/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/ |
H A D | SILowerI1Copies.cpp | 74 SmallVectorImpl<Incoming> &Incomings) const override; 81 void constrainAsLaneMask(Incoming &In) override; 105 /// Helper class that determines the relationship between incoming values of a 106 /// phi in the control flow graph to determine where an incoming value can 111 /// - Determine all basic blocks which, starting from the incoming blocks, 114 /// - If an incoming block has no predecessors in this set, we can take the 115 /// incoming value as a scalar lane mask as-is. 117 /// - Otherwise, the incoming value needs to be merged with a previously 120 /// through an incoming block where we can take the scalar lane mask as-is, 150 void analyze(MachineBasicBlock &DefBlock, ArrayRef<Incoming> Incomings) { in analyze() [all …]
|
H A D | AMDGPURewriteUndefForPHI.cpp | 8 // This file implements the idea to rewrite undef incoming operand for certain 15 // it has one unique uniform value plus additional undefined/poisoned incoming 21 // Pattern A: Block with undefined incoming value dominates defined predecessor 28 // Pattern B: Block with defined incoming value dominates undefined predecessor 110 // The unique incoming value except undef/poison for the PHI node. in INITIALIZE_PASS_DEPENDENCY() 112 // The divergent block with defined incoming value that dominates all in INITIALIZE_PASS_DEPENDENCY() 113 // other block with the same incoming value. in INITIALIZE_PASS_DEPENDENCY() 115 // Predecessors with undefined incoming value (excluding loop backedge). in INITIALIZE_PASS_DEPENDENCY() 119 Value *Incoming = PHI.getIncomingValue(i); in INITIALIZE_PASS_DEPENDENCY() 122 if (Incoming in INITIALIZE_PASS_DEPENDENCY() 120 Value *Incoming = PHI.getIncomingValue(i); INITIALIZE_PASS_DEPENDENCY() local [all...] |
H A D | SILowerI1Copies.h | 22 /// Incoming for lane maks phi as machine instruction, incoming register \p Reg 23 /// and incoming block \p Block are taken from machine instruction. 25 struct Incoming { struct 30 Incoming(Register Reg, MachineBasicBlock *Block, Register UpdatedReg) in Incoming() argument 88 SmallVectorImpl<Incoming> &Incomings) const = 0; 95 virtual void constrainAsLaneMask(Incoming &In) = 0;
|
H A D | AMDGPUGlobalISelDivergenceLowering.cpp | 14 /// currently depends on LCSSA to insert phis with one incoming. 73 SmallVectorImpl<Incoming> &Incomings) const override; 80 void constrainAsLaneMask(Incoming &In) override; 116 const MachineInstr *MI, SmallVectorImpl<Incoming> &Incomings) const { in collectIncomingValuesFromPhi() 180 // GlobalISel has to constrain S1 incoming taken as-is with lane mask register 181 // class. Insert a copy of Incoming.Reg to new lane mask inside Incoming.Block, 182 // Incoming.Reg becomes that new lane mask. 183 void DivergenceLoweringHelper::constrainAsLaneMask(Incoming &In) { in constrainAsLaneMask()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_set_incoming_stream_policy.pod | 7 SSL_INCOMING_STREAM_POLICY_REJECT - manage the QUIC incoming stream 23 SSL_set_incoming_stream_policy() policy changes the incoming stream policy for a 25 automatically reject incoming streams initiated by the peer. This is intended to 40 This is the default setting. Incoming streams are accepted according to the 49 B<SSL_DEFAULT_STREAM_MODE_AUTO_UNI>, the incoming stream is rejected. 54 the application is assumed to be stream aware, and the incoming stream is 61 Always accept incoming streams, allowing them to be dequeued using 66 Always reject incoming streams. 70 Where an incoming stream is rejected, it is rejected immediately and it is not
|
H A D | SSL_accept_stream.pod | 6 accept an incoming QUIC stream from a QUIC peer 20 The SSL_accept_stream() function attempts to dequeue an incoming stream from the 24 If the queue of incoming streams is empty, this function returns NULL (in 25 nonblocking mode) or waits for an incoming stream (in blocking mode). This 40 SSL_get_accept_stream_queue_len() returns the number of incoming streams 46 necessary to explicitly configure the incoming stream policy before streams can 54 no new incoming streams are available, or if the connection has been terminated, 58 SSL_get_accept_stream_queue_len() returns the number of incoming streams
|
H A D | BIO_s_accept.pod | 51 waits for an incoming connection. 61 incoming connection. 97 will be duplicated and prepended to the chain when an incoming 123 and subsequent calls to BIO_do_accept() will await an incoming 129 incoming connection before processing I/O calls. When an accept 136 an initial accept socket will await an incoming connection then 145 incoming connections. This can be done by waiting for a connection and 152 again which can be used to await further incoming connections. 158 however because the accept BIO will still accept additional incoming 163 called to await an incoming connection it is possible for [all …]
|
/freebsd/usr.sbin/cxgbetool/ |
H A D | cxgbetool.8 | 243 incoming packet is an IPv4 datagram. 249 incoming packet is an IPv6 datagram. 255 bitwise and of the source address in an incoming IP datagram with 266 bitwise and of the destination address in an incoming IP datagram with 277 bitwise and of the source port in an incoming TCP or UDP datagram with 286 bitwise and of the destination port in an incoming TCP or UDP datagram with 295 incoming frame is Fibre Channel over Ethernet(1) or not(0). 316 bitwise and of the 16-bit outer VLAN tag of an incoming frame with 325 bitwise and of the 16-bit VLAN tag of an incoming QinQ frame with 329 The inner VLAN tag is used if the incoming frame is QinQ. [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_set_incoming_stream_policy.3 | 66 SSL_INCOMING_STREAM_POLICY_REJECT \- manage the QUIC incoming stream 82 \&\fBSSL_set_incoming_stream_policy()\fR policy changes the incoming stream policy for a 84 automatically reject incoming streams initiated by the peer. This is intended to 96 This is the default setting. Incoming streams are accepted according to the 102 \&\fBSSL_DEFAULT_STREAM_MODE_AUTO_UNI\fR, the incoming stream is rejected. 105 the application is assumed to be stream aware, and the incoming stream is 112 Always accept incoming streams, allowing them to be dequeued using 116 Always reject incoming streams. 118 Where an incoming stream is rejected, it is rejected immediately and it is not
|
H A D | SSL_accept_stream.3 | 65 accept an incoming QUIC stream from a QUIC peer 79 The \fBSSL_accept_stream()\fR function attempts to dequeue an incoming stream from the 83 If the queue of incoming streams is empty, this function returns NULL (in 84 nonblocking mode) or waits for an incoming stream (in blocking mode). This 99 \&\fBSSL_get_accept_stream_queue_len()\fR returns the number of incoming streams 105 necessary to explicitly configure the incoming stream policy before streams can 112 no new incoming streams are available, or if the connection has been terminated, 116 \&\fBSSL_get_accept_stream_queue_len()\fR returns the number of incoming streams
|
H A D | BIO_s_accept.3 | 110 waits for an incoming connection. 120 incoming connection. 156 will be duplicated and prepended to the chain when an incoming 182 and subsequent calls to \fBBIO_do_accept()\fR will await an incoming 187 incoming connection before processing I/O calls. When an accept 194 an initial accept socket will await an incoming connection then 203 incoming connections. This can be done by waiting for a connection and 212 again which can be used to await further incoming connections. 218 however because the accept BIO will still accept additional incoming 223 called to await an incoming connection it is possible for [all …]
|
/freebsd/lib/libpmc/pmu-events/arch/x86/alderlake/ |
H A D | uncore-memory.json | 12 "BriefDescription": "Incoming VC0 read request", 21 "BriefDescription": "Incoming VC0 write request", 30 "BriefDescription": "Incoming VC1 read request", 39 "BriefDescription": "Incoming VC1 write request", 48 "BriefDescription": "Incoming read prefetch request from IA", 75 "BriefDescription": "incoming read request page status is Page Hit", 84 "BriefDescription": "incoming read request page status is Page Empty", 93 "BriefDescription": "incoming read request page status is Page Miss", 102 "BriefDescription": "incoming write request page status is Page Hit", 111 "BriefDescription": "incoming write request page status is Page Empty", [all …]
|
/freebsd/crypto/openssl/include/internal/ |
H A D | quic_port.h | 32 * incoming connections are received. 35 * of legacy compatibility where a caller can create an incoming (server role) 36 * channel and that channel will be automatically be bound to the next incoming 47 * connection object for the incoming channel 86 * Create an incoming channel using this port. 93 * Pop an incoming channel from the incoming channel queue. Returns NULL if 94 * there are no pending incoming channels. 98 /* Returns 1 if there is at least one connection incoming. */ 156 /* Returns the number of queued incoming channels. */ 159 /* Sets if incoming connections should currently be allowed. */
|
/freebsd/share/man/man4/ |
H A D | divert.4 | 60 Packets are diverted either as they are ``incoming'' or ``outgoing.'' 61 Incoming packets are diverted after reception on an IP interface, 73 was incoming) or 85 Packets are distinguished as either incoming or outgoing. 93 incoming and full packet routing is done. 106 Normally, packets read as incoming should be written as incoming; 142 Incoming packet fragments which get diverted are fully reassembled 158 Packets written as incoming and having incorrect checksums will be dropped. 192 It is questionable whether incoming fragments should be reassembled
|
H A D | send.4 | 66 incoming or outgoing direction from the interface's point of view, and the 97 The input hook is named after the input path of the incoming or outgoing 111 in case of incoming and outgoing packets. 113 is the direction of the incoming packets that are usually protected 120 .Sh INCOMING PACKETS 121 The incoming ND packet from the wire: 186 Shortage of space to receive the incoming (SeND-protected) or outgoing
|
/freebsd/contrib/llvm-project/lldb/source/Breakpoint/ |
H A D | BreakpointOptions.cpp | 162 void BreakpointOptions::CopyOverSetOptions(const BreakpointOptions &incoming) in CopyOverSetOptions() argument 164 if (incoming.m_set_flags.Test(eEnabled)) in CopyOverSetOptions() 166 m_enabled = incoming.m_enabled; in CopyOverSetOptions() 169 if (incoming.m_set_flags.Test(eOneShot)) in CopyOverSetOptions() 171 m_one_shot = incoming.m_one_shot; in CopyOverSetOptions() 174 if (incoming.m_set_flags.Test(eCallback)) in CopyOverSetOptions() 176 m_callback = incoming.m_callback; in CopyOverSetOptions() 177 m_callback_baton_sp = incoming.m_callback_baton_sp; in CopyOverSetOptions() 178 m_callback_is_synchronous = incoming.m_callback_is_synchronous; in CopyOverSetOptions() 179 m_baton_is_command_baton = incoming.m_baton_is_command_baton; in CopyOverSetOptions() [all …]
|
/freebsd/usr.sbin/ppp/ |
H A D | README.nat | 45 them appear to come from the ppp host machine. Incoming packets 142 Set to "yes" to disable all incoming connections. This just drops 145 all incoming TCP and UDP requests, making the NAT software a 147 all incoming connections to telnetd, ftpd, etc. 204 This command allows incoming traffic to <nat port> on the host 229 The above command would redirect all incoming traffic to 239 then incoming traffic will be directed to the last 255 ICMP error messages are currently handled only in the incoming direction. 267 host address, outgoing NAT and incoming de-NATing). 296 PPP host accepts incoming connections for ports 0 to 1023. [all …]
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Breakpoint/ |
H A D | BreakpointName.h | 78 // Merge the permissions from incoming into this set of permissions. Only 80 void MergeInto(const Permissions &incoming) in MergeInto() argument 82 MergePermission(incoming, listPerm); in MergeInto() 83 MergePermission(incoming, disablePerm); in MergeInto() 84 MergePermission(incoming, deletePerm); in MergeInto() 128 void MergePermission(const Permissions &incoming, in MergePermission() argument 131 if (incoming.IsSet(permission)) in MergePermission() 134 incoming.m_permissions[permission])); in MergePermission()
|
/freebsd/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_wps.c | 212 * @message: Pointer to incoming dbus message 328 * @message: Pointer to incoming dbus message 348 * @message: Pointer to incoming dbus message 370 * @iter: Pointer to incoming dbus message iter 406 * @iter: Pointer to incoming dbus message iter 428 * @iter: Pointer to incoming dbus message iter 463 * @iter: Pointer to incoming dbus message iter 483 * @iter: Pointer to incoming dbus message iter 519 * @iter: Pointer to incoming dbus message iter 539 * @iter: Pointer to incoming dbus message iter [all …]
|
H A D | dbus_new_handlers.c | 48 * @message: Pointer to incoming dbus message this error refers to 64 * @message: Pointer to incoming dbus message this error refers to 79 * @message: Pointer to incoming dbus message this error refers to 94 * @message: Pointer to incoming dbus message this error refers to 117 * @message: Pointer to incoming dbus message this error refers to 547 * @message: Pointer to incoming dbus message 581 * @iter: Pointer to incoming dbus message iterator 674 * @iter: Pointer to incoming dbus message iterator 756 * @message: Pointer to incoming dbus message 927 * @message: Pointer to incoming dbus message [all …]
|
/freebsd/crypto/openssl/ssl/quic/ |
H A D | quic_port_local.h | 63 /* RX demuxer. We register incoming DCIDs with this. */ 70 * Queue of unaccepted incoming channels. Each such channel is also on 78 /* LCIDM used for incoming packet routing by DCID. */ 81 /* SRTM used for incoming packet routing by SRT. */ 87 /* DCID length used for incoming short header packets. */ 104 /* Does this port allow incoming connections? */
|
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/SelectionDAG/ |
H A D | StatepointLowering.cpp | 195 // All incoming values should have same known stack slot, otherwise result in findPreviousSpillSlot() 248 static bool willLowerDirectly(SDValue Incoming) { in willLowerDirectly() argument 251 if (isa<FrameIndexSDNode>(Incoming)) in willLowerDirectly() 258 if (Incoming.getValueType().getSizeInBits() > 64) in willLowerDirectly() 261 return isIntOrFPConstant(Incoming) || Incoming.isUndef(); in willLowerDirectly() 264 /// Try to find existing copies of the incoming values in stack slots used for 265 /// statepoint spilling. If we can find a spill slot for the incoming value, 271 SDValue Incoming = Builder.getValue(IncomingValue); in reservePreviousStackSlotForValue() local 275 if (willLowerDirectly(Incoming)) in reservePreviousStackSlotForValue() 278 SDValue OldLocation = Builder.StatepointLowering.getLocation(Incoming); in reservePreviousStackSlotForValue() [all …]
|
/freebsd/sbin/natd/ |
H A D | natd.8 | 87 Do not pass incoming packets that have no 95 Log denied incoming packets via 160 Redirect incoming connections arriving to given port(s) to another host 208 means that incoming TCP packets destined for port 6666 on this machine 213 will redirect incoming connections on ports 3300-3399 to host 219 Redirect incoming IP packets of protocol 248 The above command would redirect all incoming traffic 259 the incoming traffic will be directed to the last 298 means that incoming HTTP requests for host www will be transparently 320 .Dq incoming . [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Scalar/ |
H A D | LoopDeletion.cpp | 76 Value *incoming = P.getIncomingValueForBlock(ExitingBlocks[0]); in isLoopDead() local 78 // Make sure all exiting blocks produce the same incoming value for the in isLoopDead() 79 // block. If there are different incoming values for different exiting in isLoopDead() 84 return incoming == P.getIncomingValueForBlock(BB); in isLoopDead() 90 if (Instruction *I = dyn_cast<Instruction>(incoming)) { in isLoopDead() 275 Value *Incoming = PN.getIncomingValueForBlock(Pred); in canProveExitOnFirstIteration() local 278 if (isa<PoisonValue>(Incoming)) in canProveExitOnFirstIteration() 281 if (OnlyInput && OnlyInput != Incoming) in canProveExitOnFirstIteration() 283 OnlyInput = Incoming; in canProveExitOnFirstIteration() 287 // If all incoming live value were poison, return poison. in canProveExitOnFirstIteration() [all …]
|
/freebsd/contrib/bearssl/tools/ |
H A D | errors.c | 52 "Incoming protocol or record version is unsupported." 56 "Incoming record version does not match the expected version." 60 "Incoming record length is invalid." 64 "Incoming record is too large to be processed, or buffer" 79 "Incoming record type is unknown." 83 "Incoming record or message has wrong type with regards to" 97 "Incoming handshake message decoding failed."
|