/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | verbs.c | 378 int valid; member in struct:__anon647 382 [IB_QPS_RESET] = { .valid = 1 }, [IB_QPS_INIT] = { .valid = 1, 393 [IB_QPS_INIT] = { [IB_QPS_RESET] = { .valid = 1 }, [IB_QPS_ERR] = { 394 .valid = 1 }, [IB_QPS_INIT] = { .valid = 1, .opt_param = { 402 | IB_QP_QKEY), } }, [IB_QPS_RTR] = { .valid = 1, 419 [IB_QPS_RTR] = { [IB_QPS_RESET] = { .valid = 1 }, [IB_QPS_ERR] = { 420 .valid = 1 }, [IB_QPS_RTS] = { .valid [all...] |
/barrelfish-2018-10-04/lib/libc/rpc/ |
H A D | clnt_simple.c | 69 int valid; /* Is this entry valid ? */ member in struct:rpc_call_private 151 rcp->valid = 0; 156 if (!(rcp->valid && rcp->pid == getpid() && 163 rcp->valid = 0; 191 rcp->valid = 1; 193 rcp->valid = 0; 205 rcp->valid = 0;
|
H A D | getnetpath.c | 60 int valid; /* token that indicates a valid netpath_vars */ member in struct:netpath_vars 103 np_sessionp->valid = NP_VALID; 126 * database entry corresponding to the first valid NETPATH component. The 129 * entry that corresponds to the next valid NETPATH component. getnetpath 151 if (np_sessionp == NULL || np_sessionp->valid != NP_VALID) { 169 * Find first valid network ID in netpath. 204 if (np_sessionp == NULL || np_sessionp->valid != NP_VALID) {
|
H A D | getnetconfig.c | 115 int valid; /* token that indicates a valid netconfig_vars */ member in struct:netconfig_vars 215 nc_vars->valid = NC_VALID; 251 * Verify that handle is valid 261 switch (ncp->valid) { 386 * Verify that handle is valid 388 if (nc_handlep == NULL || (nc_handlep->valid != NC_VALID && 389 nc_handlep->valid != NC_STORAGE)) { 397 nc_handlep->valid = NC_INVALID;
|
/barrelfish-2018-10-04/kernel/include/arch/armv8/ |
H A D | paging_kernel_arch.h | 37 uint64_t valid :1; member in struct:armv8_ttable_entry::__anon419 49 uint64_t valid :1; member in struct:armv8_ttable_entry::__anon420 68 uint64_t valid :1; member in struct:armv8_ttable_entry::__anon421 87 uint64_t valid :1; member in struct:armv8_ttable_entry::__anon422
|
/barrelfish-2018-10-04/usr/tests/mdbtests/ |
H A D | test_ops_with_root.c | 53 bool valid = true; local 59 valid = false; 63 valid = false; 67 if (valid) {
|
H A D | test_range_query.c | 53 bool valid = true; local 59 valid = false; 63 valid = false; 67 if (valid) {
|
/barrelfish-2018-10-04/kernel/arch/armv8/ |
H A D | paging.c | 106 l2.block_l2.valid = 1; 118 l1.block_l1.valid = 1; 156 e.d.valid = 1; 171 e.d.valid = 1; 186 e.block_l1.valid = 1; 204 e.d.valid = 1; 221 e.block_l2.valid = 1; 242 e.page.valid = 1; 260 e.page.valid = 1; 280 // e.d.valid [all...] |
/barrelfish-2018-10-04/include/vm/ |
H A D | phys_pager.c | 149 if (m[i]->valid == 0) { 152 m[i]->valid = VM_PAGE_BITS_ALL; 154 KASSERT(m[i]->valid == VM_PAGE_BITS_ALL, 155 ("phys_pager_getpages: partially valid page %p", m[i]));
|
H A D | vm_page.c | 1040 KASSERT(m->valid != 0, ("%s: %p is invalid", __func__, m)); 1111 KASSERT(m->valid == VM_PAGE_BITS_ALL, 1722 KASSERT(m->valid != 0, 1727 m->valid = 0; 1734 KASSERT(m->valid == 0, 1735 ("vm_page_alloc: free page %p is valid", m)); 2032 m->valid = 0; 2039 KASSERT(m->valid == 0, 2040 ("vm_page_alloc_init: free page %p is valid", m)); 2467 if (m->valid ! [all...] |
H A D | vm_fault.c | 382 vm_page_busied(m)) || m->valid != VM_PAGE_BITS_ALL) 464 * fault if the page is marked valid, but since such 509 * pagedaemon. If it still isn't completely valid 514 if (fs.m->valid != VM_PAGE_BITS_ALL) 558 } else if (fs.m->valid == VM_PAGE_BITS_ALL) 633 * existing page that is only partially valid. We 778 * Zero the page if necessary and mark it valid. 786 fs.m->valid = VM_PAGE_BITS_ALL; 885 fs.first_m->valid = VM_PAGE_BITS_ALL; 990 * Page must be completely valid o [all...] |
/barrelfish-2018-10-04/lib/bulk_transfer/backends/sm/ |
H A D | channel.c | 201 bool valid = true; local 214 valid = valid && (me.role == bulk_role_other(peer.role)); 218 valid = valid && (bulk_trust_compare(me.trust, peer.trust) == 0); 221 if (valid) {
|
/barrelfish-2018-10-04/usr/drivers/usb/usb_keyboard/ |
H A D | usb_keyboard_driver.h | 55 if (keyboard._mod.valid && (rid == keyboard._mod.report_id)) { \ 96 uint8_t valid; member in struct:usb_keyboard_key
|
H A D | usb_keyboard_driver.c | 229 if (keyboard.numlock.valid) { 240 if (keyboard.scrolllock.valid) { 251 if (keyboard.capslock.valid) { 674 if (keyboard.events.valid && (rid == keyboard.events.report_id)) { 796 keyboard.ctrl_l.valid = 1; 807 keyboard.ctrl_r.valid = 1; 818 keyboard.shift_l.valid = 1; 829 keyboard.shift_r.valid = 1; 840 keyboard.alt_l.valid = 1; 851 keyboard.alt_r.valid [all...] |
/barrelfish-2018-10-04/include/tenaciousd/ |
H A D | queue.h | 17 uint8_t valid; member in struct:tenaciousd_queue_element 20 uint64_t next; // Only valid on disk 22 uint8_t marker; // Never valid
|
/barrelfish-2018-10-04/kernel/ |
H A D | memset.c | 116 #error UINTPTR_MAX not valid
|
/barrelfish-2018-10-04/usr/webserver/ |
H A D | http_cache.c | 50 int valid; /* flag for validity of the data */ member in struct:http_cache_entry 93 /* NOTE: 0 is valid length and used by error_cache */ 146 error_cache->valid = 1; 299 e->valid = 1; 425 if (e->valid == 1) { 431 } /* end if: valid cacheline */ 461 if (e->valid == 1) { 464 e->valid = 0; 469 } /* end if: if cacheline is valid */ 530 while (ce->valid ! [all...] |
/barrelfish-2018-10-04/lib/lwip/src/core/ipv4/ |
H A D | ip_frag.c | 311 /* it wasn't the first, so it must have a valid 'prev' */ 337 int valid = 1; local 390 valid = 0; 409 valid = 0; 426 if (valid) { 430 valid = 0; 438 valid = 0; 444 /* if still valid, all fragments are received 446 if (valid) { 458 /* If valid i [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/core/ipv4/ |
H A D | ip4_frag.c | 320 /* it wasn't the first, so it must have a valid 'prev' */ 345 int valid = 1; local 397 valid = 0; 415 valid = 0; 431 if (valid) { 435 valid = 0; 443 valid = 0; 449 /* if still valid, all fragments are received 451 if (valid) { 462 /* If valid i [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/core/ipv6/ |
H A D | ip6_frag.c | 266 u8_t valid = 1; local 443 valid = 0; 461 valid = 0; 497 valid = 0; 500 valid = 0; 506 while ((q != NULL) && valid) { 509 valid = 0; 516 if (valid) { 584 /* it wasn't the first, so it must have a valid 'prev' */
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | des.c | 759 static int valid=0; local 779 if (valid) 781 memcpy(out,bb,(unsigned int)valid); 782 tot=valid; 783 valid=0; 809 valid=i-j;
|
/barrelfish-2018-10-04/lib/tenaciousd/ |
H A D | queue.c | 63 if (element->valid != QUEUE_ELEMENT_VALID) { 235 element->valid = QUEUE_ELEMENT_VALID; 257 element->valid = QUEUE_ELEMENT_INVALID;
|
/barrelfish-2018-10-04/usr/bulk_transfer_passthrough/ |
H A D | passthrough.c | 117 volatile bool valid; member in struct:future_reply 131 r->valid = true; 139 wait_cond(&r->valid);
|
/barrelfish-2018-10-04/usr/tests/bulk_transfer/ |
H A D | bulk_shm.c | 492 int valid = 1; local 495 valid = valid && (buffer_data[i] == 0x21); 497 if (valid) {
|
/barrelfish-2018-10-04/doc/026-device-queues/ |
H A D | devif.tex | 224 \item Region must currently be registered (i.e. valid region id that is currently registered) 242 The region id provided has to be valid i.e. larger or equal than 0 and is already registered. 245 region. The valid data offset has to be within the buffer and its length may not exceed 278 \item \texttt{genoffset\_t valid\_data}: the offset within the buffer where the valid data starts. 279 \item \texttt{genoffset\_t valid\_length}: the length of the valid data within the buffer. 290 \item The valid\_data offset must be within the buffers bounds 291 \item The valid\_length must not exceed the length minus the valid\_dat [all...] |