/linux/tools/testing/selftests/ftrace/test.d/dynevent/ |
H A D | eprobes_syntax_errors.tc | 4 # requires: dynamic_events events/syscalls/sys_enter_openat "<attached-group>.<attached-event> [<ar… 13 check_error 'e syscalls/sys_enter_openat ^foo' # BAD_ATTACH_ARG 14 check_error 'e:^/bar syscalls/sys_enter_openat' # NO_GROUP_NAME 15 check_error 'e:^12345678901234567890123456789012345678901234567890123456789012345/bar syscalls/sys_… 17 check_error 'e:^foo.1/bar syscalls/sys_enter_openat' # BAD_GROUP_NAME 18 check_error 'e:^ syscalls/sys_enter_openat' # NO_EVENT_NAME 19 check_error 'e:foo/^12345678901234567890123456789012345678901234567890123456789012345 syscalls/sys_… 20 check_error 'e:foo/^bar.1 syscalls/sys_enter_openat' # BAD_EVENT_NAME 22 check_error 'e:foo/bar syscalls/sys_enter_openat arg=^dfd' # BAD_FETCH_ARG 23 check_error 'e:foo/bar syscalls/sys_enter_openat ^arg=$foo' # BAD_ATTACH_ARG [all …]
|
H A D | test_duplicates.tc | 4 …up>/][<event>]] <attached-group>.<attached-event> [<args>]":README events/syscalls/sys_enter_openat 18 echo 'e:egroup/eevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events 21 ! echo 'e:egroup/eevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events 22 ! echo 'e:syscalls/sys_enter_open syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_… 26 ! echo 'e:kgroup/kevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events 31 ! echo 'p:syscalls/sys_enter_open vfs_open file=+0($arg2)' >> dynamic_events
|
/linux/tools/perf/ |
H A D | check-headers.sh | 196 check_2 tools/perf/arch/x86/entry/syscalls/syscall_32.tbl arch/x86/entry/syscalls/syscall_32.tbl 197 check_2 tools/perf/arch/x86/entry/syscalls/syscall_64.tbl arch/x86/entry/syscalls/syscall_64.tbl 198 check_2 tools/perf/arch/powerpc/entry/syscalls/syscall.tbl arch/powerpc/kernel/syscalls/syscall.tbl 199 check_2 tools/perf/arch/s390/entry/syscalls/syscall.tbl arch/s390/kernel/syscalls/syscall.tbl 200 check_2 tools/perf/arch/mips/entry/syscalls/syscall_n64.tbl arch/mips/kernel/syscalls/syscall_n64.t… 201 check_2 tools/perf/arch/arm/entry/syscalls/syscall.tbl arch/arm/tools/syscall.tbl 202 check_2 tools/perf/arch/sh/entry/syscalls/syscall.tbl arch/sh/kernel/syscalls/syscall.tbl 203 check_2 tools/perf/arch/sparc/entry/syscalls/syscall.tbl arch/sparc/kernel/syscalls/syscall.tbl 204 check_2 tools/perf/arch/xtensa/entry/syscalls/syscall.tbl arch/xtensa/kernel/syscalls/syscall.tbl 205 check_2 tools/perf/arch/alpha/entry/syscalls/syscall.tbl arch/alpha/entry/syscalls/syscall.tbl [all …]
|
H A D | builtin-timechart.c | 1553 { "syscalls:sys_enter_read", process_enter_read }, in __cmd_timechart() 1554 { "syscalls:sys_enter_pread64", process_enter_read }, in __cmd_timechart() 1555 { "syscalls:sys_enter_readv", process_enter_read }, in __cmd_timechart() 1556 { "syscalls:sys_enter_preadv", process_enter_read }, in __cmd_timechart() 1557 { "syscalls:sys_enter_write", process_enter_write }, in __cmd_timechart() 1558 { "syscalls:sys_enter_pwrite64", process_enter_write }, in __cmd_timechart() 1559 { "syscalls:sys_enter_writev", process_enter_write }, in __cmd_timechart() 1560 { "syscalls:sys_enter_pwritev", process_enter_write }, in __cmd_timechart() 1561 { "syscalls:sys_enter_sync", process_enter_sync }, in __cmd_timechart() 1562 { "syscalls:sys_enter_sync_file_range", process_enter_sync }, in __cmd_timechart() [all …]
|
H A D | builtin-trace.c | 155 } syscalls; member 339 * sc: for raw_syscalls:sys_{enter,exit} and syscalls:sys_{enter,exit}_SYSCALLNAME 363 * syscalls:sys_{enter,exit}_SYSCALL tracepoints 521 /* older kernel (e.g., RHEL6) use syscalls:{enter,exit} */ in perf_evsel__raw_syscall_newtp() 523 evsel = evsel__newtp("syscalls", direction); in perf_evsel__raw_syscall_newtp() 1816 * So that the next arg with a payload can consume its augmented arg, i.e. for rename* syscalls in syscall_arg__scnprintf_augmented_string() 2106 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array() 2165 sc->tp_format = trace_event__tp_format("syscalls", tp_name); in syscall__read_info() 2169 sc->tp_format = trace_event__tp_format("syscalls", tp_name); in syscall__read_info() 2267 pr_debug("Skipping unknown syscalls: "); in trace__validate_ev_qualifier() [all …]
|
/linux/Documentation/admin-guide/ |
H A D | syscall-user-dispatch.rst | 12 incompatible code - while being able to execute native syscalls without 15 filter syscalls based on memory regions, and it doesn't support removing 24 syscalls directly (disabled) or send them to be emulated in userspace 35 architectures, like x86, but at least for Wine, syscalls issued by 39 Since this mechanism is designed to capture syscalls issued by 40 non-native applications, it must function on syscalls whose invocation 45 As the ABI of these intercepted syscalls is unknown to Linux, these 46 syscalls are not instrumentable via ptrace or the syscall tracepoints. 61 a memory region interval from which syscalls are always executed directly, 67 included in this region. In addition, for syscalls that implement the [all …]
|
/linux/tools/perf/scripts/python/ |
H A D | syscall-counts-by-pid.py | 6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed. 33 syscalls = autodict() variable 48 syscalls[common_comm][common_pid][id] += 1 50 syscalls[common_comm][common_pid][id] = 1 63 print("%-40s %10s" % ("comm [pid]/syscalls", "count")) 67 comm_keys = syscalls.keys() 69 pid_keys = syscalls[comm].keys() 72 id_keys = syscalls[comm][pid].keys() 73 for id, val in sorted(syscalls[comm][pid].items(),
|
H A D | failed-syscalls-by-pid.py | 6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed. 34 syscalls = autodict() variable 51 syscalls[common_comm][common_pid][id][ret] += 1 53 syscalls[common_comm][common_pid][id][ret] = 1 69 comm_keys = syscalls.keys() 71 pid_keys = syscalls[comm].keys() 74 id_keys = syscalls[comm][pid].keys() 77 ret_keys = syscalls[comm][pid][id].keys() 78 …for ret, val in sorted(syscalls[comm][pid][id].items(), key = lambda kv: (kv[1], kv[0]), reverse =…
|
H A D | sctop.py | 6 # syscall. If a [comm] arg is specified, only syscalls called by 46 syscalls = autodict() variable 59 syscalls[id] += 1 61 syscalls[id] = 1 81 for id, val in sorted(syscalls.items(), 88 syscalls.clear()
|
H A D | syscall-counts.py | 6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed. 30 syscalls = autodict() variable 45 syscalls[id] += 1 47 syscalls[id] = 1 63 for id, val in sorted(syscalls.items(),
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_map_ops.c | 37 SEC("tp/syscalls/sys_enter_getpid") 51 SEC("tp/syscalls/sys_enter_getppid") 64 SEC("tp/syscalls/sys_enter_getuid") 77 SEC("tp/syscalls/sys_enter_geteuid") 90 SEC("tp/syscalls/sys_enter_getgid") 103 SEC("tp/syscalls/sys_enter_gettid") 121 SEC("tp/syscalls/sys_enter_getpgid")
|
H A D | strncmp_test.c | 22 SEC("?tp/syscalls/sys_enter_nanosleep") 32 SEC("?tp/syscalls/sys_enter_nanosleep") 40 SEC("?tp/syscalls/sys_enter_nanosleep") 48 SEC("?tp/syscalls/sys_enter_nanosleep")
|
H A D | htab_mem_bench.c | 55 SEC("?tp/syscalls/sys_enter_getpgid") 67 SEC("?tp/syscalls/sys_enter_getpgid") 83 SEC("?tp/syscalls/sys_enter_getpgid") 95 SEC("?tp/syscalls/sys_enter_getppid")
|
H A D | dynptr_success.c | 37 SEC("?tp/syscalls/sys_enter_nanosleep") 68 SEC("?tp/syscalls/sys_enter_nanosleep") 138 SEC("?tp/syscalls/sys_enter_nanosleep") 214 SEC("tp/syscalls/sys_enter_nanosleep") 266 SEC("tp/syscalls/sys_enter_nanosleep") 324 SEC("tp/syscalls/sys_enter_nanosleep") 374 SEC("tp/syscalls/sys_enter_nanosleep") 583 SEC("?tp/syscalls/sys_enter_nanosleep") 689 SEC("?tp/syscalls/sys_enter_nanosleep") 707 SEC("?tp/syscalls/sys_enter_nanosleep") [all …]
|
/linux/samples/bpf/ |
H A D | syscall_tp_kern.c | 59 SEC("tracepoint/syscalls/sys_enter_open") 67 SEC("tracepoint/syscalls/sys_enter_openat") 74 SEC("tracepoint/syscalls/sys_enter_openat2") 82 SEC("tracepoint/syscalls/sys_exit_open") 90 SEC("tracepoint/syscalls/sys_exit_openat") 97 SEC("tracepoint/syscalls/sys_exit_openat2")
|
/linux/tools/perf/scripts/perl/bin/ |
H A D | rw-by-pid-record | 2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
|
H A D | rwtop-record | 2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
|
/linux/arch/x86/include/asm/ |
H A D | syscall_wrapper.h | 27 * perform sign-extension (omitted for zero-argument syscalls). Finally the 55 /* Mapping of registers to parameters for syscalls on x86-64 and x32 */ 80 /* Mapping of registers to parameters for syscalls on i386 */ 142 * For IA32 emulation, we need to handle "compat" syscalls *and* create 144 * ia32 regs in the proper order for shared or "common" syscalls. As some 145 * syscalls may not be implemented, we need to expand COND_SYSCALL in 168 * of the x86-64-style parameter ordering of x32 syscalls. The syscalls common 214 * As some compat syscalls may not be implemented, we need to expand 257 * For VSYSCALLS, we need to declare these three syscalls with the new
|
/linux/tools/perf/Documentation/ |
H A D | perf-trace.txt | 17 syscalls, but other system events like pagefaults, task lifetime events, 39 List of syscalls and other perf events (tracepoints, HW cache events, 42 Prefixing with ! shows all syscalls but the ones specified. You may 126 Show only syscalls that failed, i.e. that returned < 0. 141 Show only a summary of syscalls by thread with min, max, and average times 146 Show all syscalls followed by a summary by thread with min, max, and 151 syscalls, using only this option will trigger --summary. 171 --syscalls:: 173 --no-syscalls. 280 $ perf trace --no-syscalls -F [all …]
|
/linux/tools/testing/selftests/ftrace/test.d/filter/ |
H A D | event-filter-function.tc | 84 if [ -f events/syscalls/sys_enter_openat/filter ]; then 86 echo "filename.ustring ~ \"*$DIRNAME*\"" > events/syscalls/sys_enter_openat/filter 87 echo 1 > events/syscalls/sys_enter_openat/enable 94 echo 0 > events/syscalls/sys_enter_openat/enable
|
/linux/tools/perf/util/bpf_skel/ |
H A D | augmented_raw_syscalls.bpf.c | 206 SEC("tp/syscalls/sys_enter_connect") 227 SEC("tp/syscalls/sys_enter_sendto") 245 SEC("tp/syscalls/sys_enter_open") 260 SEC("tp/syscalls/sys_enter_openat") 275 SEC("tp/syscalls/sys_enter_rename") 306 SEC("tp/syscalls/sys_enter_renameat2") 348 SEC("tp/syscalls/sys_enter_perf_event_open") 380 SEC("tp/syscalls/sys_enter_clock_nanosleep") 401 SEC("tp/syscalls/sys_enter_nanosleep") 534 * We'll add to this as we add augmented syscalls right after that in sys_enter() [all …]
|
/linux/Documentation/locking/ |
H A D | robust-futexes.rst | 134 need any extra per-lock syscalls. Robust mutexes thus become a very 159 msecs - clearly slower, due to the 1 million FUTEX_WAKE syscalls 169 The patch adds two new syscalls: one to register the userspace list, and 209 I've tested the new syscalls on x86 and x86_64, and have made sure the 213 i386 and x86_64 syscalls are wired up at the moment, and Ulrich has 218 the new syscalls yet. 221 inline function before writing up the syscalls.
|
/linux/tools/perf/scripts/perl/ |
H A D | failed-syscalls.pl | 6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed. 29 sub syscalls::sys_exit subroutine 36 printf("\nfailed syscalls by comm:\n\n");
|
/linux/arch/powerpc/platforms/cell/ |
H A D | spu_callbacks.c | 10 #include <linux/syscalls.h> 13 #include <asm/syscalls.h> 22 * 1. They interact with the way SPU syscalls are handled
|
/linux/tools/perf/tests/ |
H A D | mmap-basic.c | 25 * This test will generate random numbers of calls to some getpid syscalls, 27 * the syscalls. 32 * Then it checks if the number of syscalls reported as perf events by 33 * the kernel corresponds to the number of syscalls made. 44 pid_t (*syscalls[])(void) = { (void *)getsid, getppid, (void*)getpgid }; in test__basic_mmap() local 86 evsels[i] = evsel__newtp("syscalls", name); in test__basic_mmap() 120 syscalls[i](); in test__basic_mmap()
|