NetBSD/sys/compat/linux
fvdl 33e2d79f47 Define linux_usertrap function, and set it in struct emul. For all
but amd64, it just returns 0, doing nothing.

For amd64, it implements vsyscalls through cheating: if the faulting
address is in the vsyscall area (which is statically known on Linux/amd64),
and the intruction pointer is too, it must have been a vsyscall. In that
case, retrieve the return address from the user stack, fix up %rip and
%rsp, and just execute the normal system call. It will return as if
the vsyscall has been executed.
2005-05-20 12:48:26 +00:00
..
arch Define linux_usertrap function, and set it in struct emul. For all 2005-05-20 12:48:26 +00:00
common Define linux_usertrap function, and set it in struct emul. For all 2005-05-20 12:48:26 +00:00
files.linux Emulate basic mtio ioctls. 2005-02-28 22:11:31 +00:00
linux_syscall.h Fix up COMPAT_LINUX support for amd64. Still a work in progress, not 2005-05-15 21:44:41 +00:00
linux_syscallargs.h Fix up COMPAT_LINUX support for amd64. Still a work in progress, not 2005-05-15 21:44:41 +00:00
linux_syscalls.c Fix up COMPAT_LINUX support for amd64. Still a work in progress, not 2005-05-15 21:44:41 +00:00
Makefile.inc We have CVS; there is no reason to make .bak files when generating the 2003-11-15 20:30:59 +00:00