Lines Matching refs:uap

364 sigaction(proc_t p, struct sigaction_args *uap, __unused int32_t *retval)
375 signum = uap->signum;
380 if (uap->osa) {
404 error = copyout(&vec64, uap->osa, sizeof(vec64));
409 error = copyout(&vec32, uap->osa, sizeof(vec32));
414 if (uap->nsa) {
418 error = copyin(uap->nsa, &__vec64, sizeof(__vec64));
423 error = copyin(uap->nsa, &__vec32, sizeof(__vec32));
723 sigprocmask(proc_t p, struct sigprocmask_args *uap, __unused int32_t *retval)
727 user_addr_t omask = uap->omask;
733 if (uap->mask == USER_ADDR_NULL) {
737 error = copyin(uap->mask, &nmask, sizeof(sigset_t));
741 switch (uap->how) {
768 sigpending(__unused proc_t p, struct sigpending_args *uap, __unused int32_t *retval)
776 if (uap->osv)
777 copyout(&pendlist, uap->osv, sizeof(sigset_t));
795 sigsuspend(proc_t p, struct sigsuspend_args *uap, int32_t *retval)
798 return(sigsuspend_nocancel(p, (struct sigsuspend_nocancel_args *)uap, retval));
802 sigsuspend_nocancel(proc_t p, struct sigsuspend_nocancel_args *uap, __unused int32_t *retval)
817 ut->uu_sigmask = (uap->mask & ~sigcantmask);
826 __unused struct __disable_threadsignal_args *uap,
865 struct __pthread_markcancel_args *uap, __unused int32_t *retval)
871 target_act = (thread_act_t)port_name_to_thread(uap->thread_port);
897 struct __pthread_canceled_args *uap, __unused int32_t *retval)
901 int action = uap->action;
952 __old_semwait_signal(proc_t p, struct __old_semwait_signal_args *uap,
956 return(__old_semwait_signal_nocancel(p, (struct __old_semwait_signal_nocancel_args *)uap, retval));
960 __old_semwait_signal_nocancel(proc_t p, struct __old_semwait_signal_nocancel_args *uap,
971 if(uap->timeout) {
975 error = copyin(uap->ts, &ts64, sizeof(ts64));
980 error = copyin(uap->ts, &ts32, sizeof(ts32));
995 if (uap->relative) {
1017 if (uap->mutex_sem == 0)
1018 kern_result = semaphore_timedwait_trap_internal((mach_port_name_t)uap->cond_sem, then.tv_sec, then.tv_nsec, __posix_sem_syscall_return);
1020 kern_result = semaphore_timedwait_signal_trap_internal(uap->cond_sem, uap->mutex_sem, then.tv_sec, then.tv_nsec, __posix_sem_syscall_return);
1024 if (uap->mutex_sem == 0)
1025 kern_result = semaphore_wait_trap_internal(uap->cond_sem, __posix_sem_syscall_return);
1028 kern_result = semaphore_wait_signal_trap_internal(uap->cond_sem, uap->mutex_sem, __posix_sem_syscall_return);
1052 __semwait_signal(proc_t p, struct __semwait_signal_args *uap,
1056 return(__semwait_signal_nocancel(p, (struct __semwait_signal_nocancel_args *)uap, retval));
1060 __semwait_signal_nocancel(__unused proc_t p, struct __semwait_signal_nocancel_args *uap,
1070 if(uap->timeout) {
1072 ts.tv_sec = uap->tv_sec;
1073 ts.tv_nsec = uap->tv_nsec;
1081 if (uap->relative) {
1103 if (uap->mutex_sem == 0)
1104 kern_result = semaphore_timedwait_trap_internal((mach_port_name_t)uap->cond_sem, then.tv_sec, then.tv_nsec, __posix_sem_syscall_return);
1106 kern_result = semaphore_timedwait_signal_trap_internal(uap->cond_sem, uap->mutex_sem, then.tv_sec, then.tv_nsec, __posix_sem_syscall_return);
1110 if (uap->mutex_sem == 0)
1111 kern_result = semaphore_wait_trap_internal(uap->cond_sem, __posix_sem_syscall_return);
1114 kern_result = semaphore_wait_signal_trap_internal(uap->cond_sem, uap->mutex_sem, __posix_sem_syscall_return);
1131 __pthread_kill(__unused proc_t p, struct __pthread_kill_args *uap,
1136 int signum = uap->sig;
1139 target_act = (thread_t)port_name_to_thread(uap->thread_port);
1164 __pthread_sigmask(__unused proc_t p, struct __pthread_sigmask_args *uap,
1167 user_addr_t set = uap->set;
1168 user_addr_t oset = uap->oset;
1186 switch (uap->how) {
1219 __sigwait(proc_t p, struct __sigwait_args *uap, int32_t *retval)
1222 return(__sigwait_nocancel(p, (struct __sigwait_nocancel_args *)uap, retval));
1226 __sigwait_nocancel(proc_t p, struct __sigwait_nocancel_args *uap, __unused int32_t *retval)
1238 if (uap->set == USER_ADDR_NULL)
1241 error = copyin(uap->set, &mask, sizeof(sigset_t));
1310 if (uap->sig != USER_ADDR_NULL)
1311 error = copyout(&signum, uap->sig, sizeof(int));
1320 sigaltstack(__unused proc_t p, struct sigaltstack_args *uap, __unused int32_t *retval)
1334 if (uap->oss) {
1338 error = copyout(&ss64, uap->oss, sizeof(ss64));
1342 error = copyout(&ss32, uap->oss, sizeof(ss32));
1347 if (uap->nss == USER_ADDR_NULL)
1351 error = copyin(uap->nss, &ss64, sizeof(ss64));
1355 error = copyin(uap->nss, &ss32, sizeof(ss32));
1384 kill(proc_t cp, struct kill_args *uap, __unused int32_t *retval)
1388 int posix = uap->posix; /* !0 if posix behaviour desired */
1390 AUDIT_ARG(pid, uap->pid);
1391 AUDIT_ARG(signum, uap->signum);
1393 if ((u_int)uap->signum >= NSIG)
1395 if (uap->pid > 0) {
1397 if ((p = proc_find(uap->pid)) == NULL) {
1398 if ((p = pzfind(uap->pid)) != NULL) {
1408 if (!cansignal(cp, uc, p, uap->signum, 0)) {
1412 if (uap->signum)
1413 psignal(p, uap->signum);
1417 switch (uap->pid) {
1419 return (killpg1(cp, uap->signum, 0, 1, posix));
1421 return (killpg1(cp, uap->signum, 0, 0, posix));
1423 return (killpg1(cp, uap->signum, -(uap->pid), 0, posix));