Home
last modified time | relevance | path

Searched refs:syscall_id (Results 1 – 4 of 4) sorted by relevance

/linux-6.1.9/tools/testing/selftests/bpf/progs/
Dlinked_funcs1.c11 long syscall_id __weak;
69 if (my_tid != (u32)bpf_get_current_pid_tgid() || id != syscall_id) in BPF_PROG()
Dlinked_funcs2.c11 long syscall_id __weak;
69 if (my_tid != (u32)bpf_get_current_pid_tgid() || id != syscall_id) in BPF_PROG()
/linux-6.1.9/tools/testing/selftests/bpf/prog_tests/
Dlinked_funcs.c24 skel->bss->syscall_id = SYS_getpgid; in test_linked_funcs()
/linux-6.1.9/tools/perf/
Dbuiltin-trace.c427 struct tep_format_field *syscall_id = evsel__field(tp, "id"); in evsel__init_augmented_syscall_tp() local
428 if (syscall_id == NULL) in evsel__init_augmented_syscall_tp()
429 syscall_id = evsel__field(tp, "__syscall_nr"); in evsel__init_augmented_syscall_tp()
430 if (syscall_id == NULL || in evsel__init_augmented_syscall_tp()
431 __tp_field__init_uint(&sc->id, syscall_id->size, syscall_id->offset, evsel->needs_swap)) in evsel__init_augmented_syscall_tp()