/xnu-2422.115.4/tools/tests/libMicro/apple/ |
H A D | lmbench_lat_sig_catch.c | 190 struct sigaction sa, old; local 192 sa.sa_handler = handler; 193 (void) sigemptyset(&sa.sa_mask); 194 sa.sa_flags = 0; 195 (void) sigaction(SIGUSR1, &sa, &old);
|
H A D | lmbench_lat_sig_install.c | 209 struct sigaction sa, old; local 213 sa.sa_handler = handler; 214 sigemptyset(&sa.sa_mask); 215 sa.sa_flags = 0; 216 sigaction(SIGUSR1, &sa, &old);
|
H A D | lmbench_lat_sig_prot.c | 222 struct sigaction sa; local 240 sa.sa_handler = prot; 241 sigemptyset(&sa.sa_mask); 242 sa.sa_flags = 0; 243 sigaction(SIGSEGV, &sa, 0); 244 sigaction(SIGBUS, &sa, 0);
|
/xnu-2422.115.4/bsd/kern/ |
H A D | kpi_socket.c | 58 struct sockaddr *sa; local 141 (void) soacceptlock(new_so, &sa, 0); 150 if (sa != NULL && from != NULL) { 151 if (fromlen > sa->sa_len) 152 fromlen = sa->sa_len; 153 memcpy(from, sa, fromlen); 155 if (sa != NULL) 156 FREE(sa, M_SONAME); 176 struct sockaddr *sa = NULL; local 184 MALLOC(sa, struc 206 struct sockaddr *sa = NULL; local 352 struct sockaddr *sa = NULL; local 377 struct sockaddr *sa = NULL; local 431 sock_freeaddr(struct sockaddr *sa) argument [all...] |
H A D | uipc_syscalls.c | 266 struct sockaddr *sa = NULL; local 284 error = getsockaddr(so, &sa, uap->name, uap->namelen, TRUE); 288 sa = (struct sockaddr *)&ss; 294 AUDIT_ARG(sockaddr, vfs_context_cwd(vfs_context_current()), sa); 296 if ((error = mac_socket_check_bind(kauth_cred_get(), so, sa)) == 0) 297 error = sobindlock(so, sa, 1); /* will lock socket */ 299 error = sobindlock(so, sa, 1); /* will lock socket */ 302 FREE(sa, M_SONAME); 368 struct sockaddr *sa = NULL; local 528 (void) soacceptlock(so, &sa, 621 struct sockaddr *sa = NULL; local 733 connectit(struct socket *so, struct sockaddr *sa) argument 1919 struct sockaddr *sa; local 1987 struct sockaddr *sa; local 2053 struct sockaddr *sa; local 2112 struct sockaddr *sa; local 2208 struct sockaddr *sa; local [all...] |
H A D | kern_sig.c | 371 struct kern_sigaction *sa = &vec; local 383 sa->sa_handler = ps->ps_sigact[signum]; 384 sa->sa_mask = ps->ps_catchmask[signum]; 386 sa->sa_flags = 0; 388 sa->sa_flags |= SA_ONSTACK; 390 sa->sa_flags |= SA_RESTART; 392 sa->sa_flags |= SA_SIGINFO; 394 sa->sa_flags |= SA_NODEFER; 396 sa->sa_flags |= SA_64REGSET; 398 sa 573 setsigvec(proc_t p, __unused thread_t thread, int signum, struct __kern_sigaction *sa, boolean_t in_sigstart) argument [all...] |
H A D | kern_control.c | 268 struct sockaddr_ctl sa; local 278 bcopy(nam, &sa, sizeof(struct sockaddr_ctl)); 281 kctl = ctl_find_by_id_unit(sa.sc_id, sa.sc_unit); 304 if ((kctl->flags & CTL_FLAG_REG_ID_UNIT) || sa.sc_unit != 0) { 305 if (kcb_find(kctl, sa.sc_unit) != NULL) { 328 sa.sc_unit = unit; 331 kcb->unit = sa.sc_unit; 347 error = (*kctl->connect)(kctl, &sa, &kcb->userdata);
|
H A D | uipc_domain.c | 960 pfctlinput(int cmd, struct sockaddr *sa) argument 962 pfctlinput2(cmd, sa, NULL); 966 pfctlinput2(int cmd, struct sockaddr *sa, void *ctlparam) argument 972 if (sa == NULL) 979 (*pp->pr_ctlinput)(cmd, sa, ctlparam);
|
/xnu-2422.115.4/bsd/net/ |
H A D | route.c | 330 #define ASSERT_SINIFSCOPE(sa) { \ 331 if ((sa)->sa_family != AF_INET || \ 332 (sa)->sa_len < sizeof (struct sockaddr_in)) \ 333 panic("%s: bad sockaddr_in %p\n", __func__, sa); \ 336 #define ASSERT_SIN6IFSCOPE(sa) { \ 337 if ((sa)->sa_family != AF_INET6 || \ 338 (sa)->sa_len < sizeof (struct sockaddr_in6)) \ 339 panic("%s: bad sockaddr_in %p\n", __func__, sa); \ 370 #define INET_DEFAULT(sa) \ 371 ((sa) 492 sin_set_ifscope(struct sockaddr *sa, unsigned int ifscope) argument 504 sin6_set_ifscope(struct sockaddr *sa, unsigned int ifscope) argument 516 sin_get_ifscope(struct sockaddr *sa) argument 528 sin6_get_ifscope(struct sockaddr *sa) argument 537 sin6_set_embedded_ifscope(struct sockaddr *sa, unsigned int ifscope) argument 547 sin6_get_embedded_ifscope(struct sockaddr *sa) argument 653 sa_trim(struct sockaddr *sa, int skip) argument 692 rtm_scrub(int type, int idx, struct sockaddr *hint, struct sockaddr *sa, void *buf, uint32_t buflen, kauth_cred_t *credp) argument [all...] |
H A D | rtsock.c | 949 struct sockaddr *sa; local 956 sa = (struct sockaddr *)cp; 960 if ((cp + sa->sa_len) > cplim) 969 if (sa->sa_len == 0) { 974 rtinfo->rti_info[i] = sa; 975 ADVANCE32(cp, sa); 1024 struct sockaddr *sa, *hint; local 1032 if ((sa = rtinfo->rti_info[i]) == NULL) 1042 sa = rtm_scrub(type, i, hint, sa, 1114 struct sockaddr *sa, *hint; local 1192 struct sockaddr *sa = rtinfo->rti_info[RTAX_DST]; local 1249 struct sockaddr *sa = 0; local [all...] |
H A D | if.c | 1165 link_rtrequest(int cmd, struct rtentry *rt, struct sockaddr *sa) argument 1189 ifa_rtrequest(cmd, rt, sa); 1408 if_withname(struct sockaddr *sa) argument 1411 struct sockaddr_dl *sdl = (struct sockaddr_dl *)(void *)sa; 1413 if ( (sa->sa_family != AF_LINK) || (sdl->sdl_nlen == 0) || 2561 struct sockaddr *sa; local 2563 struct sockaddr sa; member in union:__anon148 2575 sa = ifa->ifa_addr; 2579 VERIFY(sa->sa_family == AF_LINK); 2580 bcopy(sa, 2936 if_addmulti_doesexist(struct ifnet *ifp, const struct sockaddr *sa, struct ifmultiaddr **retifma, int anon) argument 3045 if_addmulti(struct ifnet *ifp, const struct sockaddr *sa, struct ifmultiaddr **retifma) argument 3057 if_addmulti_anon(struct ifnet *ifp, const struct sockaddr *sa, struct ifmultiaddr **retifma) argument 3086 if_addmulti_common(struct ifnet *ifp, const struct sockaddr *sa, struct ifmultiaddr **retifma, int anon) argument 3246 if_delmulti(struct ifnet *ifp, const struct sockaddr *sa) argument 3267 if_delmulti_anon(struct ifnet *ifp, const struct sockaddr *sa) argument 3278 if_delmulti_common(struct ifmultiaddr *ifma, struct ifnet *ifp, const struct sockaddr *sa, int anon) argument [all...] |
H A D | ntstat.h | 186 struct sockaddr sa; member in union:nstat_route_descriptor::__anon241 193 struct sockaddr sa; member in union:nstat_route_descriptor::__anon242 200 struct sockaddr sa; member in union:nstat_route_descriptor::__anon243
|
H A D | if_gif.c | 651 struct sockaddr *sa; local 859 sa = (struct sockaddr *)_MALLOC(src->sa_len, M_IFADDR, 861 if (sa == NULL) { 865 bcopy((caddr_t)src, (caddr_t)sa, src->sa_len); 866 sc->gif_psrc = sa; 870 sa = (struct sockaddr *)_MALLOC(dst->sa_len, M_IFADDR, 872 if (sa == NULL) { 876 bcopy((caddr_t)dst, (caddr_t)sa, dst->sa_len); 877 sc->gif_pdst = sa;
|
H A D | pf_table.c | 792 union sockaddr_union sa, mask; local 798 bzero(&sa, sizeof (sa)); 800 FILLIN_SIN(sa.sin, ad->pfra_ip4addr); 803 FILLIN_SIN6(sa.sin6, ad->pfra_ip6addr); 810 ke = (struct pfr_kentry *)rn_lookup(&sa, &mask, head); 814 ke = (struct pfr_kentry *)rn_match(&sa, head); 968 pfr_prepare_network(union sockaddr_union *sa, int af, int net) argument 972 bzero(sa, sizeof (*sa)); [all...] |
H A D | ntstat.c | 309 struct sockaddr *sa; member in union:__anon230 338 struct radix_node_head *rnh = rt_tables[dst.sa->sa_family]; 342 struct rtentry *rt = rt_lookup(TRUE, dst.sa, mask.sa, rnh, param->ifindex); 520 struct sockaddr *sa; local 521 if ((sa = rt_key(rt))) 522 nstat_copy_sa_out(sa, &desc->dst.sa, sizeof(desc->dst)); 525 if ((sa = rt_mask(rt)) && sa [all...] |
/xnu-2422.115.4/bsd/nfs/ |
H A D | krpc_subr.c | 207 krpc_call(sa, sotype, prog, vers, func, data, from_p) 208 struct sockaddr_in *sa; 228 if (sa->sin_family != AF_INET) 294 mbuf_setlen(nam, sa->sin_len); 295 bcopy((caddr_t)sa, (caddr_t)sin, sa->sin_len);
|
/xnu-2422.115.4/bsd/netinet/ |
H A D | ip_divert.c | 223 struct socket *sa; local 292 sa = NULL; 297 sa = inp->inp_socket; 299 if (sa) { 302 socket_lock(sa, 1); 303 if (sbappendaddr(&sa->so_rcv, (struct sockaddr *)&divsrc, 305 sorwakeup(sa); 306 socket_unlock(sa, 1);
|
H A D | ip_fw2_compat.c | 467 inet_ntop(AF_INET, &s->sa.sin_addr, ipv4str, 469 if (s->sa.sin_port) 470 printf(",%d", s->sa.sin_port); 1426 compat_rule->fw_fwd_ip_compat.sin_len = p->sa.sin_len; 1427 compat_rule->fw_fwd_ip_compat.sin_family = p->sa.sin_family; 1428 compat_rule->fw_fwd_ip_compat.sin_port = p->sa.sin_port; 1429 compat_rule->fw_fwd_ip_compat.sin_addr = p->sa.sin_addr; 1489 compat_rule->fw_fwd_ip_compat.sin_len = p->sa.sin_len; 1490 compat_rule->fw_fwd_ip_compat.sin_family = p->sa.sin_family; 1491 compat_rule->fw_fwd_ip_compat.sin_port = p->sa [all...] |
H A D | in_arp.c | 666 arp_rtrequest(int req, struct rtentry *rt, struct sockaddr *sa) argument 668 #pragma unused(sa) 1134 struct sockaddr *sa; local 1157 sa = rt_ifa->ifa_addr; 1162 dlil_send_arp(ifp, ARPOP_REQUEST, NULL, sa, 1738 struct sockaddr *sa; local 1743 sa = ifa->ifa_addr; 1745 dlil_send_arp(ifp, ARPOP_REQUEST, NULL, sa, NULL, sa, 0);
|
/xnu-2422.115.4/bsd/sys/ |
H A D | kpi_socketfilter.h | 208 to intercept the getpeername function. When called, sa will 216 @param sa A pointer to a socket address pointer. 223 struct sockaddr **sa); 229 to intercept the getsockname function. When called, sa will 237 @param sa A pointer to a socket address pointer. 244 struct sockaddr **sa);
|
/xnu-2422.115.4/bsd/netkey/ |
H A D | key_debug.c | 316 struct sadb_sa *sa = (struct sadb_sa *)ext; local 323 (u_int32_t)ntohl(sa->sadb_sa_spi), sa->sadb_sa_replay, 324 sa->sadb_sa_state); 326 sa->sadb_sa_auth, sa->sadb_sa_encrypt, sa->sadb_sa_flags);
|
/xnu-2422.115.4/bsd/security/audit/ |
H A D | audit_arg.c | 349 struct sockaddr *sa) 355 KASSERT(sa != NULL, ("audit_arg_sockaddr: sa == NULL")); 357 if (cwd_vp == NULL || sa == NULL) 360 bcopy(sa, &ar->k_ar.ar_arg_sockaddr, sa->sa_len); 361 switch (sa->sa_family) { 371 sun = (struct sockaddr_un *)sa; 348 audit_arg_sockaddr(struct kaudit_record *ar, struct vnode *cwd_vp, struct sockaddr *sa) argument
|
/xnu-2422.115.4/bsd/netinet6/ |
H A D | nd6_nbr.c | 2225 nd6_alt_node_addr_decompose(struct ifnet *ifp, struct sockaddr *sa, argument 2231 VERIFY(sa); 2232 VERIFY(sdl && (void *)sa != (void *)sdl); 2233 VERIFY(sin6 && (void *)sa != (void *)sin6); 2245 switch (sa->sa_family) { 2247 struct sockaddr_in6 *sin6a = (struct sockaddr_in6 *)(void *)sa; 2250 VERIFY(sa->sa_len == sizeof *sin6); 2271 struct sockaddr_dl *sdla = (struct sockaddr_dl *)(void *)sa; 2275 VERIFY(sa->sa_len <= sizeof *sdl); 2276 bcopy(sa, sd [all...] |
H A D | ah_input.c | 1029 ah6_ctlinput(cmd, sa, d) 1031 struct sockaddr *sa; 1043 if (sa->sa_family != AF_INET6 || 1044 sa->sa_len != sizeof(struct sockaddr_in6)) 1088 sa6_dst = (struct sockaddr_in6 *)(void *)sa;
|
H A D | udp6_usrreq.c | 578 udp6_ctlinput(int cmd, struct sockaddr *sa, void *d) argument 592 if (sa->sa_family != AF_INET6 || 593 sa->sa_len != sizeof (struct sockaddr_in6)) 631 (void) in6_pcbnotify(&udbinfo, sa, uh.uh_dport, 635 (void) in6_pcbnotify(&udbinfo, sa, 0,
|