Searched refs:syscall (Results 1 – 25 of 116) sorted by relevance
12345
| /qemu/hw/char/ |
| A D | riscv_htif.c | 213 uint64_t syscall[8]; in htif_handle_tohost_write() local 214 cpu_physical_memory_read(payload, syscall, sizeof(syscall)); in htif_handle_tohost_write() 215 if (tswap64(syscall[0]) == PK_SYS_WRITE && in htif_handle_tohost_write() 216 tswap64(syscall[1]) == HTIF_DEV_CONSOLE && in htif_handle_tohost_write() 217 tswap64(syscall[3]) == HTIF_CONSOLE_CMD_PUTC) { in htif_handle_tohost_write() 219 cpu_physical_memory_read(tswap64(syscall[2]), &ch, 1); in htif_handle_tohost_write()
|
| /qemu/linux-headers/ |
| A D | COPYING | 3 SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note 10 With an explicit syscall exception, as stated at: 12 LICENSES/exceptions/Linux-syscall-note
|
| /qemu/linux-user/i386/ |
| A D | cpu_loop.c | 115 int syscall; in emulate_vsyscall() local 125 syscall = TARGET_NR_gettimeofday; in emulate_vsyscall() 128 syscall = TARGET_NR_time; in emulate_vsyscall() 131 syscall = TARGET_NR_getcpu; in emulate_vsyscall() 148 switch (syscall) { in emulate_vsyscall() 175 get_task_state(env_cpu(env))->orig_ax = syscall; in emulate_vsyscall() 176 ret = do_syscall(env, syscall, env->regs[R_EDI], env->regs[R_ESI], in emulate_vsyscall()
|
| /qemu/common-user/ |
| A D | meson.build | 8 'safe-syscall.S', 9 'safe-syscall-error.c',
|
| /qemu/linux-headers/LICENSES/exceptions/ |
| A D | Linux-syscall-note | 1 SPDX-Exception-Identifier: Linux-syscall-note 2 SPDX-URL: https://spdx.org/licenses/Linux-syscall-note.html 10 SPDX-License-Identifier: <SPDX-License> WITH Linux-syscall-note
|
| /qemu/linux-user/loongarch64/ |
| A D | vdso.S | 25 syscall 0 128 syscall 0
|
| /qemu/linux-user/arm/ |
| A D | signal.c | 170 static void write_arm_sigreturn(uint32_t *rc, int syscall); 584 static void write_arm_sigreturn(uint32_t *rc, int syscall) in write_arm_sigreturn() argument 586 __put_user(ARM_MOV_R7_IMM(syscall), rc); in write_arm_sigreturn() 587 __put_user(ARM_SWI_SYS(syscall), rc + 1); in write_arm_sigreturn() 591 static void write_thm_sigreturn(uint32_t *rc, int syscall) in write_thm_sigreturn() argument 593 __put_user(THUMB_SWI_SYS << 16 | THUMB_MOVS_R7_IMM(syscall), rc); in write_thm_sigreturn()
|
| /qemu/configs/targets/ |
| A D | alpha-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | sh4-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | sparc-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | xtensa-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | hppa-linux-user.mak | 4 TARGET_SYSTBL=syscall.tbl
|
| A D | sh4eb-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | xtensaeb-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | sparc64-linux-user.mak | 5 TARGET_SYSTBL=syscall.tbl
|
| A D | or1k-linux-user.mak | 4 TARGET_SYSTBL=syscall.tbl
|
| A D | sparc32plus-linux-user.mak | 6 TARGET_SYSTBL=syscall.tbl
|
| A D | microblazeel-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | hexagon-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | microblaze-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| A D | ppc-linux-user.mak | 3 TARGET_SYSTBL=syscall.tbl
|
| /qemu/tests/tcg/mips/ |
| A D | README | 7 A very simple inline assembly, write syscall based hello world
|
| /qemu/bsd-user/freebsd/ |
| A D | meson.build | 5 'os-syscall.c',
|
| /qemu/include/qemu/ |
| A D | futex.h | 20 #define qemu_futex(...) syscall(__NR_futex, __VA_ARGS__)
|
| /qemu/tests/tcg/arm/ |
| A D | README | 6 A very simple inline assembly, write syscall based hello world
|
Completed in 31 milliseconds
12345