swh:1:snp:77163734605b0ec556b01d897b7bb4a7e30d46b6
Raw File
Tip revision: a4412fdd49dc011bcc2c0d81ac4cab7457092650 authored by Steven Rostedt (Google) on 21 November 2022, 15:44:03 UTC
error-injection: Add prompt for function error injection
Tip revision: a4412fd
xen-hypercalls.sh
#!/bin/sh
# SPDX-License-Identifier: GPL-2.0
out="$1"
shift
in="$@"

for i in $in; do
	eval $CPP $LINUXINCLUDE -dD -imacros "$i" -x c /dev/null
done | \
awk '$1 == "#define" && $2 ~ /__HYPERVISOR_[a-z][a-z_0-9]*/ { v[$3] = $2 }
	END {   print "/* auto-generated by scripts/xen-hypercall.sh */"
		for (i in v) if (!(v[i] in v))
			print "HYPERCALL("substr(v[i], 14)")"}' | sort -u >$out
back to top