Lines Matching +full:r0 +full:- +full:6
4 * SPDX-License-Identifier: Apache-2.0
66 if ((thread->base.user_options & K_USER) != 0) { in z_check_thread_stack_fail()
75 guard_end = thread->stack_info.start; in z_check_thread_stack_fail()
76 guard_start = (uint32_t)thread->stack_obj; in z_check_thread_stack_fail()
82 guard_end = thread->arch.priv_stack_start; in z_check_thread_stack_fail()
83 guard_start = guard_end - Z_ARC_STACK_GUARD_SIZE; in z_check_thread_stack_fail()
89 guard_end = thread->stack_info.start; in z_check_thread_stack_fail()
90 guard_start = guard_end - Z_ARC_STACK_GUARD_SIZE; in z_check_thread_stack_fail()
95 * (like enter_s {r13-r26, fp, blink}) push a collection of in z_check_thread_stack_fail()
113 * the technical manual, just switch on the values in Table 6-5
153 ARC_EXCEPTION_DUMP("Memory read-modify-write violation (%s)", in dump_protv_exception()
195 ARC_EXCEPTION_DUMP(" - jump and branch target"); in dump_machine_check_exception()
360 if (esf->pc >= start && esf->pc < end) { in _Fault()
361 esf->pc = (uint32_t)(exceptions[i].fixup); in _Fault()
374 * in user mode software-triggered system fatal exceptions only allow in _Fault()
378 if ((esf->status32 & _ARC_V2_STATUS32_U) && in _Fault()
379 esf->r0 != K_ERR_STACK_CHK_FAIL) { in _Fault()
380 esf->r0 = K_ERR_KERNEL_OOPS; in _Fault()
384 z_arc_fatal_error(esf->r0, esf); in _Fault()
397 /* Vector 6 = EV_ProV. Regardless of cause, parameter 2 means stack in _Fault()