Lines Matching defs:syscall

51 #include <sys/syscall.h>
141 # warning "seccomp syscall number unknown for this architecture"
273 return syscall(__NR_seccomp, op, flags, args);
293 return syscall(__NR_kcmp, pid1, pid2, KCMP_FILE, fd1, fd2);
307 TH_LOG("kcmp() syscall missing (test is less accurate)");\
331 syscall(__NR_exit, 0);
342 syscall(__NR_prctl, PR_SET_SECCOMP, SECCOMP_MODE_FILTER,
585 EXPECT_EQ(parent, syscall(__NR_getppid));
604 EXPECT_EQ(0, syscall(__NR_getpid)) {
626 EXPECT_EQ(0, syscall(__NR_getpid)) {
671 EXPECT_EQ(parent, syscall(__NR_getppid));
673 EXPECT_EQ(0, syscall(__NR_getpid));
706 EXPECT_EQ(parent, syscall(__NR_getppid));
707 EXPECT_LE(clock, syscall(__NR_times, &timebuf));
709 EXPECT_EQ(0, syscall(__NR_times, &fatal_address));
751 EXPECT_EQ(parent, syscall(__NR_getppid));
752 map1 = (void *)syscall(sysno,
756 map2 = (void *)syscall(sysno,
955 EXPECT_EQ(parent, syscall(__NR_getppid));
973 EXPECT_EQ(parent, syscall(__NR_getppid));
995 EXPECT_EQ(parent, syscall(__NR_getppid));
1026 EXPECT_EQ(parent, syscall(__NR_getppid));
1067 syscall(__NR_getpid);
1082 syscall(__NR_getpid);
1122 ret = syscall(__NR_getpid);
1129 unsigned int _arch; /* AUDIT_ARCH_* of syscall */
1239 res = syscall(__NR_getppid);
1265 res = syscall(__NR_getppid);
1268 res = syscall(__NR_getpid);
1294 EXPECT_EQ(parent, syscall(__NR_getppid));
1296 EXPECT_EQ(0, syscall(__NR_getpid));
1319 EXPECT_EQ(parent, syscall(__NR_getppid));
1321 EXPECT_EQ(0, syscall(__NR_getpid));
1344 EXPECT_EQ(parent, syscall(__NR_getppid));
1346 EXPECT_EQ(0, syscall(__NR_getpid));
1367 EXPECT_EQ(parent, syscall(__NR_getppid));
1368 EXPECT_EQ(0, syscall(__NR_getpid));
1389 EXPECT_EQ(parent, syscall(__NR_getppid));
1390 EXPECT_EQ(0, syscall(__NR_getpid));
1409 EXPECT_EQ(parent, syscall(__NR_getppid));
1411 EXPECT_EQ(-1, syscall(__NR_getpid));
1430 EXPECT_EQ(parent, syscall(__NR_getppid));
1432 EXPECT_EQ(-1, syscall(__NR_getpid));
1450 EXPECT_EQ(parent, syscall(__NR_getppid));
1452 EXPECT_EQ(mypid, syscall(__NR_getpid));
1470 EXPECT_EQ(parent, syscall(__NR_getppid));
1472 EXPECT_EQ(mypid, syscall(__NR_getpid));
1554 syscall(__NR_exit, _metadata->passed ? EXIT_SUCCESS : EXIT_FAILURE);
1579 syscall(__NR_exit, 0);
1698 EXPECT_NE(0, syscall(__NR_getpid));
1770 * A syscall error is signaled by the \
1788 TH_LOG("Can't modify syscall return on this architecture")
1811 TH_LOG("Can't modify syscall return on this architecture")
1814 # define SYSCALL_NUM(_regs) (_regs).syscall
1816 * On xtensa syscall return value is in the register
1829 * Most architectures can change the syscall by just updating the
1839 * Most architectures can change the syscall return value by just
1842 * (for example when the syscall and return value register is
1856 /* When the syscall return can't be changed, stub out the tests for it. */
1873 * Some architectures (e.g. powerpc) can only set syscall
1874 * return values on syscall exit during ptrace.
1906 /* Architecture-specific syscall fetching routine. */
1918 /* Architecture-specific syscall changing routine. */
1920 pid_t tracee, long *syscall, long *ret)
1925 if (!syscall && !ret)
1933 if (syscall)
1934 SYSCALL_NUM_SET(regs, *syscall);
1944 /* Change only syscall number. */
1946 pid_t tracee, long syscall)
1948 __change_syscall(_metadata, tracee, &syscall, NULL);
1951 /* Change syscall return value (and set syscall number to -1). */
1955 long syscall = -1;
1957 __change_syscall(_metadata, tracee, &syscall, &ret);
2030 * syscall exit under ptrace, and on exit the syscall number may
2039 * Depending on the architecture's syscall setting abilities, we
2051 /* Never change syscall return for this case. */
2109 /* Prepare some testable syscall results. */
2110 self->mytid = syscall(__NR_gettid);
2149 * and userspace asking for syscall "-1".
2152 EXPECT_EQ(-1, syscall(-1));
2156 EXPECT_EQ(-1, syscall(-101));
2168 EXPECT_EQ(self->parent, syscall(__NR_getppid));
2169 EXPECT_NE(self->mypid, syscall(__NR_getppid));
2175 EXPECT_EQ(self->parent, syscall(__NR_getpid));
2176 EXPECT_NE(self->mypid, syscall(__NR_getpid));
2181 /* Tracer should skip the open syscall, resulting in ESRCH. */
2182 EXPECT_SYSCALL_RETURN(-ESRCH, syscall(__NR_openat));
2187 /* Tracer skips the gettid syscall and store altered return value. */
2188 EXPECT_SYSCALL_RETURN(45000, syscall(__NR_gettid));
2212 EXPECT_EQ(-1, syscall(__NR_getpid));
2236 EXPECT_NE(self->mypid, syscall(__NR_getpid));
2258 TH_LOG("Kernel does not support seccomp syscall!");
2309 TH_LOG("Kernel does not support seccomp syscall!");
2364 TH_LOG("Kernel does not support seccomp syscall!");
2437 TH_LOG("Kernel does not support seccomp syscall!");
2561 me->system_tid = syscall(__NR_gettid);
2616 TH_LOG("Kernel does not support seccomp syscall!");
2656 TH_LOG("Kernel does not support seccomp syscall!");
2733 TH_LOG("Kernel does not support seccomp syscall!");
2764 TH_LOG("Kernel does not support seccomp syscall!");
2809 TH_LOG("Kernel does not support seccomp syscall!");
2874 TH_LOG("Kernel does not support seccomp syscall!");
3024 syscall(__NR_exit, _metadata->passed ? EXIT_SUCCESS
3091 * - native ARM registers do NOT expose true syscall.
3092 * - compat ARM registers on ARM64 DO expose true syscall.
3143 TH_LOG("Kernel does not support seccomp syscall!");
3169 EXPECT_EQ(parent, syscall(__NR_getppid));
3171 EXPECT_EQ(0, syscall(__NR_getpid));
3185 TH_LOG("Kernel does not support seccomp syscall!");
3323 ret = syscall(__NR_getppid);
3352 ret = syscall(__NR_getppid);
3442 * of a syscall.
3448 ret = syscall(__NR_getppid);
3510 ret = syscall(__NR_gettid);
3571 ret = syscall(__NR_getppid);
3605 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3651 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3713 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3823 SKIP(return, "Kernel does not support kcmp() syscall");
3994 if (syscall(__NR_getppid) != USER_NOTIF_MAGIC)
3996 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
4057 /* Resume syscall */
4121 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);