/src/lib/libc/sys/ |
Lint_syscall.c | 13 syscall(int arg1, ...) function in typeref:typename:int
|
/src/sys/arch/zaurus/stand/zboot/ |
unixsys.S | 54 ENTRY(syscall) function
|
/src/sys/arch/ia64/ia64/ |
syscall_stubs.S | 31 #include <sys/syscall.h> 41 * A process performs a syscall by performing an indirect call to the 43 * saved prior to the syscall in r9 and r10 respectively. The kernel 45 * across the call. This allows for small enough syscall stubs without 48 * the syscall entry point. The syscall code in the gateway page is 53 * r8 - syscall number 56 * in0-in7 - syscall arguments 58 * A syscall returns: 59 * r8+r9 - syscall return value(s 78 #define syscall macro [all...] |
/src/sys/compat/linux32/common/ |
linux32_socketcall.c | 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anonb8c1a1540108 110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
|
/src/sys/arch/sh3/sh3/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */ 84 #include <sys/syscall.h> 91 static void syscall(struct lwp *, struct trapframe *); 98 p->p_md.md_syscall = syscall; 108 syscall(struct lwp *l, struct trapframe *tf) function in typeref:typename:void 136 * Like syscall, but code is a quad, so as to maintain
|
/src/sys/arch/alpha/alpha/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */ 92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $"); 98 #include <sys/syscall.h> 107 void syscall(struct lwp *, uint64_t, struct trapframe *); 113 p->p_md.md_syscall = syscall; 119 * System calls are strange beasts. They are passed the syscall number 121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error), 131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function in typeref:typename:void 149 * syscall() and __syscall() are handled the same on
|
/src/sys/arch/vax/vax/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */ 31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 52 void syscall(struct trapframe *); 58 p->p_md.md_syscall = syscall; 62 syscall(struct trapframe *tf) function in typeref:typename:void 73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n", 96 * Only trace if tracing is enabled and the syscall isn't indirect
|
/src/sys/arch/x86/x86/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */ 33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 57 static void syscall(struct trapframe *); 81 * syscall(frame): 86 void syscall(struct trapframe *); 91 syscall(struct trapframe *frame) function in typeref:typename:void 99 /* Verify that the syscall args will fit in the trapframe space */ 118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9 119 * (rcx gets copied to r10 in the libc stub because the syscall [all...] |
/src/tests/compat/linux/ |
h_linux.h | 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro 45 #define close(fd) (int)syscall(LINUX_SYS_close, fd) 46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status) 47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \ 49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \ 51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \ 53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \ 56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \ 58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \ 60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir, [all...] |
/src/sys/arch/arm/arm/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $ */ 67 * syscall entry handling 74 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $"); 82 #include <sys/syscall.h> 173 void syscall(struct trapframe *, lwp_t *, uint32_t); 178 p->p_md.md_syscall = syscall; 182 syscall(struct trapframe *tf, lwp_t *l, uint32_t insn) function in typeref:typename:void
|
/src/sys/arch/m68k/m68k/ |
m68k_syscall.c | 80 #include <sys/syscall.h> 97 void syscall(register_t, struct frame); 108 syscall(register_t code, struct frame frame) function in typeref:typename:void 116 panic("syscall"); 195 * Like syscall, but code is a quad, so as to maintain 229 * if this is a child returning from fork syscall. 240 * themselves, so no need to copy the syscall return 323 * Like syscall, but code is a quad, so as to maintain 360 * if this is a child returning from fork syscall.
|
/src/sys/arch/sparc/sparc/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $ */ 52 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $"); 61 #include <sys/syscall.h> 102 void syscall(register_t, struct trapframe *, register_t); 128 * Check for ``special'' codes that alter this, namely syscall and 129 * __syscall. The latter takes a quad syscall number, so that other 201 p->p_md.md_syscall = syscall; 208 * `in' registers within the syscall trap code (because of the automatic 213 syscall(register_t code, struct trapframe *tf, register_t pc) function in typeref:typename:void
|
/src/sys/arch/sparc64/sparc64/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $ */ 82 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $"); 90 #include <sys/syscall.h> 117 void syscall(struct trapframe64 *, register_t, register_t); 147 * Check for ``special'' codes that alter this, namely syscall and 148 * __syscall. The latter takes a quad syscall number, so that other 192 printf("syscall(): 64-bit stack but P_32 set\n"); 198 printf("syscall(): 64-bit stack on a 32-bit kernel????\n"); 245 p->p_md.md_syscall = syscall; 252 * `in' registers within the syscall trap code (because of the automati 278 syscall(struct trapframe64 *tf, register_t code, register_t pc) function in typeref:typename:void [all...] |
/src/sys/arch/usermode/usermode/ |
syscall.c | 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */ 30 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $"); 39 #include <sys/syscall.h> 83 syscall(void) function in typeref:typename:void 114 aprint_debug("syscall no. %d, ", code); 116 thunk_printf_debug("syscall no. %d, ", code); 150 //thunk_printf_debug("end of syscall : return to userland\n");
|
/src/sys/kern/ |
Makefile | 14 init_sysent.c syscalls.c systrace_args.c ../sys/syscall.h ../sys/syscallargs.h: ${SYSCALLSRC}
|
/src/usr.bin/make/filemon/ |
filemon_ktrace.c | 39 #include <sys/syscall.h> 112 struct ktr_syscall syscall; member in union:filemon::__anonfbc2a417020a 418 struct ktr_syscall *call = &F->payload.syscall; 421 /* Validate the syscall code. */ 428 * Invoke the syscall-specific logic to create a new 453 /* Find an active syscall state, or drop it. */ 468 /* Find and remove an active syscall state, or drop it. */ 475 * If the active syscall state matches this return, 476 * invoke the syscall-specific logic to show a filemon 479 /* XXX What to do if syscall code doesn't match? * [all...] |
/src/sys/arch/hppa/hppa/ |
trap.c | 73 #include <sys/syscall.h> 175 void syscall(struct trapframe *, int *); 189 * This tracing is normally activated by the dispatching of a certain syscall 190 * with certain arguments - see the activation code in syscall(). 1222 * Don't touch the syscall gateway page. Instead, insert a 1257 p->p_md.md_syscall = syscall; 1261 * call actual syscall routine 1262 * from the low-level syscall handler: 1263 * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto 1268 syscall(struct trapframe *frame, int *args function in typeref:typename:void [all...] |
/src/lib/libc/include/ |
namespace.h | 736 #define syscall _syscall macro
|