Searched refs:stack (Results 1 - 18 of 18) sorted by relevance
/seL4-mcs-10.1.1/src/kernel/ |
H A D | stack.c | 12 #include <kernel/stack.h>
|
/seL4-mcs-10.1.1/include/kernel/ |
H A D | stack.h | 17 #include <mode/kernel/stack.h> 21 * address of the stack is per-arch-mode aligned. KERNEL_STACK_ALIGNMENT is 22 * defined for each arch/mode in <mode/kernel/stack.h>
|
/seL4-mcs-10.1.1/include/arch/x86/arch/32/mode/model/ |
H A D | smp.h | 22 /* Get current stack pointer */ 26 word_t stack; local 28 asm ("movl %[stack_address], %[result]" : [result] "=r"(result) : [stack_address] "r"(&stack));
|
/seL4-mcs-10.1.1/include/arch/arm/arch/64/mode/smp/ |
H A D | smp.h | 18 #include <kernel/stack.h>
|
/seL4-mcs-10.1.1/src/arch/x86/api/ |
H A D | faults.c | 93 word_t UNUSED stack = sp + i * sizeof(word_t); local 94 printf("*0x%lx == 0x%lx\n", stack, *(word_t*)stack);
|
/seL4-mcs-10.1.1/include/arch/x86/arch/32/mode/ |
H A D | stack.h | 19 #include <kernel/stack.h> 21 /** Hardware stack switching on exception/IRQ entry. 35 * The stack pointer is loaded from the TSS on IRQ and exception entry. 38 * For an SMP build, we also have to set the location of the kernel stack for the 41 /* save kernel stack pointer for next exception */
|
/seL4-mcs-10.1.1/src/arch/x86/32/ |
H A D | c_traps.c | 13 #include <kernel/stack.h> 18 #include <mode/stack.h> 49 // Set our stack pointer to the top of the tcb so we can efficiently pop 78 // Set our stack pointer to the top of the tcb so we can efficiently pop 121 /* reset our stack and jmp to the IRQ entry point */ 161 // Set our stack pointer to the top of the tcb so we can efficiently pop 219 // Set our stack pointer to the top of the tcb so we can efficiently pop
|
H A D | traps.S | 15 # Hardware pushes onto the stack SS, ESP, EFLAGS, CS, NextIP and Error, 16 # leaving the stack pointer pointing to TLS_BASE. The kernel pushes the rest. 338 # switch to kernel stack 341 # Place the arguments on the stack 401 * So, unset the EFLAGS.TF on the stack and this causes the syscall that we 487 # switch to kernel stack 531 # switch to kernel stack
|
/seL4-mcs-10.1.1/include/arch/x86/arch/64/mode/ |
H A D | machine.h | 131 /* Get current stack pointer */ 134 word_t stack; local 136 asm volatile("movq %[stack_address], %[result]" : [result] "=r"(result) : [stack_address] "r"(&stack)); 204 * the temporary address space and not the stack. We preserve the
|
/seL4-mcs-10.1.1/include/arch/x86/arch/32/mode/fastpath/ |
H A D | fastpath.h | 20 #include <mode/stack.h>
|
/seL4-mcs-10.1.1/src/arch/x86/64/ |
H A D | c_traps.c | 18 #include <kernel/stack.h> 51 // Set our stack pointer to the top of the tcb so we can efficiently pop 92 // Set our stack pointer to the top of the tcb so we can efficiently pop 144 /* reset our stack and jmp to the IRQ entry point */ 201 * by the user. To prevent a storage channel across threads through the irq stack, 202 * which is idirectly controlled by the user, we need to clear the stack. We perform 203 * this here since when we return *from* an interrupt we must use this stack and 206 * the kernel, clear the irq stack. */ 220 // Set our stack pointer to the top of the tcb so we can efficiently pop 279 // Set our stack pointe [all...] |
H A D | traps.S | 20 * The size of interrupt-stack pushes is fixed at 64 bits; and the processor uses 8-byte, zero extended 22 * The stack pointer (SS:RSP) is pushed unconditionally on interrupts. 26 * The RSP is aligned to a 16-byte boundary before pushing the stack frame. 30 * field is set to the new CPL. The old SS and RSP are saved on the new stack. 56 * of the data and stack segment selector and the descriptor registers are ignored 127 /* use saved stack */ \ 142 /* nested interrupt, use saved stack */ \ 456 # switch to kernel stack 525 * So, unset the EFLAGS.TF on the stack and this causes the syscall that we 616 # switch to kernel stack [all...] |
/seL4-mcs-10.1.1/include/arch/arm/arch/32/mode/ |
H A D | machine.h | 26 #include <kernel/stack.h> 259 /* Setup kernel stack pointer. 260 * Load the (per-core) kernel stack pointer to TPIDRPRW for faster reloads on traps.
|
/seL4-mcs-10.1.1/manual/parts/ |
H A D | objects.tex | 325 itself, including the code, data, and stack sections (seL4 is a single 326 kernel-stack operating system). It then creates an initial user
|
H A D | threads.tex | 45 \apifunc{seL4\_TCB\_WriteRegisters}{tcb_writeregisters} with an initial stack pointer and instruction
|
/seL4-mcs-10.1.1/src/arch/riscv/kernel/ |
H A D | vspace.c | 40 #include <kernel/stack.h>
|
/seL4-mcs-10.1.1/src/arch/arm/32/kernel/ |
H A D | vspace.c | 19 #include <kernel/stack.h>
|
/seL4-mcs-10.1.1/src/arch/arm/64/kernel/ |
H A D | vspace.c | 21 #include <kernel/stack.h>
|
Completed in 203 milliseconds