/seL4-refos-master/apps/timer_server/src/dispatchers/ |
H A D | serv_dispatch.c | 70 int label = seL4_GetMR(0); local 71 if (label == RPC_SERV_CONNECT_DIRECT && m->badge != 0) {
|
/seL4-refos-master/kernel/include/object/ |
H A D | schedcontext.h | 12 exception_t decodeSchedContextInvocation(word_t label, cap_t cap, extra_caps_t extraCaps, word_t *buffer);
|
/seL4-refos-master/libs/libsel4utils/include/sel4utils/ |
H A D | irq_server.h | 72 * @param[in] label A label to use when sending to an IPC to an endpoint 78 seL4_Word label, size_t num_irqs, ps_malloc_ops_t *malloc_ops); 125 * with the designated label was received on an endpoint that was given to an 135 * label does not match that which was assigned to the IRQ server, the message info and 136 * badge are returned to the caller, much like seL4_Recv(...). If the label does match, 146 * caller may check that the label matches that which
|
/seL4-refos-master/projects/seL4_libs/libsel4utils/include/sel4utils/ |
H A D | irq_server.h | 72 * @param[in] label A label to use when sending to an IPC to an endpoint 78 seL4_Word label, size_t num_irqs, ps_malloc_ops_t *malloc_ops); 125 * with the designated label was received on an endpoint that was given to an 135 * label does not match that which was assigned to the IRQ server, the message info and 136 * badge are returned to the caller, much like seL4_Recv(...). If the label does match, 146 * caller may check that the label matches that which
|
/seL4-refos-master/kernel/src/arch/arm/object/ |
H A D | smmu.c | 21 exception_t decodeARMSIDControlInvocation(word_t label, unsigned int length, cptr_t cptr, argument 33 if (label == ARMSIDGetFault) { 44 if (label == ARMSIDClearFault) { 50 if (label != ARMSIDIssueSIDManager) { 97 exception_t decodeARMSIDInvocation(word_t label, unsigned int length, cptr_t cptr, argument 107 switch (label) { 184 exception_t decodeARMCBControlInvocation(word_t label, unsigned int length, cptr_t cptr, argument 195 if (label == ARMCBTLBInvalidateAll) { 201 if (label != ARMCBIssueCBManager) { 249 exception_t decodeARMCBInvocation(word_t label, unsigne argument [all...] |
/seL4-refos-master/projects/refos/impl/cidl_templates/ |
H A D | root.py | 33 /*! @brief RPC syscall label enums for {{ifname}} interface. */\n
|
/seL4-refos-master/cidl_templates/ |
H A D | root.py | 33 /*! @brief RPC syscall label enums for {{ifname}} interface. */\n
|
/seL4-refos-master/kernel/src/api/ |
H A D | faults.c | 118 word_t label = seL4_MessageInfo_get_label(tag); local 128 return (label == 0); 132 return (label == 0); 137 return (label == 0); 146 return (label == 0); 182 return (label == 0);
|
/seL4-refos-master/libs/libmuslc/tools/ |
H A D | add-cfi.i386.awk | 21 # used to detect "call label; label:" trick 94 label = substr($1, 1, length($1)-1) # drop trailing : 96 if (called == label) { 97 # note adjustment of stack pointer from "call label; label:" 101 if (functions[label]) { 147 if (match($0, /call [0-9]+f/)) # "forward" label
|
H A D | add-cfi.i386_sel4.awk | 21 # used to detect "call label; label:" trick 94 label = substr($1, 1, length($1)-1) # drop trailing : 96 if (called == label) { 97 # note adjustment of stack pointer from "call label; label:" 101 if (functions[label]) { 147 if (match($0, /call [0-9]+f/)) # "forward" label
|
H A D | add-cfi.x86_64.awk | 14 # used to detect "call label; label:" trick 89 label = substr($1, 1, length($1)-1) # drop trailing : 91 if (called == label) { 92 # note adjustment of stack pointer from "call label; label:" 96 if (functions[label]) { 133 if (match($0, /call [0-9]+f/)) # "forward" label
|
H A D | add-cfi.x86_64_sel4.awk | 14 # used to detect "call label; label:" trick 89 label = substr($1, 1, length($1)-1) # drop trailing : 91 if (called == label) { 92 # note adjustment of stack pointer from "call label; label:" 96 if (functions[label]) { 133 if (match($0, /call [0-9]+f/)) # "forward" label
|
/seL4-refos-master/kernel/include/arch/riscv/arch/object/ |
H A D | objecttype.h | 22 exception_t Arch_decodeInvocation(word_t label, word_t length,
|
/seL4-refos-master/kernel/src/arch/arm/64/object/ |
H A D | objecttype.c | 474 exception_t Arch_decodeInvocation(word_t label, word_t length, cptr_t cptr, argument 486 return decodeARMVCPUInvocation(label, length, cptr, slot, cap, extraCaps, call, buffer); 490 return decodeARMSIDControlInvocation(label, length, cptr, slot, cap, extraCaps, call, buffer); 492 return decodeARMSIDInvocation(label, length, cptr, slot, cap, extraCaps, call, buffer); 494 return decodeARMCBControlInvocation(label, length, cptr, slot, cap, extraCaps, call, buffer); 496 return decodeARMCBInvocation(label, length, cptr, slot, cap, extraCaps, call, buffer); 502 return decodeARMMMUInvocation(label, length, cptr, slot, cap, extraCaps, buffer);
|
/seL4-refos-master/projects/refos/design/ |
H A D | paper.tex | 41 %%% When using this you should use \autoref{label} instead of 42 %%% Section~\ref{label}. This will make ``Section'' part of the link, not 171 \label{s:intro} 175 \label{s:interface} 179 \label{s:protocolip} 183 \label{s:implementation} 186 \chapter{\label{s:concl}Conclusions}
|
H A D | intro.tex | 95 A => B [ label = "A synchronous call or fault via a synchronous endpoint"]; 96 A << B [ label = "A return from a call (via reply capability)"]; 97 A -> B [ label = "An asynchronous signal via an asynchronous endpoint"]; 98 A :> B [ label = "A kernel operation that affects B"]; 102 \label{fig:mta} 106 \label{mNotation} 145 R [ label ="Server"], 146 C [ label = "Client"]; 147 C => R [ label = "server\_process\_C.method(13, id)"]; 151 \label{fi [all...] |
/seL4-refos-master/kernel/manual/parts/ |
H A D | notifications.tex | 7 \chapter{\label{ch:notifications}Notifications} 25 different badges. \label{s:notif-badge} 55 \label{sec:notification-binding}
|
/seL4-refos-master/libs/libplatsupport/src/plat/pc99/ |
H A D | serial.c | 39 #define CONSOLE(port, label) ((port) + (SERIAL_##label))
|
/seL4-refos-master/projects/util_libs/libplatsupport/src/plat/pc99/ |
H A D | serial.c | 39 #define CONSOLE(port, label) ((port) + (SERIAL_##label))
|
/seL4-refos-master/kernel/src/object/ |
H A D | schedcontrol.c | 159 exception_t decodeSchedControlInvocation(word_t label, cap_t cap, word_t length, extra_caps_t extraCaps, argument 162 switch (label) {
|
/seL4-refos-master/libs/librefos/src/refos-rpc/ |
H A D | rpc.c | 133 rpc_get_endpoint(int32_t label) argument 136 assert(!"rpc_get_endpoint: unknown label."); 141 rpc_init(const char* name_str, int32_t label) argument 143 _rpc_label = label; 155 seL4_SetMR(0, label);
|
/seL4-refos-master/projects/refos/impl/libs/librefos/src/refos-rpc/ |
H A D | rpc.c | 133 rpc_get_endpoint(int32_t label) argument 136 assert(!"rpc_get_endpoint: unknown label."); 141 rpc_init(const char* name_str, int32_t label) argument 143 _rpc_label = label; 155 seL4_SetMR(0, label);
|
/seL4-refos-master/libs/libmuslc/src/thread/powerpc/ |
H A D | clone.s | 43 bns+ 1f # jump to label 1 if no summary overflow.
|
/seL4-refos-master/kernel/tools/hardware/utils/ |
H A D | rule.py | 45 self.labels = {} # dict of label => offset within region. 82 ''' Get a dict of address -> label for the kernel ''' 107 def __init__(self, label: str, irq: int, prio: int = 0, sel_macro: str = None, false_irq: int = -1, enable_macro: str = None, desc: str = None): 108 self.label = label 141 return 'KernelInterrupt(label={},irq={},sel_macro={},false_irq={})'.format(self.label, self.irq, self.sel_macro, self.false_irq)
|
/seL4-refos-master/projects/util_libs/libfdt/ |
H A D | fdt_overlay.c | 399 * @label: Label of the node referenced by the phandle 416 int poffset, const char *label) 427 symbol_path = fdt_getprop(fdt, symbols_off, label, 476 const char *label; local 480 &label, &len); 529 poffset, label); 412 overlay_fixup_one_phandle(void *fdt, void *fdto, int symbols_off, const char *path, uint32_t path_len, const char *name, uint32_t name_len, int poffset, const char *label) argument
|