Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 25 of 40) sorted by relevance

12

/xen/tools/libfsimage/zfs/
A Dfsys_zfs.c390 if ((char *)buf < stack && ((char *)buf) + lsize > stack) { in zio_read()
397 buf = stack; in zio_read()
398 stack += psize; in zio_read()
669 zapbuf = stack; in zap_lookup()
671 stack += size; in zap_lookup()
704 char *stack) in dnode_get() argument
779 char *stack) in dnode_get_path() argument
903 stack))) in get_objset_mdn()
1280 char *stack; in zfs_mount() local
1382 char *stack; in zfs_open() local
[all …]
/xen/xen/tools/kconfig/
A Dsymbol.c1016 memset(stack, 0, sizeof(*stack)); in dep_stack_insert()
1020 stack->sym = sym; in dep_stack_insert()
1021 check_top = stack; in dep_stack_insert()
1049 for (stack = check_top; stack != NULL; stack = stack->prev) in sym_check_print_recursive()
1052 if (!stack) { in sym_check_print_recursive()
1057 for (; stack; stack = stack->next) { in sym_check_print_recursive()
1058 sym = stack->sym; in sym_check_print_recursive()
1059 next_sym = stack->next ? stack->next->sym : last_sym; in sym_check_print_recursive()
1183 stack.expr = NULL; in sym_check_sym_deps()
1189 stack.prop = prop; in sym_check_sym_deps()
[all …]
/xen/xen/arch/x86/efi/
A DMakefile13 $(call cc-option-add,cflags-stack-boundary,CC,-mpreferred-stack-boundary=4)
14 $(EFIOBJ): CFLAGS-stack-boundary := $(cflags-stack-boundary)
/xen/xen/common/
A Dwait.c36 char *stack; member
49 wqv->stack = alloc_xenheap_page(); in init_waitqueue_vcpu()
50 if ( wqv->stack == NULL ) in init_waitqueue_vcpu()
75 free_xenheap_page(wqv->stack); in destroy_waitqueue_vcpu()
163 : "i" (PAGE_SIZE), "0" (0), "1" (cpu_info), "2" (wqv->stack) in __prepare_to_wait()
213 : : "S" (wqv->stack), "D" (wqv->esp), in check_wakeup_from_wait()
215 [ip] "r" (*(unsigned long *)wqv->stack) in check_wakeup_from_wait()
/xen/xen/arch/x86/
A Dtraps.c243 if ( !__compat_access_ok(v->domain, stack, sizeof(*stack)) ) in compat_show_guest_stack()
261 stack_page = stack = do_page_walk(v, (unsigned long)stack); in compat_show_guest_stack()
273 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & mask ) in compat_show_guest_stack()
286 stack++; in compat_show_guest_stack()
316 if ( !access_ok(stack, sizeof(*stack)) ) in show_guest_stack()
330 stack_page = stack = do_page_walk(v, (unsigned long)stack); in show_guest_stack()
342 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & mask ) in show_guest_stack()
355 stack++; in show_guest_stack()
442 while ( stack <= bottom ) in _show_trace()
444 addr = *stack++; in _show_trace()
[all …]
A DRules.mk9 c_flags += $(object_label_flags) $(CFLAGS-stack-boundary)
10 a_flags += $(object_label_flags) $(CFLAGS-stack-boundary)
A Darch.mk50 $(call cc-option-add,CFLAGS-stack-boundary,CC,-mpreferred-stack-boundary=3)
51 export CFLAGS-stack-boundary
/xen/tools/xentrace/
A Dxenctx.c873 guest_word_t stack = stk_addr_start; in print_stack() local
909 stack = stack_pointer(ctx); in print_stack()
913 while (stack < frame) { in print_stack()
921 stack += width; in print_stack()
924 stack = frame; in print_stack()
927 p = map_page(ctx, vcpu, stack); in print_stack()
937 stack += width; in print_stack()
950 stack += width; in print_stack()
954 stack = stk_addr_start; in print_stack()
955 while(stack < stack_limit) { in print_stack()
[all …]
/xen/xen/arch/x86/oprofile/
A Dbacktrace.c133 unsigned long stack = (unsigned long)regs->rsp; in valid_hypervisor_stack() local
134 unsigned long stack_base = (stack & ~(STACK_SIZE - 1)) + STACK_SIZE; in valid_hypervisor_stack()
136 return headaddr > stack && headaddr < stack_base; in valid_hypervisor_stack()
/xen/xen/include/asm-arm/
A Dcurrent.h46 #define switch_stack_and_jump(stack, fn) \ argument
47 asm volatile ("mov sp,%0; b " STR(fn) : : "r" (stack) : "memory" )
A Dinit.h7 unsigned char *stack; member
A Ddomain.h124 void *stack; member
/xen/xen/arch/arm/
A Dsmpboot.c59 .stack = cpu0_boot_stack,
432 init_data.stack = idle_vcpu[cpu]->arch.stack; in __cpu_up()
473 init_data.stack = NULL; in __cpu_up()
A Dtraps.c985 unsigned long *stack, addr; in show_guest_stack() local
1058 stack = mapped + (sp & ~PAGE_MASK); in show_guest_stack()
1062 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & PAGE_SIZE ) in show_guest_stack()
1064 addr = *stack; in show_guest_stack()
1068 stack++; in show_guest_stack()
1150 register_t *stack = STACK_BEFORE_EXCEPTION(regs), addr; in show_stack() local
1156 printk("Xen stack trace from sp=%p:\n ", stack); in show_stack()
1160 if ( ((long)stack & (STACK_SIZE-BYTES_PER_LONG)) == 0 ) in show_stack()
1165 addr = *stack++; in show_stack()
A Ddomain.c564 v->arch.stack = alloc_xenheap_pages(STACK_ORDER, MEMF_node(vcpu_to_node(v))); in arch_vcpu_create()
565 if ( v->arch.stack == NULL ) in arch_vcpu_create()
568 v->arch.cpu_info = (struct cpu_info *)(v->arch.stack in arch_vcpu_create()
610 free_xenheap_pages(v->arch.stack, STACK_ORDER); in arch_vcpu_destroy()
/xen/tools/firmware/rombios/
A D32bitgateway.c83 ; Save caller state, stack frame offsets listed below
129 ; Restore real-mode stack pointer
/xen/
A DCODING_STYLE142 Passing errors up the stack should be used when the caller is already
146 domain_crash() should be used when passing errors up the stack is too
152 BUG_ON() should be used when you can’t pass errors up the stack, and
232 call stack may not realize that the domain is now dying as a result of
236 documentation of the code to make sure all callers at the stack handle
A DConfig.mk206 EMBEDDED_EXTRA_CFLAGS := -nopie -fno-stack-protector -fno-stack-protector-all
/xen/xen/arch/arm/arm64/
A Dasm-offsets.c54 OFFSET(INITINFO_stack, struct init_info, stack); in __dummy__()
/xen/xen/arch/arm/arm32/
A Dasm-offsets.c74 OFFSET(INITINFO_stack, struct init_info, stack); in __dummy__()
/xen/xen/arch/x86/boot/
A Dwakeup.S21 movw %ax, %ss # A stack required for BIOS call
/xen/xen/arch/x86/x86_64/
A Dentry.S540 # Get out of the guest-save area of the stack.
731 movq %rax,UREGS_rip(%rsp) # fixup regular stack
738 wrssq %rax, 1*8(%rdi) # fixup shadow stack
741 subq $8,UREGS_rsp(%rsp) # add ec/ev to previous stack frame
/xen/docs/features/
A Dintel_psr_mba.pandoc126 default Thrtl MSR is used only in hypervisor and is transparent to tool stack
130 using the tool stack. Since MBA shares COS ID with CAT/CDP, a COS ID
/xen/docs/misc/
A Dxen-error-handling.txt19 * Unrecoverable guest kernel stack overflows
A Dnetif-staging-grants.pandoc113 network stack goes as following:
207 25) Call into to the network stack.
309 from backend to frontend network stack:
376 24) Call packet into the network stack.

Completed in 31 milliseconds

12