HomeSort by: relevance | last modified time | path
    Searched defs:syscall (Results 1 - 25 of 34) sorted by relevancy

1 2

  /src/lib/libc/sys/
Lint_syscall.c 13 syscall(int arg1, ...) function
  /src/sys/arch/zaurus/stand/zboot/
unixsys.S 54 ENTRY(syscall) function
  /src/sys/arch/ia64/ia64/
syscall_stubs.S 31 #include <sys/syscall.h>
41 * A process performs a syscall by performing an indirect call to the
43 * saved prior to the syscall in r9 and r10 respectively. The kernel
45 * across the call. This allows for small enough syscall stubs without
48 * the syscall entry point. The syscall code in the gateway page is
53 * r8 - syscall number
56 * in0-in7 - syscall arguments
58 * A syscall returns:
59 * r8+r9 - syscall return value(s
78 #define syscall 0 define
    [all...]
  /src/sys/compat/linux32/common/
linux32_socketcall.c 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anon2370
110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
  /src/sys/arch/alpha/alpha/
syscall.c 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */
92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $");
98 #include <sys/syscall.h>
107 void syscall(struct lwp *, uint64_t, struct trapframe *);
113 p->p_md.md_syscall = syscall;
119 * System calls are strange beasts. They are passed the syscall number
121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error),
131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function
149 * syscall() and __syscall() are handled the same on
  /src/sys/arch/sh3/sh3/
syscall.c 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */
84 #include <sys/syscall.h>
91 static void syscall(struct lwp *, struct trapframe *);
98 p->p_md.md_syscall = syscall;
108 syscall(struct lwp *l, struct trapframe *tf) function
136 * Like syscall, but code is a quad, so as to maintain
  /src/sys/arch/vax/vax/
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
52 void syscall(struct trapframe *);
58 p->p_md.md_syscall = syscall;
62 syscall(struct trapframe *tf) function
73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n",
96 * Only trace if tracing is enabled and the syscall isn't indirect
  /src/sys/arch/x86/x86/
syscall.c 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */
33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
57 static void syscall(struct trapframe *);
81 * syscall(frame):
86 void syscall(struct trapframe *);
91 syscall(struct trapframe *frame) function
99 /* Verify that the syscall args will fit in the trapframe space */
118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9
119 * (rcx gets copied to r10 in the libc stub because the syscall
    [all...]
  /src/external/gpl3/gdb/dist/sim/common/
sim-syscall.c 28 #include "sim-syscall.h"
41 TRACE_MEMORY (cpu, "READ (syscall) %i bytes @ 0x%08lx", bytes, taddr);
53 TRACE_MEMORY (cpu, "WRITE (syscall) %i bytes @ 0x%08lx", bytes, taddr);
59 /* Main syscall callback for simulators. */
68 const char unknown_syscall[] = "<UNKNOWN SYSCALL>";
69 const char *syscall;
91 syscall = cb_target_str_syscall (cb, func);
92 if (!syscall)
93 syscall = unknown_syscall;
97 syscall, func, arg1, arg2, arg3, sc.result
67 const char *syscall; local
    [all...]
  /src/external/gpl3/gdb.old/dist/sim/common/
sim-syscall.c 28 #include "sim-syscall.h"
41 TRACE_MEMORY (cpu, "READ (syscall) %i bytes @ 0x%08lx", bytes, taddr);
53 TRACE_MEMORY (cpu, "WRITE (syscall) %i bytes @ 0x%08lx", bytes, taddr);
59 /* Main syscall callback for simulators. */
68 const char unknown_syscall[] = "<UNKNOWN SYSCALL>";
69 const char *syscall;
91 syscall = cb_target_str_syscall (cb, func);
92 if (!syscall)
93 syscall = unknown_syscall;
97 syscall, func, arg1, arg2, arg3, sc.result
67 const char *syscall; local
    [all...]
  /src/sys/arch/aarch64/aarch64/
syscall.c 1 /* $NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $ */
54 #include <sys/syscall.h>
61 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $");
84 static void EMULNAME(syscall)(struct trapframe *);
87 EMULNAME(syscall)(struct trapframe *tf) function
192 p->p_md.md_syscall = EMULNAME(syscall);
aarch32_syscall.c 51 static void EMULNAME(syscall)(struct trapframe *);
59 EMULNAME(syscall)(struct trapframe *tf) function
136 /* don't allow nested syscall */
235 p->p_md.md_syscall = EMULNAME(syscall);
  /src/sys/arch/powerpc/powerpc/
syscall.c 1 /* $NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $ */
57 #include <sys/syscall.h>
62 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $");
79 static void EMULNAME(syscall)(struct trapframe *);
82 EMULNAME(syscall)(struct trapframe *tf) function
173 p->p_md.md_syscall = EMULNAME(syscall);
  /src/sys/arch/riscv/riscv/
syscall.c 1 /* $NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $ */
32 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $");
46 #include <sys/syscall.h>
55 static void EMULNAME(syscall)(struct trapframe *);
62 p->p_md.md_syscall = EMULNAME(syscall);
69 * System calls are strange beasts. They are passed the syscall number
72 * directly after the syscall is excepted to contain a jump instruction
73 * for an error handler. If the syscall completes with no error, the PC
78 EMULNAME(syscall)(struct trapframe *tf) function
102 printf("syscall: _syscall code %#"PRIxREGISTER"\n", tf->tf_a0)
    [all...]
  /src/tests/compat/linux/
h_linux.h 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro
45 #define close(fd) (int)syscall(LINUX_SYS_close, fd)
46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status)
47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \
49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \
51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \
53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \
56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \
58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \
60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir,
    [all...]
  /src/sys/arch/arm/arm/
syscall.c 1 /* $NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $ */
67 * syscall entry handling
74 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $");
82 #include <sys/syscall.h>
173 void syscall(struct trapframe *, lwp_t *, uint32_t);
178 p->p_md.md_syscall = syscall;
182 syscall(struct trapframe *tf, lwp_t *l, uint32_t insn) function
  /src/sys/arch/m68k/m68k/
m68k_syscall.c 80 #include <sys/syscall.h>
97 void syscall(register_t, struct frame);
108 syscall(register_t code, struct frame frame) function
116 panic("syscall");
195 * Like syscall, but code is a quad, so as to maintain
229 * if this is a child returning from fork syscall.
240 * themselves, so no need to copy the syscall return
323 * Like syscall, but code is a quad, so as to maintain
360 * if this is a child returning from fork syscall.
  /src/sys/arch/mips/mips/
syscall.c 1 /* $NetBSD: syscall.c,v 1.51 2023/10/05 19:41:04 ad Exp $ */
71 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.51 2023/10/05 19:41:04 ad Exp $");
78 #include <sys/syscall.h>
99 static void EMULNAME(syscall)(struct lwp *, uint32_t, uint32_t, vaddr_t);
104 p->p_md.md_syscall = EMULNAME(syscall);
110 * System calls are strange beasts. They are passed the syscall number
112 * an error flag in a3 (if a3 != 0 on return, the syscall had an error),
117 EMULNAME(syscall)(struct lwp *l, u_int status, u_int cause, vaddr_t pc) function
161 * Like syscall, but code is a quad, so as to maintain
301 printf("syscall %s:", p->p_emul->e_syscallnames[code])
    [all...]
  /src/sys/arch/sparc/sparc/
syscall.c 1 /* $NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $ */
52 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $");
61 #include <sys/syscall.h>
102 void syscall(register_t, struct trapframe *, register_t);
128 * Check for ``special'' codes that alter this, namely syscall and
129 * __syscall. The latter takes a quad syscall number, so that other
201 p->p_md.md_syscall = syscall;
208 * `in' registers within the syscall trap code (because of the automatic
213 syscall(register_t code, struct trapframe *tf, register_t pc) function
  /src/sys/arch/sparc64/sparc64/
syscall.c 1 /* $NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $ */
82 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $");
90 #include <sys/syscall.h>
117 void syscall(struct trapframe64 *, register_t, register_t);
147 * Check for ``special'' codes that alter this, namely syscall and
148 * __syscall. The latter takes a quad syscall number, so that other
192 printf("syscall(): 64-bit stack but P_32 set\n");
198 printf("syscall(): 64-bit stack on a 32-bit kernel????\n");
245 p->p_md.md_syscall = syscall;
252 * `in' registers within the syscall trap code (because of the automati
278 syscall(struct trapframe64 *tf, register_t code, register_t pc) function
    [all...]
  /src/sys/arch/usermode/usermode/
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
30 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
39 #include <sys/syscall.h>
83 syscall(void) function
114 aprint_debug("syscall no. %d, ", code);
116 thunk_printf_debug("syscall no. %d, ", code);
150 //thunk_printf_debug("end of syscall : return to userland\n");
  /src/external/gpl3/gdb/dist/gdb/
i386-linux-nat.c 675 ULONGEST syscall;
677 LINUX_SYSCALL_REGNUM, &syscall);
680 if (syscall == SYS_sigreturn || syscall == SYS_rt_sigreturn)
686 if (syscall == SYS_rt_sigreturn)
668 ULONGEST syscall; local
  /src/external/gpl3/gdb.old/dist/gdb/
i386-linux-nat.c 691 ULONGEST syscall;
693 LINUX_SYSCALL_REGNUM, &syscall);
696 if (syscall == SYS_sigreturn || syscall == SYS_rt_sigreturn)
702 if (syscall == SYS_rt_sigreturn)
684 ULONGEST syscall; local
  /src/crypto/external/bsd/heimdal/dist/lib/kafs/
afssys.c 43 unsigned long syscall; member in struct:procdata
53 unsigned long syscall; member in struct:devdata
79 uint32_t syscall; member in struct:sundevdata
90 uint64_t syscall; member in struct:sundevdata
280 return syscall(afs_syscalls[0], AFSCALL_PIOCTL,
285 return syscall(afs_syscalls[0],
360 return syscall(afs_syscalls[0], AFSCALL_SETPAG);
364 return syscall(afs_syscalls[1]);
410 * Try to see if `syscall' is a pioctl. Return 0 iff succesful.
421 syscall(syscall_num, AFSCALL_PIOCTL
    [all...]
  /src/external/gpl3/binutils/dist/gprofng/common/
hwcdrv.h 74 #define syscall CALL_UTIL(syscall) macro

Completed in 45 milliseconds

1 2