- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 52 for combinations (0.18 sec)
-
src/cmd/internal/obj/mips/asm0.go
if int(op.a2) == a2 && c1[op.a1] && c3[op.a3] && (op.family == 0 || c.ctxt.Arch.Family == op.family) { p.Optab = uint16(cap(optab) - cap(ops) + i + 1) return op } } c.ctxt.Diag("illegal combination %v %v %v %v", p.As, DRconv(a1), DRconv(a2), DRconv(a3)) prasm(p) // Turn illegal instruction into an UNDEF, avoid crashing in asmout. return &Optab{obj.AUNDEF, C_NONE, C_NONE, C_NONE, 49, 4, 0, 0, 0} }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 16 17:46:09 UTC 2024 - 53.6K bytes - Viewed (0) -
src/cmd/link/internal/ppc64/asm.go
} else { // Generate a PIC stub. This is ugly as the stub must determine its location using // POWER8 or older instruction. These stubs are likely the combination of using // GOPPC64 < 8 and linking external objects built with CFLAGS="... -mcpu=power10 ..." stub.AddUint32(ctxt.Arch, OP_MFLR_R0) // mflr r0 stub.AddUint32(ctxt.Arch, OP_BCL_NIA) // bcl 20,31,1f
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Mar 19 20:54:08 UTC 2024 - 63.7K bytes - Viewed (0) -
src/runtime/traceback.go
// of the stack, but the single pass over the inner part ensures that's // printed immediately and not revisited. It keeps minimal state on the // stack. And through a combination of skip counts and limits, we can do all // of the steps we need with a single traceback printer implementation. // // We could be more lax about exactly how many frames we print, for example
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 16:25:21 UTC 2024 - 55.1K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Futures.java
return new FutureCombiner<>(true, ImmutableList.copyOf(futures)); } /** * A helper to create a new {@code ListenableFuture} whose result is generated from a combination * of input futures. * * <p>See {@link #whenAllComplete} and {@link #whenAllSucceed} for how to instantiate this class. * * <p>Example: * * <pre>{@code
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Mon Apr 01 16:15:01 UTC 2024 - 64.1K bytes - Viewed (0) -
src/regexp/syntax/parse.go
return "", &Error{ErrInvalidRepeatSize, before[:len(before)-len(after)]} } return after, nil } // repeatIsValid reports whether the repetition re is valid. // Valid means that the combination of the top-level repetition // and any inner repetitions does not exceed n copies of the // innermost thing. // This function rewalks the regexp tree and is called for every repetition,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 02 13:59:01 UTC 2024 - 52.1K bytes - Viewed (0) -
src/crypto/x509/x509.go
MaxPathLen int // MaxPathLenZero indicates that BasicConstraintsValid==true // and MaxPathLen==0 should be interpreted as an actual // maximum path length of zero. Otherwise, that combination is // interpreted as MaxPathLen not being set. MaxPathLenZero bool SubjectKeyId []byte AuthorityKeyId []byte // RFC 5280, 4.2.2.1 (Authority Information Access) OCSPServer []string
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 09:20:15 UTC 2024 - 82K bytes - Viewed (0) -
src/runtime/malloc.go
// amd64, addresses are sign-extended beyond heapAddrBits. On // other arches, they are zero-extended. // // On most 64-bit platforms, we limit this to 48 bits based on a // combination of hardware and OS limitations. // // amd64 hardware limits addresses to 48 bits, sign-extended // to 64 bits. Addresses where the top 16 bits are not either // all 0 or all 1 are "non-canonical" and invalid. Because of
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 59.6K bytes - Viewed (0) -
src/cmd/go/internal/modload/init.go
// // Modules named "std" outside of GOROOT/src do not receive this special // treatment, so it is possible to run 'go test .' in other GOROOTs to // test individual packages using a combination of the modified package // and the ordinary standard library. // (See https://golang.org/issue/30756.) mainModules.pathPrefix[m] = "" } } if modFiles[i] != nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Jun 06 18:36:30 UTC 2024 - 69.8K bytes - Viewed (0) -
platforms/documentation/docs/src/docs/userguide/optimizing-performance/configuration_cache.adoc
The implementation is currently limited to serializable classes that either implement the `java.io.Externalizable` interface, or implement the `java.io.Serializable` interface and define one of the following combination of methods: - a `writeObject` method combined with a `readObject` method to control exactly which information to store;
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Fri Mar 29 16:24:12 UTC 2024 - 71.1K bytes - Viewed (0) -
src/cmd/go/internal/test/test.go
// // Second, we compute a hash of the values of the // environment variables and the content of the files // listed in the log from the previous run. // Then we look up test output using a combination of // the hash from the first part (testID) and the hash of the // test inputs (testInputsID). // // In order to store a new test result, we must redo the
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 16 14:34:32 UTC 2024 - 71.9K bytes - Viewed (0)