Searched refs:path (Results 1 - 16 of 16) sorted by relevance

/seL4-mcs-10.1.1/manual/tools/
H A Dgen_invocations.py76 # extract the 2nd last path member
77 (path, tail) = os.path.split(os.path.dirname(input_file))
79 (path, prefix) = os.path.split(path)
134 if not os.path.exists(os.path.dirname(args.output)):
135 os.makedirs(os.path
[all...]
H A Dparse_doxygen_xml.py506 Takes a path to a file containing doxygen-generated xml,
511 dir_name = os.path.dirname(input_file_name)
526 new_input_file = os.path.join(dir_name, new_input_file_name)
562 if not os.path.exists(os.path.dirname(args.output)):
563 os.makedirs(os.path.dirname(args.output))
/seL4-mcs-10.1.1/src/arch/x86/
H A Dc_traps.c54 ksKernelEntry.path = Entry_UnimplementedDevice;
61 ksKernelEntry.path = Entry_VMFault;
69 ksKernelEntry.path = Entry_DebugFault;
76 ksKernelEntry.path = Entry_UserLevelFault;
83 ksKernelEntry.path = Entry_Interrupt;
100 ksKernelEntry.path = Entry_UnknownSyscall;
132 ksKernelEntry.path = Entry_UnknownSyscall;
190 ksKernelEntry.path = Entry_VMExit;
/seL4-mcs-10.1.1/src/arch/arm/
H A Dc_traps.c32 ksKernelEntry.path = Entry_UserLevelFault;
76 ksKernelEntry.path = Entry_VMFault;
104 ksKernelEntry.path = Entry_Interrupt;
147 ksKernelEntry.path = Entry_UnknownSyscall;
166 ksKernelEntry.path = Entry_VCPUFault;
/seL4-mcs-10.1.1/include/benchmark/
H A Dbenchmark_track_types.h46 seL4_Word path: 3; member in struct:kernel_entry
H A Dbenchmark_track.h61 ksKernelEntry.path = Entry_Syscall;
/seL4-mcs-10.1.1/libsel4/include/sel4/
H A Dbenchmark_track_types.h46 seL4_Word path: 3; member in struct:kernel_entry
/seL4-mcs-10.1.1/include/api/
H A Ddebug.h29 switch (ksKernelEntry.path) {
/seL4-mcs-10.1.1/libsel4/tools/
H A Dbitfield_gen.py22 import os.path namespace
590 path_ptr_name = '(cparent \<^bsup>s\<^esup>%(name)s_ptr [%(path)s] :: %(toptp)s ptr)'
1165 toptp, path = type_map[name_C]
1167 substs['access_path'] = '(' + reduce(lambda x, y: y + ' (' + x + ')', ['the (ptrval s)'] + path) + ')'
1169 if len(path) == 0:
1176 substs['path'] = ', '.join(map(lambda x: "''%s''" % x.split('.')[-1], path))
1179 path.reverse()
1181 ['\\<lambda>_. ' + name] + path) + '(the (ptrval s))' + ')'
2552 self.filename = os.path
[all...]
/seL4-mcs-10.1.1/manual/tools/libsel4_tools/
H A Dbitfield_gen.py22 import os.path namespace
590 path_ptr_name = '(cparent \<^bsup>s\<^esup>%(name)s_ptr [%(path)s] :: %(toptp)s ptr)'
1165 toptp, path = type_map[name_C]
1167 substs['access_path'] = '(' + reduce(lambda x, y: y + ' (' + x + ')', ['the (ptrval s)'] + path) + ')'
1169 if len(path) == 0:
1176 substs['path'] = ', '.join(map(lambda x: "''%s''" % x.split('.')[-1], path))
1179 path.reverse()
1181 ['\\<lambda>_. ' + name] + path) + '(the (ptrval s))' + ')'
2552 self.filename = os.path
[all...]
/seL4-mcs-10.1.1/tools/
H A Dbitfield_gen.py22 import os.path namespace
590 path_ptr_name = '(cparent \<^bsup>s\<^esup>%(name)s_ptr [%(path)s] :: %(toptp)s ptr)'
1165 toptp, path = type_map[name_C]
1167 substs['access_path'] = '(' + reduce(lambda x, y: y + ' (' + x + ')', ['the (ptrval s)'] + path) + ')'
1169 if len(path) == 0:
1176 substs['path'] = ', '.join(map(lambda x: "''%s''" % x.split('.')[-1], path))
1179 path.reverse()
1181 ['\\<lambda>_. ' + name] + path) + '(the (ptrval s))' + ')'
2552 self.filename = os.path
[all...]
H A Dlex.py184 filename = os.path.join(outputdir,basetabfilename)+".py"
839 import os.path namespace
840 base,ext = os.path.splitext(filename)
/seL4-mcs-10.1.1/src/arch/x86/machine/
H A Dbreakpoint.c498 /** Used in the exception path to determine if an exception was caused by
561 /** Used in the exception path to determine which breakpoint triggered the
619 ksKernelEntry.path = Entry_UserLevelFault;
/seL4-mcs-10.1.1/src/arch/arm/machine/
H A Ddebug.c1111 ksKernelEntry.path = Entry_DebugFault;
/seL4-mcs-10.1.1/manual/parts/
H A Dcspace.tex31 of the indices of the \obj{CNode} capabilities forming the path to the
H A Dobjects.tex81 of slots within \obj{CNodes} forming the path to the destination

Completed in 191 milliseconds