/linux-4.4.14/tools/perf/scripts/python/ |
D | failed-syscalls-by-pid.py | 32 syscalls = autodict() variable 49 syscalls[common_comm][common_pid][id][ret] += 1 51 syscalls[common_comm][common_pid][id][ret] = 1 68 comm_keys = syscalls.keys() 70 pid_keys = syscalls[comm].keys() 73 id_keys = syscalls[comm][pid].keys() 76 ret_keys = syscalls[comm][pid][id].keys() 77 …for ret, val in sorted(syscalls[comm][pid][id].iteritems(), key = lambda(k, v): (v, k), reverse =…
|
D | syscall-counts-by-pid.py | 31 syscalls = autodict() variable 47 syscalls[common_comm][common_pid][id] += 1 49 syscalls[common_comm][common_pid][id] = 1 66 comm_keys = syscalls.keys() 68 pid_keys = syscalls[comm].keys() 71 id_keys = syscalls[comm][pid].keys() 72 for id, val in sorted(syscalls[comm][pid].iteritems(), \
|
D | sctop.py | 39 syscalls = autodict() variable 52 syscalls[id] += 1 54 syscalls[id] = 1 73 for id, val in sorted(syscalls.iteritems(), key = lambda(k, v): (v, k), \ 79 syscalls.clear()
|
D | syscall-counts.py | 28 syscalls = autodict() variable 43 syscalls[id] += 1 45 syscalls[id] = 1 62 for id, val in sorted(syscalls.iteritems(), key = lambda(k, v): (v, k), \
|
/linux-4.4.14/tools/perf/scripts/perl/bin/ |
D | rw-by-pid-record | 2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
|
D | rwtop-record | 2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
|
D | rw-by-file-record | 2 perf record -e syscalls:sys_enter_read -e syscalls:sys_enter_write $@
|
D | failed-syscalls-record | 3 perf record -e syscalls:sys_exit $@) 2> /dev/null
|
D | failed-syscalls-report | 10 perf script $@ -s "$PERF_EXEC_PATH"/scripts/perl/failed-syscalls.pl $comm
|
/linux-4.4.14/scripts/ |
D | checksyscalls.sh | 152 /* ... including the "new" 32-bit uid syscalls */ 195 /* Unmerged syscalls for AFS, STREAMS, etc. */ 215 (ignore_list && syscall_list $(dirname $0)/../arch/x86/entry/syscalls/syscall_32.tbl) | \
|
/linux-4.4.14/arch/x86/um/ |
D | user-offsets.c | 13 static char syscalls[] = { variable 20 static char syscalls[] = { variable 95 DEFINE(__NR_syscall_max, sizeof(syscalls) - 1); in foo() 96 DEFINE(NR_syscalls, sizeof(syscalls)); in foo()
|
/linux-4.4.14/tools/perf/scripts/python/bin/ |
D | futex-contention-record | 2 perf record -e syscalls:sys_enter_futex -e syscalls:sys_exit_futex $@
|
D | failed-syscalls-by-pid-record | 3 perf record -e syscalls:sys_exit $@) 2> /dev/null
|
D | sctop-record | 3 perf record -e syscalls:sys_enter $@) 2> /dev/null
|
D | syscall-counts-by-pid-record | 3 perf record -e syscalls:sys_enter $@) 2> /dev/null
|
D | syscall-counts-record | 3 perf record -e syscalls:sys_enter $@) 2> /dev/null
|
D | failed-syscalls-by-pid-report | 10 perf script $@ -s "$PERF_EXEC_PATH"/scripts/python/failed-syscalls-by-pid.py $comm
|
/linux-4.4.14/tools/perf/scripts/perl/ |
D | rwtop.pl | 35 sub syscalls::sys_exit_read subroutine 53 sub syscalls::sys_enter_read subroutine 66 sub syscalls::sys_exit_write subroutine 79 sub syscalls::sys_enter_write subroutine
|
D | rw-by-pid.pl | 24 sub syscalls::sys_exit_read subroutine 40 sub syscalls::sys_enter_read subroutine 51 sub syscalls::sys_exit_write subroutine 62 sub syscalls::sys_enter_write subroutine
|
D | rw-by-file.pl | 28 sub syscalls::sys_enter_read subroutine 39 sub syscalls::sys_enter_write subroutine
|
D | failed-syscalls.pl | 29 sub syscalls::sys_exit subroutine
|
/linux-4.4.14/tools/perf/Documentation/ |
D | perf-trace.txt | 17 syscalls, but other system events like pagefaults, task lifetime events, 38 List of syscalls to show, currently only syscall names. 39 Prefixing with ! shows all syscalls but the ones specified. You may 100 Show only a summary of syscalls by thread with min, max, and average times 105 Show all syscalls followed by a summary by thread with min, max, and 117 --syscalls:: 155 $ perf trace --no-syscalls -F 157 Trace syscalls, major and minor pagefaults:
|
D | perf-script-python.txt | 79 - we could enable every event under the tracing/events/syscalls 80 directory, but this is over 600 syscalls, well beyond the number 84 individual syscalls of interest. 86 - we can enable the sys_enter and/or sys_exit syscalls found under 87 tracing/events/raw_syscalls. These are called for all syscalls; the 241 syscalls = autodict() 244 syscalls[id] += 1 246 syscalls[id] = 1 249 The syscalls 'autodict' object is a special kind of Python dictionary 253 levels if they don't exist e.g syscalls[comm][pid][id] = 1 will create [all …]
|
D | perf-timechart.txt | 31 in poll/epoll/select syscalls.
|
/linux-4.4.14/arch/x86/kernel/ |
D | asm-offsets_32.c | 11 static char syscalls[] = { variable 73 DEFINE(__NR_syscall_max, sizeof(syscalls) - 1); in foo() 74 DEFINE(NR_syscalls, sizeof(syscalls)); in foo()
|
/linux-4.4.14/ |
D | Kbuild | 90 always += missing-syscalls 91 targets += missing-syscalls 96 missing-syscalls: scripts/checksyscalls.sh $(offsets-file) FORCE 97 $(call cmd,syscalls)
|
D | CREDITS | 1705 D: iBCS personalities, socket and X interfaces, x.out loader, syscalls...
|
D | MAINTAINERS | 227 F: include/linux/syscalls.h
|
/linux-4.4.14/tools/perf/tests/ |
D | mmap-basic.c | 28 pid_t (*syscalls[])(void) = { (void *)getsid, getppid, (void*)getpgid }; in test__basic_mmap() local 98 int foo = syscalls[i](); in test__basic_mmap()
|
/linux-4.4.14/tools/perf/ |
D | builtin-trace.c | 1413 } syscalls; member 1692 if (id > trace->syscalls.max) { in trace__read_syscall_info() 1693 struct syscall *nsyscalls = realloc(trace->syscalls.table, (id + 1) * sizeof(*sc)); in trace__read_syscall_info() 1698 if (trace->syscalls.max != -1) { in trace__read_syscall_info() 1699 memset(nsyscalls + trace->syscalls.max + 1, 0, in trace__read_syscall_info() 1700 (id - trace->syscalls.max) * sizeof(*sc)); in trace__read_syscall_info() 1705 trace->syscalls.table = nsyscalls; in trace__read_syscall_info() 1706 trace->syscalls.max = id; in trace__read_syscall_info() 1709 sc = trace->syscalls.table + id; in trace__read_syscall_info() 1889 if ((id > trace->syscalls.max || trace->syscalls.table[id].name == NULL) && in trace__syscall_info() [all …]
|
/linux-4.4.14/arch/microblaze/include/asm/ |
D | Kbuild | 11 generic-y += syscalls.h
|
/linux-4.4.14/Documentation/ |
D | robust-futexes.txt | 130 need any extra per-lock syscalls. Robust mutexes thus become a very 155 msecs - clearly slower, due to the 1 million FUTEX_WAKE syscalls 165 The patch adds two new syscalls: one to register the userspace list, and 205 i've tested the new syscalls on x86 and x86_64, and have made sure the 209 i386 and x86_64 syscalls are wired up at the moment, and Ulrich has 214 the new syscalls yet. 217 inline function before writing up the syscalls (that function returns
|
D | adding-syscalls.txt | 198 include/linux/syscalls.h, marked as asmlinkage to match the way that system 236 - corresponding prototype in include/linux/syscalls.h 247 arch/x86/entry/syscalls/syscall_64.tbl: 251 and an "i386" entry in arch/x86/entry/syscalls/syscall_32.tbl: 350 First, the entry in arch/x86/entry/syscalls/syscall_32.tbl gets an extra 362 arch/x86/entry/syscalls/syscall_64.tbl is split so that x32 programs hit the 371 arch/x86/entry/syscalls/syscall_64.tbl is unchanged). 400 (arch/x86/entry/syscalls/syscall_64.tbl) is adjusted to match: 407 arch/x86/entry/syscalls/syscall_32.tbl:
|
D | highuid.txt | 27 compatibility syscalls, if the OS being emulated used 16-bit UIDs, or
|
D | kernel-docs.txt | 513 Keywords: syscalls, intercept, hide, abuse, symbol table. 515 order to intercept and modify syscalls, make
|
D | kernel-parameters.txt | 1658 "isolated" CPU via the CPU affinity syscalls or cpuset. 2276 number for the readdir() and stat() syscalls instead
|
/linux-4.4.14/arch/h8300/kernel/ |
D | Makefile | 8 signal.o setup.o syscalls.o \
|
/linux-4.4.14/include/trace/events/ |
D | syscalls.h | 3 #define TRACE_INCLUDE_FILE syscalls
|
/linux-4.4.14/tools/testing/selftests/powerpc/ |
D | Makefile | 23 syscalls \
|
/linux-4.4.14/arch/powerpc/platforms/cell/spufs/ |
D | Makefile | 3 spufs-y += inode.o file.o context.o syscalls.o
|
/linux-4.4.14/Documentation/ABI/stable/ |
D | vdso | 4 to real syscalls.
|
/linux-4.4.14/arch/mips/kernel/ |
D | scall64-o32.S | 113 sd a7, PT_R11(sp) # For indirect syscalls 145 ld a7, PT_R11(sp) # For indirect syscalls 207 sd a1, PT_R5(sp) # syscalls expect them there
|
D | scall32-o32.S | 212 sw a1, PT_R5(sp) # syscalls expect them there
|
/linux-4.4.14/arch/unicore32/include/asm/ |
D | Kbuild | 55 generic-y += syscalls.h
|
/linux-4.4.14/Documentation/accounting/ |
D | taskstats-struct.txt | 162 __u64 read_syscalls; /* read syscalls */ 163 __u64 write_syscalls; /* write syscalls */
|
/linux-4.4.14/arch/sh/kernel/ |
D | entry-common.S | 206 mov.l 2f, r10 ! Number of syscalls
|
/linux-4.4.14/arch/mips/ |
D | Makefile | 380 $(Q)$(MAKE) $(build)=. missing-syscalls missing_syscalls_flags="-mabi=n32" 384 $(Q)$(MAKE) $(build)=. missing-syscalls missing_syscalls_flags="-mabi=32"
|
D | Kconfig | 2691 syscalls, it's possible to isolate those applications in 2694 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/microblaze/ |
D | Kconfig | 121 syscalls, it's possible to isolate those applications in 124 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/parisc/ |
D | Kconfig | 336 syscalls, it's possible to isolate those applications in 339 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/Documentation/serial/ |
D | serial-rs485.txt | 86 /* Use read() and write() syscalls here... */
|
/linux-4.4.14/Documentation/powerpc/ |
D | transactional_memory.txt | 86 guarantees are provided by the kernel about which syscalls will affect 89 Care must be taken when relying on syscalls to abort during active transactions
|
/linux-4.4.14/Documentation/trace/ |
D | events.txt | 388 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger 395 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger 405 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger 408 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
|
D | ftrace-design.txt | 218 You need very few things to get the syscalls tracing in an arch. 222 of syscalls supported by the arch. 225 in the ptrace syscalls tracing path.
|
D | ftrace.txt | 2758 # echo 1 > instances/zoot/events/syscalls/enable
|
/linux-4.4.14/arch/powerpc/kernel/ |
D | Makefile | 29 obj-y := cputable.o ptrace.o syscalls.o \
|
/linux-4.4.14/Documentation/ABI/ |
D | README | 17 (like syscalls) are expected to never change and always be
|
/linux-4.4.14/Documentation/prctl/ |
D | seccomp_filter.txt | 187 fall back to real syscalls. To minimize these surprises on x86, make 224 syscalls. New code will use the vDSO, and vDSO-issued system calls
|
/linux-4.4.14/arch/x86/ |
D | Makefile | 199 $(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all
|
D | Kconfig | 1732 syscalls, it's possible to isolate those applications in 1735 and the task is only allowed to execute a few safe syscalls 2037 to be able to issue three syscalls by calling fixed addresses in
|
/linux-4.4.14/Documentation/x86/ |
D | entry_64.txt | 13 ability to execute syscalls when running on 64-bit kernels.
|
/linux-4.4.14/arch/arm/kernel/ |
D | entry-common.S | 223 tst r10, #_TIF_SYSCALL_WORK @ are we tracing syscalls?
|
/linux-4.4.14/arch/tile/ |
D | Kconfig | 233 syscalls, it's possible to isolate those applications in 236 allowed to execute a few safe syscalls defined by each seccomp
|
/linux-4.4.14/arch/arc/kernel/ |
D | entry-compact.S | 411 ;this case is for syscalls or Exceptions or pure kernel mode
|
/linux-4.4.14/kernel/time/ |
D | Kconfig | 112 transitions: syscalls, exceptions and interrupts. Even when it's
|
/linux-4.4.14/arch/sparc/ |
D | Kconfig | 245 syscalls, it's possible to isolate those applications in 248 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/sh/ |
D | Kconfig | 660 syscalls, it's possible to isolate those applications in 663 allowed to execute a few safe syscalls defined by each seccomp
|
/linux-4.4.14/init/ |
D | Kconfig | 265 bool "Enable process_vm_readv/writev syscalls" 275 bool "open by fhandle syscalls" 284 syscalls. 1387 bool "sgetmask/ssetmask syscalls support" if EXPERT 1579 bool "Enable madvise/fadvise syscalls" if EXPERT 1582 This option enables the madvise and fadvise syscalls, used by 1585 applications use these syscalls, you can disable this option to save
|
/linux-4.4.14/arch/s390/ |
D | Kconfig | 702 syscalls, it's possible to isolate those applications in 705 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/kernel/trace/ |
D | Kconfig | 234 bool "Trace syscalls" 515 TBD - enable a way to actually call the syscalls as we test their
|
/linux-4.4.14/Documentation/networking/ |
D | netlink_mmap.txt | 20 syscalls have to be issued by user-space to get more message.
|
/linux-4.4.14/arch/arm64/ |
D | Kconfig | 553 syscalls, it's possible to isolate those applications in 556 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/unicore32/kernel/ |
D | entry.S | 625 cand.a ip, #_TIF_SYSCALL_TRACE @ are we tracing syscalls?
|
/linux-4.4.14/arch/powerpc/ |
D | Kconfig | 693 syscalls, it's possible to isolate those applications in 696 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/arm/ |
D | Kconfig | 1628 intercept syscalls that have structure arguments which layout 1631 overhead to all syscalls and produces a slightly larger kernel. 1791 syscalls, it's possible to isolate those applications in 1794 and the task is only allowed to execute a few safe syscalls
|
/linux-4.4.14/arch/xtensa/ |
D | Kconfig | 243 bool "Enable fast atomic syscalls"
|
/linux-4.4.14/arch/ |
D | Kconfig | 340 syscalls if TIF_SECCOMP is set, but seccomp_phase1 does not
|
/linux-4.4.14/Documentation/filesystems/ |
D | proc.txt | 1548 I/O counter: read syscalls 1549 Attempt to count the number of read I/O operations, i.e. syscalls like read() 1556 I/O counter: write syscalls 1557 Attempt to count the number of write I/O operations, i.e. syscalls like
|
/linux-4.4.14/Documentation/s390/ |
D | Debugging390.txt | 509 r0 used by syscalls/assembly call-clobbered 510 r1 used by syscalls/assembly call-clobbered 1061 Tracing linux syscalls under VM 1068 the syscalls are defined in linux/arch/s390/include/asm/unistd.h
|
/linux-4.4.14/arch/sparc/kernel/ |
D | entry.S | 1221 st %i0, [%sp + STACKFRAME_SZ + PT_G0] ! for restarting syscalls
|
/linux-4.4.14/Documentation/vm/ |
D | numa_memory_policy.txt | 372 prefix, are defined in <linux/syscalls.h>; the mode and flag
|
/linux-4.4.14/Documentation/scheduler/ |
D | sched-deadline.txt | 407 * the new scheduling related syscalls that manipulate it, i.e.,
|
/linux-4.4.14/Documentation/security/ |
D | keys.txt | 371 Userspace can manipulate keys directly through three new syscalls: add_key, 392 The main syscalls are:
|