Searched refs:_userlimit (Results 1 – 8 of 8) sorted by relevance
692 if ((_userlimit & LEVEL_MASK(1)) != _userlimit) { in hat_init()694 (void *)_userlimit, (void *)LEVEL_SIZE(1)); in hat_init()1145 uintptr_t eaddr = _userlimit; in hat_swapout()1588 ASSERT(hat == kas.a_hat || va < _userlimit); in hat_memload()1645 ASSERT(hat == kas.a_hat || va + len <= _userlimit); in hat_memload_array()1780 ASSERT(hat == kas.a_hat || eva <= _userlimit); in hat_devload()1880 ASSERT(hat == kas.a_hat || eaddr <= _userlimit); in hat_unlock()1885 if (eaddr > _userlimit) in hat_unlock()2316 ASSERT(hat == kas.a_hat || va + len <= _userlimit); in hat_unload()2391 ASSERT(hat == kas.a_hat || eaddr <= _userlimit); in hat_unload_callback()[all …]
345 extern uintptr_t _userlimit;399 #define USERLIMIT _userlimit
706 if ((uintptr_t)uaddr >= _userlimit) { in dtrace_fuword8()718 if ((uintptr_t)uaddr >= _userlimit) { in dtrace_fuword16()730 if ((uintptr_t)uaddr >= _userlimit) { in dtrace_fuword32()742 if ((uintptr_t)uaddr >= _userlimit) { in dtrace_fuword64()
114 (*func)(0, _userlimit); in dtrace_toxic_ranges()133 (*func)(0, _userlimit); in dtrace_toxic_ranges()
1386 *(uintptr_t *)&_userlimit = kernelbase; in startup_kmem()1388 *(uintptr_t *)&_userlimit -= KERNELBASE - USERLIMIT; in startup_kmem()1390 *(uintptr_t *)&_userlimit32 = _userlimit; in startup_kmem()1393 PRM_DEBUG(_userlimit); in startup_kmem()2414 clear_boot_mappings(0, _userlimit); in release_bootstrap()
90 return (_userlimit); in kdi_get_userlimit()
107 ASSERT((uintptr_t)a->kaddr > _userlimit); in segumap_create()116 if ((uintptr_t)a->kaddr <= _userlimit || in segumap_create()
111 uintptr_t _userlimit = (uintptr_t)USERLIMIT; variable