HomeSort by: relevance | last modified time | path
    Searched defs:syscall (Results 1 - 25 of 44) sorted by relevancy

1 2

  /src/lib/libc/sys/
Lint_syscall.c 13 syscall(int arg1, ...) function
Lint_syscall.c 13 syscall(int arg1, ...) function
  /src/sys/arch/zaurus/stand/zboot/
unixsys.S 54 ENTRY(syscall) function
unixsys.S 54 ENTRY(syscall) function
  /src/sys/arch/ia64/ia64/
syscall_stubs.S 31 #include <sys/syscall.h>
41 * A process performs a syscall by performing an indirect call to the
43 * saved prior to the syscall in r9 and r10 respectively. The kernel
45 * across the call. This allows for small enough syscall stubs without
48 * the syscall entry point. The syscall code in the gateway page is
53 * r8 - syscall number
56 * in0-in7 - syscall arguments
58 * A syscall returns:
59 * r8+r9 - syscall return value(s
78 #define syscall 0 define
    [all...]
syscall_stubs.S 31 #include <sys/syscall.h>
41 * A process performs a syscall by performing an indirect call to the
43 * saved prior to the syscall in r9 and r10 respectively. The kernel
45 * across the call. This allows for small enough syscall stubs without
48 * the syscall entry point. The syscall code in the gateway page is
53 * r8 - syscall number
56 * in0-in7 - syscall arguments
58 * A syscall returns:
59 * r8+r9 - syscall return value(s
78 #define syscall 0 define
    [all...]
  /src/sys/compat/linux32/common/
linux32_socketcall.c 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anon2370
110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
linux32_socketcall.c 65 int (*syscall)(struct lwp *, const void *, register_t *); member in struct:__anon2370
110 return linux32_socketcall[SCARG(uap, what)].syscall(l, &ua, retval);
  /src/sys/arch/alpha/alpha/
syscall.c 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */
92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $");
98 #include <sys/syscall.h>
107 void syscall(struct lwp *, uint64_t, struct trapframe *);
113 p->p_md.md_syscall = syscall;
119 * System calls are strange beasts. They are passed the syscall number
121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error),
131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function
149 * syscall() and __syscall() are handled the same on
syscall.c 1 /* $NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $ */
92 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.45 2023/10/05 19:41:03 ad Exp $");
98 #include <sys/syscall.h>
107 void syscall(struct lwp *, uint64_t, struct trapframe *);
113 p->p_md.md_syscall = syscall;
119 * System calls are strange beasts. They are passed the syscall number
121 * an error flag in a3 (if a3 != 0 on return, the syscall had an error),
131 syscall(struct lwp *l, uint64_t code, struct trapframe *tf) function
149 * syscall() and __syscall() are handled the same on
  /src/sys/arch/sh3/sh3/
syscall.c 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */
84 #include <sys/syscall.h>
91 static void syscall(struct lwp *, struct trapframe *);
98 p->p_md.md_syscall = syscall;
108 syscall(struct lwp *l, struct trapframe *tf) function
136 * Like syscall, but code is a quad, so as to maintain
syscall.c 1 /* $NetBSD: syscall.c,v 1.16 2019/04/06 03:06:27 thorpej Exp $ */
84 #include <sys/syscall.h>
91 static void syscall(struct lwp *, struct trapframe *);
98 p->p_md.md_syscall = syscall;
108 syscall(struct lwp *l, struct trapframe *tf) function
136 * Like syscall, but code is a quad, so as to maintain
  /src/sys/arch/vax/vax/
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
52 void syscall(struct trapframe *);
58 p->p_md.md_syscall = syscall;
62 syscall(struct trapframe *tf) function
73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n",
96 * Only trace if tracing is enabled and the syscall isn't indirect
syscall.c 1 /* $NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $ */
31 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.27 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
52 void syscall(struct trapframe *);
58 p->p_md.md_syscall = syscall;
62 syscall(struct trapframe *tf) function
73 TDB(("trap syscall %s pc %lx, psl %lx, sp %lx, pid %d, frame %p\n",
96 * Only trace if tracing is enabled and the syscall isn't indirect
  /src/sys/arch/x86/x86/
syscall.c 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */
33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
57 static void syscall(struct trapframe *);
81 * syscall(frame):
86 void syscall(struct trapframe *);
91 syscall(struct trapframe *frame) function
99 /* Verify that the syscall args will fit in the trapframe space */
118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9
119 * (rcx gets copied to r10 in the libc stub because the syscall
    [all...]
syscall.c 1 /* $NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $ */
33 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.22 2023/10/05 19:41:06 ad Exp $");
40 #include <sys/syscall.h>
57 static void syscall(struct trapframe *);
81 * syscall(frame):
86 void syscall(struct trapframe *);
91 syscall(struct trapframe *frame) function
99 /* Verify that the syscall args will fit in the trapframe space */
118 * The first 6 syscall args are passed in rdi, rsi, rdx, r10, r8 and r9
119 * (rcx gets copied to r10 in the libc stub because the syscall
    [all...]
  /src/sys/arch/aarch64/aarch64/
syscall.c 1 /* $NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $ */
54 #include <sys/syscall.h>
61 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $");
84 static void EMULNAME(syscall)(struct trapframe *);
87 EMULNAME(syscall)(struct trapframe *tf) function
192 p->p_md.md_syscall = EMULNAME(syscall);
syscall.c 1 /* $NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $ */
54 #include <sys/syscall.h>
61 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.13 2023/10/05 19:41:03 ad Exp $");
84 static void EMULNAME(syscall)(struct trapframe *);
87 EMULNAME(syscall)(struct trapframe *tf) function
192 p->p_md.md_syscall = EMULNAME(syscall);
aarch32_syscall.c 51 static void EMULNAME(syscall)(struct trapframe *);
59 EMULNAME(syscall)(struct trapframe *tf) function
136 /* don't allow nested syscall */
235 p->p_md.md_syscall = EMULNAME(syscall);
  /src/sys/arch/powerpc/powerpc/
syscall.c 1 /* $NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $ */
57 #include <sys/syscall.h>
62 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $");
79 static void EMULNAME(syscall)(struct trapframe *);
82 EMULNAME(syscall)(struct trapframe *tf) function
173 p->p_md.md_syscall = EMULNAME(syscall);
syscall.c 1 /* $NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $ */
57 #include <sys/syscall.h>
62 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.58 2023/10/05 19:41:05 ad Exp $");
79 static void EMULNAME(syscall)(struct trapframe *);
82 EMULNAME(syscall)(struct trapframe *tf) function
173 p->p_md.md_syscall = EMULNAME(syscall);
  /src/sys/arch/riscv/riscv/
syscall.c 1 /* $NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $ */
32 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $");
46 #include <sys/syscall.h>
55 static void EMULNAME(syscall)(struct trapframe *);
62 p->p_md.md_syscall = EMULNAME(syscall);
69 * System calls are strange beasts. They are passed the syscall number
72 * directly after the syscall is excepted to contain a jump instruction
73 * for an error handler. If the syscall completes with no error, the PC
78 EMULNAME(syscall)(struct trapframe *tf) function
102 printf("syscall: _syscall code %#"PRIxREGISTER"\n", tf->tf_a0)
    [all...]
syscall.c 1 /* $NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $ */
32 __KERNEL_RCSID(0, "$NetBSD: syscall.c,v 1.6 2024/11/22 20:01:04 skrll Exp $");
46 #include <sys/syscall.h>
55 static void EMULNAME(syscall)(struct trapframe *);
62 p->p_md.md_syscall = EMULNAME(syscall);
69 * System calls are strange beasts. They are passed the syscall number
72 * directly after the syscall is excepted to contain a jump instruction
73 * for an error handler. If the syscall completes with no error, the PC
78 EMULNAME(syscall)(struct trapframe *tf) function
102 printf("syscall: _syscall code %#"PRIxREGISTER"\n", tf->tf_a0)
    [all...]
  /src/tests/compat/linux/
h_linux.h 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro
45 #define close(fd) (int)syscall(LINUX_SYS_close, fd)
46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status)
47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \
49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \
51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \
53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \
56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \
58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \
60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir,
    [all...]
h_linux.h 38 #define syscall(number, ...) syscall6(number, ## __VA_ARGS__, \ macro
45 #define close(fd) (int)syscall(LINUX_SYS_close, fd)
46 #define exit(status) (void)syscall(LINUX_SYS_exit_group, status)
47 #define fcntl(fd, cmd, ...) (int)syscall(LINUX_SYS_fcntl, fd, cmd, \
49 #define lseek(fd, off, whence) (off_t)syscall(LINUX_SYS_lseek, fd, \
51 #define mkdir(path, mode) (int)syscall(LINUX_SYS_mkdir, \
53 #define open(path, flags, ...) (int)syscall(LINUX_SYS_open, \
56 #define read(fd, buf, count) (ssize_t)syscall(LINUX_SYS_read, fd, \
58 #define rename(from, to) (int)syscall(LINUX_SYS___posix_rename, \
60 #define rmdir(path) (int)syscall(LINUX_SYS_rmdir,
    [all...]

Completed in 53 milliseconds

1 2