Tms320c2x/C2xx/C5x Optimizing C Compiler User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Tms320c2x/C2xx/C5x Optimizing C Compiler User's Guide TMS320C2x/C2xx/C5x Optimizing C Compiler User’s Guide Literature Number: SPRU024E August 1999 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments and its subsidiaries (TI) reserve the right to make changes to their products or to discontinue any product or service without notice, and advise customers to obtain the latest version of relevant information to verify, before placing orders, that information being relied on is current and complete. All products are sold subject to the terms and conditions of sale supplied at the time of order acknowledgement, including those pertaining to warranty, patent infringement, and limitation of liability. TI warrants performance of its semiconductor products to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. CERTAIN APPLICATIONS USING SEMICONDUCTOR PRODUCTS MAY INVOLVE POTENTIAL RISKS OF DEATH, PERSONAL INJURY, OR SEVERE PROPERTY OR ENVIRONMENTAL DAMAGE (“CRITICAL APPLICATIONS”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. INCLUSION OF TI PRODUCTS IN SUCH APPLICATIONS IS UNDERSTOOD TO BE FULLY AT THE CUSTOMER’S RISK. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards must be provided by the customer to minimize inherent or procedural hazards. TI assumes no liability for applications assistance or customer product design. TI does not warrant or represent that any license, either express or implied, is granted under any patent right, copyright, mask work right, or other intellectual property right of TI covering or relating to any combination, machine, or process in which such semiconductor products or services might be or are used. TI’s publication of information regarding any third party’s products or services does not constitute TI’s approval, warranty or endorsement thereof. Copyright 1999, Texas Instruments Incorporated Preface Read This First About This Manual The TMS320C2x/C2xx/C5x Optimizing C Compiler User’s Guide tells you how to use these compiler tools: - Compiler - Source interlist utility - Optimizer - Parser - Library-build utility The TMS320C2x/C2xx/C5x C compiler accepts American National Standards Institute (ANSI) standard C source code and produces assembly language source code for the TMS320C2x/C2xx/C5x devices. This user’s guide dis- cusses the characteristics of the C compiler. It assumes that you already know how to write C programs. The C Programming Language (second edition), by Brian W. Kernighan and Dennis M. Ritchie (hereafter referred to as K & R), describes C based on the ANSI C standard. You can use the Kernighan and Ritchie book as a supplement to this manual. Before you use the information about the C compiler in this User’s Guide, you should read the TMS320C1x/C2x/ C2xx/C5x Code Generation Tools Getting Started to install the C compiler tools. Read This First iii How to Use This Manual / Notational Conventions How to Use This Manual The goal of this book is to help you learn how to use the Texas Instruments C compiler tools specifically designed for the TMS320C2x/C2xx/C5x devices. This book is divided into three distinct parts: - Introductory information, consisting of Chapter 1, provides an overview of the TMS320C2x/C2xx/C5x development tools. - Compiler description, consisting of Chapters 2, 5, 6, 7, and 8, describes how to operate the C compiler and the shell program, and discusses specific characteristics of the C compiler as they relate to the ANSI C spec- ification. It contains technical information on the TMS320C2x/ C2xx/C5x architecture and includes information needed for interfacing assembly language to C programs. It describes libraries and header files in addition to the macros, functions, and types they declare. Finally, it describes the library-build utility. - Reference material, consisting of Appendix B, provides a glossary. Notational Conventions This document uses the following conventions. - Program listings, program examples, and interactive displays are shown in a special typeface similar to a typewriter’s. Examples use a bold version of the special typeface for emphasis; interactive displays use a bold version of the special typeface to distinguish commands that you enter from items that the system displays (such as prompts, command output, error messages, etc.). Here is a sample of C code: # ifdef NDEBUG # define assert - In syntax descriptions, the instruction, command, or directive is in a bold face font and parameters are in italics. Portions of a syntax that are in bold face must be entered as shown; portions of a syntax that are in italics de- scribe the type of information that should be entered. Here is an example of a directive syntax: #include “filename” The #include preprocessor directive has one required parameter, file- name. The filename must be enclosed in double quotes or angle brackets. iv Notational Conventions / Related Documentation From Texas Instruments - Square brackets ( [ and ] ) identify an optional parameter. If you use an op- tional parameter, you specify the information within the brackets; you do not enter the brackets themselves. Here is an example of a command that has an optional parameter: clist asmfile [outfile] [−options] J The clist command has three parameters. J The first parameter, asmfile, is required. J The second and third parameters, outfile and −options, are optional. J If you omit the outfile, the file has the same name as the assembly file with the extension .cl. J Options are preceded by a hyphen. Related Documentation From Texas Instruments The following books describe the TMS320C2x/C2xx/C5x and related support tools. To obtain a copy of any of these TI documents, call the Texas Instru- ments Literature Response Center at (800) 477−8924. When ordering, identify the book by its title and literature number (located on the bottom-right corner of the back cover). TMS320C2x User’s Guide (literature number SPRU014) discusses the hard- ware aspects of the ’C2x fixed-point digital signal processors. It de- scribes pin assignments, architecture, instruction set, and software and hardware applications. It also includes electrical specifications and pack- age mechanical data for all ’C2x devices. The book features a section with a ’C1x-to-’C2x DSP system migration. TMS320C2xx User’s Guide (literature number SPRU127) discusses the hardware aspects of the ’C2xx fixed-point digital signal processors. It de- scribes pin assignments, architecture, instruction set, and software and hardware applications. It also includes electrical specifications and pack- age mechanical data for all ’C2xx devices. The book features a section comparing instructions from ’C2x to ’C2xx. TMS320C5x User’s Guide (literature number SPRU056) describes the TMS320C5x 16-bit, fixed-point, general-purpose digital signal proces- sors. Covered are its architecture, internal register structure, instruction set, pipeline, specifications, DMA, and I/O ports. Software applications are covered in a dedicated chapter. Read This First v Related Documentation From Texas Instruments TMS320C1x/C2x/C2xx/C5x Assembly Language Tools User’s Guide (lit- erature number SPRU018) describes the assembly language tools (as- sembler, linker, and other tools used to develop assembly language code), assembler directives, macros, common object file format, and symbolic debugging directives for the ’C1x, ’C2x, ’C2xx, and ’C5x gen- erations of devices. TMS320C2x Software Development System Technical Reference (liter- ature number SPRU072) provides specific application and design in- formation for using the TMS320C2x Software Development System (SWDS) board. TMS320C5x Software Development System Technical Reference (liter- ature number SPRU066) provides specific application and design in- formation for using the TMS320C5x Software Development System (SWDS) board. TMS320C2x C Source Debugger User’s Guide (literature number SPRU070) tells how to use the ’C2x C source debugger with the ’C2x emulator, software development system (SWDS), and simulator. TMS320C5x C Source Debugger User’s Guide (literature number SPRU055) tells you how to invoke the ’C5x emulator, EVM, and simulator versions of the C source debugger interface. This book discusses various aspects of the debugger interface, including window management, command entry, code execution, data management, and breakpoints, and includes a tutorial that introduces basic debugger functionality. vi Related DocumentationRelated Documentation From Texas / TrademarksInstruments Related Documentation The C Programming Language (second edition), by Brian W. Kernighan and Dennis M. Ritchie, published by Prentice-Hall, Englewood Cliffs, New Jersey, 1988. You may find these documents helpful as well: American National Standard for Information Systems—Programming Language C X3.159-1989, American National Standards Institute (ANSI standard for C) Programming in C, Kochan, Steve G., Hayden Book Company Trademarks MS-DOS is a registered trademark of Microsoft Corp. PC-DOS is a trademark of International Business Machines Corp. SPARC is a trademark of SPARC International, Inc. Sun-OS and Sun Workstation are trademarks of Sun Microsystems, Inc. XDS is
Recommended publications
  • CHERI C/C++ Programming Guide
    UCAM-CL-TR-947 Technical Report ISSN 1476-2986 Number 947 Computer Laboratory CHERI C/C++ Programming Guide Robert N. M. Watson, Alexander Richardson, Brooks Davis, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Filardo, Simon W. Moore, Edward Napierala, Peter Sewell, Peter G. Neumann June 2020 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 https://www.cl.cam.ac.uk/ c 2020 Robert N. M. Watson, Alexander Richardson, Brooks Davis, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Filardo, Simon W. Moore, Edward Napierala, Peter Sewell, Peter G. Neumann, SRI International This work was supported by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL), under contracts FA8750-10-C-0237 (“CTSRD”) and HR0011-18-C-0016 (“ECATS”). The views, opinions, and/or findings contained in this report are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government. This work was supported in part by the Innovate UK project Digital Security by Design (DSbD) Technology Platform Prototype, 105694. This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 789108), ERC Advanced Grant ELVER. We also acknowledge the EPSRC REMS Programme Grant (EP/K008528/1), Arm Limited, HP Enterprise, and Google, Inc. Approved for Public Release, Distribution Unlimited. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: https://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 3 Abstract This document is a brief introduction to the CHERI C/C++ programming languages.
    [Show full text]
  • XL C/C++ for AIX, V13.1.2 IBM
    IBM XL C/C++ for AIX, V13.1.2 IBM Optimization and Programming Guide Version 13.1.2 SC27-4261-01 IBM XL C/C++ for AIX, V13.1.2 IBM Optimization and Programming Guide Version 13.1.2 SC27-4261-01 Note Before using this information and the product it supports, read the information in “Notices” on page 185. First edition This edition applies to IBM XL C/C++ for AIX, V13.1.2 (Program 5765-J07; 5725-C72) and to all subsequent releases and modifications until otherwise indicated in new editions. Make sure you are using the correct edition for the level of the product. © Copyright IBM Corporation 1996, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document ........ vii Using a heap ............. 33 Who should read this document ....... vii Getting information about a heap ...... 34 How to use this document ......... vii Closing and destroying a heap ....... 34 How this document is organized ....... vii Changing the default heap used in a program .. 35 Conventions .............. viii Compiling and linking a program with Related information ........... xii user-created heaps ........... 35 IBM XL C/C++ information ........ xii Example of a user heap with regular memory .. 35 Standards and specifications ....... xiii Debugging memory heaps ......... 36 Other IBM information ......... xiv Functions for checking memory heaps .... 37 Other information ........... xiv Functions for debugging memory heaps .... 37 Technical support ............ xiv Using memory allocation fill patterns..... 39 How to send your comments ........ xiv Skipping heap checking ......... 39 Using stack traces ........... 40 Chapter 1.
    [Show full text]
  • CM-5 C* User's Guide
    The Connection Machine System CM-5 C* User's Guide ---------__------- . Version 7.1 May 1993 Thinking Machines Corporation Cambridge, Massachusetts Frst printing, May 1993 The informatiaonin this document is subject to change without notice and should not be constnued as a commitmentby ThinngMacMachines po Thk Machinesreservestheright toae changesto any product described herein Although the information inthis document has beenreviewed and is believed to bereliable, Thinldng Machines Coaporation assumes no liability for erns in this document Thinklng Machines does not assume any liability arising from the application or use of any information or product described herein Connection Machine is a registered traemark of Thinking Machines Corporation. CM and CM-5 are trademarks of Thinking Machines Corpoation. CMosr, Prism, and CMAX are trademaks of Thinking Machines Corporation. C*4is a registered trademark of Thinking Machines Corporation CM Fortran is a trademark of Thinking Machines Corporation CMMD,CMSSL, and CMXIl are tdemarks of Thinking Machines Corporation. Thinking Machines is a registered trademark of Thinking Machines Corporatin. SPARCand SPARCstationare trademarks of SPARCintematinal, Inc. Sun, Sun,4, and Sun Workstation are trademarks of Sun Microsystems, Inc. UNIX is a registered trademark of UNIX System Laboratoies, Inc. The X Window System is a trademark of the Massachusetts Institute of Technology. Copyright © 1990-1993 by Thinking Machines Corporatin. All rights reserved. Thinking Machines Corporation 245 First Street Cambridge, Massachusetts 02142-1264 (617) 234-1000 Contents About This Manual .......................................................... viU Custom Support ........................................................ ix Chapter 1 Introduction ........................................ 1 1.1 Developing a C* Program ........................................ 1 1.2 Compiling a C* Program ......................................... 1 1.3 Executing a C* Program ........................................
    [Show full text]
  • Exploring C Semantics and Pointer Provenance
    Exploring C Semantics and Pointer Provenance KAYVAN MEMARIAN, University of Cambridge VICTOR B. F. GOMES, University of Cambridge BROOKS DAVIS, SRI International STEPHEN KELL, University of Cambridge ALEXANDER RICHARDSON, University of Cambridge ROBERT N. M. WATSON, University of Cambridge PETER SEWELL, University of Cambridge The semantics of pointers and memory objects in C has been a vexed question for many years. C values cannot be treated as either purely abstract or purely concrete entities: the language exposes their representations, 67 but compiler optimisations rely on analyses that reason about provenance and initialisation status, not just runtime representations. The ISO WG14 standard leaves much of this unclear, and in some respects differs with de facto standard usage — which itself is difficult to investigate. In this paper we explore the possible source-language semantics for memory objects and pointers, in ISO C and in C as it is used and implemented in practice, focussing especially on pointer provenance. We aim to, as far as possible, reconcile the ISO C standard, mainstream compiler behaviour, and the semantics relied on by the corpus of existing C code. We present two coherent proposals, tracking provenance via integers and not; both address many design questions. We highlight some pros and cons and open questions, and illustrate the discussion with a library of test cases. We make our semantics executable as a test oracle, integrating it with the Cerberus semantics for much of the rest of C, which we have made substantially more complete and robust, and equipped with a web-interface GUI. This allows us to experimentally assess our proposals on those test cases.
    [Show full text]
  • Section “Common Predefined Macros” in the C Preprocessor
    The C Preprocessor For gcc version 12.0.0 (pre-release) (GCC) Richard M. Stallman, Zachary Weinberg Copyright c 1987-2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is included in the section entitled \GNU Free Documentation License". This manual contains no Invariant Sections. The Front-Cover Texts are (a) (see below), and the Back-Cover Texts are (b) (see below). (a) The FSF's Front-Cover Text is: A GNU Manual (b) The FSF's Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. i Table of Contents 1 Overview :::::::::::::::::::::::::::::::::::::::: 1 1.1 Character sets:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Initial processing ::::::::::::::::::::::::::::::::::::::::::::::: 2 1.3 Tokenization ::::::::::::::::::::::::::::::::::::::::::::::::::: 4 1.4 The preprocessing language :::::::::::::::::::::::::::::::::::: 6 2 Header Files::::::::::::::::::::::::::::::::::::: 7 2.1 Include Syntax ::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.2 Include Operation :::::::::::::::::::::::::::::::::::::::::::::: 8 2.3 Search Path :::::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.4 Once-Only Headers::::::::::::::::::::::::::::::::::::::::::::: 9 2.5 Alternatives to Wrapper #ifndef ::::::::::::::::::::::::::::::
    [Show full text]
  • User's Manual
    rBOX610 Linux Software User’s Manual Disclaimers This manual has been carefully checked and believed to contain accurate information. Axiomtek Co., Ltd. assumes no responsibility for any infringements of patents or any third party’s rights, and any liability arising from such use. Axiomtek does not warrant or assume any legal liability or responsibility for the accuracy, completeness or usefulness of any information in this document. Axiomtek does not make any commitment to update the information in this manual. Axiomtek reserves the right to change or revise this document and/or product at any time without notice. No part of this document may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Axiomtek Co., Ltd. Trademarks Acknowledgments Axiomtek is a trademark of Axiomtek Co., Ltd. ® Windows is a trademark of Microsoft Corporation. Other brand names and trademarks are the properties and registered brands of their respective owners. Copyright 2014 Axiomtek Co., Ltd. All Rights Reserved February 2014, Version A2 Printed in Taiwan ii Table of Contents Disclaimers ..................................................................................................... ii Chapter 1 Introduction ............................................. 1 1.1 Specifications ...................................................................................... 2 Chapter 2 Getting Started ......................................
    [Show full text]
  • C2X Liaison: Removal of Deprecated Functions Title: Removal of Deprecated Functions Author: Nick Stoughton / the Austin Group Date: 2020-08-17
    ISO/IEC JTC 1/SC 22/WG 14 Nxxxx Austin Group Document 1056 C2X Liaison: Removal of Deprecated Functions Title: Removal of Deprecated Functions Author: Nick Stoughton / The Austin Group Date: 2020-08-17 As stated in N2528, The Austin Group is currently in the process of revising the POSIX (ISO/IEC Std 9945), and is trying to keep aligned with C17 and C2X changes as necessary. There are several functions that are marked as "Obsolescent" in the current version of the POSIX standard that we would typically remove during this revision process. However, we note that in the current working draft for C2X the two obsolete functions "asctime_r()" and "ctime_r()" have been added. During the August 2020 WG 14 meeting, there was general agreement to seek a paper that more closely aligned the C2X functions with POSIX, noting that it was at very least odd that C2X should be adding functions already marked as obsolete. However, there was also concern that strftime, the proposed alternative to use for these new “asctime_r()” and “ctime_r()” , would “pull in locale baggage not wanted in small embedded programs”. Locale Free Alternatives It should be noted that asctime_r() is currently defined to be equivalent to a simple snprintf() call, and anyone who really wants a locale free way to print the date and time could use this. As an experiment, three equivalent simple programs were constructed: date1.c #include <stdio.h> #include <time.h> char * date1(const struct tm * timeptr , char * buf) { static const char wday_name[7][3] = { "Sun", "Mon", "Tue", "Wed",
    [Show full text]
  • Remove Support for Function Definitions with Identifier Lists Lars Bjønnes, Jens Gustedt
    Remove support for function definitions with identifier lists Lars Bjønnes, Jens Gustedt To cite this version: Lars Bjønnes, Jens Gustedt. Remove support for function definitions with identifier lists. [Research Report] N2432, ISO JCT1/SC22/WG14. 2019. hal-02311466 HAL Id: hal-02311466 https://hal.inria.fr/hal-02311466 Submitted on 10 Oct 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License ISO/IEC JTC 1/SC 22/WG14 N2432 September 25, 2019 v 1 Remove support for function definitions with identifier lists proposal for C2x Lars Gullik Bjønnes and Jens Gustedt CISCO Inc., Norway and INRIA and ICube, Universit´ede Strasbourg, France Function definitions with identifier lists (often referred to as K&R functions) are deprecated for a long time. Because they are now clearly phased out everywhere and because function declarations and definitions that provide a prototypes are clearly superior we propose to remove this feature for good. 1. INTRODUCTION The original syntax for definitions with identifier lists and a subsequent declarator list has the disadvantage that it does not provide a prototype of the defined function, and that the function needs a special convention (called default argument promotion) that leaves the verification of type correspondance between caller and callee to the programmer.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Proposal for C2x WG14 ​N2542 Title: Defer Mechanism for C Author
    Proposal for C2x WG14 n2542 ​ Title: Defer Mechanism for C Author, affiliation: Aaron Ballman, Self Alex Gilding, Perforce Jens Gustedt, Inria, France Tom Scogland, Lawrence Livermore National Laboratory Robert C. Seacord, NCC Group Martin Uecker, University Medical Center Göttingen Freek Wiedijk, Radboud Universiteit Nijmegen Date: 2020-09-08 Proposal category: Feature Target audience: Implementers Abstract: Add a defer mechanism to C language to aid in resource management ​ Prior art: C, Go ​ Defer Mechanism for C Reply-to: Robert C. Seacord ([email protected]) Document No: n2542 ​ Date: 2020-09-08 Defer Mechanism for C The defer mechanism can restore a previously known property or invariant that is altered during the processing of a code block. The defer mechanism is useful for paired operations, where one operation is performed at the start of a code block and the paired operation is performed before exiting the block. Because blocks can be exited using a variety of mechanisms, operations are frequently paired incorrectly. The defer mechanism in C is intended to help ensure the proper pairing of these operations. This pattern is common in resource management, synchronization, and outputting balanced strings (e.g., parenthesis or HTML). A separable feature of the defer mechanism is a panic/recover mechanism that allows error handling at a distance. Table of Contents Defer Mechanism for C 2 Table of Contents 2 Resource Management 4 Acquiring Resources 5 Releasing Resources 5 Synchronization Primitives 7 Security Concerns 9 Error Handling
    [Show full text]
  • Improving Performance of Key “External Projects” in Android
    Improving performance of key “External Projects” in Android Khasim Syed Mohammed, Linaro Objective •What these external projects are ? •Why we should be improving these ? •How to approach •What Linaro has done in this space so far ? •What's on our road map ? •Community participation request .. Android’s external folder aosp@android: $ ls abi build development frameworks Makefile prebuilts art cts device hardware ndk sdk bionic dalvik docs libcore packages external bootable developers system libnativehelper pdk tools We are here Android’s external folder •Android is, in many ways, just another Linux distribution •As such, it includes code from many FOSS projects in the “external” folder ... •… and quite frequently, isn't in sync with what upstreams are doing nor improved for performance. Current situation Android imports an external FOSS project into its git repository •(sometimes a released version, sometimes a git or svn snapshot) •Patches to make it work with Android (and sometimes to add, remove or modify some functionality) are added inside Android's git repository •There is little or no effort made to upstream those changes, some changes are a little bogus (checking in a config.h generated by autoconf to avoid the need to call configure, ...) •A newer upstream release may or may not be merged into Android – if at all, merges typically happen months after the upstream release •Android has no concept of updating an individual component (e.g. openssl) – often leading to important upstream updates being ignored by device makers Analyzing external folder Switching to another document that gives more details Overview of external folder in Linaro repositories Out of 175 components in the external folder, Team Projects Details Google 11 Updated to latest versions, might be tracking and maintaining for performance.
    [Show full text]
  • PCW C Compiler Reference Manual June 2012
    PCW C Compiler Reference Manual June 2012 Table of Contents Overview ........................................................................................................................................... 1 PCB, PCM and PCH Overview ..................................................................................................... 1 PCW Overview .............................................................................................................................. 1 Installation ................................................................................................................................... 10 PCB, PCM, PCH, and PCD Installation: ...................................................................................... 10 PCW, PCWH, PCWHD, and PCDIDE Installation: ..................................................................... 10 Technical Support ....................................................................................................................... 10 Directories ................................................................................................................................... 11 File Formats ................................................................................................................................ 11 Invoking the Command Line Compiler ........................................................................................ 12 Program Syntax .............................................................................................................................
    [Show full text]