Home
last modified time | relevance | path

Searched refs:syscall_id (Results 1 – 4 of 4) sorted by relevance

/linux-6.15/tools/testing/selftests/bpf/progs/
H A Dlinked_funcs1.c12 long syscall_id __weak;
73 if (my_tid != (u32)bpf_get_current_pid_tgid() || id != syscall_id) in BPF_PROG()
H A Dlinked_funcs2.c12 long syscall_id __weak;
73 if (my_tid != (s32)bpf_get_current_pid_tgid() || id != syscall_id) in BPF_PROG()
/linux-6.15/tools/testing/selftests/bpf/prog_tests/
H A Dlinked_funcs.c24 skel->bss->syscall_id = SYS_getpgid; in test_linked_funcs()
/linux-6.15/tools/perf/
H A Dbuiltin-trace.c485 struct tep_format_field *syscall_id = evsel__field(tp, "id"); in evsel__init_augmented_syscall_tp() local
486 if (syscall_id == NULL) in evsel__init_augmented_syscall_tp()
487 syscall_id = evsel__field(tp, "__syscall_nr"); in evsel__init_augmented_syscall_tp()
488 if (syscall_id == NULL || in evsel__init_augmented_syscall_tp()
489 __tp_field__init_uint(&sc->id, syscall_id->size, syscall_id->offset, evsel->needs_swap)) in evsel__init_augmented_syscall_tp()