| /src/lib/libc/sys/ |
| Lint_syscall.c | 13 syscall(int arg1, ...) function
|
| Lint_syscall.c | 13 syscall(int arg1, ...) function
|
| /src/sys/arch/zaurus/stand/zboot/ |
| unixsys.S | 54 ENTRY(syscall) function
|
| unixsys.S | 54 ENTRY(syscall) function
|
| /src/sys/arch/ia64/ia64/ |
| syscall_stubs.S | 31 #include <sys/syscall.h> 41 * A process performs a syscall by performing an indirect call to the 43 * saved prior to the syscall in r9 and r10 respectively. The kernel 45 * across the call. This allows for small enough syscall stubs without 48 * the syscall entry point. The syscall code in the gateway page is 53 * r8 - syscall number 56 * in0-in7 - syscall arguments 58 * A syscall returns: 59 * r8+r9 - syscall return value(s 78 #define syscall 0 define [all...] |
| syscall_stubs.S | 31 #include <sys/syscall.h> 41 * A process performs a syscall by performing an indirect call to the 43 * saved prior to the syscall in r9 and r10 respectively. The kernel 45 * across the call. This allows for small enough syscall stubs without 48 * the syscall entry point. The syscall code in the gateway page is 53 * r8 - syscall number 56 * in0-in7 - syscall arguments 58 * A syscall returns: 59 * r8+r9 - syscall return value(s 78 #define syscall 0 define [all...] |
| /src/sys/compat/linux32/common/ |
| linux32_socketcall.c | 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anon2370 110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
|
| linux32_socketcall.c | 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anon2370 110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
|
| /src/sys/arch/alpha/alpha/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */ 92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $"); 98 #include <sys/syscall.h> 107 void syscall(struct lwp *, uint64_t, struct trapframe *); 113 p->p_md.md_syscall = syscall; 119 * System calls are strange beasts. They are passed the syscall number 121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error), 131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function 149 * syscall() and __syscall() are handled the same on
|
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */ 92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $"); 98 #include <sys/syscall.h> 107 void syscall(struct lwp *, uint64_t, struct trapframe *); 113 p->p_md.md_syscall = syscall; 119 * System calls are strange beasts. They are passed the syscall number 121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error), 131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function 149 * syscall() and __syscall() are handled the same on
|
| /src/sys/arch/sh3/sh3/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */ 84 #include <sys/syscall.h> 91 static void syscall(struct lwp *, struct trapframe *); 98 p->p_md.md_syscall = syscall; 108 syscall(struct lwp *l, struct trapframe *tf) function 136 * Like syscall, but code is a quad, so as to maintain
|
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */ 84 #include <sys/syscall.h> 91 static void syscall(struct lwp *, struct trapframe *); 98 p->p_md.md_syscall = syscall; 108 syscall(struct lwp *l, struct trapframe *tf) function 136 * Like syscall, but code is a quad, so as to maintain
|
| /src/sys/arch/vax/vax/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */ 31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 52 void syscall(struct trapframe *); 58 p->p_md.md_syscall = syscall; 62 syscall(struct trapframe *tf) function 73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n", 96 * Only trace if tracing is enabled and the syscall isn't indirect
|
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */ 31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 52 void syscall(struct trapframe *); 58 p->p_md.md_syscall = syscall; 62 syscall(struct trapframe *tf) function 73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n", 96 * Only trace if tracing is enabled and the syscall isn't indirect
|
| /src/sys/arch/x86/x86/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */ 33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 57 static void syscall(struct trapframe *); 81 * syscall(frame): 86 void syscall(struct trapframe *); 91 syscall(struct trapframe *frame) function 99 /* Verify that the syscall args will fit in the trapframe space */ 118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9 119 * (rcx gets copied to r10 in the libc stub because the syscall [all...] |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */ 33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $"); 40 #include <sys/syscall.h> 57 static void syscall(struct trapframe *); 81 * syscall(frame): 86 void syscall(struct trapframe *); 91 syscall(struct trapframe *frame) function 99 /* Verify that the syscall args will fit in the trapframe space */ 118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9 119 * (rcx gets copied to r10 in the libc stub because the syscall [all...] |
| /src/sys/arch/aarch64/aarch64/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $ */ 54 #include <sys/syscall.h> 61 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $"); 84 static void EMULNAME(syscall)(struct trapframe *); 87 EMULNAME(syscall)(struct trapframe *tf) function 192 p->p_md.md_syscall = EMULNAME(syscall);
|
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $ */ 54 #include <sys/syscall.h> 61 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $"); 84 static void EMULNAME(syscall)(struct trapframe *); 87 EMULNAME(syscall)(struct trapframe *tf) function 192 p->p_md.md_syscall = EMULNAME(syscall);
|
| aarch32_syscall.c | 51 static void EMULNAME(syscall)(struct trapframe *); 59 EMULNAME(syscall)(struct trapframe *tf) function 136 /* don't allow nested syscall */ 235 p->p_md.md_syscall = EMULNAME(syscall);
|
| /src/sys/arch/powerpc/powerpc/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $ */ 57 #include <sys/syscall.h> 62 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $"); 79 static void EMULNAME(syscall)(struct trapframe *); 82 EMULNAME(syscall)(struct trapframe *tf) function 173 p->p_md.md_syscall = EMULNAME(syscall);
|
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $ */ 57 #include <sys/syscall.h> 62 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $"); 79 static void EMULNAME(syscall)(struct trapframe *); 82 EMULNAME(syscall)(struct trapframe *tf) function 173 p->p_md.md_syscall = EMULNAME(syscall);
|
| /src/sys/arch/riscv/riscv/ |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $ */ 32 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $"); 46 #include <sys/syscall.h> 55 static void EMULNAME(syscall)(struct trapframe *); 62 p->p_md.md_syscall = EMULNAME(syscall); 69 * System calls are strange beasts. They are passed the syscall number 72 * directly after the syscall is excepted to contain a jump instruction 73 * for an error handler. If the syscall completes with no error, the PC 78 EMULNAME(syscall)(struct trapframe *tf) function 102 printf("syscall: _syscall code %#"PRIxREGISTER"\n", tf->tf_a0) [all...] |
| syscall.c | 1 /* $NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $ */ 32 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $"); 46 #include <sys/syscall.h> 55 static void EMULNAME(syscall)(struct trapframe *); 62 p->p_md.md_syscall = EMULNAME(syscall); 69 * System calls are strange beasts. They are passed the syscall number 72 * directly after the syscall is excepted to contain a jump instruction 73 * for an error handler. If the syscall completes with no error, the PC 78 EMULNAME(syscall)(struct trapframe *tf) function 102 printf("syscall: _syscall code %#"PRIxREGISTER"\n", tf->tf_a0) [all...] |
| /src/tests/compat/linux/ |
| h_linux.h | 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro 45 #define close(fd) (int)syscall(LINUX_SYS_close, fd) 46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status) 47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \ 49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \ 51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \ 53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \ 56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \ 58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \ 60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir, [all...] |
| h_linux.h | 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro 45 #define close(fd) (int)syscall(LINUX_SYS_close, fd) 46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status) 47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \ 49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \ 51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \ 53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \ 56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \ 58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \ 60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir, [all...] |