Home
last modified time | relevance | path

Searched refs:stackptr (Results 1 – 5 of 5) sorted by relevance

/xnu-11215/libkern/gen/
H A DOSDebug.cpp119 x86_64_validate_stackptr(vm_offset_t stackptr) in x86_64_validate_stackptr() argument
123 if (!stackptr || (stackptr & 0x7) || !x86_64_validate_raddr(stackptr)) { in x86_64_validate_stackptr()
129 if (!kvtophys(stackptr)) { in x86_64_validate_stackptr()
137 !kvtophys(stackptr + x86_64_RETURN_OFFSET)) { in x86_64_validate_stackptr()
165 vm_offset_t stackptr, stackptr_prev, raddr; local
169 __asm__ volatile ("movq %%rbp, %0" : "=m" (stackptr));
171 if (!x86_64_validate_stackptr(stackptr)) {
184 stackptr_prev = stackptr;
185 stackptr = *((vm_offset_t *) stackptr_prev);
187 if (!x86_64_validate_stackptr(stackptr)) {
[all …]
/xnu-11215/osfmk/kdp/ml/x86_64/
H A Dkdp_machdep.c495 addr64_t stackptr = STACK_IKS(thread->kernel_stack)->k_rbp; in machine_trace_thread64() local
502 if (!stackptr || (stackptr == fence)) { in machine_trace_thread64()
505 if (stackptr & 0x0000007) { in machine_trace_thread64()
508 if (stackptr <= prevsp) { in machine_trace_thread64()
512 kern_virt_addr = stackptr + RETURN_OFFSET64; in machine_trace_thread64()
522 prevsp = stackptr; in machine_trace_thread64()
524 kern_virt_addr = stackptr; in machine_trace_thread64()
532 stackptr = *(uint64_t *)kern_virt_addr; in machine_trace_thread64()
/xnu-11215/tests/
H A Dldt.c234 static uint64_t stack_range_to_GSbase(uint64_t stackptr, uint64_t GSbase);
235 void restore_gsbase(uint64_t stackptr);
254 restore_gsbase(uint64_t stackptr) in restore_gsbase() argument
257 uint64_t orig_GSbase = stack_range_to_GSbase(stackptr, 0); in restore_gsbase()
774 stack_range_to_GSbase(uint64_t stackptr, uint64_t GSbase) in stack_range_to_GSbase() argument
779 if (stackptr >= stack2gs[i].stack_base && in stack_range_to_GSbase()
780 stackptr < stack2gs[i].stack_limit) { in stack_range_to_GSbase()
/xnu-11215/osfmk/i386/
H A Dmp.c566 void *stackptr; in NMI_pte_corruption_callback() local
567 __asm__ volatile ("movq %%rbp, %0" : "=m" (stackptr)); in NMI_pte_corruption_callback()
572 panic_i386_backtrace(stackptr, 64, &pstr[0], TRUE, current_cpu_datap()->cpu_int_state); in NMI_pte_corruption_callback()
580 void *stackptr; in NMIInterruptHandler() local
596 __asm__ volatile ("movq %%rbp, %0" : "=m" (stackptr)); in NMIInterruptHandler()
611 panic_i386_backtrace(stackptr, 64, &pstr[0], TRUE, regs); in NMIInterruptHandler()
616 panic_i386_backtrace(stackptr, 48, &pstr[0], TRUE, regs); in NMIInterruptHandler()
621 panic_i386_backtrace(stackptr, 64, &pstr[0], TRUE, regs); in NMIInterruptHandler()
626 panic_i386_backtrace(stackptr, 64, &pstr[0], TRUE, regs); in NMIInterruptHandler()
/xnu-11215/osfmk/i386/AT386/
H A Dmodel_dep.c844 void *stackptr = NULL; in SavePanicInfo() local
873 stackptr = (void *) &synthetic_stack_frame; in SavePanicInfo()
877 if (stackptr == NULL) { in SavePanicInfo()
878 __asm__ volatile ("movq %%rbp, %0" : "=m" (stackptr)); in SavePanicInfo()
886 …panic_i386_backtrace(stackptr, ((panic_double_fault_cpu == cn) ? 80 : 48), debugger_msg, FALSE, NU… in SavePanicInfo()