Lines Matching refs:tcp

60 	printaddr(tcp->u_arg[0]);  in SYS_FUNC()
97 print_mmap(struct tcb *tcp, kernel_ulong_t *u_arg, unsigned long long offset) in print_mmap() argument
111 printfd(tcp, fd); in print_mmap()
128 fetch_indirect_syscall_args(tcp, tcp->u_arg[0], 6); in SYS_FUNC()
131 print_mmap(tcp, args, args[5]); in SYS_FUNC()
133 printaddr(tcp->u_arg[0]); in SYS_FUNC()
143 fetch_indirect_syscall_args(tcp, tcp->u_arg[0], 6); in SYS_FUNC()
151 print_mmap(tcp, args, offset); in SYS_FUNC()
153 printaddr(tcp->u_arg[0]); in SYS_FUNC()
169 print_mmap(tcp, tcp->u_arg, tcp->u_arg[5]); in SYS_FUNC()
179 offset = tcp->u_arg[5]; in SYS_FUNC()
181 print_mmap(tcp, tcp->u_arg, offset); in SYS_FUNC()
190 offset = tcp->u_arg[5]; in SYS_FUNC()
192 print_mmap(tcp, tcp->u_arg, offset); in SYS_FUNC()
199 printaddr(tcp->u_arg[0]); in SYS_FUNC()
200 tprintf(", %" PRI_klu, tcp->u_arg[1]); in SYS_FUNC()
206 do_mprotect(struct tcb *tcp, bool has_pkey) in do_mprotect() argument
208 printaddr(tcp->u_arg[0]); in do_mprotect()
209 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in do_mprotect()
210 printflags64(mmap_prot, tcp->u_arg[2], "PROT_???"); in do_mprotect()
213 tprintf(", %d", (int) tcp->u_arg[3]); in do_mprotect()
220 return do_mprotect(tcp, false); in SYS_FUNC()
225 return do_mprotect(tcp, true); in SYS_FUNC()
232 printaddr(tcp->u_arg[0]); in SYS_FUNC()
233 tprintf(", %" PRI_klu ", %" PRI_klu ", ", tcp->u_arg[1], tcp->u_arg[2]); in SYS_FUNC()
234 printflags64(mremap_flags, tcp->u_arg[3], "MREMAP_???"); in SYS_FUNC()
236 if ((tcp->u_arg[3] & (MREMAP_MAYMOVE | MREMAP_FIXED)) == in SYS_FUNC()
239 printaddr(tcp->u_arg[4]); in SYS_FUNC()
249 printaddr(tcp->u_arg[0]); in SYS_FUNC()
250 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in SYS_FUNC()
251 printxval(madvise_cmds, tcp->u_arg[2], "MADV_???"); in SYS_FUNC()
260 printflags(mlockall_flags, tcp->u_arg[0], "MCL_???"); in SYS_FUNC()
270 printaddr(tcp->u_arg[0]); in SYS_FUNC()
272 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in SYS_FUNC()
274 printflags(mctl_sync, tcp->u_arg[2], "MS_???"); in SYS_FUNC()
283 printaddr(tcp->u_arg[0]); in SYS_FUNC()
284 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in SYS_FUNC()
285 printflags(mlock_flags, tcp->u_arg[2], "MLOCK_???"); in SYS_FUNC()
292 if (entering(tcp)) { in SYS_FUNC()
293 printaddr(tcp->u_arg[0]); in SYS_FUNC()
294 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in SYS_FUNC()
298 unsigned long len = tcp->u_arg[1]; in SYS_FUNC()
302 if (syserror(tcp) || !verbose(tcp) || in SYS_FUNC()
303 !tcp->u_arg[2] || !(vec = malloc(len)) || in SYS_FUNC()
304 umoven(tcp, tcp->u_arg[2], len, vec) < 0) in SYS_FUNC()
305 printaddr(tcp->u_arg[2]); in SYS_FUNC()
312 if (abbrev(tcp) && i >= max_strlen) { in SYS_FUNC()
327 const kernel_ulong_t addr = tcp->u_arg[0]; in SYS_FUNC()
328 const kernel_ulong_t size = tcp->u_arg[1]; in SYS_FUNC()
329 const kernel_ulong_t prot = tcp->u_arg[2]; in SYS_FUNC()
330 const kernel_ulong_t pgoff = tcp->u_arg[3]; in SYS_FUNC()
331 const kernel_ulong_t flags = tcp->u_arg[4]; in SYS_FUNC()
344 print_protmap_entry(struct tcb *tcp, void *elem_buf, size_t elem_size, void *data) in print_protmap_entry() argument
353 kernel_ulong_t addr = tcp->u_arg[0]; in SYS_FUNC()
354 kernel_ulong_t len = tcp->u_arg[1]; in SYS_FUNC()
356 kernel_ulong_t map = tcp->u_arg[2]; in SYS_FUNC()
362 print_array(tcp, map, nmemb, &entry, sizeof(entry), in SYS_FUNC()