/kernel/linux/linux-5.10/include/trace/events/ |
H A D | syscalls.h | 18 TRACE_EVENT_FN(sys_enter, 42 TRACE_EVENT_FLAGS(sys_enter, TRACE_EVENT_FL_CAP_ANY)
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | syscalls.h | 18 TRACE_EVENT_FN(sys_enter, 42 TRACE_EVENT_FLAGS(sys_enter, TRACE_EVENT_FL_CAP_ANY)
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | trace_printk.c | 13 SEC("tp/raw_syscalls/sys_enter") 14 int sys_enter(void *ctx) in sys_enter() function
|
H A D | test_endian.c | 24 SEC("raw_tp/sys_enter") 25 int sys_enter(const void *ctx) in sys_enter() function
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | trace_printk.c | 17 int sys_enter(void *ctx) in sys_enter() function
|
H A D | trace_vprintk.c | 16 int sys_enter(void *ctx) in sys_enter() function
|
H A D | test_endian.c | 24 SEC("raw_tp/sys_enter") 25 int sys_enter(const void *ctx) in sys_enter() function
|
H A D | timer_crash.c | 30 int sys_enter(void *ctx) in sys_enter() function
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | verif_stats.c | 19 err = bpf_prog_get_info_by_fd(skel->progs.sys_enter.prog_fd, in test_verif_stats()
|
/kernel/linux/linux-5.10/tools/perf/ |
H A D | builtin-trace.c | 109 const char *sys_enter, member 126 struct bpf_map *sys_enter, member 130 struct evsel *sys_enter, member 1193 * is_open: is this "open" or "openat"? To associate the fd returned in sys_exit with the pathname in sys_enter. 1202 struct bpf_program *sys_enter, member 1518 * first having received a sys_enter ("poll" issued before tracing session 1519 * starts, lost sys_enter exit due to ring buffer overflow). 1717 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array() 2253 * For now with BPF raw_augmented we hook into raw_syscalls:sys_enter 2257 * sc->args_size but always after the full raw_syscalls:sys_enter payloa 3143 struct evsel *sys_enter, *sys_exit; global() local [all...] |
/kernel/linux/linux-6.6/tools/perf/ |
H A D | builtin-trace.c | 118 const char *sys_enter, member 134 struct evsel *sys_enter, member 1211 * is_open: is this "open" or "openat"? To associate the fd returned in sys_exit with the pathname in sys_enter. 1220 struct bpf_program *sys_enter, member 1554 * first having received a sys_enter ("poll" issued before tracing session 1555 * starts, lost sys_enter exit due to ring buffer overflow). 1763 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array() 2298 * For now with BPF raw_augmented we hook into raw_syscalls:sys_enter 2302 * sc->args_size but always after the full raw_syscalls:sys_enter payload, 2363 * If this is raw_syscalls.sys_enter, the 3210 struct evsel *sys_enter, *sys_exit; global() local [all...] |
/kernel/linux/linux-5.10/tools/perf/examples/bpf/ |
H A D | augmented_raw_syscalls.c | 9 * This exactly matches what is marshalled into the raw_syscall:sys_enter 13 * trace', in the next csets we'll hook up these with the sys_enter/sys_exit 130 * These will be tail_called from SEC("raw_syscalls:sys_enter"), so will find in 131 * augmented_args_tmp what was read by that raw_syscalls:sys_enter and go 237 SEC("raw_syscalls:sys_enter") 238 int sys_enter(struct syscall_enter_args *args) in sys_enter() function 248 * initial, non-augmented raw_syscalls:sys_enter payload. in sys_enter()
|
/kernel/linux/linux-6.6/tools/perf/util/bpf_skel/ |
H A D | augmented_raw_syscalls.bpf.c | 5 * This exactly matches what is marshalled into the raw_syscall:sys_enter 180 SEC("tp/raw_syscalls/sys_enter") 187 * These will be tail_called from SEC("raw_syscalls:sys_enter"), so will find in 188 * augmented_args_tmp what was read by that raw_syscalls:sys_enter and go 367 SEC("tp/raw_syscalls/sys_enter") 368 int sys_enter(struct syscall_enter_args *args) in sys_enter() function 378 * initial, non-augmented raw_syscalls:sys_enter payload. in sys_enter()
|