Lines Matching refs:to

58 #	define va_copy(to, from)	__va_copy(to, from)
63 void* to;
69 char* to;
78 // separates panic() message from command list to execute
253 // move the following chars to make room for the ones to insert
483 kputs("\x1b[1D"); // move to the left one
502 // All the following needs to be transparent for the
504 // we have to get the on-screen line into the visual state
532 kputs("\x1b[1C"); // move to the right one
538 kputs("\x1b[1D"); // move to the left one
573 kprintf("\x1b[%" B_PRId32 "D", position); // move to beginning of line
666 /* supposed to fall through */
737 // The message string contains a list of commands to be
739 // want to print those, so we copy the interesting part of
775 // Indeed there are commands to execute.
824 kprintf("Welcome to Kernel Debugging Land...\n");
889 // B_KDEBUG_CONT, i.e. asked to be repeatable, -1 otherwise.
955 // Some other CPU must have entered the debugger and tried to halt
956 // us. Process ICIs to ensure we get the halt request. Then we are
958 // try to enter it again.
966 // First entry on a MP system, send a halt request to all of the other
967 // CPUs. Should they try to enter the debugger they will be cought in
1014 // hand over to another CPU without us noticing. Since this is only
1042 // We're not handing over to a different CPU and we weren't
1141 // Our output caused older syslog output to be evicted from the
1142 // syslog buffer. We need to adjust our offsets accordingly. Note,
1144 // was written to it than we have processed, but we can't help that.
1199 // wait for syslog data to become available
1201 // Note: We time out since in some situations output is added to
1202 // the syslog buffer without being allowed to notify us (e.g. in
1205 // every single message written to the buffer, but we potentially
1214 // We need to have exclusive access to our syslog buffer
1251 // The port is gone, there is no need to run anymore
1263 // We could write the last pending buffer, try to read more
1405 // syslog_init_post_modules() we'll write it back to disk and free it.
1417 "Welcome to syslog debug output!\nHaiku revision: %s\n",
1453 dprintf("Failed to open previous syslog file: %s\n", strerror(errno));
1479 memcpy(parameters->to, parameters->from, parameters->size);
1488 parameters->result = strlcpy(parameters->to, parameters->from,
1691 "Switches to another CPU.",
1693 "Switches to CPU with the index <cpu>.\n", 0);
1775 dprintf("kernel debugger extension \"%s\": failed to load\n", name);
1849 // Broadcast to the kernel debugger modules
1867 \param address The start address of the memory range to be checked.
1868 \param size The size of the memory range to be checked.
1869 \param protection The area protection for which to check. Valid is a bitwise
1898 \param jumpBuffer Buffer to be used for setjmp()/longjmp().
1899 \param function The function to be called.
1900 \param parameter The parameter to be passed to the function to be called.
1905 - Any other value the function passes to longjmp().
1930 /*! Similar to user_memcpy(), but can only be invoked from within the kernel
1932 The supplied \a teamID specifies the address space in which to interpret
1938 debug_memcpy(team_id teamID, void* to, const void* from, size_t size)
1941 if ((addr_t)from + size < (addr_t)from || (addr_t)to + size < (addr_t)to)
1946 if ((IS_KERNEL_ADDRESS(from) && IS_KERNEL_ADDRESS(to))
1948 debug_memcpy_parameters parameters = {to, from, size};
1965 if (((addr_t)to + toCopy) % B_PAGE_SIZE < toCopy)
1966 toCopy -= ((addr_t)to + toCopy) % B_PAGE_SIZE;
1970 || vm_debug_copy_page_memory(teamID, to, buffer, toCopy, true)
1976 to = (uint8*)to + toCopy;
1984 /*! Similar to user_strlcpy(), but can only be invoked from within the kernel
1986 The supplied \a teamID specifies the address space in which to interpret
1992 debug_strlcpy(team_id teamID, char* to, const char* from, size_t size)
1994 if (from == NULL || (to == NULL && size > 0))
1997 // limit size to avoid address overflows
1999 ~(addr_t)0 - std::max((addr_t)from, (addr_t)to) + 1);
2005 if ((IS_KERNEL_ADDRESS(from) && IS_KERNEL_ADDRESS(to))
2007 debug_strlcpy_parameters parameters = {to, from, maxSize};
2030 if (((addr_t)to + toCopy) % B_PAGE_SIZE < toCopy)
2031 toCopy -= ((addr_t)to + toCopy) % B_PAGE_SIZE;
2063 if (vm_debug_copy_page_memory(teamID, to, buffer, toCopy, true)
2068 to = (char*)to + toCopy;
2168 /*! Similar to dprintf() but thought to be used in the kernel
2249 /*! Returns whether the supplied team ID refers to the same team the currently
2250 debugged thread (debug_get_debugged_thread()) belongs to.