Home
last modified time | relevance | path

Searched refs:ret_offending_syscall (Results 1 – 1 of 1) sorted by relevance

/systemd-251/src/analyze/ !
Danalyze-security.c570 …ilter(Hashmap *s, bool allow_list, const SyscallFilterSet *f, const char **ret_offending_syscall) { in syscall_names_in_filter() argument
580 if (syscall_names_in_filter(s, allow_list, g, ret_offending_syscall)) in syscall_names_in_filter()
593 if (ret_offending_syscall) in syscall_names_in_filter()
594 *ret_offending_syscall = syscall; in syscall_names_in_filter()
599 *ret_offending_syscall = NULL; in syscall_names_in_filter()