Lines Matching refs:proc

52 get_arch_dep(struct process *proc)  in get_arch_dep()  argument
55 proc->mask_32bit = (proc->e_machine == EM_PPC); in get_arch_dep()
63 syscall_p(struct process *proc, int status, int *sysnum) in syscall_p() argument
66 && WSTOPSIG(status) == (SIGTRAP | proc->tracesysgood)) { in syscall_p()
67 long pc = (long)get_instruction_pointer(proc); in syscall_p()
69 (int)ptrace(PTRACE_PEEKTEXT, proc->pid, pc - sizeof(long), in syscall_p()
74 (int)ptrace(PTRACE_PEEKUSER, proc->pid, in syscall_p()
76 if (proc->callstack_depth > 0 && in syscall_p()
77 proc->callstack[proc->callstack_depth - 1].is_syscall && in syscall_p()
78 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) { in syscall_p()
90 arch_sw_singlestep(struct process *proc, struct breakpoint *sbp, in arch_sw_singlestep() argument
94 arch_addr_t ip = get_instruction_pointer(proc); in arch_sw_singlestep()
95 struct breakpoint *other = address2bpstruct(proc->leader, ip); in arch_sw_singlestep()
98 proc->pid, ip, breakpoint_name(sbp), sbp->addr); in arch_sw_singlestep()
109 } else if (proc_read_32(proc, ip, &u.insn) < 0) { in arch_sw_singlestep()
125 unsigned long l = ptrace(PTRACE_PEEKTEXT, proc->pid, addr, 0); in arch_sw_singlestep()
140 proc->pid, addr, branch_addr); in arch_sw_singlestep()
150 proc->pid, ip, addr); in arch_sw_singlestep()
158 " at %p\n", proc->pid, ip); in arch_sw_singlestep()
169 ptrace(PTRACE_CONT, proc->pid, 0, 0); in arch_sw_singlestep()
174 arch_type_sizeof(struct process *proc, struct arg_type_info *info) in arch_type_sizeof() argument
176 if (proc == NULL) in arch_type_sizeof()
197 return proc->e_machine == EM_PPC64 ? 8 : 4; in arch_type_sizeof()
217 arch_type_alignof(struct process *proc, struct arg_type_info *info) in arch_type_alignof() argument
219 if (proc == NULL) in arch_type_alignof()
240 return arch_type_sizeof(proc, info); in arch_type_alignof()