/src/sys/arch/evbppc/mpc85xx/ |
machdep.c | 819 struct pglist splist; local in function:e500_cpu_spinup 833 64*1024*1024, PAGE_SIZE, 0, &splist, 1, 1); 839 h->hatch_sp = VM_PAGE_TO_PHYS(TAILQ_FIRST(&splist)) 990 uvm_pglistfree(&splist);
|
machdep.c | 819 struct pglist splist; local in function:e500_cpu_spinup 833 64*1024*1024, PAGE_SIZE, 0, &splist, 1, 1); 839 h->hatch_sp = VM_PAGE_TO_PHYS(TAILQ_FIRST(&splist)) 990 uvm_pglistfree(&splist);
|
/src/sys/netipsec/ |
key.c | 164 * - Modifications to the key_spd.splist must be done with holding key_spd.lock 166 * - Read accesses to the key_spd.splist must be in pserialize(9) read sections 168 * - An SP that has been inserted to the key_spd.splist is initially referenced 169 * by none, i.e., a reference from the key_spd.splist isn't counted 174 * - Normally we get an SP from the key_spd.splist (see key_lookup_sp_byspidx) 201 * the key_spd.socksplist list (not the key_spd.splist) 258 struct pslist_head splist[IPSEC_DIR_MAX]; member in struct:__anon0681207f0108 299 /* Macros for key_spd.splist */ 307 (PSLIST_READER_FIRST(&key_spd.splist[(dir)], struct secpolicy, \ 310 PSLIST_READER_FOREACH((sp), &key_spd.splist[(dir)], [all...] |
key.c | 164 * - Modifications to the key_spd.splist must be done with holding key_spd.lock 166 * - Read accesses to the key_spd.splist must be in pserialize(9) read sections 168 * - An SP that has been inserted to the key_spd.splist is initially referenced 169 * by none, i.e., a reference from the key_spd.splist isn't counted 174 * - Normally we get an SP from the key_spd.splist (see key_lookup_sp_byspidx) 201 * the key_spd.socksplist list (not the key_spd.splist) 258 struct pslist_head splist[IPSEC_DIR_MAX]; member in struct:__anon0681207f0108 299 /* Macros for key_spd.splist */ 307 (PSLIST_READER_FIRST(&key_spd.splist[(dir)], struct secpolicy, \ 310 PSLIST_READER_FOREACH((sp), &key_spd.splist[(dir)], [all...] |