Lines Matching defs:syscall
52 #include <sys/syscall.h>
146 # warning "seccomp syscall number unknown for this architecture"
286 return syscall(__NR_seccomp, op, flags, args);
306 return syscall(__NR_kcmp, pid1, pid2, KCMP_FILE, fd1, fd2);
320 TH_LOG("kcmp() syscall missing (test is less accurate)");\
344 syscall(__NR_exit, 0);
355 syscall(__NR_prctl, PR_SET_SECCOMP, SECCOMP_MODE_FILTER,
600 EXPECT_EQ(parent, syscall(__NR_getppid));
619 EXPECT_EQ(0, syscall(__NR_getpid)) {
641 EXPECT_EQ(0, syscall(__NR_getpid)) {
686 EXPECT_EQ(parent, syscall(__NR_getppid));
688 EXPECT_EQ(0, syscall(__NR_getpid));
721 EXPECT_EQ(parent, syscall(__NR_getppid));
722 EXPECT_LE(clock, syscall(__NR_times, &timebuf));
724 EXPECT_EQ(0, syscall(__NR_times, &fatal_address));
766 EXPECT_EQ(parent, syscall(__NR_getppid));
767 map1 = (void *)syscall(sysno,
771 map2 = (void *)syscall(sysno,
970 EXPECT_EQ(parent, syscall(__NR_getppid));
988 EXPECT_EQ(parent, syscall(__NR_getppid));
1010 EXPECT_EQ(parent, syscall(__NR_getppid));
1041 EXPECT_EQ(parent, syscall(__NR_getppid));
1082 syscall(__NR_getpid);
1097 syscall(__NR_getpid);
1137 ret = syscall(__NR_getpid);
1144 unsigned int _arch; /* AUDIT_ARCH_* of syscall */
1254 res = syscall(__NR_getppid);
1280 res = syscall(__NR_getppid);
1283 res = syscall(__NR_getpid);
1309 EXPECT_EQ(parent, syscall(__NR_getppid));
1311 EXPECT_EQ(0, syscall(__NR_getpid));
1334 EXPECT_EQ(parent, syscall(__NR_getppid));
1336 EXPECT_EQ(0, syscall(__NR_getpid));
1359 EXPECT_EQ(parent, syscall(__NR_getppid));
1361 EXPECT_EQ(0, syscall(__NR_getpid));
1382 EXPECT_EQ(parent, syscall(__NR_getppid));
1383 EXPECT_EQ(0, syscall(__NR_getpid));
1404 EXPECT_EQ(parent, syscall(__NR_getppid));
1405 EXPECT_EQ(0, syscall(__NR_getpid));
1424 EXPECT_EQ(parent, syscall(__NR_getppid));
1426 EXPECT_EQ(-1, syscall(__NR_getpid));
1445 EXPECT_EQ(parent, syscall(__NR_getppid));
1447 EXPECT_EQ(-1, syscall(__NR_getpid));
1465 EXPECT_EQ(parent, syscall(__NR_getppid));
1467 EXPECT_EQ(mypid, syscall(__NR_getpid));
1485 EXPECT_EQ(parent, syscall(__NR_getppid));
1487 EXPECT_EQ(mypid, syscall(__NR_getpid));
1579 syscall(__NR_exit, _metadata->passed ? EXIT_SUCCESS : EXIT_FAILURE);
1604 syscall(__NR_exit, 0);
1723 EXPECT_NE(0, syscall(__NR_getpid));
1795 * A syscall error is signaled by the \
1813 TH_LOG("Can't modify syscall return on this architecture")
1836 TH_LOG("Can't modify syscall return on this architecture")
1839 # define SYSCALL_NUM(_regs) (_regs).syscall
1841 * On xtensa syscall return value is in the register
1858 * Most architectures can change the syscall by just updating the
1868 * Most architectures can change the syscall return value by just
1871 * (for example when the syscall and return value register is
1885 /* When the syscall return can't be changed, stub out the tests for it. */
1902 * Some architectures (e.g. powerpc) can only set syscall
1903 * return values on syscall exit during ptrace.
1935 /* Architecture-specific syscall fetching routine. */
1947 /* Architecture-specific syscall changing routine. */
1949 pid_t tracee, long *syscall, long *ret)
1954 if (!syscall && !ret)
1962 if (syscall)
1963 SYSCALL_NUM_SET(regs, *syscall);
1973 /* Change only syscall number. */
1975 pid_t tracee, long syscall)
1977 __change_syscall(_metadata, tracee, &syscall, NULL);
1980 /* Change syscall return value (and set syscall number to -1). */
1984 long syscall = -1;
1986 __change_syscall(_metadata, tracee, &syscall, &ret);
2069 * syscall exit under ptrace, and on exit the syscall number may
2078 * Depending on the architecture's syscall setting abilities, we
2090 /* Never change syscall return for this case. */
2148 /* Prepare some testable syscall results. */
2149 self->mytid = syscall(__NR_gettid);
2188 SKIP(return, "arm32 does not support calling syscall -1");
2192 * and userspace asking for syscall "-1".
2195 EXPECT_EQ(-1, syscall(-1));
2199 EXPECT_EQ(-1, syscall(-101));
2211 EXPECT_EQ(self->parent, syscall(__NR_getppid));
2212 EXPECT_NE(self->mypid, syscall(__NR_getppid));
2218 EXPECT_EQ(self->parent, syscall(__NR_getpid));
2219 EXPECT_NE(self->mypid, syscall(__NR_getpid));
2224 /* Tracer should skip the open syscall, resulting in ESRCH. */
2225 EXPECT_SYSCALL_RETURN(-ESRCH, syscall(__NR_openat));
2230 /* Tracer skips the gettid syscall and store altered return value. */
2231 EXPECT_SYSCALL_RETURN(45000, syscall(__NR_gettid));
2254 EXPECT_EQ(-1, syscall(__NR_mknodat, -1, NULL, 0, 0));
2278 EXPECT_EQ(-1, syscall(__NR_getpid));
2302 EXPECT_NE(self->mypid, syscall(__NR_getpid));
2324 TH_LOG("Kernel does not support seccomp syscall!");
2375 TH_LOG("Kernel does not support seccomp syscall!");
2430 TH_LOG("Kernel does not support seccomp syscall!");
2503 TH_LOG("Kernel does not support seccomp syscall!");
2627 me->system_tid = syscall(__NR_gettid);
2682 TH_LOG("Kernel does not support seccomp syscall!");
2722 TH_LOG("Kernel does not support seccomp syscall!");
2799 TH_LOG("Kernel does not support seccomp syscall!");
2830 TH_LOG("Kernel does not support seccomp syscall!");
2875 TH_LOG("Kernel does not support seccomp syscall!");
2940 TH_LOG("Kernel does not support seccomp syscall!");
3091 syscall(__NR_exit, _metadata->passed ? EXIT_SUCCESS
3158 * - native ARM registers do NOT expose true syscall.
3159 * - compat ARM registers on ARM64 DO expose true syscall.
3210 TH_LOG("Kernel does not support seccomp syscall!");
3236 EXPECT_EQ(parent, syscall(__NR_getppid));
3238 EXPECT_EQ(0, syscall(__NR_getpid));
3252 TH_LOG("Kernel does not support seccomp syscall!");
3390 ret = syscall(__NR_getppid);
3419 ret = syscall(__NR_getppid);
3509 * of a syscall.
3515 ret = syscall(__NR_getppid);
3577 ret = syscall(__NR_gettid);
3638 ret = syscall(__NR_getppid);
3672 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3718 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3783 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
3893 SKIP(return, "Kernel does not support kcmp() syscall");
4074 if (syscall(__NR_getppid) != USER_NOTIF_MAGIC)
4078 if (fcntl(syscall(__NR_getppid), F_GETFD) == -1)
4081 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
4138 /* Resume syscall */
4228 exit(syscall(__NR_getppid) != USER_NOTIF_MAGIC);
4300 ret = syscall(__NR_getppid);
4462 ret = syscall(__NR_getppid);
4484 ret = syscall(__NR_getppid);
4516 /* get_proc_syscall - Get the syscall in progress for a given pid
4518 * Returns the current syscall number for a given process
4519 * Returns -1 if not in syscall (running or blocked)
4528 snprintf(proc_path, sizeof(proc_path), "/proc/%d/syscall", pid);
4585 ret = syscall(__NR_getppid);
4652 /* Make sure that the syscall is completed (no EINTR) */
4653 ret = syscall(__NR_getppid);
4714 syscall(__NR_getppid);