/src/sys/miscfs/procfs/ |
procfs_subr.c | 146 struct lwp *curl; local in function:procfs_rw 159 curl = curlwp; 168 error = kauth_authorize_process(curl->l_cred, KAUTH_PROCESS_PROCFS, 195 error = procfs_donote(curl, p, pfs, uio); 199 error = procfs_doregs(curl, l, pfs, uio); 203 error = procfs_dofpregs(curl, l, pfs, uio); 207 error = procfs_dostatus(curl, l, pfs, uio); 211 error = procfs_do_pid_stat(curl, l, pfs, uio); 215 error = procfs_dolimit(curl, p, pfs, uio); 219 error = procfs_dolimits(curl, p, pfs, uio) [all...] |
procfs_mem.c | 92 struct lwp *curl, /* tracer */ 99 return (process_domem(curl, l, uio));
|
procfs_regs.c | 86 struct lwp *curl, /* tracer */ 93 return (process_doregs(curl, l, uio));
|
procfs_fpregs.c | 89 struct lwp *curl, /* tracer */ 96 return (process_dofpregs(curl, l, uio));
|
procfs_fd.c | 47 procfs_dofd(lwp_t *curl, proc_t *p, struct pfsnode *pfs, struct uio *uio) 60 error = (*fp->f_ops->fo_read)(fp, &offs, uio, curl->l_cred, 0); 63 error = (*fp->f_ops->fo_write)(fp, &offs, uio, curl->l_cred, 0);
|
procfs_note.c | 88 struct lwp *curl,
|
procfs_auxv.c | 42 procfs_doauxv(struct lwp *curl, struct proc *p, struct pfsnode *pfs,
|
procfs_map.c | 108 procfs_domap(struct lwp *curl, struct proc *p, struct pfsnode *pfs, 123 int width = (int)((curl->l_proc->p_flag & PK_32) ? sizeof(int32_t) : 159 error = VOP_GETATTR(vp, &va, curl->l_cred); 165 MAXPATHLEN * 4, vp, curl, p);
|
procfs_linux.c | 159 procfs_domeminfo(struct lwp *curl, struct proc *p, 222 procfs_dodevices(struct lwp *curl, struct proc *p, 282 procfs_docpustat(struct lwp *curl, struct proc *p, 359 procfs_doloadavg(struct lwp *curl, struct proc *p, 395 procfs_do_pid_statm(struct lwp *curl, struct lwp *l, 451 procfs_do_pid_stat(struct lwp *curl, struct lwp *l, 553 procfs_docpuinfo(struct lwp *curl, struct proc *p, 578 procfs_douptime(struct lwp *curl, struct proc *p, 607 const struct statvfs *sfs, struct lwp *curl, int suser) 634 procfs_domounts(struct lwp *curl, struct proc *p [all...] |
procfs_limit.c | 85 procfs_dolimit(struct lwp *curl, struct proc *p, struct pfsnode *pfs, 128 procfs_dolimits(struct lwp *curl, struct proc *p, struct pfsnode *pfs,
|
procfs_cmdline.c | 64 struct lwp *curl,
|
procfs_status.c | 248 procfs_dostatus(struct lwp *curl, struct lwp *l, struct pfsnode *pfs,
|
/src/sys/arch/powerpc/powerpc/ |
procfs_machdep.c | 48 procfs_machdep_rw(struct lwp *curl, struct lwp *l, struct pfsnode *pfs, 54 return (procfs_machdep_dovecregs(curl, l, pfs, uio)); 82 procfs_machdep_dovecregs(struct lwp *curl, struct lwp *l, 86 return (process_machdep_dovecregs(curl, l, uio));
|
process_machdep.c | 237 process_machdep_dovecregs(struct lwp *curl, struct lwp *l, struct uio *uio)
|
/src/sys/kern/ |
sys_process_lwpstatus.c | 182 process_doregs(struct lwp *curl /*tracer*/, 192 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0; 216 process_dofpregs(struct lwp *curl /*tracer*/, 226 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0; 251 process_dodbregs(struct lwp *curl /*tracer*/, 261 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0;
|
sys_process.c | 149 process_domem(struct lwp *curl /*tracer*/,
|
kern_ktrace.c | 470 lwp_t *curl = curlwp; local in function:ktrderefall 481 if (!auth || ktrcanset(curl, p)) 992 ktrace_common(lwp_t *curl, int ops, int facs, int pid, file_t **fpp) 1005 (void)ktrenter(curl); 1108 ret |= ktrsetchildren(curl, p, ops, 1111 ret |= ktrops(curl, p, ops, facs, 1124 ret |= ktrsetchildren(curl, p, ops, facs, ktd); 1126 ret |= ktrops(curl, p, ops, facs, ktd); 1146 ktrexit(curl); 1180 ktrops(lwp_t *curl, struct proc *p, int ops, int facs [all...] |
vfs_getcwd.c | 529 vnode_to_path(char *path, size_t len, struct vnode *vp, struct lwp *curl, 532 struct proc *curp = curl->l_proc; 548 GETCWD_CHECK_ACCESS, curl);
|
kern_lwp.c | 437 lwp_suspend(struct lwp *curl, struct lwp *t) 444 KASSERT(curl != t || curl->l_stat == LSONPROC); 450 if ((curl->l_flag & (LW_WEXIT | LW_WCORE)) != 0) {
|
/src/sys/compat/netbsd32/ |
netbsd32_ptrace.c | 159 netbsd32_doregs(struct lwp *curl /*tracer*/, 197 netbsd32_dofpregs(struct lwp *curl /*tracer*/, 235 netbsd32_dodbregs(struct lwp *curl /*tracer*/,
|
/src/sys/arch/x86/x86/ |
procfs_machdep.c | 496 procfs_machdep_rw(struct lwp *curl, struct lwp *l, struct pfsnode *pfs, 502 return (procfs_machdep_doxmmregs(curl, l, pfs, uio)); 525 procfs_machdep_doxmmregs(struct lwp *curl, struct lwp *l, 529 return process_machdep_doxmmregs(curl, l, uio);
|
/src/sys/arch/i386/i386/ |
process_machdep.c | 361 process_machdep_doxmmregs(struct lwp *curl, struct lwp *l, struct uio *uio) 362 /* curl: tracer */ 406 process_machdep_doxstate(struct lwp *curl, struct lwp *l, struct uio *uio) 407 /* curl: tracer */
|
/src/sys/rump/librump/rumpkern/ |
emul.c | 277 rump_vnode_to_path(char *path, size_t len, struct vnode *vp, struct lwp *curl,
|
/src/sys/arch/amd64/amd64/ |
netbsd32_machdep.c | 500 netbsd32_process_doxmmregs(struct lwp *curl, struct lwp *l, void *addr, 502 /* curl: tracer */ 510 if ((curl->l_proc->p_flag & PK_32) == 0 || 517 error = proc_vmspace_getref(curl->l_proc, &vm); 530 error = netbsd32_process_xmmregio(curl, l, &uio); 536 netbsd32_process_xmmregio(struct lwp *curl, struct lwp *l, struct uio *uio) 537 /* curl: tracer */
|
/src/sys/arch/sh3/sh3/ |
process_machdep.c | 226 process_machdep_doregs40(struct lwp *curl, struct lwp *l, struct uio *uio)
|