/glibc-2.36/posix/ |
D | wordexp-test.c | 225 wordexp_t we; in command_line_test() local 227 int retval = wordexp (words, &we, 0); in command_line_test() 229 for (i = 0; i < we.we_wordc; i++) in command_line_test() 230 printf ("info: we_wordv[%d] = \"%s\"\n", i, we.we_wordv[i]); in command_line_test() 354 wordexp_t we, sav_we; in testit() local 373 we = sav_we; in testit() 382 if (wordexp ("pre1 pre2", &we, tc->flags & ~WRDE_APPEND) != 0) in testit() 388 retval = wordexp (words.buffer, &we, tc->flags); in testit() 393 if (retval != tc->retval || (retval == 0 && we.we_wordc != tc->wordc)) in testit() 398 if (we.we_wordv[i] != NULL) in testit() [all …]
|
/glibc-2.36/sysdeps/unix/sysv/linux/sparc/sparc64/ |
D | wordexp.c | 43 wordexp_t we; in __old_wordexp() local 46 we.we_wordc = pwordexp->we_wordc; in __old_wordexp() 47 we.we_wordv = pwordexp->we_wordv; in __old_wordexp() 48 we.we_offs = pwordexp->we_offs; in __old_wordexp() 50 result = __new_wordexp (words, &we, flags); in __old_wordexp() 52 pwordexp->we_wordc = we.we_wordc; in __old_wordexp() 53 pwordexp->we_wordv = we.we_wordv; in __old_wordexp() 54 pwordexp->we_offs = we.we_offs; in __old_wordexp()
|
/glibc-2.36/sysdeps/unix/sysv/linux/ia64/ |
D | wordexp.c | 43 wordexp_t we; in __old_wordexp() local 46 we.we_wordc = pwordexp->we_wordc; in __old_wordexp() 47 we.we_wordv = pwordexp->we_wordv; in __old_wordexp() 48 we.we_offs = pwordexp->we_offs; in __old_wordexp() 50 result = __new_wordexp (words, &we, flags); in __old_wordexp() 52 pwordexp->we_wordc = we.we_wordc; in __old_wordexp() 53 pwordexp->we_wordv = we.we_wordv; in __old_wordexp() 54 pwordexp->we_offs = we.we_offs; in __old_wordexp()
|
/glibc-2.36/sysdeps/arm/armv6/ |
D | strlen.S | 28 @ To cater to long strings, we want to search through a few 29 @ characters until we reach an aligned pointer. To cater to 30 @ small strings, we don't want to start doing word operations 65 @ we get 1 for any byte that was originally zero and 0 otherwise. 66 @ Therefore we consider the lsb of each byte the "found" bit. 86 @ bit result from clz will be 7 higher than "true", but we'll
|
D | rawmemchr.S | 30 @ To cater to long strings, we want to search through a few 31 @ characters until we reach an aligned pointer. To cater to 32 @ small strings, we don't want to start doing word operations 72 @ we consider the lsb of each byte the "found" bit. 93 @ bit result from clz will be 7 higher than "true", but we'll
|
D | strrchr.S | 33 @ Loop a few times until we're aligned. 46 @ So now we're aligned. Now we actually need a stack frame. 65 @ Any time we find a match in a word, we copy the address of 70 @ we consider the lsb of each byte the "found" bit. 118 @ Adjust the result pointer if we found a word containing C.
|
D | strcpy.S | 50 @ To cater to long strings, we want 8 byte alignment in the source. 51 @ To cater to small strings, we don't want to start that right away. 140 @ aligned. Therefore we have to shift the data in order to be 143 @ Find out which misalignment we're dealing with.
|
D | strchr.S | 31 @ To cater to long strings, we want to search through a few 32 @ characters until we reach an aligned pointer. To cater to 33 @ small strings, we don't want to start doing word operations 60 @ So now we're aligned. Now we actually need a stack frame. 84 @ we consider the lsb of each byte the "found" bit.
|
/glibc-2.36/localedata/tst-localedef-hardlinks.root/ |
D | tst-localedef-hardlinks.script | 4 # The container install ensures we have uncompressed charmaps so we don't 5 # need gzip, and we don't need to copy in the uncompressed charmap from 8 # The container install ensures we have the compiled locale dirctory
|
/glibc-2.36/manual/ |
D | texinfo.tex | 37 % complete document in each bug report with which we can reproduce the 62 % and turn on active characters that we couldn't do earlier because 74 % For @tex, we can use \tabalign. 77 % Save some plain tex macros whose names we will redefine. 113 % messages, but if we're using an old version of TeX, don't do anything. 226 % we did was a \nobreak, we don't want to insert more space. 248 % We dump everything together because we only have one kind of mark. 249 % This works because we only use \botmark / \topmark, not \firstmark. 263 % section appears on the page, and we can get the name of this section 285 % page or the contents), so we use \firstmark there -- this gets us [all …]
|
/glibc-2.36/math/ |
D | gen-fromfp-tests.py | 93 for we in width_list: 94 w, ws = we 134 for we in width_list: 135 w, ws = we
|
/glibc-2.36/mach/ |
D | Machrules | 36 # Make sure no value comes from the environment, since we append to it. 37 # This is done also in ../Rules, but we append to the value before 58 # use the same compiler setup we are using to run cpp. 75 # If any .ir file is missing, we will be unable to make all the deps. 86 # matching patterns we are pretty damn sure will only match the particular 87 # files we have in mind. To be so damn sure, we use the silly names 160 # we generate two files and paste them together. 206 # Don't automatically generate dependencies for the sources we generate. 207 # There are likely to be a whole lot of them, and we know their
|
/glibc-2.36/sysdeps/arm/ |
D | dl-trampoline.S | 34 @ we get called with 83 @ we get called with 95 @ For now, we only save the general purpose registers. 137 @ Check whether we're wrapping this function.
|
D | strlen.S | 50 Laligned: @ here, we have a word in r2. Does it 56 ldrne r2, [r1], $4 @ and we continue to the next word 58 Llastword: @ drop through to here once we find a
|
D | Versions | 21 # This set has to exist in some Versions file so we can use 2.19 in 22 # SHLIB_COMPAT. Since it didn't exist anywhere else, we add it here.
|
/glibc-2.36/elf/ |
D | rtld-Rules | 71 # This is how we descend into each subdirectory. See below. 87 # In this case we are being run by $(rtld-subdir-make), above. 89 # and we just provide some additional definitions. 126 # what we need to build, and that tells us what dependency files we need. 129 # Figure out the dependency files we need. After respecting the $(omit-deps)
|
/glibc-2.36/iconvdata/testdata/ |
D | suntzus | 96 19. Hence, when able to attack, we must seem unable; 97 when using our forces, we must seem inactive; when we 98 are near, we must make the enemy believe we are far away; 99 when far away, we must make him believe we are near. 154 5. Thus, though we have heard of stupid haste in war, 264 9. If equally matched, we can offer battle; 265 if slightly inferior in numbers, we can avoid the enemy; 266 if quite unequal in every way, we can flee from him. 299 17. Thus we may know that there are five essentials 345 Thus on the one hand we have ability to protect ourselves; [all …]
|
/glibc-2.36/sysdeps/arm/armv6t2/ |
D | memchr.S | 71 @ At this point, we are aligned, we know we have at least 8 bytes to work with 127 60: @ We're here because the fast path found a hit - now we have to track down exactly which word …
|
/glibc-2.36/sysdeps/alpha/alphaev6/ |
D | memcpy.S | 66 and $16, 7, $1 # E : Are we at 0mod8 yet? 71 cmple $18, 127, $1 # E : Can we unroll the loop? 89 cmple $18, 127, $1 # E : Can we go through the unrolled loop? 205 bne $1, $aligndest # U : go until we are aligned.
|
/glibc-2.36/sysdeps/i386/ |
D | configure.ac | 18 # have no atomic.h implementation. Given the declining use of i386 we disable 20 # check for i386, instead we make sure the compiler has support for inlining 21 # the builtin __sync_val_compare_and_swap. If it does then we should have no
|
D | configure | 18 # have no atomic.h implementation. Given the declining use of i386 we disable 20 # check for i386, instead we make sure the compiler has support for inlining 21 # the builtin __sync_val_compare_and_swap. If it does then we should have no
|
/glibc-2.36/timezone/ |
D | antarctica | 7 # To keep things manageable, we list only locations occupied year-round; see 16 # Unless otherwise specified, we have no time zone information. 229 # ``in the US Camp (East Camp) we have been on New Zealand (McMurdo) 241 # happened to be during their visit. So we still don't really know what time 242 # it is at Vostok. But we'll guess UTC+6. 326 # we have to go around and set them back 5 minutes or so. 327 # Maybe if we let them run fast all of the time, we'd get to leave here sooner!!
|
/glibc-2.36/nptl/ |
D | TODO | 1 - we should probably extend pthread_mutexattr_t with a field to create a 6 - a new attribute for mutexes: number of times we spin before calling
|
/glibc-2.36/ |
D | abi-tags | 1 # This file defines the ABI tag value we will use in the ELF note included 9 # The ABI tags we use are four 32-bit integers. The first of these
|
D | configure.ac | 2 dnl Note we do not use AC_PREREQ here! See aclocal.m4 for what we use instead. 43 dnl This is here so we can set $subdirs directly based on configure fragments. 245 dnl On some platforms we cannot use dynamic loading. We must provide 252 dnl Enable static NSS also if we build no shared objects. 271 dnl On some platforms we allow dropping compatibility with all kernel 288 dnl For the development we sometimes want gcc to issue even more warnings. 378 # If there isn't then we can't link anything with libcrypt.a, 456 # can't distinguish i486-pc-linux-gnu fully from i486-pc-gnu. So we mutate a 494 # We keep the original values in `$config_*' and never modify them, so we 634 # For the multi-arch option we need support in the assembler & linker. [all …]
|