | 6 obj-y := clone.o mmu.o process.o syscall.o uaccess.o
|
/linux-4.1.27/arch/arm/kernel/ |
D | entry-common.S | 36 ldr r1, [tsk, #TI_FLAGS] @ re-check for syscall tracing 176 adr tbl, sys_call_table @ load syscall table pointer 194 ldr r10, [tsk, #TI_FLAGS] @ check for syscall tracing 200 cmp scno, #NR_syscalls @ check upper syscall limit 208 mov why, #0 @ no longer a real syscall 237 mov scno, r0 @ syscall number (possibly new) 239 cmp scno, #NR_syscalls @ check upper syscall limit 243 cmp scno, #-1 @ skip the syscall? 268 #define OBSOLETE(syscall) sys_ni_syscall argument 270 #define OBSOLETE(syscall) syscall argument [all …]
|
D | signal.c | 504 static int do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 513 if (syscall) { in do_signal() 568 do_work_pending(struct pt_regs *regs, unsigned int thread_flags, int syscall) in do_work_pending() argument 578 int restart = do_signal(regs, syscall); in do_work_pending() 587 syscall = 0; in do_work_pending()
|
D | entry-header.S | 21 @ the addition of 8 bytes for storing syscall args 5 and 6. 398 scno .req r7 @ syscall number 399 tbl .req r8 @ syscall table pointer 400 why .req r8 @ Linux syscall (!= 0)
|
D | ptrace.c | 857 task_thread_info(child)->syscall = data; in arch_ptrace() 926 current_thread_info()->syscall = -1; in tracehook_report_syscall() 933 current_thread_info()->syscall = scno; in syscall_trace_enter() 947 scno = current_thread_info()->syscall; in syscall_trace_enter()
|
/linux-4.1.27/samples/bpf/ |
D | libbpf.c | 31 return syscall(__NR_bpf, BPF_MAP_CREATE, &attr, sizeof(attr)); in bpf_create_map() 43 return syscall(__NR_bpf, BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr)); in bpf_update_elem() 54 return syscall(__NR_bpf, BPF_MAP_LOOKUP_ELEM, &attr, sizeof(attr)); in bpf_lookup_elem() 64 return syscall(__NR_bpf, BPF_MAP_DELETE_ELEM, &attr, sizeof(attr)); in bpf_delete_elem() 75 return syscall(__NR_bpf, BPF_MAP_GET_NEXT_KEY, &attr, sizeof(attr)); in bpf_get_next_key() 103 return syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); in bpf_prog_load() 133 return syscall(__NR_perf_event_open, attr, pid, cpu, in perf_event_open()
|
/linux-4.1.27/samples/seccomp/ |
D | bpf-direct.c | 64 int syscall; in emulator() local 72 syscall = ctx->uc_mcontext.gregs[REG_SYSCALL]; in emulator() 76 if (syscall != __NR_write) in emulator() 171 syscall(__NR_write, STDOUT_FILENO, in main() 173 bytes = syscall(__NR_read, STDIN_FILENO, buf, sizeof(buf)); in main() 174 syscall(__NR_write, STDOUT_FILENO, payload("HELLO, ")); in main() 175 syscall(__NR_write, STDOUT_FILENO, buf, bytes); in main() 176 syscall(__NR_write, STDERR_FILENO, in main()
|
D | bpf-fancy.c | 96 syscall(__NR_write, STDOUT_FILENO, msg1, strlen(msg1)); in main() 97 bytes = syscall(__NR_read, STDIN_FILENO, buf, sizeof(buf)-1); in main() 99 syscall(__NR_write, STDERR_FILENO, msg2, strlen(msg2)); in main() 100 syscall(__NR_write, STDERR_FILENO, buf, bytes); in main() 102 syscall(__NR_write, STDERR_FILENO, msg2, strlen(msg2)+2); in main()
|
/linux-4.1.27/arch/powerpc/platforms/cell/ |
D | spu_callbacks.c | 55 long (*syscall)(u64 a1, u64 a2, u64 a3, u64 a4, u64 a5, u64 a6); in spu_sys_callback() local 62 syscall = spu_syscall_table[s->nr_ret]; in spu_sys_callback() 66 syscall, in spu_sys_callback() 71 return syscall(s->parm[0], s->parm[1], s->parm[2], in spu_sys_callback()
|
/linux-4.1.27/tools/testing/selftests/powerpc/tm/ |
D | Makefile | 7 tm-syscall: tm-syscall-asm.S 8 tm-syscall: CFLAGS += -mhtm
|
D | .gitignore | 2 tm-syscall
|
/linux-4.1.27/arch/x86/kernel/ |
D | vsyscall_emu_64.S | 22 syscall 27 syscall 32 syscall
|
D | audit_64.c | 40 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 45 return ia32_classify_syscall(syscall); in audit_classify_syscall() 47 switch(syscall) { in audit_classify_syscall()
|
D | entry_32.S | 324 # userspace resumption stub bypassing syscall exit tracing 608 # than syscall tracing? 645 # perform syscall exit tracing 657 # perform syscall exit tracing 1233 movl $-1, PT_ORIG_EAX(%esp) # no syscall to restart
|
/linux-4.1.27/arch/sh/kernel/vsyscall/ |
D | Makefile | 1 obj-y += vsyscall.o vsyscall-syscall.o 3 $(obj)/vsyscall-syscall.o: \ 24 $(call if_changed,syscall) 36 $(call if_changed,syscall)
|
/linux-4.1.27/arch/cris/kernel/ |
D | ptrace.c | 46 void do_work_pending(int syscall, struct pt_regs *regs, in do_work_pending() argument 57 do_signal(syscall, regs); in do_work_pending() 58 syscall = 0; in do_work_pending()
|
/linux-4.1.27/arch/s390/kernel/ |
D | audit.c | 41 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 45 return s390_classify_syscall(syscall); in audit_classify_syscall() 47 switch(syscall) { in audit_classify_syscall()
|
D | compat_audit.c | 30 int s390_classify_syscall(unsigned syscall) in s390_classify_syscall() argument 32 switch(syscall) { in s390_classify_syscall()
|
/linux-4.1.27/arch/sparc/kernel/ |
D | audit.c | 42 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 46 return sparc32_classify_syscall(syscall); in audit_classify_syscall() 48 switch(syscall) { in audit_classify_syscall()
|
D | compat_audit.c | 30 int sparc32_classify_syscall(unsigned syscall) in sparc32_classify_syscall() argument 32 switch(syscall) { in sparc32_classify_syscall()
|
D | kernel.h | 62 int sparc32_classify_syscall(unsigned syscall);
|
/linux-4.1.27/arch/metag/kernel/ |
D | signal.c | 226 static int do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 238 if (syscall == __NR_rt_sigreturn) in do_signal() 239 syscall = -1; in do_signal() 242 if (syscall >= 0) { in do_signal() 305 int syscall) in do_work_pending() argument 315 int restart = do_signal(regs, syscall); in do_work_pending() 324 syscall = -1; in do_work_pending()
|
D | traps.c | 312 TBIRES tail_end_sys(TBIRES State, int syscall, int *restart) in tail_end_sys() argument 322 do_work_pending(regs, flags, syscall)) { in tail_end_sys()
|
/linux-4.1.27/arch/avr32/kernel/ |
D | signal.c | 207 handle_signal(struct ksignal *ksig, struct pt_regs *regs, int syscall) in handle_signal() argument 232 static void do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 245 if (syscall) { in do_signal() 271 handle_signal(&ksig, regs, syscall); in do_signal() 276 int syscall = 0; in do_notify_resume() local 279 syscall = 1; in do_notify_resume() 282 do_signal(regs, syscall); in do_notify_resume()
|
D | Makefile | 8 obj-y += syscall_table.o syscall-stubs.o irq.o
|
/linux-4.1.27/lib/ |
D | audit.c | 39 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 42 return audit_classify_compat_syscall(abi, syscall); in audit_classify_syscall() 44 switch(syscall) { in audit_classify_syscall()
|
D | compat_audit.c | 30 int audit_classify_compat_syscall(int abi, unsigned syscall) in audit_classify_compat_syscall() argument 32 switch (syscall) { in audit_classify_compat_syscall()
|
D | Makefile | 120 obj-$(CONFIG_HAVE_ARCH_TRACEHOOK) += syscall.o
|
/linux-4.1.27/Documentation/ABI/stable/ |
D | syscalls | 1 What: The kernel syscall interface 9 documentation for details on the syscall numbers that are to be 10 mapped to each syscall.
|
/linux-4.1.27/arch/parisc/kernel/ |
D | audit.c | 40 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 45 return parisc32_classify_syscall(syscall); in audit_classify_syscall() 47 switch (syscall) { in audit_classify_syscall()
|
D | compat_audit.c | 28 int parisc32_classify_syscall(unsigned syscall) in parisc32_classify_syscall() argument 30 switch (syscall) { in parisc32_classify_syscall()
|
D | Makefile | 8 pa7300lc.o syscall.o entry.o sys_parisc.o firmware.o \
|
/linux-4.1.27/arch/powerpc/kernel/ |
D | audit.c | 40 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 45 return ppc32_classify_syscall(syscall); in audit_classify_syscall() 47 switch(syscall) { in audit_classify_syscall()
|
D | compat_audit.c | 29 int ppc32_classify_syscall(unsigned syscall) in ppc32_classify_syscall() argument 31 switch(syscall) { in ppc32_classify_syscall()
|
D | signal_64.c | 557 static long setup_trampoline(unsigned int syscall, unsigned int __user *tramp) in setup_trampoline() argument 565 err |= __put_user(0x38000000UL | (syscall & 0xffff), &tramp[1]); in setup_trampoline()
|
/linux-4.1.27/arch/c6x/kernel/ |
D | entry.S | 121 ;; a syscall. It is cleared here, but the syscall handler 124 STW .D2T2 B1,*+SP(REGS__END+8) ; clear syscall flag 204 ;; Called before syscall handler when process is being debugged 218 ;; tracing returns (possibly new) syscall number 226 ;; reload syscall args from (possibly modified) stack frame 227 ;; and get syscall handler addr from sys_call_table: 240 BNOP .S2 B0,5 ; branch to syscall handler 322 ;; B0 = syscall number (in sys_call_table) 323 ;; A4,B4,A6,B6,A8,B8 = arguments of the syscall function 328 STW .D2T2 B2,*+SP(REGS__END+8) ; set syscall flag [all …]
|
D | signal.c | 239 int syscall) in handle_signal() argument 244 if (syscall) { in handle_signal() 273 static void do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 283 handle_signal(&ksig, regs, syscall); in do_signal() 288 if (syscall) { in do_signal() 316 int syscall) in do_notify_resume() argument 320 do_signal(regs, syscall); in do_notify_resume()
|
/linux-4.1.27/arch/mips/kernel/ |
D | scall64-64.S | 42 dsubu t0, v0, __NR_64_Linux # check syscall number 45 ld t1, PT_EPC(sp) # skip syscall on return 53 # syscall routine 55 sd a3, PT_R26(sp) # save a3 for syscall restarting 58 LONG_L t0, TI_FLAGS($28) # syscall tracing enabled? 69 ld t1, PT_R2(sp) # syscall number 71 sd t1, PT_R0(sp) # save it for syscall restarting 86 bltz v0, 2f # seccomp failed? Skip syscall 103 ld t1, PT_R2(sp) # syscall number 105 sd t1, PT_R0(sp) # save it for syscall restarting
|
D | scall32-o32.S | 36 lw t1, PT_EPC(sp) # skip syscall on return 38 subu v0, v0, __NR_O32_Linux # check syscall number 47 lw t2, (t1) # syscall routine 50 sw a3, PT_R26(sp) # save a3 for syscall restarting 94 lw t0, TI_FLAGS($28) # syscall tracing enabled? 106 lw t1, PT_R2(sp) # syscall number 108 sw t1, PT_R0(sp) # save it for syscall restarting 131 bltz v0, 2f # seccomp failed? Skip syscall 146 lw t1, PT_R2(sp) # syscall number 148 sw t1, PT_R0(sp) # save it for syscall restarting [all …]
|
D | scall64-o32.S | 34 ld t1, PT_EPC(sp) # skip syscall on return 36 dsubu t0, v0, __NR_O32_Linux # check syscall number 58 sd a3, PT_R26(sp) # save a3 for syscall restarting 85 LONG_L t0, TI_FLAGS($28) # syscall tracing enabled? 96 ld t1, PT_R2(sp) # syscall number 98 sd t1, PT_R0(sp) # save it for syscall restarting 113 move s0, t2 # Save syscall pointer 132 bltz v0, 2f # seccomp failed? Skip syscall 151 ld t1, PT_R2(sp) # syscall number 153 sd t1, PT_R0(sp) # save it for syscall restarting [all …]
|
D | scall64-n32.S | 35 dsubu t0, v0, __NR_N32_Linux # check syscall number 39 ld t1, PT_EPC(sp) # skip syscall on return 48 sd a3, PT_R26(sp) # save a3 for syscall restarting 51 LONG_L t0, TI_FLAGS($28) # syscall tracing enabled? 62 ld t1, PT_R2(sp) # syscall number 64 sd t1, PT_R0(sp) # save it for syscall restarting 78 bltz v0, 2f # seccomp failed? Skip syscall 95 ld t1, PT_R2(sp) # syscall number 97 sd t1, PT_R0(sp) # save it for syscall restarting
|
D | ptrace.c | 803 asmlinkage long syscall_trace_enter(struct pt_regs *regs, long syscall) in syscall_trace_enter() argument 808 current_thread_info()->syscall = syscall; in syscall_trace_enter() 820 audit_syscall_entry(syscall, regs->regs[4], regs->regs[5], in syscall_trace_enter() 822 return syscall; in syscall_trace_enter()
|
D | entry.S | 147 # other than syscall tracing?
|
D | Makefile | 9 syscall.o time.o topology.o traps.o unaligned.o watch.o \
|
/linux-4.1.27/arch/x86/ia32/ |
D | audit.c | 28 int ia32_classify_syscall(unsigned syscall) in ia32_classify_syscall() argument 30 switch (syscall) { in ia32_classify_syscall()
|
/linux-4.1.27/arch/openrisc/kernel/ |
D | signal.c | 231 int do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 239 if (syscall) { in do_signal() 297 do_work_pending(struct pt_regs *regs, unsigned int thread_flags, int syscall) in do_work_pending() argument 307 int restart = do_signal(regs, syscall); in do_work_pending() 316 syscall = 0; in do_work_pending()
|
/linux-4.1.27/tools/perf/Documentation/ |
D | perf-script-python.txt | 32 'syscall-counts' script you see when you list the available perf script 37 The syscall-counts script is a simple script, but demonstrates all the 39 of its output (syscall names are not yet supported, they will appear 43 syscall events: 73 Basically our task is to keep a per-syscall tally that gets updated 81 allowable by perf. These individual syscall events will however be 88 'id' field can be used to distinguish between individual syscall 91 For this script, we only need to know that a syscall was entered; we 102 The options basically say to collect data for every syscall event 192 # mv perf-script.py syscall-counts.py [all …]
|
D | perf-bench.txt | 158 Use perf's cpu-cycles event instead of gettimeofday syscall. 190 Use perf's cpu-cycles event instead of gettimeofday syscall.
|
D | perf-trace.txt | 38 List of events to show, currently only syscall names. 111 hooking the open syscall return + vfs_getname or via reading /proc/pid/fd, etc.
|
D | examples.txt | 204 0.00 : 31a2e95607: 0f 05 syscall
|
/linux-4.1.27/arch/alpha/kernel/ |
D | audit.c | 36 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 38 switch(syscall) { in audit_classify_syscall()
|
/linux-4.1.27/arch/ia64/kernel/ |
D | audit.c | 36 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 38 switch(syscall) { in audit_classify_syscall()
|
/linux-4.1.27/Documentation/mn10300/ |
D | ABI.txt | 141 A0 1st syscall argument Saved 142 D1 2nd syscall argument Saved 143 A3 3rd syscall argument Saved 144 A2 4th syscall argument Saved 145 D3 5th syscall argument Saved 146 D2 6th syscall argument Saved
|
/linux-4.1.27/tools/perf/tests/ |
D | Build | 6 perf-y += open-syscall.o 7 perf-y += open-syscall-all-cpus.o 8 perf-y += open-syscall-tp-fields.o
|
D | mmap-thread-lookup.c | 42 td->tid = syscall(SYS_gettid); in thread_init()
|
/linux-4.1.27/arch/score/kernel/ |
D | entry.S | 312 # other than syscall tracing? 409 sw r4, [r0, PT_ORIG_R4] #for restart syscall 410 sw r7, [r0, PT_ORIG_R7] #for restart syscall 411 sw r27, [r0, PT_IS_SYSCALL] # it from syscall 413 lw r9, [r0, PT_EPC] # skip syscall on return 417 cmpi.c r27, __NR_syscalls # check syscall number 420 slli r8, r27, 2 # get syscall routine 423 lw r10, [r11] # get syscall entry 477 sw r4, [r0, PT_R0] # set flag for syscall
|
/linux-4.1.27/arch/x86/vdso/vdso32/ |
D | syscall.S | 7 #define SYSCALL_ENTER_KERNEL syscall 21 syscall
|
/linux-4.1.27/arch/x86/um/ |
D | stub_64.S | 6 syscall 54 syscall
|
D | ptrace_32.c | 111 child->thread.regs.regs.syscall = value; in putreg() 146 return child->thread.regs.regs.syscall; in getreg()
|
/linux-4.1.27/include/linux/ |
D | audit.h | 87 extern int audit_classify_syscall(int abi, unsigned syscall); 96 extern int audit_classify_compat_syscall(int abi, unsigned syscall); 139 extern void __audit_seccomp(unsigned long syscall, long signr, int code); 209 static inline void audit_seccomp(unsigned long syscall, long signr, int code) in audit_seccomp() argument 213 __audit_seccomp(syscall, signr, code); in audit_seccomp() 378 static inline void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument 380 static inline void audit_seccomp(unsigned long syscall, long signr, int code) in audit_seccomp() argument
|
/linux-4.1.27/Documentation/prctl/ |
D | seccomp_filter.txt | 101 syscall was attempted. The program counter will be as though 102 the syscall happened (i.e. it will not point to the syscall 129 The tracer can skip the system call by changing the syscall number 131 requested by changing the system call to a valid syscall number. If 197 'syscall' instruction. Any code which wants to restart the call 199 trying to resume the syscall will again trigger the standard vsyscall 200 emulation security checks, making resuming the syscall mostly 204 but the syscall may not be changed to another system call using the 207 The rip value seen by the tracer will be the syscall entry address; 210 They might work. For example, on some kernels, choosing a syscall
|
/linux-4.1.27/kernel/trace/ |
D | trace_syscalls.c | 80 find_syscall_meta(unsigned long syscall) in find_syscall_meta() argument 89 kallsyms_lookup(syscall, NULL, NULL, NULL, str); in find_syscall_meta() 117 int i, syscall; in print_syscall_enter() local 120 syscall = trace->nr; in print_syscall_enter() 121 entry = syscall_nr_to_meta(syscall); in print_syscall_enter() 162 int syscall; in print_syscall_exit() local 166 syscall = trace->nr; in print_syscall_exit() 167 entry = syscall_nr_to_meta(syscall); in print_syscall_exit()
|
D | Kconfig | 239 Basic tracer to catch the syscall entry and exit events. 507 bool "Run selftest on syscall events" 510 This option will also enable testing every syscall event.
|
/linux-4.1.27/tools/testing/selftests/ptrace/ |
D | peeksiginfo.c | 16 return syscall(SYS_rt_sigqueueinfo, tgid, sig, uinfo); in sys_rt_sigqueueinfo() 22 return syscall(SYS_rt_tgsigqueueinfo, tgid, tid, sig, uinfo); in sys_rt_tgsigqueueinfo() 27 return syscall(SYS_ptrace, request, pid, addr, data); in sys_ptrace()
|
/linux-4.1.27/arch/xtensa/kernel/ |
D | signal.c | 195 regs->syscall = -1; /* disable syscall checks */ in restore_sigcontext() 429 if ((signed)regs->syscall >= 0) { in do_signal() 446 regs->areg[2] = regs->syscall; in do_signal() 468 if ((signed) regs->syscall >= 0) { in do_signal() 474 regs->areg[2] = regs->syscall; in do_signal()
|
D | Makefile | 8 ptrace.o setup.o signal.o stacktrace.o syscall.o time.o traps.o \
|
D | ptrace.c | 233 tmp = regs->syscall; in ptrace_peekusr() 261 regs->syscall = val; in ptrace_pokeusr()
|
D | asm-offsets.c | 43 DEFINE(PT_SYSCALL, offsetof (struct pt_regs, syscall)); in main()
|
D | traps.c | 416 regs->syscall); in show_regs()
|
D | entry.S | 911 rsr a0, depc # get syscall-nr 930 rsr a0, depc # get syscall-nr
|
/linux-4.1.27/tools/testing/selftests/x86/ |
D | single_step_syscall.c | 161 syscall(SYS_getpid); /* Force symbol binding without TF set. */ in main() 164 syscall(SYS_getpid); in main()
|
D | sigreturn.c | 146 if (syscall(SYS_modify_ldt, 1, desc, sizeof(*desc)) == 0) { in add_ldt() 227 if (syscall(SYS_set_thread_area, &gdt_data16_desc) == 0) { in setup_ldt() 252 if (syscall(SYS_set_thread_area, &gdt_npdata32_desc) == 0) { in setup_ldt()
|
/linux-4.1.27/arch/cris/arch-v32/kernel/ |
D | entry.S | 95 moveq 0, $r9 ; no syscall restarts, TYVM... 102 moveq 0, $r9 ; not a syscall 137 ;; In r9 we have the wanted syscall number. Arguments come in r10,r11,r12, 260 ;; We get here after doing a syscall if extra work might need to be done 261 ;; perform syscall exit tracing if needed. 293 ;; We get here as a sidetrack when we've entered a syscall with the 303 ;; Now re-enter the syscall code to do the syscall itself. We need to 304 ;; restore R9 here to contain the wanted syscall, and the other
|
/linux-4.1.27/arch/unicore32/kernel/ |
D | entry.S | 26 @ the addition of 8 bytes for storing syscall args 5 and 6. 75 add sp, sp, #\offset + S_R1 @ r0 is syscall return value 136 scno .req r21 @ syscall number 137 tbl .req r22 @ syscall table pointer 138 why .req r22 @ Linux syscall (!= 0) 618 ldw tbl, =sys_call_table @ load syscall table pointer 624 ldw ip, [tsk+], #TI_FLAGS @ check for syscall tracing 628 csub.a scno, #__NR_syscalls @ check upper syscall limit 634 2: mov why, #0 @ no longer a real syscall 648 mov scno, r0 @ syscall number (possibly new) [all …]
|
D | ptrace.c | 131 current_thread_info()->syscall = scno; in syscall_trace() 148 return current_thread_info()->syscall; in syscall_trace()
|
D | signal.c | 305 int syscall) in handle_signal() argument 315 if (syscall) { in handle_signal() 357 static void do_signal(struct pt_regs *regs, int syscall) in do_signal() argument 371 handle_signal(&ksig, regs, syscall); in do_signal() 378 if (syscall) { in do_signal() 405 unsigned int thread_flags, int syscall) in do_notify_resume() argument 408 do_signal(regs, syscall); in do_notify_resume()
|
/linux-4.1.27/Documentation/x86/ |
D | entry_64.txt | 12 syscall entry points and thus provides for 32-bit processes the 19 - system_call: syscall instruction from 64-bit code. 21 - ia32_syscall: int 0x80 from 32-bit or 64-bit code; compat syscall 24 - ia32_syscall, ia32_sysenter: syscall and sysenter from 32-bit 39 have different calling conventions. The syscall and sysenter
|
D | intel_mpx.txt | 119 memory. Any direct kernel involvement (like a syscall) to access the 147 allocation syscall. This can be done for small, constrained applications.
|
/linux-4.1.27/arch/um/os-Linux/ |
D | start_up.c | 261 int pid, syscall, n, status; in check_ptrace() local 283 syscall = ptrace(PTRACE_PEEKUSER, pid, PT_SYSCALL_NR_OFFSET, in check_ptrace() 285 if (syscall == __NR_getpid) { in check_ptrace()
|
D | aio.c | 38 return syscall(__NR_io_setup, n, ctxp); in io_setup() 43 return syscall(__NR_io_submit, ctx, nr, iocbpp); in io_submit() 49 return syscall(__NR_io_getevents, ctx_id, min_nr, nr, events, timeout); in io_getevents()
|
D | process.c | 124 return syscall(__NR_getpid); in os_getpid()
|
/linux-4.1.27/arch/hexagon/kernel/ |
D | traps.c | 361 syscall_fn syscall; in do_trap0() local 398 syscall = (syscall_fn) in do_trap0() 400 regs->r00 = syscall(regs->r00, regs->r01, in do_trap0()
|
/linux-4.1.27/tools/perf/scripts/python/bin/ |
D | syscall-counts-report | 10 perf script $@ -s "$PERF_EXEC_PATH"/scripts/python/syscall-counts.py $comm
|
D | syscall-counts-by-pid-report | 10 perf script $@ -s "$PERF_EXEC_PATH"/scripts/python/syscall-counts-by-pid.py $comm
|
/linux-4.1.27/kernel/bpf/ |
D | Makefile | 2 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o hashtab.o arraymap.o helpers.o
|
/linux-4.1.27/arch/x86/vdso/ |
D | .gitignore | 3 vdso32-syscall-syms.lds
|
D | Makefile | 23 vdso_img-$(CONFIG_COMPAT) += 32-syscall 129 vdso32.so-$(CONFIG_COMPAT) += syscall 209 clean-files := vdso32-syscall* vdso32-sysenter* vdso32-int80* vdso64* vdso-image-*.c vdsox32.so*
|
/linux-4.1.27/Documentation/vm/ |
D | remap_file_pages.txt | 16 It's only known that one enterprise RDBMS implementation uses the syscall 21 The syscall is deprecated and replaced it with an emulation now. The
|
/linux-4.1.27/tools/lib/lockdep/ |
D | common.c | 29 current_obj.pid = syscall(__NR_gettid); in __curr()
|
/linux-4.1.27/ipc/ |
D | Makefile | 6 obj-$(CONFIG_SYSVIPC) += util.o msgutil.o msg.o sem.o shm.o syscall.o
|
/linux-4.1.27/arch/metag/include/asm/ |
D | syscalls.h | 37 int syscall);
|
/linux-4.1.27/arch/x86/um/os-Linux/ |
D | tls.c | 31 if (syscall(__NR_get_thread_area, &info) == 0) { in check_host_supports_tls()
|
/linux-4.1.27/arch/xtensa/include/asm/ |
D | ptrace.h | 38 unsigned long syscall; /* 56 */ member
|
/linux-4.1.27/tools/perf/bench/ |
D | futex.h | 36 syscall(SYS_futex, uaddr, op | opflags, val, timeout, uaddr2, val3)
|
/linux-4.1.27/arch/arm64/kernel/ |
D | signal.c | 335 int syscall = (int)regs->syscallno; in do_signal() local 341 if (syscall >= 0) { in do_signal() 393 if (syscall >= 0 && regs->pc == restart_addr) { in do_signal()
|
D | entry.S | 37 .macro ct_user_exit, syscall = 0 40 .if \syscall == 1
|
/linux-4.1.27/arch/cris/arch-v10/kernel/ |
D | entry.S | 127 ;; In r9 we have the wanted syscall number. Arguments come in r10,r11,r12,r13,mof,srp 224 ;; We get here after doing a syscall if extra work might need to be done 225 ;; perform syscall exit tracing if needed 275 ;; We get here as a sidetrack when we've entered a syscall with the 284 ;; now re-enter the syscall code to do the syscall itself 285 ;; we need to restore $r9 here to contain the wanted syscall, and
|
/linux-4.1.27/Documentation/ |
D | robust-futexes.txt | 15 syscall is used to wait for the other guy to release it. The kernel 20 sys_futex(FUTEX_WAKE) syscall to wake them up. Once all waiters have 53 syscall variants to sys_futex(): FUTEX_REGISTER, FUTEX_DEREGISTER and 87 userspace list is registered with the kernel via a new syscall [this 179 for new threads, without the need of another syscall.] 182 and even for robust futex users, there is only one extra syscall per
|
D | dontdiff | 235 vdso32-syscall-syms.lds
|
D | stable_api_nonsense.txt | 10 the one that application programs use, the syscall interface. That
|
D | kernel-parameters.txt | 3935 native Vsyscalls are native syscall instructions.
|
/linux-4.1.27/arch/m68k/kernel/ |
D | entry.S | 159 jcs syscall 200 | syscall trace? 205 syscall: label
|
/linux-4.1.27/arch/um/kernel/ |
D | Makefile | 15 signal.o syscall.o sysrq.o time.o tlb.o trap.o \
|
/linux-4.1.27/arch/mn10300/kernel/ |
D | entry.S | 132 # is there any work to be done other than syscall tracing? 148 # perform syscall entry tracing 153 call syscall_trace_entry[],0 # returns the syscall number to actually use 164 # userspace resumption stub bypassing syscall exit tracing
|
/linux-4.1.27/tools/testing/selftests/kcmp/ |
D | kcmp_test.c | 24 return syscall(__NR_kcmp, pid1, pid2, type, fd1, fd2); in sys_kcmp()
|
/linux-4.1.27/arch/mips/include/asm/ |
D | ptrace.h | 84 extern asmlinkage long syscall_trace_enter(struct pt_regs *regs, long syscall);
|
D | syscall.h | 32 return current_thread_info()->syscall; in syscall_get_nr()
|
D | thread_info.h | 37 long syscall; /* syscall number */ member
|
/linux-4.1.27/Documentation/zh_CN/arm64/ |
D | tagged-pointers.txt | 39 这意味着任何携带用户空间虚拟地址的系统调用(syscall)
|
/linux-4.1.27/arch/arm/include/asm/ |
D | syscall.h | 24 return task_thread_info(task)->syscall; in syscall_get_nr()
|
D | thread_info.h | 58 __u32 syscall; /* syscall number */ member
|
/linux-4.1.27/tools/perf/ |
D | perf-sys.h | 180 fd = syscall(__NR_perf_event_open, attr, pid, cpu, in sys_perf_event_open()
|
D | builtin-trace.c | 1136 struct syscall { struct 1224 struct syscall *table; 1443 static int syscall__set_arg_fmts(struct syscall *sc) in syscall__set_arg_fmts() 1469 struct syscall *sc; in trace__read_syscall_info() 1476 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc)); in trace__read_syscall_info() 1543 static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size, in syscall__scnprintf_args() 1615 static struct syscall *trace__syscall_info(struct trace *trace, in trace__syscall_info() 1716 struct syscall *sc = trace__syscall_info(trace, evsel, id); in trace__sys_enter() 1772 struct syscall *sc = trace__syscall_info(trace, evsel, id); in trace__sys_exit() 2457 struct syscall *sc; in thread__dump_stats()
|
D | design.txt | 28 The syscall returns the new fd. The fd can be used via the normal 96 * parameter of the sys_perf_event_open() syscall:
|
/linux-4.1.27/drivers/pci/ |
D | Makefile | 52 obj-$(CONFIG_PCI_SYSCALL) += syscall.o
|
/linux-4.1.27/arch/unicore32/include/asm/ |
D | thread_info.h | 75 __u32 syscall; /* syscall number */ member
|
/linux-4.1.27/Documentation/ko_KR/ |
D | stable_api_nonsense.txt | 31 인터페이스는 응용프로그램이 사용하는 syscall 인터페이스이다. 그 인터페이스는
|
/linux-4.1.27/arch/ |
D | Kconfig | 190 # asm/syscall.h supplying asm-generic/syscall.h interface 324 - seccomp syscall wired up 335 to the syscall_xyz helpers for every syscall. 530 Architecture has old sigsuspend(2) syscall, of one-argument variety 540 Architecture has old sigaction(2) syscall. Nope, not the same
|
/linux-4.1.27/tools/testing/selftests/powerpc/pmu/ |
D | event.c | 19 return syscall(__NR_perf_event_open, attr, pid, cpu, in perf_event_open()
|
/linux-4.1.27/Documentation/block/ |
D | ioprio.txt | 91 return syscall(__NR_ioprio_set, which, who, ioprio); 96 return syscall(__NR_ioprio_get, which, who);
|
/linux-4.1.27/arch/xtensa/ |
D | Kconfig | 237 fast_syscall_xtensa is a syscall that can make atomic operations 240 This syscall is deprecated. It may have issues when called with 247 bool "Enable spill registers syscall" 250 fast_syscall_spill_registers is a syscall that spills all active 253 This syscall is deprecated. It may have issues when called with
|
/linux-4.1.27/Documentation/arm64/ |
D | tagged-pointers.txt | 17 are tagged with tag 0x00. This means that any syscall
|
/linux-4.1.27/tools/testing/selftests/powerpc/mm/ |
D | subpage_prot.c | 111 err = syscall(__NR_subpage_prot, addr, size, map); in run_test()
|
/linux-4.1.27/arch/m32r/kernel/ |
D | entry.S | 151 ; userspace resumption stub bypassing syscall exit tracing
|
/linux-4.1.27/tools/testing/selftests/memfd/ |
D | fuse_test.c | 41 return syscall(__NR_memfd_create, name, flags); in sys_memfd_create()
|
D | memfd_test.c | 26 return syscall(__NR_memfd_create, name, flags); in sys_memfd_create()
|
/linux-4.1.27/arch/sh/kernel/ |
D | entry-common.S | 235 syscall_badsys: ! Bad syscall number
|
/linux-4.1.27/kernel/ |
D | auditfilter.c | 197 int audit_match_class(int class, unsigned syscall) in audit_match_class() argument 199 if (unlikely(syscall >= AUDIT_BITMASK_SIZE * 32)) in audit_match_class() 203 return classes[class][AUDIT_WORD(syscall)] & AUDIT_BIT(syscall); in audit_match_class()
|
D | seccomp.c | 539 static void seccomp_send_sigsys(int syscall, int reason) in seccomp_send_sigsys() argument 548 info.si_syscall = syscall; in seccomp_send_sigsys()
|
D | audit.h | 229 extern int audit_match_class(int class, unsigned syscall);
|
D | auditsc.c | 2406 void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument 2415 signr, syscall_get_arch(), syscall, is_compat_task(), in __audit_seccomp()
|
/linux-4.1.27/Documentation/scheduler/ |
D | sched-deadline.txt | 418 #include <sys/syscall.h> 421 #define gettid() syscall(__NR_gettid) 425 /* XXX use the proper syscall numbers */ 465 return syscall(__NR_sched_setattr, pid, attr, flags); 473 return syscall(__NR_sched_getattr, pid, attr, size, flags);
|
D | sched-nice-design.txt | 69 (the first one is the glibc API, the second one is the syscall API.)
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | sysfs-bus-event_source-devices-events | 60 to the perf_open syscall.
|
D | dev-kmsg | 99 console, /proc/kmsg or the syslog() syscall.
|
/linux-4.1.27/arch/m32r/include/asm/ |
D | assembler.h | 151 addi r15, #4 ; Skip syscall number
|
/linux-4.1.27/arch/um/include/shared/ |
D | os.h | 250 int syscall, unsigned long *args, long expected,
|
/linux-4.1.27/arch/frv/kernel/ |
D | entry.S | 1135 # perform syscall entry tracing 1149 # perform syscall exit tracing
|
/linux-4.1.27/Documentation/ptp/ |
D | testptp.c | 55 return syscall(__NR_clock_adjtime, id, tx); in clock_adjtime()
|
/linux-4.1.27/fs/hostfs/ |
D | hostfs_user.c | 373 err = syscall(SYS_renameat2, AT_FDCWD, from, AT_FDCWD, to, flags); in rename2_file()
|
/linux-4.1.27/arch/arc/kernel/ |
D | entry.S | 435 ; Tracing code now returns the syscall num (orig or modif) 446 ; have deliberately changed the syscall args: r0-r7
|
/linux-4.1.27/Documentation/networking/ |
D | nfc.txt | 114 NFC_SOCKPROTO_RAW socket and call the 'connect' syscall with the sockaddr_nfc
|
D | filter.txt | 1103 The maps are accessed from user space via BPF syscall, which has commands: 1126 userspace programs use this syscall to create/access maps that eBPF programs 1285 Also trinity, the Linux syscall fuzzer, has built-in support for BPF and
|
D | can.txt | 603 The CAN device MTU can be retrieved e.g. with a SIOCGIFMTU ioctl() syscall. 691 CAN interface unless the sendto() syscall is used to overrule the 'any' CAN 1175 The CAN device MTU can be retrieved e.g. with a SIOCGIFMTU ioctl() syscall.
|
/linux-4.1.27/tools/testing/selftests/exec/ |
D | execveat.c | 31 return syscall(__NR_execveat, fd, path, argv, envp, flags); in execveat_()
|
/linux-4.1.27/arch/sh/kernel/cpu/sh3/ |
D | entry.S | 250 add #4, r15 ! Skip syscall number
|
/linux-4.1.27/drivers/uio/ |
D | Kconfig | 36 interrupts in the interrupt controller using the write() syscall.
|
/linux-4.1.27/arch/microblaze/kernel/ |
D | entry.S | 337 # do_syscall_trace_enter returns the new syscall nr. 371 # Find and jump into the syscall handler.
|
/linux-4.1.27/Documentation/ia64/ |
D | fsys.txt | 212 fsyscall-handler, at which point, by definition, a syscall 261 mov r15 = 1087 // gettimeofday syscall
|
/linux-4.1.27/Documentation/nfc/ |
D | nfc-hci.txt | 213 will be the syscall context. skb will return the result that was received in 235 The completion callback will then wake the syscall context.
|
/linux-4.1.27/Documentation/sysctl/ |
D | kernel.txt | 346 A toggle indicating if the kexec_load syscall has been disabled. This 350 loaded before disabling the syscall, allowing a system to set up (and 798 Each write syscall must fully contain the sysctl value to be 808 fully contained in the buffer sent in the write syscall.
|
/linux-4.1.27/Documentation/arm/ |
D | kernel_user_helpers.txt | 98 Get the TLS value as previously set via the __ARM_NR_set_tls syscall.
|
/linux-4.1.27/Documentation/security/ |
D | keys-request-key.txt | 76 (1) Process A calls request_key() [the userspace syscall calls the kernel
|
D | keys.txt | 454 The keyctl syscall functions are:
|
/linux-4.1.27/Documentation/early-userspace/ |
D | README | 137 filesystem via linuxrc and use the pivot_root syscall. The initrd is
|
/linux-4.1.27/arch/tile/kernel/ |
D | intvec_32.S | 683 .ifc \kind,syscall 1199 check_single_stepping syscall, .Ldispatch_syscall
|
/linux-4.1.27/init/ |
D | Kconfig | 287 bool "uselib syscall" 290 This option enables the uselib syscall, a system call used in the 293 earlier, you may need to enable this syscall. Current systems 1359 This enables the legacy 16-bit UID syscall wrappers. 1386 bool "Sysfs syscall support" if EXPERT 1396 bool "Sysctl syscall support" if EXPERT 1538 # syscall, maps, verifier
|
/linux-4.1.27/Documentation/powerpc/ |
D | transactional_memory.txt | 85 itself by calling a syscall, you'll have a livelock & make no progress.
|
D | cxl.txt | 98 userspace by a read syscall documented below.
|
/linux-4.1.27/Documentation/scsi/ |
D | advansys.txt | 127 syscall(103, 7, 0, 0);
|
/linux-4.1.27/Documentation/hid/ |
D | uhid.txt | 41 If you want to handle multiple events in a single syscall, then use vectored
|
/linux-4.1.27/Documentation/filesystems/nfs/ |
D | rpc-cache.txt | 172 (which propagates back to the write syscall) or 0.
|
/linux-4.1.27/Documentation/filesystems/ |
D | Locking | 156 by resolving the pathname passed to syscall. 293 ->writepages() is used for periodic writeback and for syscall-initiated
|
/linux-4.1.27/Documentation/filesystems/caching/ |
D | cachefiles.txt | 417 process issued the original syscall on the netfs.
|
/linux-4.1.27/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 2707 411 else res = EXECUTE_SYSCALL(syscall, regs); 3061 kernel_stack_page = 0, signal_stack = 1342627840, syscall = {id = 4, args = { 3073 The interesting things here are the fact that its .thread.syscall.id 3145 #17 0x1006d5b3 in execute_syscall (syscall=4, args=0x5006ef08) 3524 #9 0x1006d603 in execute_syscall (syscall=4, args=0x5006ef08)
|
/linux-4.1.27/Documentation/s390/ |
D | Debugging390.txt | 1065 opcode and the second byte being the syscall number. They are traced using the 1070 TR SVC 5 ( as this is the syscall number of open ) 1116 e.g. consider tracing an open syscall
|
/linux-4.1.27/arch/arm/ |
D | Kconfig | 1599 option also changes the kernel syscall calling convention to 1609 This option preserves the old syscall interface along with the
|
/linux-4.1.27/arch/x86/ |
D | Kconfig | 1748 bool "Verify kernel signature during kexec_file_load() syscall" 1752 the kexec_file_load() syscall.
|
/linux-4.1.27/ |
D | CREDITS | 1271 D: prctl() syscall
|
D | MAINTAINERS | 7917 F: include/asm-generic/syscall.h
|