| /src/lib/libc/compat/sys/ |
| compat_sigaltstack.c | 49 stack_t nss, oss; local 52 nss.ss_sp = onss->ss_sp; 53 nss.ss_size = onss->ss_size; 54 nss.ss_flags = onss->ss_flags; 56 error = __sigaltstack14(&nss, &oss);
|
| /src/sys/compat/common/ |
| compat_sigaltstack.h | 20 stack_t nss, oss; \ 23 if (SCARG_COMPAT_PTR(uap, nss)) { \ 24 error = copyin(SCARG_COMPAT_PTR(uap, nss), &css, sizeof css); \ 27 nss.ss_sp = COMPAT_GET_PTR(css.ss_sp); \ 28 nss.ss_size = css.ss_size; \ 30 nss.ss_flags = css.ss_flags; \ 32 nss.ss_flags = \ 37 error = sigaltstack1(curlwp, SCARG_COMPAT_PTR(uap, nss) ? &nss : 0, \
|
| kern_sig_43.c | 153 sigset_t nss, oss; local 157 compat_43_sigmask_to_sigset(&nsm, &nss); 159 error = sigprocmask1(l, SIG_BLOCK, &nss, &oss); 176 sigset_t nss, oss; local 180 compat_43_sigmask_to_sigset(&nsm, &nss); 182 error = sigprocmask1(l, SIG_SETMASK, &nss, &oss); 196 syscallarg(struct sigstack *) nss; 199 struct sigstack nss, oss; local 203 if (SCARG(uap, nss)) { 204 error = copyin(SCARG(uap, nss), &nss, sizeof(nss)) [all...] |
| /src/external/apache2/mDNSResponder/ |
| Makefile | 7 SUBDIR+= nss
|
| /src/sys/uvm/ |
| uvm_unix.c | 137 vsize_t nss; local 163 nss = btoc(sp - p->p_stackbase); 165 nss = btoc(p->p_stackbase - sp); 167 if (nss > btoc(p->p_rlimit[RLIMIT_STACK].rlim_cur)) 169 vm->vm_ssize = nss;
|
| /src/sys/kern/ |
| sys_sig.c | 138 sigset_t nss, oss; local 142 error = copyin(SCARG(uap, set), &nss, sizeof(nss)); 148 SCARG(uap, set) ? &nss : 0, SCARG(uap, oset) ? &oss : 0); 201 syscallarg(const struct sigaltstack *) nss; 204 stack_t nss, oss; local 207 if (SCARG(uap, nss)) { 208 error = copyin(SCARG(uap, nss), &nss, sizeof(nss)); [all...] |
| systrace_args.c | 421 uarg[0] = (intptr_t) SCARG(p, nss); /* const struct sigaltstack13 * */ 834 uarg[0] = (intptr_t) SCARG(p, nss); /* struct sigstack * */ 2097 uarg[0] = (intptr_t) SCARG(p, nss); /* const stack_t * */
|
| /src/sys/rump/librump/rumpkern/ |
| signals.c | 234 sigprocmask1(struct lwp *l, int how, const sigset_t *nss, sigset_t *oss) 243 if (nss) { 246 sigplusset(nss, mask); 249 sigminusset(nss, mask); 252 *mask = *nss;
|
| /src/sys/sys/ |
| epoll.h | 86 const sigset_t *nss);
|
| syscallargs.h | 348 syscallarg(const struct sigaltstack13 *) nss; member in struct:compat_13_sys_sigaltstack_args 700 syscallarg(struct sigstack *) nss; member in struct:compat_43_sys_sigstack_args 1834 syscallarg(const stack_t *) nss; member in struct:sys___sigaltstack14_args
|
| /src/sys/arch/sh3/sh3/ |
| exception.c | 388 uint32_t nss; local 389 nss = btoc((vaddr_t)vm->vm_minsaddr - va); 390 if (nss > vm->vm_ssize) 391 vm->vm_ssize = nss;
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/nssov/ |
| Makefile | 62 tio.lo: nss-pam-ldapd/tio.c
|
| /src/sys/compat/linux/common/ |
| linux_signal.c | 719 stack_t nss; local 732 linux_to_native_sigaltstack(&nss, &ss); 736 if (nss.ss_flags & ~SS_ALLBITS) 738 else if (nss.ss_flags & SS_DISABLE) { 741 } else if (nss.ss_size < LINUX_MINSIGSTKSZ) 745 l->l_sigstk = nss;
|
| /src/sys/external/bsd/compiler_rt/dist/include/sanitizer/ |
| netbsd_syscall_hooks.h | 303 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \ 304 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \ 306 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \ 307 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \ 584 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \ 585 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \ 587 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \ 588 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \ 1463 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \ 1464 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \ [all...] |
| /src/sys/compat/netbsd32/ |
| netbsd32_compat_43.c | 687 syscallarg(netbsd32_sigstackp_t) nss; 694 if (SCARG_P32(uap, nss)) { 695 error = copyin(SCARG_P32(uap, nss), &ss32, sizeof(ss32));
|
| netbsd32_syscallargs.h | 306 syscallarg(netbsd32_sigaltstack13p_t) nss; member in struct:compat_13_netbsd32_sigaltstack13_args 602 syscallarg(netbsd32_sigstackp_t) nss; member in struct:compat_43_netbsd32_osigstack_args 1512 syscallarg(netbsd32_sigaltstackp_t) nss; member in struct:netbsd32___sigaltstack14_args
|
| netbsd32_systrace_args.c | 421 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigaltstack13p_t */ 834 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigstackp_t */ 2036 uarg[0] = (intptr_t) SCARG(p, nss).i32; /* netbsd32_sigaltstackp_t */
|
| /src/external/bsd/wpa/dist/src/ap/ |
| beacon.c | 1781 u16 nss = 0; local 1812 * If Tx and/or Rx indicate support for a given NSS, 1813 * count it towards the maximum NSS. 1818 nss++; 1825 nss++; 1832 nss++; 1841 * The Supported EHT-MCS And NSS Set field for the AP contains 1843 * bandwidth. Check the first byte (max NSS for Rx/Tx that 1845 * 160, 320) to find the maximum NSS. This assumes that 1860 nss = max_nss [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| principal.c | 1419 _krb5_debug(context, 5, "Using nss for name canon immediately"); 1493 } else if (needs_type && strcmp(tok, "nss") == 0) { 1795 krb5_principal nss = NULL; local 1877 &nss); 1893 new_hostname = krb5_principal_get_comp_string(context, nss, 1); 1894 new_realm = krb5_principal_get_realm(context, nss); 1963 krb5_free_principal(context, nss);
|
| /src/external/gpl3/gcc/dist/libsanitizer/include/sanitizer/ |
| netbsd_syscall_hooks.h | 302 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \ 303 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \ 305 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \ 306 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \ 588 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \ 589 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \ 591 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \ 592 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \ 1489 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \ 1490 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \ [all...] |
| /src/external/gpl3/gcc.old/dist/libsanitizer/include/sanitizer/ |
| netbsd_syscall_hooks.h | 302 #define __sanitizer_syscall_pre_compat_13_sigaltstack13(nss, oss) \ 303 __sanitizer_syscall_pre_impl_compat_13_sigaltstack13((long long)(nss), \ 305 #define __sanitizer_syscall_post_compat_13_sigaltstack13(res, nss, oss) \ 306 __sanitizer_syscall_post_impl_compat_13_sigaltstack13(res, (long long)(nss), \ 588 #define __sanitizer_syscall_pre_compat_43_osigstack(nss, oss) \ 589 __sanitizer_syscall_pre_impl_compat_43_osigstack((long long)(nss), \ 591 #define __sanitizer_syscall_post_compat_43_osigstack(res, nss, oss) \ 592 __sanitizer_syscall_post_impl_compat_43_osigstack(res, (long long)(nss), \ 1489 #define __sanitizer_syscall_pre___sigaltstack14(nss, oss) \ 1490 __sanitizer_syscall_pre_impl___sigaltstack14((long long)(nss), \ [all...] |
| /src/sys/external/bsd/ipf/netinet/ |
| ip_nat.c | 2270 nat_stat_side_t *nss; local 2284 nss = &softn->ipf_nat_stats.ns_side[0]; 2285 ASSERT(nss->ns_bucketlen[bkt] > 0); 2286 nss->ns_bucketlen[bkt]--; 2287 if (nss->ns_bucketlen[bkt] == 0) { 2288 nss->ns_inuse--; 2292 nss = &softn->ipf_nat_stats.ns_side[1]; 2293 ASSERT(nss->ns_bucketlen[bkt] > 0); 2294 nss->ns_bucketlen[bkt]--; 2295 if (nss->ns_bucketlen[bkt] == 0) [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-802_11.c | 859 "parameter, or the Basic VHT-MCS and NSS Set field in " 3131 u_int nss, mcs; local 3132 nss = mcs_nss[i] & IEEE80211_RADIOTAP_VHT_NSS_MASK; 3135 if (nss == 0)
|
| /src/external/bsd/wpa/dist/hostapd/ |
| ctrl_iface.c | 2944 u8 cw, operating_mode = 0, nss; local 2983 nss = hostapd_maxnss(hapd, sta) - 1; 2986 (u8) (nss << 4));
|