/titanic_41/usr/src/uts/sparc/v9/ |
H A D | Makefile.rules | 54 $(OBJS_DIR)/%.o: $(UTSBASE)/sparc/v9/syscall/%.c 74 $(LINTS_DIR)/%.ln: $(UTSBASE)/sparc/v9/syscall/%.c
|
/titanic_41/usr/src/uts/common/os/ |
H A D | brand.c | 357 * Currently, only sparc has system level brand syscall interposition. 358 * On x86 we're able to enable syscall interposition on a per-cpu basis 362 /* Local variables needed for dynamic syscall interposition support */ 366 /* Trap Table syscall entry hot patch points */ 370 /* Alternate syscall entry handlers used when branded zones are running */ 406 * the 64 and 32 bit syscall paths at the same time since there's in brand_plat_interposition_enable() 424 * Restore the original instructions at the trap table syscall in brand_plat_interposition_disable() 425 * patch points to disable the brand syscall interposition in brand_plat_interposition_disable() 559 * arg1: syscall number in brand_solaris_cmd()
|
H A D | acct.c | 44 #include <sys/syscall.h> 82 &mod_syscallops, "acct(2) syscall", &acctsysent 87 &mod_syscallops32, "32-bit acct(2) syscall", &acctsysent
|
/titanic_41/usr/src/uts/intel/ia32/ml/ |
H A D | hypersubr.s | 45 * as in C calling convention since the "syscall" instruction clobbers %rcx. 126 * 'int 82' triggers the call. In 64-bit PV domains, a 'syscall' does the 178 #define TRAP_INSTR syscall
|
/titanic_41/usr/src/lib/libbc/libc/sys/common/ |
H A D | getdents.c | 32 #include <sys/syscall.h> 110 * in ndir were not copied to dir, the next getdents syscall
|
/titanic_41/usr/src/cmd/truss/ |
H A D | listopts.c | 47 * Routines for scanning syscall, signal, fault 61 * Scan list of syscall names. 65 syslist(char *str, /* string of syscall names */ in syslist() 66 sysset_t *setp, /* syscall set */ in syslist() 298 "%s: unrecognized syscall: %s\n", in syslist()
|
H A D | actions.c | 310 * Set up pri->sys_nargs and pri->sys_args[] (syscall args). 320 /* determine whether syscall is indirect */ in setupsysargs() 328 (void) printf("%s\t*** Inconsistent syscall: %d vs %d ***\n", in setupsysargs() 349 * Return TRUE iff syscall is being traced. 382 /* get systable entry for this syscall */ in sysentry() 529 * because the process was sleeping in an untraced syscall. in sysexit() 580 /* get systable entry for this syscall */ in sysexit() 632 if (pri->Errno != 0) { /* error in syscall */ in sysexit()
|
H A D | systable.c | 481 /* SYSEND == max syscall number + 1 */ 1085 subsys(int syscall, int subcode) in subsys() argument 1090 switch (syscall) { in subsys() 1287 stp = &systable[((unsigned)syscall < SYSEND)? syscall : 0]; in subsys() 1296 sysname(private_t *pri, int syscall, int subcode) in sysname() argument 1298 const struct systable *stp = subsys(syscall, subcode); in sysname() 1302 (void) sprintf(pri->sys_name, "sys#%d", syscall); in sysname() 1344 * Determine the subcode for this syscall, if any. 1350 int syscall = Lsp->pr_syscall; in getsubcode() local 1355 if (syscall > 0 && nsysarg > 0 && !prismember(&rawout, syscall)) { in getsubcode() [all …]
|
/titanic_41/usr/src/lib/libbc/inc/include/sys/ |
H A D | stropts.h | 59 * Flags for recv() and send() syscall arguments 64 * Flags returned as value of recv() syscall
|
/titanic_41/usr/src/uts/i86pc/os/ |
H A D | trap.c | 48 #include <sys/syscall.h> 249 * Test to see if the instruction at pc is sysenter or syscall. The second 254 * syscall is two bytes: 0x0F 0x05 293 return ("syscall"); in syscall_insn_string() 313 * this site to the slower (int) syscall instruction. in ldt_rewrite_syscall() 340 * The bytes of an lcall instruction used for the syscall trap. 932 * If the syscall instruction is disabled due to LDT usage, a in trap() 935 * doesn't even support syscall, the result of all of this will in trap() 1118 /* not on sysenter/syscall; uregs available */ in trap() 1256 * Emulate the syscall here, just as we do above for a in trap() [all …]
|
H A D | mp_startup.c | 163 * Configure syscall support on this CPU. 177 * The syscall instruction imposes a certain ordering on in init_cpu_syscall() 186 * Turn syscall/sysret extensions on. in init_cpu_syscall() 208 * hard to use syscall/sysret, and it is more portable anyway. in init_cpu_syscall() 210 * On 64-bit kernels on Nocona machines, the 32-bit syscall in init_cpu_syscall() 1515 * Initialize our syscall handlers in start_other_cpus() 1711 * Initialize this CPU's syscall handlers in mp_startup_common() 2010 * syscall features. 2076 * Turn off the SCE (syscall enable) bit in the EFER register. Software in cpu_asysc_disable() 2077 * executing syscall or sysret with this bit off will incur a #ud trap. in cpu_asysc_disable()
|
/titanic_41/usr/src/man/man3perl/ |
H A D | Kstat.3perl | 36 \fB$ks\(->{cpu_stat}{0}{cpu_stat0}{syscall}\fR will read in all the statistics 120 my $ref = \eks->{cpu_stat}{0}{cpu_stat0}{syscall};
|
/titanic_41/usr/src/uts/common/c2/ |
H A D | audit_kernel.h | 85 #define S2E_PUB TAD_PUBLIC_EV /* syscall is defined as a public op */ 174 #define TAD_ATCALL 0x00000002 /* *at() syscall, like openat() */ 183 #define TAD_PUBLIC_EV 0x00000400 /* syscall is defined as a public op */ 207 /* until syscall end: */
|
H A D | audit_io.c | 46 #include <sys/syscall.h> 121 * syscall end, unless no syscall is active or the syscall is _exit. in au_close() 134 * syscall end time it will be pulled off. 181 * syscall end. No locking is needed because the tad is per-thread. in au_close_defer()
|
/titanic_41/usr/src/lib/libshell/common/include/ |
H A D | edit.h | 188 # ifdef SYSCALL 189 # define read(fd,buff,n) syscall(3,fd,buff,n) 192 # endif /* SYSCALL */
|
/titanic_41/usr/src/uts/i86pc/sys/ |
H A D | machcpuvar.h | 120 greg_t mcpu_rtmp_rsp; /* syscall: temporary %rsp stash */ 121 greg_t mcpu_rtmp_r15; /* syscall: temporary %r15 stash */
|
/titanic_41/usr/src/cmd/sendmail/libsm/ |
H A D | exc.c | 162 char *syscall = exc->exc_argv[1].v_str; local 167 sysargs, syscall, sm_errstring(err)); 169 sm_io_fprintf(stream, SM_TIME_DEFAULT, "%s failed: %s", syscall, 177 ** char *syscall (eg, "open")
|
/titanic_41/usr/src/cmd/dtrace/test/tst/common/java_api/src/ |
H A D | TestStateMachine.java | 71 consumer.compile("syscall:::entry"); in beforeOpen() 317 consumer.compile("syscall:::entry"); in afterGo() 427 consumer.compile("syscall:::entry"); in afterClose() 601 "syscall:::entry { @[execname] = count(); } " + in main()
|
/titanic_41/usr/src/uts/common/brand/solaris10/ |
H A D | s10_brand.h | 104 * or that are to be removed or reassigned after the dtrace syscall provider 105 * has been reengineered to deal properly with syscall::open (for example).
|
/titanic_41/usr/src/lib/brand/solaris10/s10_brand/common/ |
H A D | s10_signal.c | 629 * We shouldn't return EINVAL as the syscall didn't technically fail. in s10_waitid() 663 * We shouldn't return EINVAL as the syscall didn't technically in s10_sigtimedwait() 672 * sigtimedwait syscall, just sort of punt and leave it untranslated. in s10_sigtimedwait() 674 * We shouldn't return EINVAL as the syscall didn't technically in s10_sigtimedwait() 701 * The native version of this syscall takes an extra argument. in s10_sigqueue()
|
/titanic_41/usr/src/cmd/dtrace/test/tst/common/java_api/ |
H A D | tst.Enable.ksh.out | 4 java.lang.IllegalStateException: Not all compiled probes are enabled. Compiled description syscall:…
|
H A D | tst.Bean.ksh.out | 180 serialized: syscall::malloc:entry 181 deserialized: syscall::malloc:entry 183 encoded: syscall::malloc:entry 184 decoded: syscall::malloc:entry 358 …solaris.os.dtrace.ProbeData[epid = 7, cpu = 1, enabledProbeDescription = syscall::malloc:entry, fl… 407 …solaris.os.dtrace.ProbeData[epid = 7, cpu = 1, enabledProbeDescription = syscall::malloc:entry, fl… 457 …encoded: org.opensolaris.os.dtrace.ProbeData[epid = 7, cpu = 1, enabledProbeDescription = syscall:… 506 …decoded: org.opensolaris.os.dtrace.ProbeData[epid = 7, cpu = 1, enabledProbeDescription = syscall:… 658 …syscall::malloc:entry, epid = 8, cpu = 3, action = 1, offset = 20, fault = DTRACEFLT_BADALIGN, add… 659 …syscall::malloc:entry, epid = 8, cpu = 3, action = 1, offset = 20, fault = DTRACEFLT_BADALIGN, add… [all …]
|
/titanic_41/usr/src/uts/intel/brand/common/ |
H A D | brand_solaris.s | 79 * syscall handler for 32-bit user processes: 98 * syscall handler for 64-bit user processes:
|
/titanic_41/usr/src/uts/common/sys/ |
H A D | systm.h | 366 #define SE_LOADABLE 0x08 /* syscall is loadable */ 367 #define SE_LOADED 0x10 /* syscall is completely loaded */ 368 #define SE_NOUNLOAD 0x20 /* syscall never needs unload */ 369 #define SE_ARGC 0x40 /* syscall takes C-style args */
|
/titanic_41/usr/src/lib/libproc/common/ |
H A D | pr_getsockname.c | 41 int syscall, int sock, struct sockaddr *name, socklen_t *namelen) in get_sock_peer_name() argument 76 error = Psyscall(Pr, &rval, syscall, 4, &argd[0]); in get_sock_peer_name()
|