Home
last modified time | relevance | path

Searched full:syscalls (Results 1 – 25 of 537) sorted by relevance

12345678910>>...22

/linux/tools/testing/selftests/ftrace/test.d/dynevent/
H A Deprobes_syntax_errors.tc4 # requires: dynamic_events events/syscalls/sys_enter_openat "<attached-group>.<attached-event> [<ar…
13 check_error 'e syscalls/sys_enter_openat ^foo' # BAD_ATTACH_ARG
14 check_error 'e:^/bar syscalls/sys_enter_openat' # NO_GROUP_NAME
15 check_error 'e:^12345678901234567890123456789012345678901234567890123456789012345/bar syscalls/sys_…
17 check_error 'e:^foo.1/bar syscalls/sys_enter_openat' # BAD_GROUP_NAME
18 check_error 'e:^ syscalls/sys_enter_openat' # NO_EVENT_NAME
19 check_error 'e:foo/^12345678901234567890123456789012345678901234567890123456789012345 syscalls/sys_…
20 check_error 'e:foo/^bar.1 syscalls/sys_enter_openat' # BAD_EVENT_NAME
22 check_error 'e:foo/bar syscalls/sys_enter_openat arg=^dfd' # BAD_FETCH_ARG
23 check_error 'e:foo/bar syscalls/sys_enter_openat ^arg=$foo' # BAD_ATTACH_ARG
[all …]
H A Dtest_duplicates.tc4 …up>/][<event>]] <attached-group>.<attached-event> [<args>]":README events/syscalls/sys_enter_openat
18 echo 'e:egroup/eevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events
21 ! echo 'e:egroup/eevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events
22 ! echo 'e:syscalls/sys_enter_open syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_…
26 ! echo 'e:kgroup/kevent syscalls/sys_enter_openat file=+0($filename):ustring' >> dynamic_events
31 ! echo 'p:syscalls/sys_enter_open vfs_open file=+0($arg2)' >> dynamic_events
/linux/tools/perf/
H A Dcheck-headers.sh196 check_2 tools/perf/arch/x86/entry/syscalls/syscall_32.tbl arch/x86/entry/syscalls/syscall_32.tbl
197 check_2 tools/perf/arch/x86/entry/syscalls/syscall_64.tbl arch/x86/entry/syscalls/syscall_64.tbl
198 check_2 tools/perf/arch/powerpc/entry/syscalls/syscall.tbl arch/powerpc/kernel/syscalls/syscall.tbl
199 check_2 tools/perf/arch/s390/entry/syscalls/syscall.tbl arch/s390/kernel/syscalls/syscall.tbl
200 check_2 tools/perf/arch/mips/entry/syscalls/syscall_n64.tbl arch/mips/kernel/syscalls/syscall_n64.t…
201 check_2 tools/perf/arch/arm/entry/syscalls/syscall.tbl arch/arm/tools/syscall.tbl
202 check_2 tools/perf/arch/sh/entry/syscalls/syscall.tbl arch/sh/kernel/syscalls/syscall.tbl
203 check_2 tools/perf/arch/sparc/entry/syscalls/syscall.tbl arch/sparc/kernel/syscalls/syscall.tbl
204 check_2 tools/perf/arch/xtensa/entry/syscalls/syscall.tbl arch/xtensa/kernel/syscalls/syscall.tbl
205 check_2 tools/perf/arch/alpha/entry/syscalls/syscall.tbl arch/alpha/entry/syscalls/syscall.tbl
[all …]
H A Dbuiltin-timechart.c1553 { "syscalls:sys_enter_read", process_enter_read }, in __cmd_timechart()
1554 { "syscalls:sys_enter_pread64", process_enter_read }, in __cmd_timechart()
1555 { "syscalls:sys_enter_readv", process_enter_read }, in __cmd_timechart()
1556 { "syscalls:sys_enter_preadv", process_enter_read }, in __cmd_timechart()
1557 { "syscalls:sys_enter_write", process_enter_write }, in __cmd_timechart()
1558 { "syscalls:sys_enter_pwrite64", process_enter_write }, in __cmd_timechart()
1559 { "syscalls:sys_enter_writev", process_enter_write }, in __cmd_timechart()
1560 { "syscalls:sys_enter_pwritev", process_enter_write }, in __cmd_timechart()
1561 { "syscalls:sys_enter_sync", process_enter_sync }, in __cmd_timechart()
1562 { "syscalls:sys_enter_sync_file_range", process_enter_sync }, in __cmd_timechart()
[all …]
H A Dbuiltin-trace.c155 } syscalls; member
339 * sc: for raw_syscalls:sys_{enter,exit} and syscalls:sys_{enter,exit}_SYSCALLNAME
363 * syscalls:sys_{enter,exit}_SYSCALL tracepoints
521 /* older kernel (e.g., RHEL6) use syscalls:{enter,exit} */ in perf_evsel__raw_syscall_newtp()
523 evsel = evsel__newtp("syscalls", direction); in perf_evsel__raw_syscall_newtp()
1816 * So that the next arg with a payload can consume its augmented arg, i.e. for rename* syscalls in syscall_arg__scnprintf_augmented_string()
2106 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array()
2165 sc->tp_format = trace_event__tp_format("syscalls", tp_name); in syscall__read_info()
2169 sc->tp_format = trace_event__tp_format("syscalls", tp_name); in syscall__read_info()
2267 pr_debug("Skipping unknown syscalls: "); in trace__validate_ev_qualifier()
[all …]
/linux/Documentation/admin-guide/
H A Dsyscall-user-dispatch.rst12 incompatible code - while being able to execute native syscalls without
15 filter syscalls based on memory regions, and it doesn't support removing
24 syscalls directly (disabled) or send them to be emulated in userspace
35 architectures, like x86, but at least for Wine, syscalls issued by
39 Since this mechanism is designed to capture syscalls issued by
40 non-native applications, it must function on syscalls whose invocation
45 As the ABI of these intercepted syscalls is unknown to Linux, these
46 syscalls are not instrumentable via ptrace or the syscall tracepoints.
61 a memory region interval from which syscalls are always executed directly,
67 included in this region. In addition, for syscalls that implement the
[all …]
/linux/tools/perf/scripts/python/
H A Dsyscall-counts-by-pid.py6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed.
33 syscalls = autodict() variable
48 syscalls[common_comm][common_pid][id] += 1
50 syscalls[common_comm][common_pid][id] = 1
63 print("%-40s %10s" % ("comm [pid]/syscalls", "count"))
67 comm_keys = syscalls.keys()
69 pid_keys = syscalls[comm].keys()
72 id_keys = syscalls[comm][pid].keys()
73 for id, val in sorted(syscalls[comm][pid].items(),
H A Dfailed-syscalls-by-pid.py6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed.
34 syscalls = autodict() variable
51 syscalls[common_comm][common_pid][id][ret] += 1
53 syscalls[common_comm][common_pid][id][ret] = 1
69 comm_keys = syscalls.keys()
71 pid_keys = syscalls[comm].keys()
74 id_keys = syscalls[comm][pid].keys()
77 ret_keys = syscalls[comm][pid][id].keys()
78 …for ret, val in sorted(syscalls[comm][pid][id].items(), key = lambda kv: (kv[1], kv[0]), reverse =…
H A Dsctop.py6 # syscall. If a [comm] arg is specified, only syscalls called by
46 syscalls = autodict() variable
59 syscalls[id] += 1
61 syscalls[id] = 1
81 for id, val in sorted(syscalls.items(),
88 syscalls.clear()
H A Dsyscall-counts.py6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed.
30 syscalls = autodict() variable
45 syscalls[id] += 1
47 syscalls[id] = 1
63 for id, val in sorted(syscalls.items(),
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_map_ops.c37 SEC("tp/syscalls/sys_enter_getpid")
51 SEC("tp/syscalls/sys_enter_getppid")
64 SEC("tp/syscalls/sys_enter_getuid")
77 SEC("tp/syscalls/sys_enter_geteuid")
90 SEC("tp/syscalls/sys_enter_getgid")
103 SEC("tp/syscalls/sys_enter_gettid")
121 SEC("tp/syscalls/sys_enter_getpgid")
H A Dstrncmp_test.c22 SEC("?tp/syscalls/sys_enter_nanosleep")
32 SEC("?tp/syscalls/sys_enter_nanosleep")
40 SEC("?tp/syscalls/sys_enter_nanosleep")
48 SEC("?tp/syscalls/sys_enter_nanosleep")
H A Dhtab_mem_bench.c55 SEC("?tp/syscalls/sys_enter_getpgid")
67 SEC("?tp/syscalls/sys_enter_getpgid")
83 SEC("?tp/syscalls/sys_enter_getpgid")
95 SEC("?tp/syscalls/sys_enter_getppid")
H A Ddynptr_success.c37 SEC("?tp/syscalls/sys_enter_nanosleep")
68 SEC("?tp/syscalls/sys_enter_nanosleep")
138 SEC("?tp/syscalls/sys_enter_nanosleep")
214 SEC("tp/syscalls/sys_enter_nanosleep")
266 SEC("tp/syscalls/sys_enter_nanosleep")
324 SEC("tp/syscalls/sys_enter_nanosleep")
374 SEC("tp/syscalls/sys_enter_nanosleep")
583 SEC("?tp/syscalls/sys_enter_nanosleep")
689 SEC("?tp/syscalls/sys_enter_nanosleep")
707 SEC("?tp/syscalls/sys_enter_nanosleep")
[all …]
/linux/samples/bpf/
H A Dsyscall_tp_kern.c59 SEC("tracepoint/syscalls/sys_enter_open")
67 SEC("tracepoint/syscalls/sys_enter_openat")
74 SEC("tracepoint/syscalls/sys_enter_openat2")
82 SEC("tracepoint/syscalls/sys_exit_open")
90 SEC("tracepoint/syscalls/sys_exit_openat")
97 SEC("tracepoint/syscalls/sys_exit_openat2")
/linux/tools/perf/scripts/perl/bin/
H A Drw-by-pid-record2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
H A Drwtop-record2 perf record -e syscalls:sys_enter_read -e syscalls:sys_exit_read -e syscalls:sys_enter_write -e sys…
/linux/arch/x86/include/asm/
H A Dsyscall_wrapper.h27 * perform sign-extension (omitted for zero-argument syscalls). Finally the
55 /* Mapping of registers to parameters for syscalls on x86-64 and x32 */
80 /* Mapping of registers to parameters for syscalls on i386 */
142 * For IA32 emulation, we need to handle "compat" syscalls *and* create
144 * ia32 regs in the proper order for shared or "common" syscalls. As some
145 * syscalls may not be implemented, we need to expand COND_SYSCALL in
168 * of the x86-64-style parameter ordering of x32 syscalls. The syscalls common
214 * As some compat syscalls may not be implemented, we need to expand
257 * For VSYSCALLS, we need to declare these three syscalls with the new
/linux/tools/perf/Documentation/
H A Dperf-trace.txt17 syscalls, but other system events like pagefaults, task lifetime events,
39 List of syscalls and other perf events (tracepoints, HW cache events,
42 Prefixing with ! shows all syscalls but the ones specified. You may
126 Show only syscalls that failed, i.e. that returned < 0.
141 Show only a summary of syscalls by thread with min, max, and average times
146 Show all syscalls followed by a summary by thread with min, max, and
151 syscalls, using only this option will trigger --summary.
171 --syscalls::
173 --no-syscalls.
280 $ perf trace --no-syscalls -F
[all …]
/linux/tools/testing/selftests/ftrace/test.d/filter/
H A Devent-filter-function.tc84 if [ -f events/syscalls/sys_enter_openat/filter ]; then
86 echo "filename.ustring ~ \"*$DIRNAME*\"" > events/syscalls/sys_enter_openat/filter
87 echo 1 > events/syscalls/sys_enter_openat/enable
94 echo 0 > events/syscalls/sys_enter_openat/enable
/linux/tools/perf/util/bpf_skel/
H A Daugmented_raw_syscalls.bpf.c206 SEC("tp/syscalls/sys_enter_connect")
227 SEC("tp/syscalls/sys_enter_sendto")
245 SEC("tp/syscalls/sys_enter_open")
260 SEC("tp/syscalls/sys_enter_openat")
275 SEC("tp/syscalls/sys_enter_rename")
306 SEC("tp/syscalls/sys_enter_renameat2")
348 SEC("tp/syscalls/sys_enter_perf_event_open")
380 SEC("tp/syscalls/sys_enter_clock_nanosleep")
401 SEC("tp/syscalls/sys_enter_nanosleep")
534 * We'll add to this as we add augmented syscalls right after that in sys_enter()
[all …]
/linux/Documentation/locking/
H A Drobust-futexes.rst134 need any extra per-lock syscalls. Robust mutexes thus become a very
159 msecs - clearly slower, due to the 1 million FUTEX_WAKE syscalls
169 The patch adds two new syscalls: one to register the userspace list, and
209 I've tested the new syscalls on x86 and x86_64, and have made sure the
213 i386 and x86_64 syscalls are wired up at the moment, and Ulrich has
218 the new syscalls yet.
221 inline function before writing up the syscalls.
/linux/tools/perf/scripts/perl/
H A Dfailed-syscalls.pl6 # If a [comm] arg is specified, only syscalls called by [comm] are displayed.
29 sub syscalls::sys_exit subroutine
36 printf("\nfailed syscalls by comm:\n\n");
/linux/arch/powerpc/platforms/cell/
H A Dspu_callbacks.c10 #include <linux/syscalls.h>
13 #include <asm/syscalls.h>
22 * 1. They interact with the way SPU syscalls are handled
/linux/tools/perf/tests/
H A Dmmap-basic.c25 * This test will generate random numbers of calls to some getpid syscalls,
27 * the syscalls.
32 * Then it checks if the number of syscalls reported as perf events by
33 * the kernel corresponds to the number of syscalls made.
44 pid_t (*syscalls[])(void) = { (void *)getsid, getppid, (void*)getpgid }; in test__basic_mmap() local
86 evsels[i] = evsel__newtp("syscalls", name); in test__basic_mmap()
120 syscalls[i](); in test__basic_mmap()

12345678910>>...22