Home
last modified time | relevance | path

Searched refs:we (Results 1 – 25 of 241) sorted by relevance

12345678910

/glibc-2.36/posix/
Dwordexp-test.c225 wordexp_t we; in command_line_test() local
227 int retval = wordexp (words, &we, 0); in command_line_test()
229 for (i = 0; i < we.we_wordc; i++) in command_line_test()
230 printf ("info: we_wordv[%d] = \"%s\"\n", i, we.we_wordv[i]); in command_line_test()
354 wordexp_t we, sav_we; in testit() local
373 we = sav_we; in testit()
382 if (wordexp ("pre1 pre2", &we, tc->flags & ~WRDE_APPEND) != 0) in testit()
388 retval = wordexp (words.buffer, &we, tc->flags); in testit()
393 if (retval != tc->retval || (retval == 0 && we.we_wordc != tc->wordc)) in testit()
398 if (we.we_wordv[i] != NULL) in testit()
[all …]
/glibc-2.36/sysdeps/unix/sysv/linux/sparc/sparc64/
Dwordexp.c43 wordexp_t we; in __old_wordexp() local
46 we.we_wordc = pwordexp->we_wordc; in __old_wordexp()
47 we.we_wordv = pwordexp->we_wordv; in __old_wordexp()
48 we.we_offs = pwordexp->we_offs; in __old_wordexp()
50 result = __new_wordexp (words, &we, flags); in __old_wordexp()
52 pwordexp->we_wordc = we.we_wordc; in __old_wordexp()
53 pwordexp->we_wordv = we.we_wordv; in __old_wordexp()
54 pwordexp->we_offs = we.we_offs; in __old_wordexp()
/glibc-2.36/sysdeps/unix/sysv/linux/ia64/
Dwordexp.c43 wordexp_t we; in __old_wordexp() local
46 we.we_wordc = pwordexp->we_wordc; in __old_wordexp()
47 we.we_wordv = pwordexp->we_wordv; in __old_wordexp()
48 we.we_offs = pwordexp->we_offs; in __old_wordexp()
50 result = __new_wordexp (words, &we, flags); in __old_wordexp()
52 pwordexp->we_wordc = we.we_wordc; in __old_wordexp()
53 pwordexp->we_wordv = we.we_wordv; in __old_wordexp()
54 pwordexp->we_offs = we.we_offs; in __old_wordexp()
/glibc-2.36/sysdeps/arm/armv6/
Dstrlen.S28 @ To cater to long strings, we want to search through a few
29 @ characters until we reach an aligned pointer. To cater to
30 @ small strings, we don't want to start doing word operations
65 @ we get 1 for any byte that was originally zero and 0 otherwise.
66 @ Therefore we consider the lsb of each byte the "found" bit.
86 @ bit result from clz will be 7 higher than "true", but we'll
Drawmemchr.S30 @ To cater to long strings, we want to search through a few
31 @ characters until we reach an aligned pointer. To cater to
32 @ small strings, we don't want to start doing word operations
72 @ we consider the lsb of each byte the "found" bit.
93 @ bit result from clz will be 7 higher than "true", but we'll
Dstrrchr.S33 @ Loop a few times until we're aligned.
46 @ So now we're aligned. Now we actually need a stack frame.
65 @ Any time we find a match in a word, we copy the address of
70 @ we consider the lsb of each byte the "found" bit.
118 @ Adjust the result pointer if we found a word containing C.
Dstrcpy.S50 @ To cater to long strings, we want 8 byte alignment in the source.
51 @ To cater to small strings, we don't want to start that right away.
140 @ aligned. Therefore we have to shift the data in order to be
143 @ Find out which misalignment we're dealing with.
Dstrchr.S31 @ To cater to long strings, we want to search through a few
32 @ characters until we reach an aligned pointer. To cater to
33 @ small strings, we don't want to start doing word operations
60 @ So now we're aligned. Now we actually need a stack frame.
84 @ we consider the lsb of each byte the "found" bit.
/glibc-2.36/localedata/tst-localedef-hardlinks.root/
Dtst-localedef-hardlinks.script4 # The container install ensures we have uncompressed charmaps so we don't
5 # need gzip, and we don't need to copy in the uncompressed charmap from
8 # The container install ensures we have the compiled locale dirctory
/glibc-2.36/manual/
Dtexinfo.tex37 % complete document in each bug report with which we can reproduce the
62 % and turn on active characters that we couldn't do earlier because
74 % For @tex, we can use \tabalign.
77 % Save some plain tex macros whose names we will redefine.
113 % messages, but if we're using an old version of TeX, don't do anything.
226 % we did was a \nobreak, we don't want to insert more space.
248 % We dump everything together because we only have one kind of mark.
249 % This works because we only use \botmark / \topmark, not \firstmark.
263 % section appears on the page, and we can get the name of this section
285 % page or the contents), so we use \firstmark there -- this gets us
[all …]
/glibc-2.36/math/
Dgen-fromfp-tests.py93 for we in width_list:
94 w, ws = we
134 for we in width_list:
135 w, ws = we
/glibc-2.36/mach/
DMachrules36 # Make sure no value comes from the environment, since we append to it.
37 # This is done also in ../Rules, but we append to the value before
58 # use the same compiler setup we are using to run cpp.
75 # If any .ir file is missing, we will be unable to make all the deps.
86 # matching patterns we are pretty damn sure will only match the particular
87 # files we have in mind. To be so damn sure, we use the silly names
160 # we generate two files and paste them together.
206 # Don't automatically generate dependencies for the sources we generate.
207 # There are likely to be a whole lot of them, and we know their
/glibc-2.36/sysdeps/arm/
Ddl-trampoline.S34 @ we get called with
83 @ we get called with
95 @ For now, we only save the general purpose registers.
137 @ Check whether we're wrapping this function.
Dstrlen.S50 Laligned: @ here, we have a word in r2. Does it
56 ldrne r2, [r1], $4 @ and we continue to the next word
58 Llastword: @ drop through to here once we find a
DVersions21 # This set has to exist in some Versions file so we can use 2.19 in
22 # SHLIB_COMPAT. Since it didn't exist anywhere else, we add it here.
/glibc-2.36/elf/
Drtld-Rules71 # This is how we descend into each subdirectory. See below.
87 # In this case we are being run by $(rtld-subdir-make), above.
89 # and we just provide some additional definitions.
126 # what we need to build, and that tells us what dependency files we need.
129 # Figure out the dependency files we need. After respecting the $(omit-deps)
/glibc-2.36/iconvdata/testdata/
Dsuntzus96 19. Hence, when able to attack, we must seem unable;
97 when using our forces, we must seem inactive; when we
98 are near, we must make the enemy believe we are far away;
99 when far away, we must make him believe we are near.
154 5. Thus, though we have heard of stupid haste in war,
264 9. If equally matched, we can offer battle;
265 if slightly inferior in numbers, we can avoid the enemy;
266 if quite unequal in every way, we can flee from him.
299 17. Thus we may know that there are five essentials
345 Thus on the one hand we have ability to protect ourselves;
[all …]
/glibc-2.36/sysdeps/arm/armv6t2/
Dmemchr.S71 @ At this point, we are aligned, we know we have at least 8 bytes to work with
127 60: @ We're here because the fast path found a hit - now we have to track down exactly which word …
/glibc-2.36/sysdeps/alpha/alphaev6/
Dmemcpy.S66 and $16, 7, $1 # E : Are we at 0mod8 yet?
71 cmple $18, 127, $1 # E : Can we unroll the loop?
89 cmple $18, 127, $1 # E : Can we go through the unrolled loop?
205 bne $1, $aligndest # U : go until we are aligned.
/glibc-2.36/sysdeps/i386/
Dconfigure.ac18 # have no atomic.h implementation. Given the declining use of i386 we disable
20 # check for i386, instead we make sure the compiler has support for inlining
21 # the builtin __sync_val_compare_and_swap. If it does then we should have no
Dconfigure18 # have no atomic.h implementation. Given the declining use of i386 we disable
20 # check for i386, instead we make sure the compiler has support for inlining
21 # the builtin __sync_val_compare_and_swap. If it does then we should have no
/glibc-2.36/timezone/
Dantarctica7 # To keep things manageable, we list only locations occupied year-round; see
16 # Unless otherwise specified, we have no time zone information.
229 # ``in the US Camp (East Camp) we have been on New Zealand (McMurdo)
241 # happened to be during their visit. So we still don't really know what time
242 # it is at Vostok. But we'll guess UTC+6.
326 # we have to go around and set them back 5 minutes or so.
327 # Maybe if we let them run fast all of the time, we'd get to leave here sooner!!
/glibc-2.36/nptl/
DTODO1 - we should probably extend pthread_mutexattr_t with a field to create a
6 - a new attribute for mutexes: number of times we spin before calling
/glibc-2.36/
Dabi-tags1 # This file defines the ABI tag value we will use in the ELF note included
9 # The ABI tags we use are four 32-bit integers. The first of these
Dconfigure.ac2 dnl Note we do not use AC_PREREQ here! See aclocal.m4 for what we use instead.
43 dnl This is here so we can set $subdirs directly based on configure fragments.
245 dnl On some platforms we cannot use dynamic loading. We must provide
252 dnl Enable static NSS also if we build no shared objects.
271 dnl On some platforms we allow dropping compatibility with all kernel
288 dnl For the development we sometimes want gcc to issue even more warnings.
378 # If there isn't then we can't link anything with libcrypt.a,
456 # can't distinguish i486-pc-linux-gnu fully from i486-pc-gnu. So we mutate a
494 # We keep the original values in `$config_*' and never modify them, so we
634 # For the multi-arch option we need support in the assembler & linker.
[all …]

12345678910