/freebsd-10.1-release/tools/regression/sockets/so_setfib/ |
H A D | so_setfib.c | 97 so_setfib(int s, int i, u_int dom, u_int type) argument 104 printf("ok %d %s_%s_%d\n", testno, t_dom[dom].name, 109 t_dom[dom].name, t_type[type].name, i, s, i); 111 printf("ok %d %s_%s_%d\n", testno, t_dom[dom].name, 116 t_dom[dom].name, t_type[type].name, i, s, i, 119 printf("not ok %d %s_%s_%d\n", testno, t_dom[dom].name, 131 t(u_int dom, u_int type) argument 136 if (t_dom[dom].domain == PF_ROUTE && t_type[type].type != SOCK_RAW) 138 if (t_dom[dom].domain == PF_LOCAL && t_type[type].type == SOCK_RAW) 142 s = socket(t_dom[dom] [all...] |
/freebsd-10.1-release/sys/amd64/vmm/io/ |
H A D | iommu.h | 43 typedef void (*iommu_remove_device_t)(void *dom, int bus, int slot, int func); 44 typedef void (*iommu_invalidate_tlb_t)(void *dom); 68 void iommu_destroy_domain(void *dom); 69 void iommu_create_mapping(void *dom, vm_paddr_t gpa, vm_paddr_t hpa, 71 void iommu_remove_mapping(void *dom, vm_paddr_t gpa, size_t len); 72 void iommu_add_device(void *dom, int bus, int slot, int func); 73 void iommu_remove_device(void *dom, int bus, int slot, int func);
|
H A D | iommu.c | 84 IOMMU_DESTROY_DOMAIN(void *dom) argument 88 (*ops->destroy_domain)(dom); 223 iommu_destroy_domain(void *dom) argument 226 IOMMU_DESTROY_DOMAIN(dom); 230 iommu_create_mapping(void *dom, vm_paddr_t gpa, vm_paddr_t hpa, size_t len) argument 237 mapped = IOMMU_CREATE_MAPPING(dom, gpa, hpa, remaining); 245 iommu_remove_mapping(void *dom, vm_paddr_t gpa, size_t len) argument 252 unmapped = IOMMU_REMOVE_MAPPING(dom, gpa, remaining); 266 iommu_add_device(void *dom, int bus, int slot, int func) argument 269 IOMMU_ADD_DEVICE(dom, bu 273 iommu_remove_device(void *dom, int bus, int slot, int func) argument [all...] |
/freebsd-10.1-release/sys/amd64/vmm/intel/ |
H A D | vtd.c | 156 struct domain *dom; local 160 SLIST_FOREACH(dom, &domhead, next) { 161 if (dom->id == id) 164 if (dom == NULL) 367 struct domain *dom = arg; local 378 pt_paddr = vtophys(dom->ptp); 391 ctxp[idx + 1] = dom->addrwidth | (dom->id << 8); 447 struct domain *dom; local 451 dom 547 vtd_invalidate_tlb(void *dom) argument 565 struct domain *dom; local 671 struct domain *dom; local [all...] |
/freebsd-10.1-release/sys/xen/interface/ |
H A D | event_channel.h | 83 * EVTCHNOP_alloc_unbound: Allocate a port in domain <dom> and mark as 85 * is allocated in <dom> and returned as <port>. 87 * 1. If the caller is unprivileged then <dom> must be DOMID_SELF. 92 domid_t dom, remote_dom; member in struct:evtchn_alloc_unbound 189 * has an endpoint at <dom, port>. 191 * 1. <dom> may be specified as DOMID_SELF. 193 * channel for which <dom> is not DOMID_SELF. 197 domid_t dom; member in struct:evtchn_status 210 domid_t dom; member in struct:evtchn_status::__anon11559::__anon11560 213 domid_t dom; member in struct:evtchn_status::__anon11559::__anon11561 259 domid_t dom; member in struct:evtchn_reset [all...] |
H A D | grant_table.h | 321 * GNTTABOP_map_grant_ref: Map the grant entry (<dom>,<ref>) for access 342 domid_t dom; member in struct:gnttab_map_grant_ref 374 * GNTTABOP_setup_table: Set up a grant table for <dom> comprising at least 378 * 1. <dom> may be specified as DOMID_SELF. 379 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF. 384 domid_t dom; member in struct:gnttab_setup_table 399 domid_t dom; member in struct:gnttab_dump_table 473 * 1. <dom> may be specified as DOMID_SELF. 474 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF. 478 domid_t dom; member in struct:gnttab_query_size 540 domid_t dom; member in struct:gnttab_get_status_frames 554 domid_t dom; member in struct:gnttab_get_version [all...] |
/freebsd-10.1-release/contrib/gcc/ |
H A D | dominance.c | 54 artificial ENTRY_BLOCK (or EXIT_BLOCK in the post-dom case) in our lists to 80 /* After the algorithm is done, dom[x] contains the immediate dominator 82 TBB *dom; member in struct:dom_info 156 init_ar (di->dom, TBB, num, 0); 184 free (di->dom); 326 /* In the post-dom case we may have nodes without a path to EXIT_BLOCK. 327 They are reverse-unreachable. In the dom-case we disallow such 328 nodes, but in post-dom we have to deal with them. 471 On return the immediate dominator to node V is in di->dom[V]. */ 550 di->dom[ 748 basic_block dom; local 811 basic_block dom; local [all...] |
H A D | tree-ssa-math-opts.c | 180 basic_block dom = nearest_common_dominator (CDI_DOMINATORS, occ_bb, bb); local 181 if (dom == bb) 192 else if (dom == occ_bb) 195 insert_bb (new_occ, dom, &occ->children); 199 else if (dom != idom) 201 gcc_assert (!dom->aux); 213 new_occ = occ_new (dom, new_occ); 254 basic_block dom = occ->bb; local 263 bb = single_noncomplex_succ (dom); 265 bb = dom; [all...] |
H A D | tree-cfgcleanup.c | 489 basic_block dom, dombb, domdest; local 497 dom = dombb; 500 dom = nearest_common_dominator (CDI_DOMINATORS, domdest, dombb); 502 set_immediate_dominator (CDI_DOMINATORS, dest, dom); 637 basic_block dombb, domdest, dom; local 722 dom = dombb; 725 dom = nearest_common_dominator (CDI_DOMINATORS, domdest, dombb); 727 set_immediate_dominator (CDI_DOMINATORS, dest, dom);
|
/freebsd-10.1-release/sys/ia64/pci/ |
H A D | pci_cfgreg.c | 36 pci_sal_address(int dom, int bus, int slot, int func, int reg) argument 41 if (dom >= 0 && dom <= 255 && bus >= 0 && bus <= 255 && 44 addr = ((u_long)dom << 24) | ((u_long)bus << 16) |
|
/freebsd-10.1-release/include/rpcsvc/ |
H A D | ypclnt.h | 73 int yp_bind(char *dom); 74 int _yp_dobind(char *dom, struct dom_binding **ypdb); 75 void yp_unbind(char *dom);
|
/freebsd-10.1-release/crypto/heimdal/lib/krb5/ |
H A D | get_host_realm.c | 96 char dom[MAXHOSTNAMELEN]; local 111 ret = snprintf(dom, sizeof(dom), "%s.%s.", labels[i], domain); 112 if(ret < 0 || (size_t)ret >= sizeof(dom)) { 117 r = rk_dns_lookup(dom, "TXT");
|
/freebsd-10.1-release/sys/vm/ |
H A D | vm_phys.c | 157 int dom, error, flind, oind, pind; local 163 for (dom = 0; dom < vm_ndomains; dom++) { 164 sbuf_printf(&sbuf,"\nDOMAIN %d:\n", dom); 179 fl = vm_phys_free_queues[dom][flind][pind]; 311 int dom, flind, i, oind, pind; local 347 for (dom = 0; dom < vm_ndomains; dom 416 int dom, domain, flind; local 443 int dom, domain; local 873 int dom, domain, flind, oind, order, pind; local 971 int flind, oind, pind, dom; local [all...] |
H A D | vm_pageout.c | 657 int actl, actmax, inactl, inactmax, dom, initial_dom; local 684 dom = initial_dom; 699 if (vm_phys_domain_intersects(vm_dom[dom].vmd_segs, 701 vm_pageout_launder(&vm_dom[dom].vmd_pagequeues[PQ_INACTIVE], 706 if (++dom == vm_ndomains) 707 dom = 0; 708 if (dom != initial_dom) 712 if (vm_phys_domain_intersects(vm_dom[dom].vmd_segs, 714 vm_pageout_launder(&vm_dom[dom].vmd_pagequeues[PQ_ACTIVE], 719 if (++dom [all...] |
/freebsd-10.1-release/usr.sbin/ypset/ |
H A D | ypset.c | 58 bind_tohost(struct sockaddr_in *sin, char *dom, char *server) argument 85 /* strncpy(ypsd.ypsetdom_domain, dom, sizeof ypsd.ypsetdom_domain); */ 86 ypsd.ypsetdom_domain = dom; 104 warnx("sorry, cannot ypset for domain %s on host - make sure ypbind was started with -ypset or -ypsetme", dom);
|
/freebsd-10.1-release/lib/libc/gen/ |
H A D | getnetgrent.c | 299 const char* dom, const char* group) 310 dom ? dom : lookupdom); 317 dom ? dom : lookupdom); 348 innetgr(const char *group, const char *host, const char *user, const char *dom) argument 391 host?host:user, dom, group); 394 else if (ret == 0 && dom != NULL) 404 ( dom == NULL || dm == NULL || !strcmp(dom, d 298 _revnetgr_lookup(char* lookupdom, char* map, const char* str, const char* dom, const char* group) argument [all...] |
/freebsd-10.1-release/usr.sbin/cron/cron/ |
H A D | cron.c | 227 register int second, minute, hour, dom, month, dow; local 236 dom = tm->tm_mday -FIRST_DOM; 241 getpid(), second, minute, hour, dom, month, dow)) 303 /* the dom/dow situation is odd. '* * 1,15 * Sun' will run on the 321 ? (bit_test(e->dow,otzdow) && bit_test(e->dom,otzdom)) 322 : (bit_test(e->dow,otzdow) || bit_test(e->dom,otzdom)) 341 ? (bit_test(e->dow,dow) && bit_test(e->dom,dom)) 342 : (bit_test(e->dow,dow) || bit_test(e->dom,dom)) [all...] |
/freebsd-10.1-release/lib/libc/yp/ |
H A D | yplib.c | 287 _yp_dobind(char *dom, struct dom_binding **ypdb) argument 304 if (strchr(dom, '/') != NULL) 324 if (dom == NULL || strlen(dom) == 0) 328 if (strcmp(dom, ysd->dom_domain) == 0) 377 snprintf(path, sizeof(path), "%s/%s.%d", BINDINGDIR, dom, 2); 471 (xdrproc_t)xdr_domainname, &dom, 482 "YP: server for domain %s not responding, retrying\n", dom); 519 strlcpy(ysd->dom_domain, dom, sizeof(ysd->dom_domain)); 604 yp_bind_locked(char *dom) argument 610 yp_bind(char *dom) argument 621 yp_unbind_locked(char *dom) argument 642 yp_unbind(char *dom) argument 1222 _yp_check(char **dom) argument [all...] |
/freebsd-10.1-release/sys/net/ |
H A D | route.c | 195 struct domain *dom; local 204 for (dom = domains; dom; dom = dom->dom_next) 205 if (dom->dom_maxrtkey > max_keylen) 206 max_keylen = dom->dom_maxrtkey; 257 struct domain *dom; local 268 for (dom = domains; dom; do 298 struct domain *dom; local [all...] |
/freebsd-10.1-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/ |
H A D | DebugCheckers.cpp | 37 DominatorTree dom; local 38 dom.buildDominatorTree(*AC); 39 dom.dump();
|
/freebsd-10.1-release/sys/kern/ |
H A D | vfs_export.c | 99 struct domain *dom; local 172 for (dom = domains; dom; dom = dom->dom_next) { 175 if (dom->dom_family == i && dom->dom_rtattach) { 186 dom->dom_rtattach(
|
/freebsd-10.1-release/usr.sbin/cron/lib/ |
H A D | entry.c | 157 bit_set(e->dom, 0); 166 bit_set(e->dom, 0); 175 bit_nset(e->dom, 0, (LAST_DOM-FIRST_DOM+1)); 184 bit_nset(e->dom, 0, (LAST_DOM-FIRST_DOM+1)); 192 bit_nset(e->dom, 0, (LAST_DOM-FIRST_DOM+1)); 200 bit_nset(e->dom, 0, (LAST_DOM-FIRST_DOM+1)); 209 bit_nset(e->dom, 0, (LAST_DOM-FIRST_DOM+1)); 250 ch = get_list(e->dom, FIRST_DOM, LAST_DOM,
|
/freebsd-10.1-release/sys/xen/ |
H A D | gnttab.h | 138 map->dom = domid;
|
/freebsd-10.1-release/usr.bin/ypwhich/ |
H A D | ypwhich.c | 91 bind_host(char *dom, struct sockaddr_in *lsin) argument 112 (xdrproc_t)xdr_domainname, &dom,
|
/freebsd-10.1-release/usr.sbin/ypbind/ |
H A D | yp_ping.c | 213 __yp_ping(struct in_addr *restricted_addrs, int cnt, char *dom, short *port) argument 225 char *foo = dom;
|