代码搜索:syscall
找到约 6,689 项符合「syscall」的源代码
代码结果 6,689
www.eeworm.com/read/417108/11003309
c syscall.c
/*
* Syscall wrappers to ensure that nothing gets done in dry_run mode
* and to handle system peculiarities.
*
* Copyright (C) 1998 Andrew Tridgell
* Copyright (C) 2002 Martin Pool
* Copyright (
www.eeworm.com/read/310705/7074363
asm syscall.asm
; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
; syscall.asm
; ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
;
www.eeworm.com/read/392997/7247805
h syscall.h
/* syscalls.h
* Nachos system call interface. These are Nachos kernel operations
* that can be invoked from user programs, by trapping to the kernel
* via the "syscall" instruction.
*
* This
www.eeworm.com/read/439882/7697570
c syscall.c
/*
* syscall.c - proxy system call handler routines
*
* This file is an adaptation of the software in the SimpleScalar tool suite
* originally written by Todd M. Austin for the Multiscalar Researc
www.eeworm.com/read/439882/7697582
h syscall.h
/*
* syscall.h - proxy system call handler interfaces
*
* This file is an adaptation of the software in the SimpleScalar tool suite
* originally written by Todd M. Austin for the Multiscalar Resea
www.eeworm.com/read/435007/7799279
c syscall.c
/* syscall.c
*
* System call "stealing" sample
*/
/* Copyright (C) 1998-99 by Ori Pomerantz */
/* The necessary header files */
/* Standard in kernel modules */
#include /
www.eeworm.com/read/333431/12683244
c syscall.c
/*
* pci_syscall.c
*
* For architectures where we want to allow direct access
* to the PCI config stuff - it would probably be preferable
* on PCs too, but there people just do it by hand with th
www.eeworm.com/read/246717/12707281
doc syscall.doc
www.eeworm.com/read/245586/12791596
c syscall.c
#include "hos.h"
void sys_ni_syscall(){}
void sys_exit(){}
//void sys_fork(){}
void sys_read(){}
void sys_write(){
printk("in sys_write\n");
for(;;);
}
void sys_open(){}
void sys_close(){}
void
www.eeworm.com/read/245586/12791836