/linux/arch/alpha/kernel/ |
H A D | audit.c | 36 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 38 switch(syscall) { in audit_classify_syscall()
|
/linux/tools/testing/selftests/pidfd/ |
H A D | pidfd_getfd_test.c | 14 #include <syscall.h> 34 return syscall(__NR_kcmp, pid1, pid2, type, idx1, idx2); in sys_kcmp() 215 SKIP(return, "kcmp() syscall not supported"); in TEST_F() 270 …fprintf(stderr, "__NR_pidfd_getfd undefined. The pidfd_getfd syscall is unavailable. Test aborting… in main()
|
/linux/tools/testing/selftests/perf_events/ |
H A D | sigtrap_threads.c | 31 #include <sys/syscall.h> 84 __atomic_fetch_sub(&ctx.tids_want_signal, syscall(__NR_gettid), __ATOMIC_RELAXED); in sigtrap_handler() 90 pid_t tid = syscall(__NR_gettid); in test_thread() 133 self->fd = syscall(__NR_perf_event_open, &attr, 0, -1, -1, PERF_FLAG_FD_CLOEXEC); in FIXTURE_SETUP()
|
/linux/arch/x86/um/ |
H A D | sys_call_table_32.c | 10 #include <asm/syscall.h> 18 * and the UML syscall table.
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | linked_vars.c | 5 #include <sys/syscall.h> 30 syscall(SYS_getpgid); in test_linked_vars()
|
H A D | verify_pkcs7_sig.c | 275 syscall(__NR_request_key, "keyring", "_uid.0", NULL, in test_verify_pkcs7_sig_from_map() 332 skel->bss->user_keyring_serial = syscall(__NR_request_key, "keyring", in test_verify_pkcs7_sig_from_map() 344 syscall(__NR_keyctl, KEYCTL_SETPERM, skel->bss->user_keyring_serial, in test_verify_pkcs7_sig_from_map() 351 syscall(__NR_keyctl, KEYCTL_SETPERM, skel->bss->user_keyring_serial, in test_verify_pkcs7_sig_from_map() 357 syscall(__NR_keyctl, KEYCTL_SET_TIMEOUT, in test_verify_pkcs7_sig_from_map() 504 skel->bss->user_keyring_serial = syscall(__NR_request_key, "keyring", in test_pkcs7_sig_fsverity()
|
/linux/arch/arm64/kernel/ |
H A D | sigreturn32.S | 9 * For ARM syscalls, the syscall number has to be loaded into r7. 12 * For Thumb syscalls, we also pass the syscall number via r7. We therefore
|
/linux/arch/powerpc/kernel/ |
H A D | systbl.c | 3 * This file contains the table of syscall-handling functions. 26 * Coerce syscall handlers with arbitrary parameters to common type
|
H A D | signal.c | 184 /* syscall ? */ in check_syscall_restart() 204 /* ERESTARTNOHAND means that the syscall should only be in check_syscall_restart() 211 /* ERESTARTSYS means to restart the syscall if there is no in check_syscall_restart() 217 /* ERESTARTNOINTR means that the syscall should be in check_syscall_restart() 253 /* Is there any syscall restart business here ? */ in do_signal()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | crypto_basic.c | 12 SEC("syscall") 38 SEC("syscall")
|
H A D | free_timer.c | 57 SEC("syscall") 64 SEC("syscall")
|
/linux/tools/testing/selftests/mm/ |
H A D | mlock2.h | 2 #include <syscall.h> 9 int ret = syscall(__NR_mlock2, start, len, flags); in mlock2_()
|
/linux/arch/xtensa/include/uapi/asm/ |
H A D | ptrace.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 57 __u32 syscall; member
|
/linux/tools/testing/selftests/x86/ |
H A D | lam.c | 6 #include <sys/syscall.h> 142 ret = syscall(SYS_arch_prctl, ARCH_GET_MAX_TAG_BITS, &bits); in lam_is_available() 182 syscall(SYS_arch_prctl, ARCH_ENABLE_TAGGED_ADDR, lam); in set_lam() 185 syscall(SYS_arch_prctl, ARCH_GET_UNTAG_MASK, &ptr); in set_lam() 229 if (syscall(SYS_arch_prctl, ARCH_GET_UNTAG_MASK, &ptr) == -1) in get_lam() 297 if (syscall(SYS_arch_prctl, ARCH_GET_MAX_TAG_BITS, &bits) == -1) in handle_max_bits() 475 return (int)syscall(__NR_io_uring_setup, entries, p); in sys_uring_setup() 480 return (int)syscall(__NR_io_uring_enter, fd, to, min, flags, NULL, 0); in sys_uring_enter() 981 .msg = "SYSCALL: LAM_U57. syscall wit [all...] |
/linux/tools/testing/selftests/vDSO/ |
H A D | vdso_test_getrandom.c | 19 #include <sys/syscall.h> 170 ssize_t ret = syscall(__NR_getrandom, &val, sizeof(val), 0); in test_syscall_getrandom() 196 printf("syscall: %u times in %lu.%09lu seconds\n", TRIALS, diff.tv_sec, diff.tv_nsec); in bench_single() 229 …printf(" syscall: %u x %u times in %lu.%09lu seconds\n", TRIALS, THREADS, diff.tv_sec, diff.tv_n… in bench_multi() 282 ksft_exit_fail_msg("vgetrandom passed buffer to syscall getrandom unexpectedly\n"); in kselftest()
|
/linux/arch/openrisc/include/asm/ |
H A D | ptrace.h | 33 * during a syscall or other kernel entry. 89 * Set to syscall number for syscall exceptions,
|
/linux/tools/include/io_uring/ |
H A D | mini_liburing.h | 5 #include <sys/syscall.h> 118 return syscall(__NR_io_uring_setup, entries, p); in io_uring_setup() 125 return syscall(__NR_io_uring_enter, fd, to_submit, min_complete, in io_uring_enter() 253 ret = syscall(__NR_io_uring_register, ring->ring_fd, in io_uring_register_buffers()
|
/linux/tools/lib/perf/ |
H A D | Makefile | 105 syscall-y := $(uapi-asm)/unistd_64.h 108 $(if $(syscall-y),\ 110 generic=include/uapi/asm-generic $(syscall-y),) 133 $(TESTS_STATIC) $(TESTS_SHARED) $(syscall-y)
|
/linux/tools/testing/selftests/kvm/include/ |
H A D | numaif.h | 23 return syscall(__NR_get_mempolicy, policy, nmask, in get_mempolicy() 31 return syscall(__NR_migrate_pages, pid, maxnode, frommask, tomask); in migrate_pages()
|
/linux/arch/parisc/kernel/ |
H A D | audit.c | 41 int audit_classify_syscall(int abi, unsigned syscall) in audit_classify_syscall() argument 43 switch (syscall) { in audit_classify_syscall()
|
/linux/arch/powerpc/include/uapi/asm/ |
H A D | cputable.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 51 #define PPC_FEATURE2_SCV 0x00100000 /* scv syscall */
|
/linux/Documentation/mm/ |
H A D | remap_file_pages.rst | 20 It's only known that one enterprise RDBMS implementation uses the syscall 25 The syscall is deprecated and replaced it with an emulation now. The
|
/linux/arch/um/include/asm/ |
H A D | thread_info.h | 35 #define TIF_SYSCALL_TRACE 0 /* syscall trace active */ 46 #define TIF_SYSCALL_TRACEPOINT 11 /* syscall tracepoint instrumentation */
|
/linux/tools/include/uapi/linux/ |
H A D | sched.h |
|
/linux/arch/microblaze/kernel/ |
H A D | ptrace.c | 42 #include <asm/syscall.h> 61 * kernel via [syscall] trap, is not stored anywhere; that's in reg_save_addr() 144 * Tracing decided this syscall should not happen. in do_syscall_trace_enter()
|