Searched refs:call (Results 251 - 275 of 318) sorted by relevance

<<111213

/illumos-gate/usr/src/lib/libc/i386/gen/
H A Dmemcpy.s42 movl %edi,%eax / return value from the call
/illumos-gate/usr/src/lib/libm/i386/src/
H A Dpow.s98 call .pow_main /// LOCAL
242 call .y_is_int
358 call .y_is_int
433 call PIC_F(_SVID_libm_err) / report result/error according to SVID
H A Dpowf.s99 call .pow_main /// LOCAL
238 call .y_is_int
337 call .y_is_int
H A Dpowl.s95 call .pow_main /// LOCAL
234 call .y_is_int
329 call .y_is_int
/illumos-gate/usr/src/grub/grub-0.97/stage1/
H A Dstage1.S33 #define MSG(x) movw $ABS(x), %si; call message
213 * BIOS call "INT 0x13 Function 0x42" to read sectors from disk into memory
240 * The call failed, so maybe use the floppy probe instead.
326 * BIOS call "INT 0x13 Function 0x2" to read sectors from disk into memory
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dstart.S41 #define MSG(x) movw $ABS(x), %si; call message
147 * BIOS call "INT 0x13 Function 0x42" to read sectors from disk into memory
237 * BIOS call "INT 0x13 Function 0x2" to read sectors from disk into memory
/illumos-gate/usr/src/lib/brand/shared/brand/amd64/
H A Dhandler.s56 * call number. The table needs the same alignment as the individual
120 * into brand_handler. That offset indicates the system call number
121 * while %rax holds the return address for the system call. We replace
123 * compute the system call number by dividing by the table entry size.
139 /* Look up the system call's entry in the sysent table */
153 * Setup arguments for our emulation call. Our input arguments,
154 * 0 to N, will become emulation call arguments 1 to N+1.
156 * Note: Syscall argument passing is different from function call
183 call *(%r11)
/illumos-gate/usr/src/cmd/fm/eversholt/common/
H A Dliterals.h152 L_DECL(call); variable
/illumos-gate/usr/src/uts/sun4u/sys/
H A Dfpras_impl.h184 * CPU migration of this thread must be prevented before we call this macro.
299 * forfeit after using it. If the call to fpras_failure returns
321 call fpras_failure /* take failure action */ ;\
/illumos-gate/usr/src/uts/sun4u/ml/
H A Dcpr_resume_setup.s182 call i_cpr_mp_setup
214 ! a call stack looks like this:
232 jmpl %g4, %o7 ! call prom service
H A Dmach_xc.s60 * %o5 - function to call
63 * %o3 - function to call
100 jmp %o3 ! call the fast trap handler
204 * of xtrap handler. So, callers can call this xtrap-handler to ensure
/illumos-gate/usr/src/uts/intel/ia32/ml/
H A Dhypersubr.s37 * %eax == call number
41 * %rax == call number
124 * The method for issuing a hypercall (i.e. a system call to the
126 * 'int 82' triggers the call. In 64-bit PV domains, a 'syscall' does the
140 * hypercall page requires a call and several more instructions than simply
172 call *%eax
/illumos-gate/usr/src/uts/sun4u/cpu/
H A Dus3_common_asm.s603 * %o0 - function or inumber to call
618 call panic
1168 * For Cheetah*, call cpu_tl1_error via systrap at PIL 15
1236 * 10) call cpu_fast_ecc_error via systrap at PIL 14 unless we're already
1248 * call cpu_fast_ecc_error via systrap. The clo_flags parameter is used
1430 call ptl1_panic
1501 * event pending flag and call cpu_tl1_error via systrap if set.
1598 * 7. call cpu_disrupting_error via sys_trap at PIL 14
1609 * (sys_trap->have_win arg #1) and call cpu_disrupting_error via
1717 call ptl1_pani
[all...]
H A Dspitfire_copy.s123 * registers are volatile across a call. Some examples:
136 * We therefore need a per-call place in which to preserve fp state -
146 * use. Bit 2 (BCOPY_FLAG) indicates that the call was to bcopy.
568 bnz,a,pt %ncc, 1f ! Need to call kpreempt?
586 ! call kpreempt if necessary
590 call kpreempt
617 call panic
728 call kpreempt
1560 bnz,a,pt %ncc, 1f ! Need to call kpreempt?
1577 ! Null handler. Check for kpreempt flag, call i
[all...]
/illumos-gate/usr/src/uts/sun4v/cpu/
H A Dgeneric_copy.s290 call .alignit ! copy bytes until aligned
322 call .alignit ! go word-align it
354 call sync_icache
505 call sync_icache
1235 * call bzero and return 1 to ensure that the pages in cache should be
1254 ! Simply call bzero and notify the caller that bzero was used
1256 call bzero
/illumos-gate/usr/src/lib/libc/port/gen/
H A Derrlist43 4 Interrupted system call
/illumos-gate/usr/src/common/bignum/amd64/
H A Dbignum_amd64_asm.s456 call big_mul_set_vec
468 call big_mul_add_vec
/illumos-gate/usr/src/cmd/awk/
H A Dawk.h361 extern Cell *call(Node **, int);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/ftp/
H A Dcmds.c266 call(settype, "type", "binary", 0);
276 call(settype, "type", "ascii", 0);
286 call(settype, "type", "tenex", 0);
296 call(settype, "type", "ebcdic", 0);
H A Dftp_var.h225 void (*c_handler)(int argc, char *argv[]); /* function to call */
319 extern void call(void (*routine)(int argc, char *argv[]), ...);
/illumos-gate/usr/src/uts/sun4u/vm/
H A Dmach_sfmmu_asm.s229 call panic ! found no unlocked TTE so
343 call panic ! found no unlocked TTE so
377 * From resume we call sfmmu_setctx_sec with interrupts disabled.
529 call panic
/illumos-gate/usr/src/uts/sun4v/ml/
H A Dmach_xc.s62 * %o5 - function to call
65 * %o3 - function to call
102 jmp %o3 ! call the fast trap handler
210 * %o0 - function or inumber to call
/illumos-gate/usr/src/uts/sparc/dtrace/
H A Ddtrace_asm.s230 ! call to dtrace_probe()).
825 call dtrace_probe
/illumos-gate/usr/src/boot/sys/boot/i386/libi386/
H A Drelocater_tramp.S22 * to this area. __exec will set the pointer to %eax and call *%eax,
193 call a20_check_state
/illumos-gate/usr/src/uts/sfmmu/ml/
H A Dsfmmu_asm.s623 call panic
662 call panic
813 call panic
1165 call panic
1181 call sfmmu_fixup_mmu_asi ! patch kdtlb miss
1185 call sfmmu_fixup_mmu_asi ! patch kdtlb4m miss
1189 call sfmmu_fixup_mmu_asi ! patch kitlb miss
1193 call sfmmu_fixup_mmu_asi ! patch kitlb4m miss
1219 call sfmmu_fix_ktlb_traptable
1223 call sfmmu_fix_ktlb_traptabl
[all...]

Completed in 189 milliseconds

<<111213