Home
last modified time | relevance | path

Searched refs:it (Results 1 – 25 of 550) sorted by relevance

12345678910>>...22

/glibc-2.36/rt/
Dtst-timer4.c49 struct itimerspec it = { }; in thr1() local
50 thr1_err |= timer_settime (timer_thr1, 0, &it, NULL); in thr1()
95 struct itimerspec it = { }; in thr2() local
96 thr2_err |= timer_settime (timer_thr2, 0, &it, NULL); in thr2()
120 struct itimerspec it = { }; in sig1_handler() local
121 if (timer_settime (timer_sig1, 0, &it, NULL)) in sig1_handler()
144 struct itimerspec it = { }; in sig2_handler() local
145 if (timer_settime (timer_sig2, 0, &it, NULL)) in sig2_handler()
290 struct itimerspec it; in do_test() local
291 it.it_value.tv_sec = 0; in do_test()
[all …]
/glibc-2.36/time/
Dtst-itimer.c49 struct itimerval it, it_old; in do_test() local
53 TEST_COMPARE (getitimer (timers[i], &it), 0); in do_test()
56 TEST_COMPARE (it.it_interval.tv_sec, 0); in do_test()
57 TEST_COMPARE (it.it_interval.tv_usec, 0); in do_test()
58 TEST_COMPARE (it.it_value.tv_sec, 0); in do_test()
59 TEST_COMPARE (it.it_value.tv_usec, 0); in do_test()
61 it.it_interval.tv_sec = 10; in do_test()
62 it.it_interval.tv_usec = 20; in do_test()
63 TEST_COMPARE (setitimer (timers[i], &it, NULL), 0); in do_test()
84 it.it_interval.tv_sec = 10; in do_test()
[all …]
/glibc-2.36/sysdeps/pthread/
Dtst-cancel19.c121 struct itimerval it; in do_test() local
122 it.it_value.tv_sec = 1; in do_test()
123 it.it_value.tv_usec = 0; in do_test()
124 it.it_interval = it.it_value; in do_test()
125 setitimer (ITIMER_REAL, &it, NULL); in do_test()
130 memset (&it, 0, sizeof (it)); in do_test()
131 setitimer (ITIMER_REAL, &it, NULL); in do_test()
146 it.it_value.tv_sec = 1; in do_test()
147 it.it_value.tv_usec = 0; in do_test()
148 it.it_interval = it.it_value; in do_test()
[all …]
/glibc-2.36/posix/
Dtst-vfork2.c65 struct itimerval it; in do_test() local
66 it.it_value.tv_sec = 0; in do_test()
67 it.it_value.tv_usec = 200 * 1000; in do_test()
68 it.it_interval = it.it_value; in do_test()
69 if (setitimer (ITIMER_REAL, &it, NULL) < 0) in do_test()
93 memset (&it, 0, sizeof (it)); in do_test()
94 setitimer (ITIMER_REAL, &it, NULL); in do_test()
/glibc-2.36/string/
Dtester.c57 const char *it = "<UNSET>"; /* Routine name for message routines. */ variable
66 printf ("%s flunked test %d\n", it, number); in check()
85 it = "strcmp"; in test_strcmp()
148 it = "strcpy"; in test_strcpy()
200 it = "stpcpy"; in test_stpcpy()
282 it = "stpncpy"; in test_stpncpy()
297 it = "strcat"; in test_strcat()
371 it = "strncat"; in test_strncat()
459 it = "strncmp"; in test_strncmp()
481 it = "strncpy"; in test_strncpy()
[all …]
/glibc-2.36/manual/examples/
Dswapcontext.c76 struct itimerval it; in main() local
84 it.it_interval.tv_sec = 0; in main()
85 it.it_interval.tv_usec = 1; in main()
86 it.it_value = it.it_interval; in main()
90 || setitimer (ITIMER_PROF, &it, NULL) < 0 in main()
/glibc-2.36/manual/
Dcrypt.texi30 Sometimes it is necessary to be sure that a user is authorized
52 only discover the passphrase it corresponds to by guessing and
62 especially weak, because it ignores all but the first eight characters
78 string that it returns will consist entirely of printable ASCII
83 it also ensures that the output of the one-way function is different
84 for every user, even if they have the same passphrase. This makes it
86 the attacker could make a guess, run @code{crypt} on it once, and
146 string it returns. It is not safe to call @code{crypt} from multiple
147 threads simultaneously, and the string it returns will be overwritten
166 Instead of static storage, it uses the memory pointed to by its
[all …]
Dresource.texi28 @c On HURD, this calls task_info 3 times. On UNIX, it's a syscall.
54 the function @code{wait4}, which returns totals for a child when it
131 process tries to exceed a limit, it may get a signal, or the system call
132 by which it tried to do so may fail, depending on the resource. Each
133 process initially inherits its limit values from its parent, but it can
150 there is no way for a process to get around it. A process may lower
182 a pointer to a variable of type @code{struct rlimit64}, which allows it
222 a pointer to a variable of type @code{struct rlimit64} which allows it
245 For @code{getrlimit}, the structure is an output; it receives the current
246 values. For @code{setrlimit}, it specifies the new values.
[all …]
Dsysinfo.texi2 @c %MENU% Controlling the system and getting information about it
7 for getting information about it. Anyone can generally use the
31 Every Unix system (also known as a host) has a host name, whether it's
33 computer networks were an issue, it's just a word like @samp{chicken}.
36 But any system attached to the Internet or any network like it conforms
73 Confusing things even more is the fact that in the DNS, it is possible for
75 exactly one of them that is the true host name, and it is called the
95 This function returns the host name of the system on which it is called,
113 But you can't count on this to exist, so it is cleaner to handle
118 truncated host name is good enough. If it is, you can ignore the
[all …]
Dgetopt.texi26 error message to the standard error stream if it encounters an unknown
29 does not print any messages, but it still returns the character @code{?}
36 with a missing required argument, it stores that option character in
63 @c issue. Given print_errors, it may output errors to stderr, which may
84 string can be followed by a colon (@samp{:}) to indicate that it takes a
94 The default is to permute the contents of @var{argv} while scanning it
112 command line option. When no more option arguments are available, it
118 storing it in the variable @var{optarg}. You don't ordinarily need to
119 copy the @code{optarg} string, since it is a pointer into the original
123 included in @var{options}, or a missing option argument, it returns
[all …]
Dlgpl-2.1.texi12 of this license document, but changing it is not allowed.
22 freedom to share and change it. By contrast, the GNU General Public
28 Software Foundation and other authors who decide to use it. You can use
29 it too, but we suggest you first think carefully about whether this
37 it if you want it; that you can change the software and use pieces of it
44 you if you distribute copies of the library or if you modify it.
52 it. And you must show them these terms so they know their rights.
58 To protect each distributor, we want to make it very clear that
87 We call this license the @dfn{Lesser} General Public License because it
96 encourage the widest possible use of a certain library, so that it becomes
[all …]
Dfreemanuals.texi8 the software---it is the lack of good free documentation that we can
22 That wasn't the first time this sort of thing happened, and it was far
26 contract to make it non-free.
59 However, it must be possible to modify all the @emph{technical}
62 obstruct the use of the manual, it is not free, and we need another
63 manual to replace it.
69 realize, before it is too late, that only free manuals contribute to
72 If you are writing documentation, please insist on publishing it under
77 option; it is up to you to raise the issue and say firmly that this is
86 at all. Check the distribution terms of a manual before you buy it,
[all …]
Dsyslog.texi31 connection it gets. The kernel might report hardware failures on a disk
35 attention immediately. And it may not be just any system administrator
68 Syslog as any other process would (and it properly identifies them as
75 Klogd then passes everything in the message ring to it.
78 that submits a message to it to provide two pieces of classification
79 information with it:
88 more meaning than the system administrator gives to it.
111 do it by writing to the @file{/dev/log} socket. @xref{Submitting Syslog
166 to identify the source of the message, and people conventionally set it
210 on @var{option}. If it does, it tries to open it and connect it as a
[all …]
Dsignal.texi13 particular kind of event. Some kinds of events make it inadvisable or
19 function and tell the operating system to run it when that particular
73 terminate it with @kbd{C-c}. Whatever key sequence is used, the
111 but it does not raise a signal; instead, @code{open} returns @code{-1}.
151 When a signal is generated, it becomes @dfn{pending}. Normally it
154 of signal is currently @dfn{blocked}, it may remain pending
156 unblocked, it will be delivered immediately. @xref{Blocking Signals}.
172 If the specified action for a kind of signal is to ignore it, then any
177 it.
189 more detail in @ref{Process Completion}.) The information it can get
[all …]
Djob.texi24 have, and it is a required feature in the 2001 revision of POSIX.1
51 even if you run just one program, it can use multiple processes
66 Every process belongs to a process group. When a process is created, it
68 process. You can put it in another process group using the
73 The only way to put a process in a different session is to make it the
76 process group, and you can't move it out of that process group again.
99 terminal, it is @dfn{stopped} by the terminal driver; if the
102 Characters}) and a program can stop any job by sending it a
123 allocate a controlling terminal to a session, since it is done for you
127 An individual process disconnects from its controlling terminal when it
[all …]
Dmemory.texi31 One of the most basic resources a process has available to it is memory.
42 page of all zeroes sometimes has nothing at all backing it -- there's
43 just a flag saying it is all zeroes.
74 described in @ref{Locking Pages} can control it.
82 generally much more of it than anyone needs. Memory allocation within a
87 programmatically. Actually, forking is a third way, but it's not very
91 loading its basic program into it, and executing the program. It is
93 operation takes a program file (an executable), it allocates space to
94 load all the data in the executable, loads it, and transfers control to
95 it. That data is most notably the instructions of the program (the
[all …]
Dpipe.texi8 handled in a first-in, first-out (FIFO) order. The pipe has no name; it
16 through it.
19 from a pipe or FIFO file that doesn't have any processes writing to it
22 reading process is treated as an error condition; it generates a
47 use, a process creates a pipe just before it forks one or more child
106 interface is much simpler and easier to use. But it doesn't offer as
123 @c it may get corrupted with async signals and cancellation
130 @c it may get corrupted with async signals and cancellation
142 @c it may get corrupted with async signals and cancellation
151 command to complete, it creates a pipe to the subprocess and returns a
[all …]
/glibc-2.36/sysdeps/mach/hurd/
Dsetitimer.c143 struct itimerval it; in restart_itimer() local
147 it.it_value = it.it_interval = _hurd_itimerval.it_interval; in restart_itimer()
148 setitimer_locked (&it, NULL, NULL, 1); in restart_itimer()
373 struct itimerval it; in fork_itimer() local
377 it = _hurd_itimerval; in fork_itimer()
378 it.it_value = it.it_interval; in fork_itimer()
380 setitimer_locked (&it, NULL, NULL, 0); in fork_itimer()
/glibc-2.36/
DCOPYING7 of this license document, but changing it is not allowed.
12 freedom to share and change it. By contrast, the GNU General Public
17 using it. (Some other Free Software Foundation software is covered by
18 the GNU Lesser General Public License instead.) You can apply it to
24 this service if you wish), that you receive source code or can get it
25 if you want it, that you can change the software or use pieces of it
31 distribute copies of the software, or if you modify it.
53 program proprietary. To prevent this, we have made it clear that any
63 a notice placed by the copyright holder saying it may be distributed
67 that is to say, a work containing the Program or a portion of it,
[all …]
/glibc-2.36/math/
Dgen-auto-libm-tests.c1145 handle_input_arg (const char *arg, input_test *it, size_t num_prev_args, in handle_input_arg() argument
1254 if (it->num_input_cases >= SIZE_MAX / num_values) in handle_input_arg()
1256 generic_value **old_inputs = it->inputs; in handle_input_arg()
1257 size_t new_num_input_cases = it->num_input_cases * num_values; in handle_input_arg()
1260 for (size_t i = 0; i < it->num_input_cases; i++) in handle_input_arg()
1278 it->inputs = new_inputs; in handle_input_arg()
1279 it->num_input_cases = new_num_input_cases; in handle_input_arg()
1351 input_test *it = &tf->tests[tf->num_tests]; in add_test() local
1352 it->line = line; in add_test()
1353 it->num_input_cases = 1; in add_test()
[all …]
/glibc-2.36/misc/bits/
Dstab.def5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
10 The GNU C Library is distributed in the hope that it will be useful,
30 Desc is supposedly starting line number, but GCC doesn't set it
31 and DBX seems not to miss it. */
55 /* New stab from Solaris. I don't know what it means, but it
59 /* New stab from Solaris. I don't know what it means, but it
67 /* Modula-2 compilation unit. Can someone say what info it contains? */
86 of the definition file. Other is non-zero if it is imported with the
101 can be caught here. If Desc is 0, it means all exceptions are caught
[all …]
/glibc-2.36/iconvdata/testdata/
Dsuntzus16 within it, has been released as suntzu10.txt (or suntzu10.zip).
30 to safety or to ruin. Hence it is a subject of inquiry
83 upon it, will conquer: let such a one be retained in command!
84 The general that hearkens not to my counsel nor acts upon it,
162 the profitable way of carrying it on.
213 20. Thus it may be known that the leader of armies
214 is the arbiter of the people's fate, the man on whom it
223 to shatter and destroy it is not so good. So, too, it is
224 better to recapture an army entire than to destroy it,
238 4. The rule is, not to besiege walled cities if it
[all …]
/glibc-2.36/sysdeps/arm/
Dstrlen.S50 Laligned: @ here, we have a word in r2. Does it
60 tst r2, $0xff000000 @ word that has a zero byte in it
62 tstne r2, $0x00ff0000 @ and add up to 3 bytes on to it
67 tst r2, $0x000000ff @ word that has a zero byte in it
69 tstne r2, $0x0000ff00 @ and add up to 3 bytes on to it
/glibc-2.36/sysdeps/hppa/hppa1.1/
Dmul_1.S8 ;! The GNU MP Library is free software; you can redistribute it and/or modify
9 ;! it under the terms of the GNU Lesser General Public License as published by
13 ;! The GNU MP Library is distributed in the hope that it will be useful, but
29 ;! This runs at 9 cycles/limb on a PA7000. With the used instructions, it can
31 ;! PA7100 it runs at 7 cycles/limb, and that can not be improved either, since
/glibc-2.36/sysdeps/alpha/
Drshift.S7 # The GNU MP Library is free software; you can redistribute it and/or modify
8 # it under the terms of the GNU Lesser General Public License as published by
12 # The GNU MP Library is distributed in the hope that it will be useful, but
28 # it would take 4 cycles/limb. It should be possible to get down to 3
31 # makes it hard, if not impossible, to get down to 3 cycles/limb:

12345678910>>...22