Lines Matching defs:bsa
323 struct sys___socket30_args bsa;
327 SCARG(&bsa, protocol) = SCARG(uap, protocol);
328 SCARG(&bsa, domain) = linux_to_bsd_domain(SCARG(uap, domain));
329 if (SCARG(&bsa, domain) == -1)
331 SCARG(&bsa, type) = linux_to_bsd_type(SCARG(uap, type));
332 if (SCARG(&bsa, type) == -1)
339 if (SCARG(&bsa, domain) == AF_ROUTE && SCARG(&bsa, type) == SOCK_RAW)
341 error = sys___socket30(l, &bsa, retval);
349 if (!error && ip6_v6only && SCARG(&bsa, domain) == PF_INET6) {
376 struct sys_socketpair_args bsa;
378 SCARG(&bsa, domain) = linux_to_bsd_domain(SCARG(uap, domain));
379 if (SCARG(&bsa, domain) == -1)
381 SCARG(&bsa, type) = linux_to_bsd_type(SCARG(uap, type));
382 if (SCARG(&bsa, type) == -1)
384 SCARG(&bsa, protocol) = SCARG(uap, protocol);
385 SCARG(&bsa, rsv) = SCARG(uap, rsv);
387 return sys_socketpair(l, &bsa, retval);
1043 struct sys_setsockopt_args bsa;
1046 SCARG(&bsa, s) = SCARG(uap, s);
1047 SCARG(&bsa, level) = linux_to_bsd_sopt_level(SCARG(uap, level));
1048 SCARG(&bsa, val) = SCARG(uap, optval);
1049 SCARG(&bsa, valsize) = SCARG(uap, optlen);
1055 if (SCARG(&bsa, level) != SOL_SOCKET) {
1060 if ((error = fd_getsock(SCARG(&bsa, s), &so)) != 0)
1063 fd_putfile(SCARG(&bsa, s));
1069 switch (SCARG(&bsa, level)) {
1099 SCARG(&bsa, name) = name;
1101 return sys_setsockopt(l, &bsa, retval);
1759 struct sys_sendto_args bsa;
1761 SCARG(&bsa, s) = SCARG(uap, s);
1762 SCARG(&bsa, buf) = SCARG(uap, buf);
1763 SCARG(&bsa, len) = SCARG(uap, len);
1764 SCARG(&bsa, flags) = SCARG(uap, flags);
1765 SCARG(&bsa, to) = NULL;
1766 SCARG(&bsa, tolen) = 0;
1768 return (sys_sendto(l, &bsa, retval));