HomeSort by: relevance | last modified time | path
    Searched defs:syscall (Results 1 - 18 of 18) sorted by relevancy

  /src/lib/libc/sys/
Lint_syscall.c 13 syscall(int arg1, ...) function in typeref:typename:int
  /src/sys/arch/zaurus/stand/zboot/
unixsys.S 54 ENTRY(syscall) function
  /src/sys/arch/ia64/ia64/
syscall_stubs.S 31 #include <sys/syscall.h>
41 * A process performs a syscall by performing an indirect call to the
43 * saved prior to the syscall in r9 and r10 respectively. The kernel
45 * across the call. This allows for small enough syscall stubs without
48 * the syscall entry point. The syscall code in the gateway page is
53 * r8 - syscall number
56 * in0-in7 - syscall arguments
58 * A syscall returns:
59 * r8+r9 - syscall return value(s
78 #define syscall macro
    [all...]
  /src/sys/compat/linux32/common/
linux32_socketcall.c 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anonb8c1a1540108
110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
  /src/sys/arch/sh3/sh3/
syscall.c 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */
84 #include <sys/syscall.h>
91 static void syscall(struct lwp *, struct trapframe *);
98 p->p_md.md_syscall = syscall;
108 syscall(struct lwp *l, struct trapframe *tf) function in typeref:typename:void
136 * Like syscall, but code is a quad, so as to maintain
  /src/sys/arch/alpha/alpha/
syscall.c 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */
92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $");
98 #include <sys/syscall.h>
107 void syscall(struct lwp *, uint64_t, struct trapframe *);
113 p->p_md.md_syscall = syscall;
119 * System calls are strange beasts. They are passed the syscall number
121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error),
131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function in typeref:typename:void
149 * syscall() and __syscall() are handled the same on
  /src/sys/arch/vax/vax/
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
52 void syscall(struct trapframe *);
58 p->p_md.md_syscall = syscall;
62 syscall(struct trapframe *tf) function in typeref:typename:void
73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n",
96 * Only trace if tracing is enabled and the syscall isn't indirect
  /src/sys/arch/x86/x86/
syscall.c 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */
33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
57 static void syscall(struct trapframe *);
81 * syscall(frame):
86 void syscall(struct trapframe *);
91 syscall(struct trapframe *frame) function in typeref:typename:void
99 /* Verify that the syscall args will fit in the trapframe space */
118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9
119 * (rcx gets copied to r10 in the libc stub because the syscall
    [all...]
  /src/tests/compat/linux/
h_linux.h 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro
45 #define close(fd) (int)syscall(LINUX_SYS_close, fd)
46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status)
47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \
49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \
51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \
53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \
56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \
58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \
60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir,
    [all...]
  /src/sys/arch/arm/arm/
syscall.c 1 /* $NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $ */
67 * syscall entry handling
74 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.69 2023/10/05 19:41:03 ad Exp $");
82 #include <sys/syscall.h>
173 void syscall(struct trapframe *, lwp_t *, uint32_t);
178 p->p_md.md_syscall = syscall;
182 syscall(struct trapframe *tf, lwp_t *l, uint32_t insn) function in typeref:typename:void
  /src/sys/arch/m68k/m68k/
m68k_syscall.c 80 #include <sys/syscall.h>
97 void syscall(register_t, struct frame);
108 syscall(register_t code, struct frame frame) function in typeref:typename:void
116 panic("syscall");
195 * Like syscall, but code is a quad, so as to maintain
229 * if this is a child returning from fork syscall.
240 * themselves, so no need to copy the syscall return
323 * Like syscall, but code is a quad, so as to maintain
360 * if this is a child returning from fork syscall.
  /src/sys/arch/sparc/sparc/
syscall.c 1 /* $NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $ */
52 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.33 2023/10/05 19:41:05 ad Exp $");
61 #include <sys/syscall.h>
102 void syscall(register_t, struct trapframe *, register_t);
128 * Check for ``special'' codes that alter this, namely syscall and
129 * __syscall. The latter takes a quad syscall number, so that other
201 p->p_md.md_syscall = syscall;
208 * `in' registers within the syscall trap code (because of the automatic
213 syscall(register_t code, struct trapframe *tf, register_t pc) function in typeref:typename:void
  /src/sys/arch/sparc64/sparc64/
syscall.c 1 /* $NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $ */
82 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.49 2023/10/05 19:41:06 ad Exp $");
90 #include <sys/syscall.h>
117 void syscall(struct trapframe64 *, register_t, register_t);
147 * Check for ``special'' codes that alter this, namely syscall and
148 * __syscall. The latter takes a quad syscall number, so that other
192 printf("syscall(): 64-bit stack but P_32 set\n");
198 printf("syscall(): 64-bit stack on a 32-bit kernel????\n");
245 p->p_md.md_syscall = syscall;
252 * `in' registers within the syscall trap code (because of the automati
278 syscall(struct trapframe64 *tf, register_t code, register_t pc) function in typeref:typename:void
    [all...]
  /src/sys/arch/usermode/usermode/
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
30 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
39 #include <sys/syscall.h>
83 syscall(void) function in typeref:typename:void
114 aprint_debug("syscall no. %d, ", code);
116 thunk_printf_debug("syscall no. %d, ", code);
150 //thunk_printf_debug("end of syscall : return to userland\n");
  /src/sys/kern/
Makefile 14 init_sysent.c syscalls.c systrace_args.c ../sys/syscall.h ../sys/syscallargs.h: ${SYSCALLSRC}
  /src/usr.bin/make/filemon/
filemon_ktrace.c 39 #include <sys/syscall.h>
112 struct ktr_syscall syscall; member in union:filemon::__anonfbc2a417020a
418 struct ktr_syscall *call = &F->payload.syscall;
421 /* Validate the syscall code. */
428 * Invoke the syscall-specific logic to create a new
453 /* Find an active syscall state, or drop it. */
468 /* Find and remove an active syscall state, or drop it. */
475 * If the active syscall state matches this return,
476 * invoke the syscall-specific logic to show a filemon
479 /* XXX What to do if syscall code doesn't match? *
    [all...]
  /src/sys/arch/hppa/hppa/
trap.c 73 #include <sys/syscall.h>
175 void syscall(struct trapframe *, int *);
189 * This tracing is normally activated by the dispatching of a certain syscall
190 * with certain arguments - see the activation code in syscall().
1222 * Don't touch the syscall gateway page. Instead, insert a
1257 p->p_md.md_syscall = syscall;
1261 * call actual syscall routine
1262 * from the low-level syscall handler:
1263 * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
1268 syscall(struct trapframe *frame, int *args function in typeref:typename:void
    [all...]
  /src/lib/libc/include/
namespace.h 736 #define syscall _syscall macro

Completed in 22 milliseconds