/freebsd-11-stable/sys/contrib/ck/src/ |
H A D | ck_rhs.c | 80 CK_RHS_PROBE = 0, /* Default behavior. */ 110 enum ck_rhs_probe_behavior behavior); 588 enum ck_rhs_probe_behavior behavior) 609 if (behavior != CK_RHS_PROBE_ROBIN_HOOD) { 636 if (behavior != CK_RHS_PROBE_NO_RH) { 644 if (behavior == CK_RHS_PROBE_RH || 645 behavior == CK_RHS_PROBE_ROBIN_HOOD) { 652 if (behavior != CK_RHS_PROBE_ROBIN_HOOD) { 700 enum ck_rhs_probe_behavior behavior) 722 if (behavior ! 580 ck_rhs_map_probe_rm(struct ck_rhs *hs, struct ck_rhs_map *map, unsigned long *n_probes, long *priority, unsigned long h, const void *key, const void **object, unsigned long probe_limit, enum ck_rhs_probe_behavior behavior) argument 692 ck_rhs_map_probe(struct ck_rhs *hs, struct ck_rhs_map *map, unsigned long *n_probes, long *priority, unsigned long h, const void *key, const void **object, unsigned long probe_limit, enum ck_rhs_probe_behavior behavior) argument 1315 ck_rhs_put_internal(struct ck_rhs *hs, unsigned long h, const void *key, enum ck_rhs_probe_behavior behavior) argument [all...] |
H A D | ck_hs.c | 78 CK_HS_PROBE = 0, /* Default behavior. */ 427 enum ck_hs_probe_behavior behavior) 452 if (behavior == CK_HS_PROBE_INSERT) 483 if (behavior == CK_HS_PROBE_TOMBSTONE) { 814 enum ck_hs_probe_behavior behavior) 824 map->probe_limit, behavior); 419 ck_hs_map_probe(struct ck_hs *hs, struct ck_hs_map *map, unsigned long *n_probes, const void ***priority, unsigned long h, const void *key, const void **object, unsigned long probe_limit, enum ck_hs_probe_behavior behavior) argument 811 ck_hs_put_internal(struct ck_hs *hs, unsigned long h, const void *key, enum ck_hs_probe_behavior behavior) argument
|
/freebsd-11-stable/share/mk/ |
H A D | src.sys.mk | 5 # to preserve historical (and useful) behavior. Changes here need to
|
H A D | suite.test.mk | 39 # behavior defined here.
|
H A D | bsd.own.mk | 245 # wasn't defined. bsd.ports.mk and friends depend on this behavior. Remove in 12.
|
H A D | sys.mk | 475 # to preserve historic behavior.
|
H A D | src.opts.mk | 224 # Additional, per-target behavior should be rarely added only after much
|
H A D | dirdeps.mk | 145 # make sure we get the behavior we expect
|
/freebsd-11-stable/contrib/llvm-project/llvm/lib/Support/Windows/ |
H A D | Process.inc | 97 // of that application, which is the incorrect behavior for this API.
|
/freebsd-11-stable/contrib/bmake/mk/ |
H A D | man.mk | 17 # set this to .0 for same behavior as bsd.man.mk
|
H A D | warnings.mk | 18 # make sure we get the behavior we expect
|
H A D | dirdeps.mk | 183 # make sure we get the behavior we expect
|
/freebsd-11-stable/usr.bin/dtc/ |
H A D | fdt.cc | 736 visit_behavior behavior; local 737 behavior = fn(*this, parent); 738 if (behavior == VISIT_BREAK) 742 else if (behavior != VISIT_CONTINUE) 746 behavior = c->visit(fn, this); 751 if (behavior != VISIT_RECURSE) 753 return behavior;
|
/freebsd-11-stable/sys/vm/ |
H A D | vm_fault.c | 533 u_char behavior; local 815 behavior = vm_map_entry_behavior(fs.entry); 816 if (behavior == MAP_ENTRY_BEHAV_RANDOM) { 818 } else if (behavior == MAP_ENTRY_BEHAV_SEQUENTIAL) { 920 if (nera == -1 || behavior == MAP_ENTRY_BEHAV_RANDOM ||
|
H A D | vm_map.c | 839 * Set the expected access behavior, either normal, random, or 843 vm_map_entry_set_behavior(vm_map_entry_t entry, u_char behavior) argument 846 (behavior & MAP_ENTRY_BEHAV_MASK);
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_malloc_mac.inc | 67 // This matches the behavior of malloc_create_zone() on OSX 10.7 and higher.
|
/freebsd-11-stable/contrib/bmake/unit-tests/ |
H A D | escape.mk | 23 # line immediately preceding an include line, the behavior is
|
/freebsd-11-stable/contrib/llvm-project/llvm/lib/Support/Unix/ |
H A D | Program.inc | 72 // the behavior of sh(1) and friends.
|
/freebsd-11-stable/lib/msun/ |
H A D | Makefile | 42 # original code. To avoid this, use the -fp-exception-behavior=maytrap flag, 45 CFLAGS+= -ffp-exception-behavior=maytrap
|
/freebsd-11-stable/sys/conf/ |
H A D | kern.mk | 195 # The C standard leaves signed integer overflow behavior undefined.
|
H A D | kern.post.mk | 32 # behavior of installing debug files in the kernel directory.
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 659 #define __sanitizer_syscall_pre_madvise(start, len, behavior) \ 661 (long)(behavior)) 662 #define __sanitizer_syscall_post_madvise(res, start, len, behavior) \ 664 (long)(behavior)) 2377 void __sanitizer_syscall_pre_impl_madvise(long start, long len, long behavior); 2379 long behavior);
|
/freebsd-11-stable/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CheckSecuritySyntaxOnly.cpp | 935 "Potential insecure implementation-specific behavior in "
|
/freebsd-11-stable/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 299 # behavior, which loaded the the SSH2 DSA host key when HostDsaKey wasn't 691 - Remove the default path and mimic login's behavior in the server itself.
|
/freebsd-11-stable/usr.sbin/route6d/ |
H A D | route6d.c | 2242 * there are couple of p2p interface routing models. "behavior" lets 2243 * you pick one. it looks that gated behavior fits best with BSDs, 2258 const enum { CISCO, GATED, ROUTE6D } behavior = GATED; local 2268 switch (behavior) { 3245 /* it is safer behavior */
|