4c4a1a19e8
window to the user stack while in a nested kernel trap. We do this for entry to the kernel from user mode, but if we get an interrupt in kernel mode while there are still user windows in the cpu, and we attempt to spill to the user stack, we may take too many nested traps and overflow the trap stack, causing a red state exception. This is needed by upcoming changes to allow the user tsb to not be locked in the tlb. Reviewed by: tmm |
||
---|---|---|
.. | ||
compile | ||
conf | ||
ebus | ||
include | ||
isa | ||
pci | ||
sbus | ||
sparc64 |