Home
last modified time | relevance | path

Searched refs:call (Results 1 – 11 of 11) sorted by relevance

/DragonOS/kernel/crates/kprobe/src/arch/
H A Dmod.rs66 pub fn call(&self, trap_frame: &dyn ProbeArgs) { in call() method
84 fn call(&self, trap_frame: &dyn ProbeArgs); in call() method
144 fn call(&self, trap_frame: &dyn ProbeArgs); in call() method
159 self.pre_handler.call(trap_frame); in call_pre_handler()
163 self.post_handler.call(trap_frame); in call_post_handler()
167 self.fault_handler.call(trap_frame); in call_fault_handler()
172 call_back.call(trap_frame); in call_event_callback()
/DragonOS/tools/
H A Dconfigure_network.sh7 sudo sysctl -w net.bridge.bridge-nf-call-arptables=0
8 sudo sysctl -w net.bridge.bridge-nf-call-ip6tables=0
9 sudo sysctl -w net.bridge.bridge-nf-call-iptables=0
/DragonOS/kernel/src/arch/riscv64/asm/
H A Dhead.S35 call __initial_clear_pgtable
37 call __initial_clear_pgtable
41 call __initial_clear_pgtable
54 call initial_map_256M_phys_addr
61 call initial_map_1g_identical
64 call __initial_reloacate_enable_mmu
92 call kernel_main
/DragonOS/kernel/crates/unified-init/src/
H A Dlib.rs23 pub fn call(&self) -> Result<(), SystemError> { in call() method
68 initializer.call().unwrap_or_else(|e| {
/DragonOS/kernel/crates/rbpf/mk/
H A Dappveyor.bat13 call %VCVARSALL% amd64
22 call %VCVARSALL% amd64_x86
/DragonOS/docs/kernel/trace/
H A DeBPF.md48 5. 根据内核版本,对eBPF程序中的bpf to bpf call进行处理
111 1. 增加bpf to bpf call 的支持:通过增加新的栈抽象和保存和恢复必要的寄存器数据
191 /// For each element in map, call callback_fn function with map,
/DragonOS/kernel/src/perf/
H A Dkprobe.rs69 fn call(&self, trap_frame: &dyn ProbeArgs) { in call() method
/DragonOS/kernel/src/filesystem/vfs/
H A Dmod.rs938 pub fn call( in call() method
977 maker.call(data)
/DragonOS/kernel/crates/rbpf/src/
H A Dcranelift.rs931 let call = bcx.ins().call(func_ref, &[arg0, arg1, arg2, arg3, arg4]); in translate_program() localVariable
932 let ret = bcx.inst_results(call)[0]; in translate_program()
H A Dinsn_builder.rs294 pub fn call(&mut self) -> FunctionCall { in call() method
657 program.call().set_imm(0x11_22_33_44).push(); in call_immediate()
/DragonOS/kernel/crates/rbpf/
H A DREADME.md98 4. Execute your program: either run the interpreter or call the JIT-compiled