Lines Matching refs:process
79 * and resolved (to some address). When the process starts (or when
90 * the process as if nothing happened.
197 arch_dynlink_done(struct process *proc)
284 arch_translate_address_dyn(struct process *proc,
351 sym2addr(struct process *proc, struct library_symbol *sym)
593 read_plt_slot_value(struct process *proc, GElf_Addr addr, GElf_Addr *valp)
612 unresolve_plt_slot(struct process *proc, GElf_Addr addr, GElf_Addr value)
627 arch_elf_add_func_entry(struct process *proc, struct ltelf *lte,
691 arch_elf_add_plt_entry(struct process *proc, struct ltelf *lte,
754 * want read this from ELF file, but from process image. That
756 * process. */
825 dl_plt_update_bp_on_hit(struct breakpoint *bp, struct process *proc)
865 struct process *proc = self->task_enabling_breakpoint;
912 struct process *leader = proc->leader;
940 jump_to_entry_point(struct process *proc, struct breakpoint *bp)
950 ppc_plt_bp_continue(struct breakpoint *bp, struct process *proc)
962 struct process *leader;
1014 /* When a process is in a PLT stub, it may have already read the data
1018 * the dynamic linker needs that data. Moreover, the process may
1023 detach_task_cb(struct process *task, void *data)
1043 ppc_plt_bp_retract(struct breakpoint *bp, struct process *proc)
1058 ppc_plt_bp_install(struct breakpoint *bp, struct process *proc)
1152 arch_breakpoint_init(struct process *proc, struct breakpoint *bp)
1200 arch_process_init(struct process *proc)
1208 arch_process_destroy(struct process *proc)
1213 arch_process_clone(struct process *retp, struct process *proc)
1232 arch_process_exec(struct process *proc)