Home
last modified time | relevance | path

Searched full:incoming (Results 1 – 25 of 1413) sorted by relevance

12345678910>>...57

/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/
H A DSILowerI1Copies.cpp74 SmallVectorImpl<Incoming> &Incomings) const override;
81 void constrainAsLaneMask(Incoming &In) override;
105 /// Helper class that determines the relationship between incoming values of a
106 /// phi in the control flow graph to determine where an incoming value can
111 /// - Determine all basic blocks which, starting from the incoming blocks,
114 /// - If an incoming block has no predecessors in this set, we can take the
115 /// incoming value as a scalar lane mask as-is.
117 /// - Otherwise, the incoming value needs to be merged with a previously
120 /// through an incoming block where we can take the scalar lane mask as-is,
150 void analyze(MachineBasicBlock &DefBlock, ArrayRef<Incoming> Incomings) { in analyze()
[all …]
H A DAMDGPURewriteUndefForPHI.cpp8 // This file implements the idea to rewrite undef incoming operand for certain
15 // it has one unique uniform value plus additional undefined/poisoned incoming
21 // Pattern A: Block with undefined incoming value dominates defined predecessor
28 // Pattern B: Block with defined incoming value dominates undefined predecessor
110 // The unique incoming value except undef/poison for the PHI node. in INITIALIZE_PASS_DEPENDENCY()
112 // The divergent block with defined incoming value that dominates all in INITIALIZE_PASS_DEPENDENCY()
113 // other block with the same incoming value. in INITIALIZE_PASS_DEPENDENCY()
115 // Predecessors with undefined incoming value (excluding loop backedge). in INITIALIZE_PASS_DEPENDENCY()
119 Value *Incoming = PHI.getIncomingValue(i); in INITIALIZE_PASS_DEPENDENCY()
122 if (Incoming in INITIALIZE_PASS_DEPENDENCY()
120 Value *Incoming = PHI.getIncomingValue(i); INITIALIZE_PASS_DEPENDENCY() local
[all...]
H A DSILowerI1Copies.h22 /// Incoming for lane maks phi as machine instruction, incoming register \p Reg
23 /// and incoming block \p Block are taken from machine instruction.
25 struct Incoming { struct
30 Incoming(Register Reg, MachineBasicBlock *Block, Register UpdatedReg) in Incoming() argument
88 SmallVectorImpl<Incoming> &Incomings) const = 0;
95 virtual void constrainAsLaneMask(Incoming &In) = 0;
H A DAMDGPUGlobalISelDivergenceLowering.cpp14 /// currently depends on LCSSA to insert phis with one incoming.
73 SmallVectorImpl<Incoming> &Incomings) const override;
80 void constrainAsLaneMask(Incoming &In) override;
116 const MachineInstr *MI, SmallVectorImpl<Incoming> &Incomings) const { in collectIncomingValuesFromPhi()
180 // GlobalISel has to constrain S1 incoming taken as-is with lane mask register
181 // class. Insert a copy of Incoming.Reg to new lane mask inside Incoming.Block,
182 // Incoming.Reg becomes that new lane mask.
183 void DivergenceLoweringHelper::constrainAsLaneMask(Incoming &In) { in constrainAsLaneMask()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_set_incoming_stream_policy.pod7 SSL_INCOMING_STREAM_POLICY_REJECT - manage the QUIC incoming stream
23 SSL_set_incoming_stream_policy() policy changes the incoming stream policy for a
25 automatically reject incoming streams initiated by the peer. This is intended to
40 This is the default setting. Incoming streams are accepted according to the
49 B<SSL_DEFAULT_STREAM_MODE_AUTO_UNI>, the incoming stream is rejected.
54 the application is assumed to be stream aware, and the incoming stream is
61 Always accept incoming streams, allowing them to be dequeued using
66 Always reject incoming streams.
70 Where an incoming stream is rejected, it is rejected immediately and it is not
H A DSSL_accept_stream.pod6 accept an incoming QUIC stream from a QUIC peer
20 The SSL_accept_stream() function attempts to dequeue an incoming stream from the
24 If the queue of incoming streams is empty, this function returns NULL (in
25 nonblocking mode) or waits for an incoming stream (in blocking mode). This
40 SSL_get_accept_stream_queue_len() returns the number of incoming streams
46 necessary to explicitly configure the incoming stream policy before streams can
54 no new incoming streams are available, or if the connection has been terminated,
58 SSL_get_accept_stream_queue_len() returns the number of incoming streams
H A DBIO_s_accept.pod51 waits for an incoming connection.
61 incoming connection.
97 will be duplicated and prepended to the chain when an incoming
123 and subsequent calls to BIO_do_accept() will await an incoming
129 incoming connection before processing I/O calls. When an accept
136 an initial accept socket will await an incoming connection then
145 incoming connections. This can be done by waiting for a connection and
152 again which can be used to await further incoming connections.
158 however because the accept BIO will still accept additional incoming
163 called to await an incoming connection it is possible for
[all …]
/freebsd/usr.sbin/cxgbetool/
H A Dcxgbetool.8243 incoming packet is an IPv4 datagram.
249 incoming packet is an IPv6 datagram.
255 bitwise and of the source address in an incoming IP datagram with
266 bitwise and of the destination address in an incoming IP datagram with
277 bitwise and of the source port in an incoming TCP or UDP datagram with
286 bitwise and of the destination port in an incoming TCP or UDP datagram with
295 incoming frame is Fibre Channel over Ethernet(1) or not(0).
316 bitwise and of the 16-bit outer VLAN tag of an incoming frame with
325 bitwise and of the 16-bit VLAN tag of an incoming QinQ frame with
329 The inner VLAN tag is used if the incoming frame is QinQ.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_set_incoming_stream_policy.366 SSL_INCOMING_STREAM_POLICY_REJECT \- manage the QUIC incoming stream
82 \&\fBSSL_set_incoming_stream_policy()\fR policy changes the incoming stream policy for a
84 automatically reject incoming streams initiated by the peer. This is intended to
96 This is the default setting. Incoming streams are accepted according to the
102 \&\fBSSL_DEFAULT_STREAM_MODE_AUTO_UNI\fR, the incoming stream is rejected.
105 the application is assumed to be stream aware, and the incoming stream is
112 Always accept incoming streams, allowing them to be dequeued using
116 Always reject incoming streams.
118 Where an incoming stream is rejected, it is rejected immediately and it is not
H A DSSL_accept_stream.365 accept an incoming QUIC stream from a QUIC peer
79 The \fBSSL_accept_stream()\fR function attempts to dequeue an incoming stream from the
83 If the queue of incoming streams is empty, this function returns NULL (in
84 nonblocking mode) or waits for an incoming stream (in blocking mode). This
99 \&\fBSSL_get_accept_stream_queue_len()\fR returns the number of incoming streams
105 necessary to explicitly configure the incoming stream policy before streams can
112 no new incoming streams are available, or if the connection has been terminated,
116 \&\fBSSL_get_accept_stream_queue_len()\fR returns the number of incoming streams
H A DBIO_s_accept.3110 waits for an incoming connection.
120 incoming connection.
156 will be duplicated and prepended to the chain when an incoming
182 and subsequent calls to \fBBIO_do_accept()\fR will await an incoming
187 incoming connection before processing I/O calls. When an accept
194 an initial accept socket will await an incoming connection then
203 incoming connections. This can be done by waiting for a connection and
212 again which can be used to await further incoming connections.
218 however because the accept BIO will still accept additional incoming
223 called to await an incoming connection it is possible for
[all …]
/freebsd/lib/libpmc/pmu-events/arch/x86/alderlake/
H A Duncore-memory.json12 "BriefDescription": "Incoming VC0 read request",
21 "BriefDescription": "Incoming VC0 write request",
30 "BriefDescription": "Incoming VC1 read request",
39 "BriefDescription": "Incoming VC1 write request",
48 "BriefDescription": "Incoming read prefetch request from IA",
75 "BriefDescription": "incoming read request page status is Page Hit",
84 "BriefDescription": "incoming read request page status is Page Empty",
93 "BriefDescription": "incoming read request page status is Page Miss",
102 "BriefDescription": "incoming write request page status is Page Hit",
111 "BriefDescription": "incoming write request page status is Page Empty",
[all …]
/freebsd/crypto/openssl/include/internal/
H A Dquic_port.h32 * incoming connections are received.
35 * of legacy compatibility where a caller can create an incoming (server role)
36 * channel and that channel will be automatically be bound to the next incoming
47 * connection object for the incoming channel
86 * Create an incoming channel using this port.
93 * Pop an incoming channel from the incoming channel queue. Returns NULL if
94 * there are no pending incoming channels.
98 /* Returns 1 if there is at least one connection incoming. */
156 /* Returns the number of queued incoming channels. */
159 /* Sets if incoming connections should currently be allowed. */
/freebsd/share/man/man4/
H A Ddivert.460 Packets are diverted either as they are ``incoming'' or ``outgoing.''
61 Incoming packets are diverted after reception on an IP interface,
73 was incoming) or
85 Packets are distinguished as either incoming or outgoing.
93 incoming and full packet routing is done.
106 Normally, packets read as incoming should be written as incoming;
142 Incoming packet fragments which get diverted are fully reassembled
158 Packets written as incoming and having incorrect checksums will be dropped.
192 It is questionable whether incoming fragments should be reassembled
H A Dsend.466 incoming or outgoing direction from the interface's point of view, and the
97 The input hook is named after the input path of the incoming or outgoing
111 in case of incoming and outgoing packets.
113 is the direction of the incoming packets that are usually protected
120 .Sh INCOMING PACKETS
121 The incoming ND packet from the wire:
186 Shortage of space to receive the incoming (SeND-protected) or outgoing
/freebsd/contrib/llvm-project/lldb/source/Breakpoint/
H A DBreakpointOptions.cpp162 void BreakpointOptions::CopyOverSetOptions(const BreakpointOptions &incoming) in CopyOverSetOptions() argument
164 if (incoming.m_set_flags.Test(eEnabled)) in CopyOverSetOptions()
166 m_enabled = incoming.m_enabled; in CopyOverSetOptions()
169 if (incoming.m_set_flags.Test(eOneShot)) in CopyOverSetOptions()
171 m_one_shot = incoming.m_one_shot; in CopyOverSetOptions()
174 if (incoming.m_set_flags.Test(eCallback)) in CopyOverSetOptions()
176 m_callback = incoming.m_callback; in CopyOverSetOptions()
177 m_callback_baton_sp = incoming.m_callback_baton_sp; in CopyOverSetOptions()
178 m_callback_is_synchronous = incoming.m_callback_is_synchronous; in CopyOverSetOptions()
179 m_baton_is_command_baton = incoming.m_baton_is_command_baton; in CopyOverSetOptions()
[all …]
/freebsd/usr.sbin/ppp/
H A DREADME.nat45 them appear to come from the ppp host machine. Incoming packets
142 Set to "yes" to disable all incoming connections. This just drops
145 all incoming TCP and UDP requests, making the NAT software a
147 all incoming connections to telnetd, ftpd, etc.
204 This command allows incoming traffic to <nat port> on the host
229 The above command would redirect all incoming traffic to
239 then incoming traffic will be directed to the last
255 ICMP error messages are currently handled only in the incoming direction.
267 host address, outgoing NAT and incoming de-NATing).
296 PPP host accepts incoming connections for ports 0 to 1023.
[all …]
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/
H A DBreakpointName.h78 // Merge the permissions from incoming into this set of permissions. Only
80 void MergeInto(const Permissions &incoming) in MergeInto() argument
82 MergePermission(incoming, listPerm); in MergeInto()
83 MergePermission(incoming, disablePerm); in MergeInto()
84 MergePermission(incoming, deletePerm); in MergeInto()
128 void MergePermission(const Permissions &incoming, in MergePermission() argument
131 if (incoming.IsSet(permission)) in MergePermission()
134 incoming.m_permissions[permission])); in MergePermission()
/freebsd/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c212 * @message: Pointer to incoming dbus message
328 * @message: Pointer to incoming dbus message
348 * @message: Pointer to incoming dbus message
370 * @iter: Pointer to incoming dbus message iter
406 * @iter: Pointer to incoming dbus message iter
428 * @iter: Pointer to incoming dbus message iter
463 * @iter: Pointer to incoming dbus message iter
483 * @iter: Pointer to incoming dbus message iter
519 * @iter: Pointer to incoming dbus message iter
539 * @iter: Pointer to incoming dbus message iter
[all …]
H A Ddbus_new_handlers.c48 * @message: Pointer to incoming dbus message this error refers to
64 * @message: Pointer to incoming dbus message this error refers to
79 * @message: Pointer to incoming dbus message this error refers to
94 * @message: Pointer to incoming dbus message this error refers to
117 * @message: Pointer to incoming dbus message this error refers to
547 * @message: Pointer to incoming dbus message
581 * @iter: Pointer to incoming dbus message iterator
674 * @iter: Pointer to incoming dbus message iterator
756 * @message: Pointer to incoming dbus message
927 * @message: Pointer to incoming dbus message
[all …]
/freebsd/crypto/openssl/ssl/quic/
H A Dquic_port_local.h63 /* RX demuxer. We register incoming DCIDs with this. */
70 * Queue of unaccepted incoming channels. Each such channel is also on
78 /* LCIDM used for incoming packet routing by DCID. */
81 /* SRTM used for incoming packet routing by SRT. */
87 /* DCID length used for incoming short header packets. */
104 /* Does this port allow incoming connections? */
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/SelectionDAG/
H A DStatepointLowering.cpp195 // All incoming values should have same known stack slot, otherwise result in findPreviousSpillSlot()
248 static bool willLowerDirectly(SDValue Incoming) { in willLowerDirectly() argument
251 if (isa<FrameIndexSDNode>(Incoming)) in willLowerDirectly()
258 if (Incoming.getValueType().getSizeInBits() > 64) in willLowerDirectly()
261 return isIntOrFPConstant(Incoming) || Incoming.isUndef(); in willLowerDirectly()
264 /// Try to find existing copies of the incoming values in stack slots used for
265 /// statepoint spilling. If we can find a spill slot for the incoming value,
271 SDValue Incoming = Builder.getValue(IncomingValue); in reservePreviousStackSlotForValue() local
275 if (willLowerDirectly(Incoming)) in reservePreviousStackSlotForValue()
278 SDValue OldLocation = Builder.StatepointLowering.getLocation(Incoming); in reservePreviousStackSlotForValue()
[all …]
/freebsd/sbin/natd/
H A Dnatd.887 Do not pass incoming packets that have no
95 Log denied incoming packets via
160 Redirect incoming connections arriving to given port(s) to another host
208 means that incoming TCP packets destined for port 6666 on this machine
213 will redirect incoming connections on ports 3300-3399 to host
219 Redirect incoming IP packets of protocol
248 The above command would redirect all incoming traffic
259 the incoming traffic will be directed to the last
298 means that incoming HTTP requests for host www will be transparently
320 .Dq incoming .
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/
H A DLoopDeletion.cpp76 Value *incoming = P.getIncomingValueForBlock(ExitingBlocks[0]); in isLoopDead() local
78 // Make sure all exiting blocks produce the same incoming value for the in isLoopDead()
79 // block. If there are different incoming values for different exiting in isLoopDead()
84 return incoming == P.getIncomingValueForBlock(BB); in isLoopDead()
90 if (Instruction *I = dyn_cast<Instruction>(incoming)) { in isLoopDead()
275 Value *Incoming = PN.getIncomingValueForBlock(Pred); in canProveExitOnFirstIteration() local
278 if (isa<PoisonValue>(Incoming)) in canProveExitOnFirstIteration()
281 if (OnlyInput && OnlyInput != Incoming) in canProveExitOnFirstIteration()
283 OnlyInput = Incoming; in canProveExitOnFirstIteration()
287 // If all incoming live value were poison, return poison. in canProveExitOnFirstIteration()
[all …]
/freebsd/contrib/bearssl/tools/
H A Derrors.c52 "Incoming protocol or record version is unsupported."
56 "Incoming record version does not match the expected version."
60 "Incoming record length is invalid."
64 "Incoming record is too large to be processed, or buffer"
79 "Incoming record type is unknown."
83 "Incoming record or message has wrong type with regards to"
97 "Incoming handshake message decoding failed."

12345678910>>...57