| /src/sys/kern/ |
| kern_lwp.c | 1028 lwp_startup(struct lwp *prev, struct lwp *new_lwp) 1032 KASSERTMSG(new_lwp == curlwp, "l %p curlwp %p prevlwp %p", new_lwp, curlwp, prev); 1058 if (__predict_true(new_lwp->l_proc->p_vmspace)) { 1059 pmap_activate(new_lwp); 1066 SDT_PROBE(proc, kernel, , lwp__start, new_lwp, 0, 0, 0, 0); 1069 if (__predict_false((new_lwp->l_pflag & LP_MPSAFE) == 0)) { 1070 KERNEL_LOCK(1, new_lwp);
|
| sys_lwp.c | 132 syscallarg(lwpid_t *) new_lwp; 160 error = copyout(&l2->l_lid, SCARG(uap, new_lwp), sizeof(l2->l_lid));
|
| systrace_args.c | 2328 uarg[2] = (intptr_t) SCARG(p, new_lwp); /* lwpid_t * */
|
| /src/sys/compat/netbsd32/ |
| netbsd32_lwp.c | 54 syscallarg(netbsd32_lwpidp) new_lwp; 85 error = copyout(&l2->l_lid, SCARG_P32(uap, new_lwp),
|
| netbsd32_syscallargs.h | 1681 syscallarg(netbsd32_lwpidp) new_lwp; member in struct:netbsd32__lwp_create_args
|
| netbsd32_systrace_args.c | 2267 uarg[2] = (intptr_t) SCARG(p, new_lwp).i32; /* netbsd32_lwpidp */
|
| /src/sys/external/bsd/compiler_rt/dist/include/sanitizer/ |
| netbsd_syscall_hooks.h | 1621 #define __sanitizer_syscall_pre__lwp_create(ucp, flags, new_lwp) \ 1623 (long long)(ucp), (long long)(flags), (long long)(new_lwp)) 1624 #define __sanitizer_syscall_post__lwp_create(res, ucp, flags, new_lwp) \ 1626 res, (long long)(ucp), (long long)(flags), (long long)(new_lwp)) 3909 long long new_lwp); 3912 long long new_lwp);
|
| /src/sys/sys/ |
| syscallargs.h | 2033 syscallarg(lwpid_t *) new_lwp; member in struct:sys__lwp_create_args
|