/xen/tools/libfsimage/zfs/ |
A D | fsys_zfs.c | 390 if ((char *)buf < stack && ((char *)buf) + lsize > stack) { in zio_read() 397 buf = stack; in zio_read() 398 stack += psize; in zio_read() 669 zapbuf = stack; in zap_lookup() 671 stack += size; in zap_lookup() 704 char *stack) in dnode_get() argument 779 char *stack) in dnode_get_path() argument 903 stack))) in get_objset_mdn() 1280 char *stack; in zfs_mount() local 1382 char *stack; in zfs_open() local [all …]
|
/xen/xen/tools/kconfig/ |
A D | symbol.c | 1016 memset(stack, 0, sizeof(*stack)); in dep_stack_insert() 1020 stack->sym = sym; in dep_stack_insert() 1021 check_top = stack; in dep_stack_insert() 1049 for (stack = check_top; stack != NULL; stack = stack->prev) in sym_check_print_recursive() 1052 if (!stack) { in sym_check_print_recursive() 1057 for (; stack; stack = stack->next) { in sym_check_print_recursive() 1058 sym = stack->sym; in sym_check_print_recursive() 1059 next_sym = stack->next ? stack->next->sym : last_sym; in sym_check_print_recursive() 1183 stack.expr = NULL; in sym_check_sym_deps() 1189 stack.prop = prop; in sym_check_sym_deps() [all …]
|
/xen/xen/arch/x86/efi/ |
A D | Makefile | 13 $(call cc-option-add,cflags-stack-boundary,CC,-mpreferred-stack-boundary=4) 14 $(EFIOBJ): CFLAGS-stack-boundary := $(cflags-stack-boundary)
|
/xen/xen/common/ |
A D | wait.c | 36 char *stack; member 49 wqv->stack = alloc_xenheap_page(); in init_waitqueue_vcpu() 50 if ( wqv->stack == NULL ) in init_waitqueue_vcpu() 75 free_xenheap_page(wqv->stack); in destroy_waitqueue_vcpu() 163 : "i" (PAGE_SIZE), "0" (0), "1" (cpu_info), "2" (wqv->stack) in __prepare_to_wait() 213 : : "S" (wqv->stack), "D" (wqv->esp), in check_wakeup_from_wait() 215 [ip] "r" (*(unsigned long *)wqv->stack) in check_wakeup_from_wait()
|
/xen/xen/arch/x86/ |
A D | traps.c | 243 if ( !__compat_access_ok(v->domain, stack, sizeof(*stack)) ) in compat_show_guest_stack() 261 stack_page = stack = do_page_walk(v, (unsigned long)stack); in compat_show_guest_stack() 273 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & mask ) in compat_show_guest_stack() 286 stack++; in compat_show_guest_stack() 316 if ( !access_ok(stack, sizeof(*stack)) ) in show_guest_stack() 330 stack_page = stack = do_page_walk(v, (unsigned long)stack); in show_guest_stack() 342 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & mask ) in show_guest_stack() 355 stack++; in show_guest_stack() 442 while ( stack <= bottom ) in _show_trace() 444 addr = *stack++; in _show_trace() [all …]
|
A D | Rules.mk | 9 c_flags += $(object_label_flags) $(CFLAGS-stack-boundary) 10 a_flags += $(object_label_flags) $(CFLAGS-stack-boundary)
|
A D | arch.mk | 50 $(call cc-option-add,CFLAGS-stack-boundary,CC,-mpreferred-stack-boundary=3) 51 export CFLAGS-stack-boundary
|
/xen/tools/xentrace/ |
A D | xenctx.c | 873 guest_word_t stack = stk_addr_start; in print_stack() local 909 stack = stack_pointer(ctx); in print_stack() 913 while (stack < frame) { in print_stack() 921 stack += width; in print_stack() 924 stack = frame; in print_stack() 927 p = map_page(ctx, vcpu, stack); in print_stack() 937 stack += width; in print_stack() 950 stack += width; in print_stack() 954 stack = stk_addr_start; in print_stack() 955 while(stack < stack_limit) { in print_stack() [all …]
|
/xen/xen/arch/x86/oprofile/ |
A D | backtrace.c | 133 unsigned long stack = (unsigned long)regs->rsp; in valid_hypervisor_stack() local 134 unsigned long stack_base = (stack & ~(STACK_SIZE - 1)) + STACK_SIZE; in valid_hypervisor_stack() 136 return headaddr > stack && headaddr < stack_base; in valid_hypervisor_stack()
|
/xen/xen/include/asm-arm/ |
A D | current.h | 46 #define switch_stack_and_jump(stack, fn) \ argument 47 asm volatile ("mov sp,%0; b " STR(fn) : : "r" (stack) : "memory" )
|
A D | init.h | 7 unsigned char *stack; member
|
A D | domain.h | 124 void *stack; member
|
/xen/xen/arch/arm/ |
A D | smpboot.c | 59 .stack = cpu0_boot_stack, 432 init_data.stack = idle_vcpu[cpu]->arch.stack; in __cpu_up() 473 init_data.stack = NULL; in __cpu_up()
|
A D | traps.c | 985 unsigned long *stack, addr; in show_guest_stack() local 1058 stack = mapped + (sp & ~PAGE_MASK); in show_guest_stack() 1062 if ( (((long)stack - 1) ^ ((long)(stack + 1) - 1)) & PAGE_SIZE ) in show_guest_stack() 1064 addr = *stack; in show_guest_stack() 1068 stack++; in show_guest_stack() 1150 register_t *stack = STACK_BEFORE_EXCEPTION(regs), addr; in show_stack() local 1156 printk("Xen stack trace from sp=%p:\n ", stack); in show_stack() 1160 if ( ((long)stack & (STACK_SIZE-BYTES_PER_LONG)) == 0 ) in show_stack() 1165 addr = *stack++; in show_stack()
|
A D | domain.c | 564 v->arch.stack = alloc_xenheap_pages(STACK_ORDER, MEMF_node(vcpu_to_node(v))); in arch_vcpu_create() 565 if ( v->arch.stack == NULL ) in arch_vcpu_create() 568 v->arch.cpu_info = (struct cpu_info *)(v->arch.stack in arch_vcpu_create() 610 free_xenheap_pages(v->arch.stack, STACK_ORDER); in arch_vcpu_destroy()
|
/xen/tools/firmware/rombios/ |
A D | 32bitgateway.c | 83 ; Save caller state, stack frame offsets listed below 129 ; Restore real-mode stack pointer
|
/xen/ |
A D | CODING_STYLE | 142 Passing errors up the stack should be used when the caller is already 146 domain_crash() should be used when passing errors up the stack is too 152 BUG_ON() should be used when you can’t pass errors up the stack, and 232 call stack may not realize that the domain is now dying as a result of 236 documentation of the code to make sure all callers at the stack handle
|
A D | Config.mk | 206 EMBEDDED_EXTRA_CFLAGS := -nopie -fno-stack-protector -fno-stack-protector-all
|
/xen/xen/arch/arm/arm64/ |
A D | asm-offsets.c | 54 OFFSET(INITINFO_stack, struct init_info, stack); in __dummy__()
|
/xen/xen/arch/arm/arm32/ |
A D | asm-offsets.c | 74 OFFSET(INITINFO_stack, struct init_info, stack); in __dummy__()
|
/xen/xen/arch/x86/boot/ |
A D | wakeup.S | 21 movw %ax, %ss # A stack required for BIOS call
|
/xen/xen/arch/x86/x86_64/ |
A D | entry.S | 540 # Get out of the guest-save area of the stack. 731 movq %rax,UREGS_rip(%rsp) # fixup regular stack 738 wrssq %rax, 1*8(%rdi) # fixup shadow stack 741 subq $8,UREGS_rsp(%rsp) # add ec/ev to previous stack frame
|
/xen/docs/features/ |
A D | intel_psr_mba.pandoc | 126 default Thrtl MSR is used only in hypervisor and is transparent to tool stack 130 using the tool stack. Since MBA shares COS ID with CAT/CDP, a COS ID
|
/xen/docs/misc/ |
A D | xen-error-handling.txt | 19 * Unrecoverable guest kernel stack overflows
|
A D | netif-staging-grants.pandoc | 113 network stack goes as following: 207 25) Call into to the network stack. 309 from backend to frontend network stack: 376 24) Call packet into the network stack.
|