Home
last modified time | relevance | path

Searched refs:we (Results 1 – 25 of 3914) sorted by relevance

12345678910>>...157

/external/tlsdate/
DHARDENING1 Platforms offer varying security features; we'd like to support the best.
3 This is a document that notes which security hardening we have implemented and
4 which things we'd like to see implemented for various platforms. We
12 wrapping because we believe the practical benefit outweights the implied risks.
13 As such, we prefer to be explicit rather than implicit in our casting or other
17 consider autotools warnings to be an exception as we would like to support
22 On all platforms we attempt to support available compiler hardening and linking
29 On all platforms, we attempt to switch from the administrative user to an
30 unimportant role account which shares data with no other processes. If we start
31 as any user other than an administrative user, we will likely be unable to
[all …]
/external/llvm/docs/tutorial/
DLangImpl8.rst12 LLVM <index.html>`_" tutorial. In chapters 1 through 7, we've built a
19 source that the programmer wrote. In LLVM we generally use a format
23 The short summary of this chapter is that we'll go through the
27 Caveat: For now we can't debug via the JIT, so we'll need to compile
29 we'll make a few modifications to the running of the language and
30 how programs are compiled. This means that we'll have a source file
32 interactive JIT. It does involve a limitation that we can only
36 Here's the sample program we'll be compiling:
54 locations more difficult. In LLVM IR we keep the original source location
61 tutorial we're going to avoid optimization (as you'll see with one of the
[all …]
DLangImpl4.rst60 Well, that was easy :). In practice, we recommend always using
113 For Kaleidoscope, we are currently generating functions on the fly, one
115 ultimate optimization experience in this setting, but we also want to
116 catch the easy and quick stuff where possible. As such, we will choose
118 in. If we wanted to make a "static Kaleidoscope compiler", we would use
119 exactly the code we have now, except that we would defer running the
122 In order to get per-function optimizations going, we need to set up a
124 and organize the LLVM optimizations that we want to run. Once we have
125 that, we can add a set of optimizations to run. We'll need a new
126 FunctionPassManager for each module that we want to optimize, so we'll
[all …]
DLangImpl5.rst18 of "build that compiler", we'll extend Kaleidoscope to have an
30 Before we get going on "how" we add this extension, lets talk about
31 "what" we want. The basic idea is that we want to be able to write this
44 like any other. Since we're using a mostly functional form, we'll have
57 Now that we know what we "want", lets break this down into its
63 The lexer extensions are straightforward. First we add new enum values
73 Once we have that, we recognize the new keywords in the lexer. This is
94 To represent the new expression we add a new AST node for it:
114 Now that we have the relevant tokens coming from the lexer and we have
116 First we define a new parsing function:
[all …]
DLangImpl6.rst12 LLVM <index.html>`_" tutorial. At this point in our tutorial, we now
23 is good or bad. In this tutorial we'll assume that it is okay to use
26 At the end of this tutorial, we'll run through an example Kaleidoscope
33 The "operator overloading" that we will add to Kaleidoscope is more
37 chapter, we will add this capability to Kaleidoscope, which will let the
42 Thus far, the parser we have been implementing uses recursive descent
49 The two specific features we'll add are programmable unary operators
80 library in the language itself. In Kaleidoscope, we can implement
115 This just adds lexer support for the unary and binary keywords, like we
117 about our current AST, is that we represent binary operators with full
[all …]
DLangImpl7.rst12 LLVM <index.html>`_" tutorial. In chapters 1 through 6, we've built a
15 journey, we learned some parsing techniques, how to build and represent
51 In this case, we have the variable "X", whose value depends on the path
54 two values. The LLVM IR that we want for this example looks like this:
108 With this in mind, the high-level idea is that we want to make a stack
110 mutable object in a function. To take advantage of this trick, we need
138 above, we could rewrite the example to use the alloca technique to avoid
166 With this, we have discovered a way to handle arbitrary mutable
176 another one: we have now apparently introduced a lot of stack traffic
209 pass is the answer to dealing with mutable variables, and we highly
[all …]
DLangImpl2.rst15 language. Once we have a parser, we'll define and build an `Abstract
18 The parser we will build uses a combination of `Recursive Descent
23 the former for everything else). Before we get to parsing though, lets
33 Kaleidoscope, we have expressions, a prototype, and a function object.
53 subclass which we use for numeric literals. The important thing to note
58 Right now we only create the AST, so there are no useful accessor
61 definitions that we'll use in the basic form of the Kaleidoscope
104 For our basic language, these are all of the expression nodes we'll
106 Turing-complete; we'll fix that in a later installment. The two things
107 we need next are a way to talk about the interface to a function, and a
[all …]
DOCamlLangImpl5.rst18 of "build that compiler", we'll extend Kaleidoscope to have an
30 Before we get going on "how" we add this extension, lets talk about
31 "what" we want. The basic idea is that we want to be able to write this
44 like any other. Since we're using a mostly functional form, we'll have
57 Now that we know what we "want", lets break this down into its
63 The lexer extensions are straightforward. First we add new variants for
71 Once we have that, we recognize the new keywords in the lexer. This is
90 To represent the new expression we add a new AST variant for it:
104 Now that we have the relevant tokens coming from the lexer and we have
106 First we define a new parsing function:
[all …]
/external/tlsdate/m4/
Dax_platform.m439 AC_DEFINE([TARGET_OS_WINDOWS], [1], [Whether we are building for Windows])
52 AC_DEFINE([TARGET_OS_MINGW],[1],[Whether we build for MinGW])],
55 AC_DEFINE([TARGET_OS_CYGWIN],[1],[Whether we build for Cygwin])],
58 AC_DEFINE([TARGET_OS_HAIKU],[1],[Whether we build for Haiku])],
61 AC_DEFINE([TARGET_OS_FREEBSD],[1],[Whether we are building for FreeBSD])],
65 AC_DEFINE([TARGET_OS_FREEBSD],[1],[Whether we are building for FreeBSD])
66 AC_DEFINE([TARGET_OS_GNUKFREEBSD],[1],[Whether we are building for GNU/kFreeBSD])],
69 AC_DEFINE([TARGET_OS_NETBSD],[1],[Whether we are building for NetBSD])],
72 AC_DEFINE([TARGET_OS_OPENBSD],[1],[Whether we are building for OpenBSD])],
75 AC_DEFINE([TARGET_OS_DRAGONFLYBSD],[1],[Whether we are building for DragonFly BSD])],
[all …]
/external/llvm/docs/HistoricalNotes/
D2003-06-25-Reoptimizer1.txt14 exceeds a threshold, we identify a hot loop and perform second-level
30 How do we keep track of which edges to instrument, and which edges are
41 3) Mark BBs which end in edges that exit the hot region; we need to
44 Assume that there is 1 free register. On SPARC we use %g1, which LLC
46 edge which corresponds to a conditional branch, we shift 0 for not
48 through the hot region. Silently fail if we need more than 64 bits.
50 At the end BB we call countPath and increment the counter based on %g1
56 together to form our trace. But we do not allow more than 5 paths; if
57 we have more than 5 we take the ones that are executed the most. We
58 verify our assumption that we picked a hot back-edge in first-level
[all …]
D2000-11-18-EarlyDesignIdeasResp.txt6 Okay... here are a few of my thoughts on this (it's good to know that we
9 > 1. We need to be clear on our goals for the VM. Do we want to emphasize
10 > portability and safety like the Java VM? Or shall we focus on the
21 pretty expensive operation to have to do. Additionally, we would like
25 2. Instead, we can do the following (eventually):
27 reinventing something that we don't add much value to). When the
36 we could sign the generated VM code with a host specific private
37 key. Then before the code is executed/loaded, we can check to see if
47 3. By focusing on a more low level virtual machine, we have much more room
52 > 2. Design issues to consider (an initial list that we should continue
[all …]
D2000-12-06-MeetingSummary.txt9 1. We decided that we shall use a flat namespace to represent our
41 idea, we could include an immediate dominator number for each basic block
52 that we will be doing? We know that it has less than stellar
54 static compiler. This could affect us if we decided to do some IP
55 research. Also we do not yet understand the level of exception support
58 2. Should we consider the requirements of a direct hardware implementation
59 of the LLVM when we design it? If so, several design issues should
63 3. Should we use some form of packetized format to improve forward
64 compatibility? For example, we could design the system to encode a
70 4. Should we use fixed length instructions or variable length
[all …]
/external/llvm/docs/
DMergeFunctions.rst22 explains how we could combine equal functions correctly, keeping module valid.
31 cover only common cases, and thus avoid cases when after minor code changes we
39 code fundamentals. In this article we suppose reader is familiar with
77 again and again, and yet you don't understand why we implemented it that way.
98 Do we need to merge functions? Obvious thing is: yes that's a quite possible
99 case, since usually we *do* have duplicates. And it would be good to get rid of
100 them. But how to detect such a duplicates? The idea is next: we split functions
101 onto small bricks (parts), then we compare "bricks" amount, and if it equal,
106 (let's assume we have only one address space), one function stores 64-bit
108 mentioned above, and if functions are identical, except the parameter type (we
[all …]
/external/llvm/test/Transforms/GVN/
Dpre-single-pred.ll2 ; This testcase assumed we'll PRE the load into %for.cond, but we don't actually
4 ; %for.end, we would actually be lengthening the execution on some paths, and
5 ; we were never actually checking that case. Now we actually do perform some
6 ; conservative checking to make sure we don't make paths longer, but we don't
7 ; currently get this case, which we got lucky on previously.
9 ; Now that that faulty assumption is corrected, test that we DON'T incorrectly
/external/antlr/antlr-3.4/runtime/ObjC/Framework/examples/simplecTreeParser/
Dmain.m26 // as we make sure it will not go away.
27 …// If the string would be coming from a volatile source, say a text field, we could opt to copy th…
28 …// That way we could do the parsing in a different thread, and still let the user edit the origina…
29 // But here we do it the simple way.
35 // For fun, you could print all tokens the lexer recognized, but we can only do it once. After that
36 // we would need to reset the lexer, and lex again.
43 // Since the parser needs to scan back and forth over the tokens, we put them into a stream, too.
53 // This is a simple example, so we just call the top-most rule 'program'.
54 // Since we want to parse the AST the parser builds, we just ask the returned object for that.
63 …// tell the TreeNodeStream where the tokens originally came from, so we can retrieve arbitrary tok…
[all …]
/external/curl/tests/data/
Dtest6232 http://%HOSTIP:%HTTPPORT/we/want/62 http://%HOSTIP:%HTTPPORT/we/want?hoge=fuga -b log/jar62.txt -H …
39 #HttpOnly_.foo.com TRUE /we/want/ FALSE 2054030187 test yes
40 .host.foo.com TRUE /we/want/ FALSE 2054030187 test2 yes
41 .fake.host.foo.com TRUE /we/want/ FALSE 2054030187 test4 yes
53 GET /we/want/62 HTTP/1.1
58 GET /we/want?hoge=fuga HTTP/1.1
Dtest108033 http://%HOSTIP:%HTTPPORT/we/want/our/1080 http://%HOSTIP:%HTTPPORT/we/want/our/1080 -w '%{redirect_…
43 GET /we/want/our/1080 HTTP/1.1
47 GET /we/want/our/1080 HTTP/1.1
59 http://%HOSTIP:%HTTPPORT/we/want/our/data/10800002.txt?coolsite=yes
66 http://%HOSTIP:%HTTPPORT/we/want/our/data/10800002.txt?coolsite=yes
/external/eigen/doc/
DInsideEigenExample.dox28 …that is, producing optimized code -- so that the complexity of Eigen, that we'll explain here, is …
39 The problem is that if we make a naive C++ library where the VectorXf class has an operator+ return…
49 Traversing the arrays twice instead of once is terrible for performance, as it means that we do man…
51 …. Notice that Eigen also supports AltiVec and that all the discussion that we make here applies al…
55we have chosen size=50, so our vectors consist of 50 float's, and 50 is not a multiple of 4. This …
81 When we do
87 … be stored as a pointer to a dynamically-allocated array. Because of this, we need to abstract sto…
89 …ensions are Dynamic or fixed at compile-time. The partial specialization that we are looking at is:
102 …amically allocated. Rather than calling new[] or malloc(), as you can see, we have our own interna…
104 … m_columns member: indeed, in this partial specialization of DenseStorage, we know the number of c…
[all …]
/external/autotest/server/site_tests/platform_InstallTestImage/
Dcontrol39 # If we're invoked from test_that, the user can pass an
40 # optional "image" argument. If it's omitted, we want to pass
45 # If we're called from the AFE, there won't be an "image"
46 # argument, and we want to ask the dev server to stage a test
49 # To distinguish the two cases above, we ask the host for
50 # the name of the default image we should stage. When we're
51 # called from test_that, this call should fail when we
52 # try to look the host up in the AFE database. Otherwise, if we
53 # get a valid image name, we use it to stage a build.
/external/skia/site/user/sample/
Dbuilding.md14 I'm going to describe up to the point where we can build a simple application that prints out an Sk…
32 With the remote repo created, we create a .gclient configuration file. The
51 The name that we configured is the directory in which the repo will be checked
66 With the repo created we can go ahead and create our src/DEPS file. The DEPS
86 The `vars` sections defines variables we can use later in the file with the
87 `Var()` accessor. In this case, we define our root directory, a shorter name
88 for any googlecode repositories and a specific revision of Skia that we're
91 the repo they'll be using the same version of Skia that we've built and tested
94 The `deps` section defines our dependencies. Currently we have one dependency
95 which we're going to checkout into the `src/third_party/skia` directory.
[all …]
/external/skia/platform_tools/android/gyp/
Ddependencies.gypi8 # distribution so we have to build a few of them ourselves.
69 # shared libraries, we need a common entry point to wrap around main().
70 # Here we also change the type of all would-be executables to be shared
82 # we're guaranteed that '_type' will be defined when we get here.
95 # libraries, we need a common entry point to wrap around main(). Here
96 # we also change the type of all would-be executables to be shared
108 # we're guaranteed that '_type' will be defined when we get here.
124 # libraries, we need a common entry point to wrap around main(). Here
125 # we also change the type of all would-be executables to be shared
137 # we're guaranteed that '_type' will be defined when we get here.
[all …]
/external/llvm/test/Transforms/LoopUnroll/
Dfull-unroll-heuristics.ll1 ; In this test we check how heuristics for complete unrolling work. We have
8 ; * If size of unrolled loop exceeds the absoulte threshold, we don't unroll
10 ; * If size of unrolled loop is below the '-unroll-threshold', then we'll
12 ; * If a loop size is between these two tresholds, we only do complete unroll
13 ; it if estimated number of potentially optimized instructions is high (we
25 ; If the absolute threshold is too low, or if we can't optimize away requested
26 ; percent of instructions, we shouldn't unroll:
30 ; Otherwise, we should:
33 ; Also, we should unroll if the 'unroll-threshold' is big enough:
36 ; And check that we don't crash when we're not allowed to do any analysis.
/external/llvm/test/Transforms/IndVarSimplify/
Dloop-invariant-conditions.ll37 ; As long as the test dominates the backedge, we're good
50 ; prevent flattening, needed to make sure we're testing what we intend
72 ; prevent flattening, needed to make sure we're testing what we intend
94 ; prevent flattening, needed to make sure we're testing what we intend
116 ; prevent flattening, needed to make sure we're testing what we intend
146 ; Negative test - we can't show that the internal branch executes, so we can't
159 ; prevent flattening, needed to make sure we're testing what we intend
165 ; prevent flattening, needed to make sure we're testing what we intend
188 ; prevent flattening, needed to make sure we're testing what we intend
192 ; prevent flattening, needed to make sure we're testing what we intend
[all …]
/external/autotest/server/control_segments/
Dprovision33 # Raising a blank exception is done here because any message we can
41 # the special task failed. Therefore we need python to exit because
45 # cleanup) that we'd be skipping out on. So therefore, we need to
46 # raise an exception. However, if we raise an exception, this
49 # up as the reason field for the job when the status.log we generate is
52 # So therefore, we raise a blank exception, which then generates an
54 # a SERVER_JOB failure with no reason, which we then ignore at suite
58 # If we finish successfully, nothing in autotest ever looks at the
/external/autotest/client/site_tests/kernel_Oom/
Dcontrol7 Verify that we get low memory notification from /dev/chromeos-low-mem
8 before we kill processes (OOM) when we consume a lot of memory.
14 Fails if we OOM (ie, processes get killed) before we get low memory

12345678910>>...157