Lines Matching refs:uintptr_t
59 uintptr_t retaddr;
455 const uintptr_t bottom = dtrace_get_kernel_stack(current_thread()); in dtrace_frame_in_kernel_stack()
462 const uintptr_t top = bottom + kernel_stack_size; in dtrace_frame_in_kernel_stack()
463 return ((uintptr_t)fp >= bottom) && ((uintptr_t)fp < top); in dtrace_frame_in_kernel_stack()
475 uintptr_t pc; in dtrace_getpcstack()
476 uintptr_t caller = CPU->cpu_dtrace_caller; in dtrace_getpcstack()
506 !ml_addr_in_non_xnu_stack((uintptr_t)nextfp)) { in dtrace_getpcstack()
520 } else if (!ml_addr_in_non_xnu_stack((uintptr_t)fp) && in dtrace_getpcstack()
521 !ml_addr_in_non_xnu_stack((uintptr_t)nextfp)) { in dtrace_getpcstack()
537 if (--aframes == 0 && caller != (uintptr_t)NULL) { in dtrace_getpcstack()
545 caller = (uintptr_t)NULL; in dtrace_getpcstack()
569 uintptr_t *stack; in dtrace_getarg()
570 uintptr_t pc; in dtrace_getarg()
582 pc = (uintptr_t)ptrauth_strip((void*)fp->retaddr, ptrauth_key_return_address); in dtrace_getarg()
588 && pc > (uintptr_t) dtrace_invop_callsite_pre in dtrace_getarg()
589 && pc <= (uintptr_t) dtrace_invop_callsite_post) { in dtrace_getarg()
600 stack = (uintptr_t*) &saved_state->x[0]; in dtrace_getarg()
604 stack = (uintptr_t*) &fp[1]; in dtrace_getarg()
632 stack = (uintptr_t*) &fp[1]; /* Find marshalled arguments */ in dtrace_getarg()
654 dtrace_probe( dtrace_probeid_error, (uint64_t)(uintptr_t)state, epid, which, fltoffs, fault ); in dtrace_probe_error()
658 dtrace_toxic_ranges(void (*func)(uintptr_t base, uintptr_t limit)) in dtrace_toxic_ranges()
666 if (VM_MAX_KERNEL_ADDRESS < ~(uintptr_t)0) { in dtrace_toxic_ranges()
667 func(VM_MAX_KERNEL_ADDRESS + 1, ~(uintptr_t)0); in dtrace_toxic_ranges()