HomeSort by: relevance | last modified time | path
    Searched refs:l_proc (Results 1 - 25 of 457) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/sys/arch/alpha/include/
userret.h 103 struct proc *p = l->l_proc;
  /src/sys/miscfs/procfs/
procfs_auxv.c 68 return l != NULL && l->l_proc != NULL && l->l_proc->p_execsw != NULL;
  /src/sys/arch/mips/mips/
linux_trap.c 49 (*l->l_proc->p_emul->e_trapsignal)(l, ksi);
mips_fpu.c 124 KASSERT(_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi));
164 KASSERT(!_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi));
254 KASSERT(_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi));
294 KASSERT(!_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi));
mips_fputrap.c 62 (*l->l_proc->p_emul->e_trapsignal)(l, &ksi);
80 (*l->l_proc->p_emul->e_trapsignal)(l, &ksi);
process_machdep.c 147 if (!_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi))
166 if (_MIPS_SIM_NEWABI_P(l->l_proc->p_md.md_abi))
  /src/sys/arch/sparc64/include/
userret.h 62 struct proc *p = l->l_proc;
  /src/sys/arch/vax/include/
userret.h 38 struct proc * const p = l->l_proc;
  /src/sys/arch/arm/arm/
ast.c 79 KASSERTMSG(curcpu()->ci_pmap_cur == l->l_proc->p_vmspace->vm_map.pmap,
81 l->l_proc->p_vmspace->vm_map.pmap);
cpu_exec.c 109 strlcpy(l->l_proc->p_md.md_march, epp->ep_machine_arch,
110 sizeof(l->l_proc->p_md.md_march));
  /src/sys/rump/librump/rumpkern/
signals.c 177 struct proc *p = l->l_proc;
193 struct proc *p = l->l_proc;
196 *ss = l->l_proc->p_sigpend.sp_set;
204 return sigismember(&l->l_proc->p_sigctx.ps_sigignore, sig);
236 sigset_t *mask = &l->l_proc->p_sigctx.ps_sigignore;
238 KASSERT(mutex_owned(l->l_proc->p_lock));
274 struct proc *p = l->l_proc;
288 struct proc *p = l->l_proc;
  /src/sys/kern/
tty_tty.c 58 struct vnode *ttyvp = cttyvp(l->l_proc);
116 struct vnode *ttyvp = cttyvp(l->l_proc);
125 if (!SESS_LEADER(l->l_proc)) {
126 l->l_proc->p_lflag &= ~PL_CONTROLT;
140 struct vnode *ttyvp = cttyvp(l->l_proc);
sys_process_lwpstatus.c 192 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0;
195 if ((l->l_proc->p_flag & PK_32) == 0) {
226 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0;
229 if ((l->l_proc->p_flag & PK_32) == 0) {
261 const bool pk32 = (curl->l_proc->p_flag & PK_32) != 0;
264 if ((l->l_proc->p_flag & PK_32) == 0) {
kern_prot.c 77 struct proc *p = l->l_proc;
87 struct proc *p = l->l_proc;
98 struct proc *p = l->l_proc;
108 struct proc *p = l->l_proc;
132 *retval = l->l_proc->p_session->s_sid;
154 *retval = l->l_proc->p_pgid;
246 struct proc *p = l->l_proc;
279 struct proc *p = l->l_proc;
302 struct proc *p = l->l_proc;
383 struct proc *p = l->l_proc;
    [all...]
sys_sig.c 136 struct proc *p = l->l_proc;
232 if (pid != l->l_proc->p_pid) {
233 if (ksi->ksi_pid != l->l_proc->p_pid)
315 ksi.ksi_pid = l->l_proc->p_pid;
328 struct proc *p = l->l_proc;
347 struct proc *p = l->l_proc;
394 p = l->l_proc;
590 KASSERT(mutex_owned(l->l_proc->p_lock));
632 struct proc *p = l->l_proc;
643 struct proc *p = l->l_proc;
    [all...]
kern_lwp.c 283 .l_proc = &proc0,
441 KASSERT(mutex_owned(t->l_proc->p_lock));
515 KASSERT(mutex_owned(l->l_proc->p_lock));
544 struct proc *p = l->l_proc;
588 proc_t *p = l->l_proc;
782 KASSERT(l1 == curlwp || l1->l_proc == &proc0);
839 l2->l_proc = p2;
850 * that l2->l_proc MUST be valid so that lookups of the proc
889 KASSERT(l1->l_proc == p2);
892 KASSERT(l1->l_proc != p2)
    [all...]
  /src/sys/compat/linux32/arch/aarch64/
linux32_exec_machdep.c 53 const struct proc *p = l->l_proc;
54 /* l->l_proc->p_emul still points to emul_netbsd at this point */
106 MIN(l->l_proc->p_rlimit[RLIMIT_STACK].rlim_cur, max_stack_size);
110 l->l_proc->p_stackbase = epp->ep_minsaddr;
  /src/sys/arch/aarch64/aarch64/
exec_machdep.c 98 CTASSERT(sizeof(l->l_proc->p_md.md_march32) ==
101 strlcpy(l->l_proc->p_md.md_march32, epp->ep_machine_arch,
102 sizeof(l->l_proc->p_md.md_march32));
144 struct proc * const p = l->l_proc;
  /src/sys/arch/sparc/include/
userret.h 64 struct proc *p = l->l_proc;
  /src/sys/compat/linux32/common/
linux32_resource.c 91 bsd_to_linux_rlimit(&orl, &l->l_proc->p_rlimit[which]);
117 return dosetrlimit(l, l->l_proc, which, &rl);
151 bsd_to_linux_rlimit64(&orl, &l->l_proc->p_rlimit[which]);
162 return dosetrlimit(l, l->l_proc, which, &rl);
  /src/sys/conf/
debugsyms.c 40 return cr->cr_uid ? ((lwp_t *)vp->v_mount)->l_proc : NULL;
  /src/sys/compat/common/
kern_resource_43.c 74 struct proc *p = l->l_proc;
108 return (dosetrlimit(l, l->l_proc, which, &lim));
  /src/sys/arch/i386/i386/
process_machdep.c 298 if ((error = ptrace_update_lwp((*lt)->l_proc, lt, data)) != 0)
300 if (!process_machdep_validxmmregs((*lt)->l_proc))
302 error = proc_vmspace_getref(l->l_proc, &vm);
324 if ((error = ptrace_update_lwp((*lt)->l_proc, lt, data)) != 0)
326 if (!process_machdep_validxstate((*lt)->l_proc))
330 error = proc_vmspace_getref(l->l_proc, &vm);
385 if (l->l_proc->p_stat != SSTOP)
  /src/sys/arch/m68k/m68k/
m68k_syscall.c 119 p = l->l_proc;
159 struct proc *p = l->l_proc;
232 p = l->l_proc;
287 struct proc *p = l->l_proc;
363 p = l->l_proc;
  /src/sys/arch/sh3/sh3/
exception.c 182 (*l->l_proc->p_md.md_syscall)(l, tf);
352 map = &l->l_proc->p_vmspace->vm_map;
366 map = &l->l_proc->p_vmspace->vm_map;
384 (va >= (vaddr_t)l->l_proc->p_vmspace->vm_maxsaddr) &&
385 (va < (vaddr_t)l->l_proc->p_vmspace->vm_minsaddr)) {
387 struct vmspace *vm = l->l_proc->p_vmspace;

Completed in 24 milliseconds

1 2 3 4 5 6 7 8 91011>>