• Home
  • Raw
  • Download

Lines Matching refs:regs

239 static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs);
241 struct pt_regs *regs);
1126 process_fetch_insn(struct fetch_insn *code, struct pt_regs *regs, void *dest, in process_fetch_insn() argument
1135 val = regs_get_register(regs, code->param); in process_fetch_insn()
1138 val = regs_get_kernel_stack_nth(regs, code->param); in process_fetch_insn()
1141 val = kernel_stack_pointer(regs); in process_fetch_insn()
1144 val = regs_return_value(regs); in process_fetch_insn()
1157 val = regs_get_kernel_argument(regs, code->param); in process_fetch_insn()
1174 __kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs, in NOKPROBE_SYMBOL()
1192 dsize = __get_data_size(&tk->tp, regs); in NOKPROBE_SYMBOL()
1203 store_trace_args(&entry[1], &tk->tp, regs, sizeof(*entry), dsize); in NOKPROBE_SYMBOL()
1206 entry, irq_flags, pc, regs); in NOKPROBE_SYMBOL()
1210 kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs) in kprobe_trace_func() argument
1215 __kprobe_trace_func(tk, regs, link->file); in kprobe_trace_func()
1222 struct pt_regs *regs, in __kretprobe_trace_func() argument
1240 dsize = __get_data_size(&tk->tp, regs); in __kretprobe_trace_func()
1252 store_trace_args(&entry[1], &tk->tp, regs, sizeof(*entry), dsize); in __kretprobe_trace_func()
1255 entry, irq_flags, pc, regs); in __kretprobe_trace_func()
1260 struct pt_regs *regs) in kretprobe_trace_func() argument
1265 __kretprobe_trace_func(tk, ri, regs, link->file); in kretprobe_trace_func()
1372 kprobe_perf_func(struct trace_kprobe *tk, struct pt_regs *regs) in kprobe_perf_func() argument
1381 unsigned long orig_ip = instruction_pointer(regs); in kprobe_perf_func()
1384 ret = trace_call_bpf(call, regs); in kprobe_perf_func()
1391 if (orig_ip != instruction_pointer(regs)) in kprobe_perf_func()
1401 dsize = __get_data_size(&tk->tp, regs); in kprobe_perf_func()
1412 store_trace_args(&entry[1], &tk->tp, regs, sizeof(*entry), dsize); in kprobe_perf_func()
1413 perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs, in kprobe_perf_func()
1422 struct pt_regs *regs) in kretprobe_perf_func() argument
1430 if (bpf_prog_array_valid(call) && !trace_call_bpf(call, regs)) in kretprobe_perf_func()
1437 dsize = __get_data_size(&tk->tp, regs); in kretprobe_perf_func()
1448 store_trace_args(&entry[1], &tk->tp, regs, sizeof(*entry), dsize); in kretprobe_perf_func()
1449 perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs, in kretprobe_perf_func()
1516 static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs) in kprobe_dispatcher() argument
1524 kprobe_trace_func(tk, regs); in kprobe_dispatcher()
1527 ret = kprobe_perf_func(tk, regs); in kprobe_dispatcher()
1534 kretprobe_dispatcher(struct kretprobe_instance *ri, struct pt_regs *regs) in kretprobe_dispatcher() argument
1541 kretprobe_trace_func(tk, ri, regs); in kretprobe_dispatcher()
1544 kretprobe_perf_func(tk, ri, regs); in kretprobe_dispatcher()