Searched refs:SYSCALL (Results 1 – 16 of 16) sorted by relevance
| /linux/samples/seccomp/ |
| H A D | bpf-fancy.c | 38 SYSCALL(__NR_exit, ALLOW), in main() 39 SYSCALL(__NR_exit_group, ALLOW), in main() 40 SYSCALL(__NR_write, JUMP(&l, write_fd)), in main() 41 SYSCALL(__NR_read, JUMP(&l, read)), in main()
|
| H A D | bpf-helper.h | 55 #define SYSCALL(nr, jt) \ macro
|
| /linux/arch/sh/kernel/vsyscall/ |
| H A D | Makefile | 11 quiet_cmd_syscall = SYSCALL $@
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | libbpf_probes.c | 111 CASE(SYSCALL, sys_bpf, true), in test_libbpf_probe_helpers()
|
| /linux/Documentation/translations/zh_TW/arch/loongarch/ |
| H A D | introduction.rst | 248 SYSCALL BREAK CPUCFG NOP IDLE ERTN(ERET) DBCL(DBGCALL) RDTIMEL.W RDTIMEH.W RDTIME.D
|
| /linux/Documentation/translations/zh_CN/arch/loongarch/ |
| H A D | introduction.rst | 248 SYSCALL BREAK CPUCFG NOP IDLE ERTN(ERET) DBCL(DBGCALL) RDTIMEL.W RDTIMEH.W RDTIME.D
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 26 SYSCALL chapter
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 351 …type=1300 audit(1653364370.067:61): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=7f1105a… 355 …type=1300 audit(1653364735.161:64): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=0 a1=10… 396 …type=1300 audit(1653425583.136:54): SYSCALL arch=c000003e syscall=1 success=yes exit=2 a0=3 a1=559…
|
| /linux/Documentation/arch/x86/ |
| H A D | pti.rst | 156 5. Run 32-bit binaries on systems supporting the SYSCALL instruction.
|
| /linux/Documentation/arch/loongarch/ |
| H A D | introduction.rst | 281 SYSCALL BREAK CPUCFG NOP IDLE ERTN(ERET) DBCL(DBGCALL) RDTIMEL.W RDTIMEH.W RDTIME.D
|
| /linux/Documentation/driver-api/nfc/ |
| H A D | nfc-hci.rst | 219 - Syscall context from a userspace call (SYSCALL)
|
| /linux/arch/x86/kvm/ |
| H A D | cpuid.c | 1132 F(SYSCALL), in kvm_initialize_cpu_caps()
|
| /linux/tools/arch/x86/kcpuid/ |
| H A D | cpuid.csv | 682 0x80000001, 0, edx, 11, syscall , SYSCALL and SYSRET instructions
|
| /linux/tools/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 342 05: SYSCALL (o64)
|
| /linux/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 342 05: SYSCALL (o64)
|
| /linux/tools/lib/bpf/ |
| H A D | libbpf.c | 9880 SEC_DEF("syscall", SYSCALL, 0, SEC_SLEEPABLE),
|