HomeSort by: relevance | last modified time | path
    Searched refs:nss (Results 1 - 24 of 24) sorted by relevancy

  /src/lib/libc/compat/sys/
compat_sigaltstack.c 49 stack_t nss, oss; local
52 nss.ss_sp = onss->ss_sp;
53 nss.ss_size = onss->ss_size;
54 nss.ss_flags = onss->ss_flags;
56 error = __sigaltstack14(&nss, &oss);
  /src/sys/compat/common/
compat_sigaltstack.h 20 stack_t nss, oss; \
23 if (SCARG_COMPAT_PTR(uap, nss)) { \
24 error = copyin(SCARG_COMPAT_PTR(uap, nss), &css, sizeof css); \
27 nss.ss_sp = COMPAT_GET_PTR(css.ss_sp); \
28 nss.ss_size = css.ss_size; \
30 nss.ss_flags = css.ss_flags; \
32 nss.ss_flags = \
37 error = sigaltstack1(curlwp, SCARG_COMPAT_PTR(uap, nss) ? &nss : 0, \
kern_sig_43.c 153 sigset_t nss, oss; local
157 compat_43_sigmask_to_sigset(&nsm, &nss);
159 error = sigprocmask1(l, SIG_BLOCK, &nss, &oss);
176 sigset_t nss, oss; local
180 compat_43_sigmask_to_sigset(&nsm, &nss);
182 error = sigprocmask1(l, SIG_SETMASK, &nss, &oss);
196 syscallarg(struct sigstack *) nss;
199 struct sigstack nss, oss; local
203 if (SCARG(uap, nss)) {
204 error = copyin(SCARG(uap, nss), &nss, sizeof(nss))
    [all...]
  /src/external/apache2/mDNSResponder/
Makefile 7 SUBDIR+= nss
  /src/sys/uvm/
uvm_unix.c 137 vsize_t nss; local
163 nss = btoc(sp - p->p_stackbase);
165 nss = btoc(p->p_stackbase - sp);
167 if (nss > btoc(p->p_rlimit[RLIMIT_STACK].rlim_cur))
169 vm->vm_ssize = nss;
  /src/sys/kern/
sys_sig.c 138 sigset_t nss, oss; local
142 error = copyin(SCARG(uap, set), &nss, sizeof(nss));
148 SCARG(uap, set) ? &nss : 0, SCARG(uap, oset) ? &oss : 0);
201 syscallarg(const struct sigaltstack *) nss;
204 stack_t nss, oss; local
207 if (SCARG(uap, nss)) {
208 error = copyin(SCARG(uap, nss), &nss, sizeof(nss));
    [all...]
systrace_args.c 421 uarg[0] = (intptr_t) SCARG(p, nss); /* const struct sigaltstack13 * */
834 uarg[0] = (intptr_t) SCARG(p, nss); /* struct sigstack * */
2097 uarg[0] = (intptr_t) SCARG(p, nss); /* const stack_t * */
  /src/sys/rump/librump/rumpkern/
signals.c 234 sigprocmask1(struct lwp *l, int how, const sigset_t *nss, sigset_t *oss)
243 if (nss) {
246 sigplusset(nss, mask);
249 sigminusset(nss, mask);
252 *mask = *nss;
  /src/sys/sys/
epoll.h 86 const sigset_t *nss);
syscallargs.h 348 syscallarg(const struct sigaltstack13 *) nss; member in struct:compat_13_sys_sigaltstack_args
700 syscallarg(struct sigstack *) nss; member in struct:compat_43_sys_sigstack_args
1834 syscallarg(const stack_t *) nss; member in struct:sys___sigaltstack14_args
  /src/sys/arch/sh3/sh3/
exception.c 388 uint32_t nss; local
389 nss = btoc((vaddr_t)vm->vm_minsaddr - va);
390 if (nss > vm->vm_ssize)
391 vm->vm_ssize = nss;
  /src/external/bsd/openldap/dist/contrib/slapd-modules/nssov/
Makefile 62 tio.lo: nss-pam-ldapd/tio.c
  /src/sys/compat/linux/common/
linux_signal.c 719 stack_t nss; local
732 linux_to_native_sigaltstack(&nss, &ss);
736 if (nss.ss_flags & ~SS_ALLBITS)
738 else if (nss.ss_flags & SS_DISABLE) {
741 } else if (nss.ss_size < LINUX_MINSIGSTKSZ)
745 l->l_sigstk = nss;
  /src/sys/external/bsd/compiler_rt/dist/include/sanitizer/
netbsd_syscall_hooks.h 303 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \
304 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \
306 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \
307 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \
584 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \
585 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \
587 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \
588 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \
1463 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \
1464 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \
    [all...]
  /src/sys/compat/netbsd32/
netbsd32_compat_43.c 687 syscallarg(netbsd32_sigstackp_t) nss;
694 if (SCARG_P32(uap, nss)) {
695 error = copyin(SCARG_P32(uap, nss), &ss32, sizeof(ss32));
netbsd32_syscallargs.h 306 syscallarg(netbsd32_sigaltstack13p_t) nss; member in struct:compat_13_netbsd32_sigaltstack13_args
602 syscallarg(netbsd32_sigstackp_t) nss; member in struct:compat_43_netbsd32_osigstack_args
1512 syscallarg(netbsd32_sigaltstackp_t) nss; member in struct:netbsd32___sigaltstack14_args
netbsd32_systrace_args.c 421 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigaltstack13p_t */
834 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigstackp_t */
2036 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigaltstackp_t */
  /src/external/bsd/wpa/dist/src/ap/
beacon.c 1781 u16 nss = 0; local
1812 * If Tx and/or Rx indicate support for a given NSS,
1813 * count it towards the maximum NSS.
1818 nss++;
1825 nss++;
1832 nss++;
1841 * The Supported EHT-MCS And NSS Set field for the AP contains
1843 * bandwidth. Check the first byte (max NSS for Rx/Tx that
1845 * 160, 320) to find the maximum NSS. This assumes that
1860 nss = max_nss
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
principal.c 1419 _krb5_debug(context, 5, "Using nss for name canon immediately");
1493 } else if (needs_type && strcmp(tok, "nss") == 0) {
1795 krb5_principal nss = NULL; local
1877 &nss);
1893 new_hostname = krb5_principal_get_comp_string(context, nss, 1);
1894 new_realm = krb5_principal_get_realm(context, nss);
1963 krb5_free_principal(context, nss);
  /src/external/gpl3/gcc/dist/libsanitizer/include/sanitizer/
netbsd_syscall_hooks.h 302 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \
303 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \
305 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \
306 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \
588 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \
589 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \
591 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \
592 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \
1489 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \
1490 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \
    [all...]
  /src/external/gpl3/gcc.old/dist/libsanitizer/include/sanitizer/
netbsd_syscall_hooks.h 302 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \
303 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \
305 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \
306 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \
588 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \
589 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \
591 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \
592 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \
1489 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \
1490 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \
    [all...]
  /src/sys/external/bsd/ipf/netinet/
ip_nat.c 2270 nat_stat_side_t *nss; local
2284 nss = &softn->ipf_nat_stats.ns_side[0];
2285 ASSERT(nss->ns_bucketlen[bkt] > 0);
2286 nss->ns_bucketlen[bkt]--;
2287 if (nss->ns_bucketlen[bkt] == 0) {
2288 nss->ns_inuse--;
2292 nss = &softn->ipf_nat_stats.ns_side[1];
2293 ASSERT(nss->ns_bucketlen[bkt] > 0);
2294 nss->ns_bucketlen[bkt]--;
2295 if (nss->ns_bucketlen[bkt] == 0)
    [all...]
  /src/external/bsd/tcpdump/dist/
print-802_11.c 859 "parameter, or the Basic VHT-MCS and NSS Set field in "
3131 u_int nss, mcs; local
3132 nss = mcs_nss[i] & IEEE80211_RADIOTAP_VHT_NSS_MASK;
3135 if (nss == 0)
  /src/external/bsd/wpa/dist/hostapd/
ctrl_iface.c 2944 u8 cw, operating_mode = 0, nss; local
2983 nss = hostapd_maxnss(hapd, sta) - 1;
2986 (u8) (nss << 4));

Completed in 86 milliseconds