• Home
  • Raw
  • Download

Lines Matching +full:os +full:- +full:code +full:- +full:offset

11 section and used by user-space tools like crash and makedumpfile to
18 ------------------------
21 code from which the kernel has been built. For example, crash uses it to
25 ---------
32 -----------
39 User-space tools can get the kernel name, host name, kernel release
40 number, kernel version, architecture name and OS type from it.
43 ---------------------
45 Offset of the name's member. Crash Utility and Makedumpfile get
49 ---------------
56 --------------
62 ------
69 -------------
75 -------
78 an index into the mem_map array. Right-shifting a physical address
85 ----------------
90 User-space tools use this to exclude free pages when dumping memory.
93 --------------------------------------------------------------------------
96 the section_mem_map offset.
103 ----------------
108 ----
114 -----------
121 ----
127 ---------
133 ---------
136 post-mortem analysis session.
139 ----------
145 ----------------------------------------------------------------------------------
147 User-space tools compute their values based on the offset of these
151 -----------------------------------------------------------------------------------------
161 ---------------------------------------
166 User-space tools compute required values based on the offset of these
170 ----------------------
172 Offset of the free_list's member. This value is used to compute the number
179 ----------------------
182 circular linked list. User-space tools need these in order to traverse
186 --------------------------
188 Offsets of the vmap_area's members. They carry vmalloc-specific
193 --------------------------------
195 Free areas descriptor. User-space tools use this value to iterate the
199 ---
204 Used by user-space tools to read the active kernel log buffer.
207 ----------------
215 ---------
219 SYSLOG_ACTION_CLEAR, like issued by 'dmesg -c'. Used by user-space
223 -----------------
230 -----------------------------------------------------------------
233 user-space tools to view the kernel log buffer without requiring the
237 -------------
243 -------------------------------------------------
246 by user-space tools to be able to traverse the descriptors without
250 --------
256 ------------------------------------------------------
259 user-space tools to be able to read descriptors without requiring
263 -----------------
270 -------------------------------
273 by user-space tools to be able to locate data blocks without
277 -----------
280 the meta-data for a record.
283 ------------------------------------------------------
285 Offsets for the fields providing the meta-data for a record. Used by
286 user-space tools to be able to read the information without requiring
290 -------------
296 ---------------------------------------------------
299 user-space tools to be able to access the data blocks without
303 -------------
305 The size of the atomic_long_t structure. Used by user-space tools to
307 architecture-specific implementation.
310 ------------------------
312 Offset for the long value of an atomic_long_t variable. Used by
313 user-space tools to access the long value without requiring the
314 architecture-specific declaration.
317 ------------------------------------
323 -------------
325 On linux-2.6.21 or later, the number of free pages is in
329 -----------------------------------------------------------------------------------------
335 -----------------------------------------------------------------------------
345 ---------
351 ------------
358 ------------------
360 User-space tools need to know whether the crash kernel was in 5-level
364 ---------
370 -------------------------
375 ------------
377 The kernel randomization offset. Used to compute the page offset. If
381 -----------------
387 --------
389 AMD-specific with SME support: it indicates the secure memory encryption
396 Currently, sme_mask stores the value of the C-bit position. If needed,
397 additional SME-relevant info can be placed in that variable.
409 -------
420 -------
426 --------------
428 The offset between the kernel virtual and physical mappings. Used to
432 -----------
439 ------------
441 The kernel randomization offset. Used to compute the page offset. If
445 -------------
447 The mask to extract the Pointer Authentication Code from a kernel virtual
451 ------------
453 Indicates the size offset of the memory region addressed by TTBR1_EL1.
454 The region size is 2^(64-T1SZ) bytes.
456 TTBR1_EL1 is the table base address register specified by ARMv8-A
457 architecture which is used to lookup the page-tables for the Virtual
462 -----------------------------------------------------------------------------
465 MODULES_VADDR ~ MODULES_END-1 : Kernel module space.
466 VMALLOC_START ~ VMALLOC_END-1 : vmalloc() / ioremap() space.
467 VMEMMAP_START ~ VMEMMAP_END-1 : vmemmap region, used for struct page array.
473 --------
482 -----------
488 -----------
493 ----------------------
502 -----------------------------------
507 ----------------
512 ------------
520 -----------------
525 --------------
532 --------------------------------------------------------------------------------------------
539 User-space tools need to know the offset of list, phys and virt_addr
543 ------------------------------------
545 The size of a struct mmu_psize_def and the offset of mmu_psize_def's
554 -----------------------------------
559 -----
567 -------
573 -----------
575 Indicates the virtual kernel start address of the direct-mapped RAM region.
578 -------------
583 ----------------------------------------------------------------------------------------------
593 -------------------
595 Indicates the offset between the kernel virtual and physical mappings.