Home
last modified time | relevance | path

Searched refs:sys_enter (Results 1 - 13 of 13) sorted by relevance

/kernel/linux/linux-5.10/include/trace/events/
H A Dsyscalls.h18 TRACE_EVENT_FN(sys_enter,
42 TRACE_EVENT_FLAGS(sys_enter, TRACE_EVENT_FL_CAP_ANY)
/kernel/linux/linux-6.6/include/trace/events/
H A Dsyscalls.h18 TRACE_EVENT_FN(sys_enter,
42 TRACE_EVENT_FLAGS(sys_enter, TRACE_EVENT_FL_CAP_ANY)
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/
H A Dtrace_printk.c13 SEC("tp/raw_syscalls/sys_enter")
14 int sys_enter(void *ctx) in sys_enter() function
H A Dtest_endian.c24 SEC("raw_tp/sys_enter")
25 int sys_enter(const void *ctx) in sys_enter() function
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/
H A Dtrace_printk.c17 int sys_enter(void *ctx) in sys_enter() function
H A Dtrace_vprintk.c16 int sys_enter(void *ctx) in sys_enter() function
H A Dtest_endian.c24 SEC("raw_tp/sys_enter")
25 int sys_enter(const void *ctx) in sys_enter() function
H A Dtimer_crash.c30 int sys_enter(void *ctx) in sys_enter() function
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/
H A Dverif_stats.c19 err = bpf_prog_get_info_by_fd(skel->progs.sys_enter.prog_fd, in test_verif_stats()
/kernel/linux/linux-5.10/tools/perf/
H A Dbuiltin-trace.c109 const char *sys_enter, member
126 struct bpf_map *sys_enter, member
130 struct evsel *sys_enter, member
1193 * is_open: is this "open" or "openat"? To associate the fd returned in sys_exit with the pathname in sys_enter.
1202 struct bpf_program *sys_enter, member
1518 * first having received a sys_enter ("poll" issued before tracing session
1519 * starts, lost sys_enter exit due to ring buffer overflow).
1717 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array()
2253 * For now with BPF raw_augmented we hook into raw_syscalls:sys_enter
2257 * sc->args_size but always after the full raw_syscalls:sys_enter payloa
3143 struct evsel *sys_enter, *sys_exit; global() local
[all...]
/kernel/linux/linux-6.6/tools/perf/
H A Dbuiltin-trace.c118 const char *sys_enter, member
134 struct evsel *sys_enter, member
1211 * is_open: is this "open" or "openat"? To associate the fd returned in sys_exit with the pathname in sys_enter.
1220 struct bpf_program *sys_enter, member
1554 * first having received a sys_enter ("poll" issued before tracing session
1555 * starts, lost sys_enter exit due to ring buffer overflow).
1763 * /sys/kernel/tracing/events/syscalls/sys_enter* in syscall_arg_fmt__init_array()
2298 * For now with BPF raw_augmented we hook into raw_syscalls:sys_enter
2302 * sc->args_size but always after the full raw_syscalls:sys_enter payload,
2363 * If this is raw_syscalls.sys_enter, the
3210 struct evsel *sys_enter, *sys_exit; global() local
[all...]
/kernel/linux/linux-5.10/tools/perf/examples/bpf/
H A Daugmented_raw_syscalls.c9 * This exactly matches what is marshalled into the raw_syscall:sys_enter
13 * trace', in the next csets we'll hook up these with the sys_enter/sys_exit
130 * These will be tail_called from SEC("raw_syscalls:sys_enter"), so will find in
131 * augmented_args_tmp what was read by that raw_syscalls:sys_enter and go
237 SEC("raw_syscalls:sys_enter")
238 int sys_enter(struct syscall_enter_args *args) in sys_enter() function
248 * initial, non-augmented raw_syscalls:sys_enter payload. in sys_enter()
/kernel/linux/linux-6.6/tools/perf/util/bpf_skel/
H A Daugmented_raw_syscalls.bpf.c5 * This exactly matches what is marshalled into the raw_syscall:sys_enter
180 SEC("tp/raw_syscalls/sys_enter")
187 * These will be tail_called from SEC("raw_syscalls:sys_enter"), so will find in
188 * augmented_args_tmp what was read by that raw_syscalls:sys_enter and go
367 SEC("tp/raw_syscalls/sys_enter")
368 int sys_enter(struct syscall_enter_args *args) in sys_enter() function
378 * initial, non-augmented raw_syscalls:sys_enter payload. in sys_enter()

Completed in 20 milliseconds