Lines Matching refs:bsa

323 	struct sys___socket30_args bsa;
327 SCARG(&bsa, protocol) = SCARG(uap, protocol);
328 SCARG(&bsa, domain) = linux_to_bsd_domain(SCARG(uap, domain));
329 if (SCARG(&bsa, domain) == -1)
331 SCARG(&bsa, type) = linux_to_bsd_type(SCARG(uap, type));
332 if (SCARG(&bsa, type) == -1)
339 if (SCARG(&bsa, domain) == AF_ROUTE && SCARG(&bsa, type) == SOCK_RAW)
341 error = sys___socket30(l, &bsa, retval);
349 if (!error && ip6_v6only && SCARG(&bsa, domain) == PF_INET6) {
376 struct sys_socketpair_args bsa;
378 SCARG(&bsa, domain) = linux_to_bsd_domain(SCARG(uap, domain));
379 if (SCARG(&bsa, domain) == -1)
381 SCARG(&bsa, type) = linux_to_bsd_type(SCARG(uap, type));
382 if (SCARG(&bsa, type) == -1)
384 SCARG(&bsa, protocol) = SCARG(uap, protocol);
385 SCARG(&bsa, rsv) = SCARG(uap, rsv);
387 return sys_socketpair(l, &bsa, retval);
1030 struct sys_setsockopt_args bsa;
1033 SCARG(&bsa, s) = SCARG(uap, s);
1034 SCARG(&bsa, level) = linux_to_bsd_sopt_level(SCARG(uap, level));
1035 SCARG(&bsa, val) = SCARG(uap, optval);
1036 SCARG(&bsa, valsize) = SCARG(uap, optlen);
1042 if (SCARG(&bsa, level) != SOL_SOCKET) {
1047 if ((error = fd_getsock(SCARG(&bsa, s), &so)) != 0)
1050 fd_putfile(SCARG(&bsa, s));
1056 switch (SCARG(&bsa, level)) {
1082 SCARG(&bsa, name) = name;
1084 return sys_setsockopt(l, &bsa, retval);
1737 struct sys_sendto_args bsa;
1739 SCARG(&bsa, s) = SCARG(uap, s);
1740 SCARG(&bsa, buf) = SCARG(uap, buf);
1741 SCARG(&bsa, len) = SCARG(uap, len);
1742 SCARG(&bsa, flags) = SCARG(uap, flags);
1743 SCARG(&bsa, to) = NULL;
1744 SCARG(&bsa, tolen) = 0;
1746 return (sys_sendto(l, &bsa, retval));