Searched refs:arg1 (Results 1 – 2 of 2) sorted by relevance
/kernel/ |
D | kcov.c | 211 static void notrace write_comp_data(u64 type, u64 arg1, u64 arg2, u64 ip) in write_comp_data() argument 237 area[start_index + 1] = arg1; in write_comp_data() 244 void notrace __sanitizer_cov_trace_cmp1(u8 arg1, u8 arg2) in __sanitizer_cov_trace_cmp1() argument 246 write_comp_data(KCOV_CMP_SIZE(0), arg1, arg2, _RET_IP_); in __sanitizer_cov_trace_cmp1() 250 void notrace __sanitizer_cov_trace_cmp2(u16 arg1, u16 arg2) in __sanitizer_cov_trace_cmp2() argument 252 write_comp_data(KCOV_CMP_SIZE(1), arg1, arg2, _RET_IP_); in __sanitizer_cov_trace_cmp2() 256 void notrace __sanitizer_cov_trace_cmp4(u32 arg1, u32 arg2) in __sanitizer_cov_trace_cmp4() argument 258 write_comp_data(KCOV_CMP_SIZE(2), arg1, arg2, _RET_IP_); in __sanitizer_cov_trace_cmp4() 262 void notrace __sanitizer_cov_trace_cmp8(u64 arg1, u64 arg2) in __sanitizer_cov_trace_cmp8() argument 264 write_comp_data(KCOV_CMP_SIZE(3), arg1, arg2, _RET_IP_); in __sanitizer_cov_trace_cmp8() [all …]
|
/kernel/trace/ |
D | bpf_trace.c | 413 BPF_CALL_5(bpf_trace_printk, char *, fmt, u32, fmt_size, u64, arg1, in BPF_CALL_5() argument 483 unsafe_ptr = (void *)(long)arg1; in BPF_CALL_5() 484 arg1 = (long)buf; in BPF_CALL_5() 522 ? __BPF_TP(arg1, ##__VA_ARGS__) \ in BPF_CALL_5() 524 ? __BPF_TP((long)arg1, ##__VA_ARGS__) \ in BPF_CALL_5() 525 : __BPF_TP((u32)arg1, ##__VA_ARGS__))) in BPF_CALL_5()
|