Home
last modified time | relevance | path

Searched +full:- +full:pie (Results 1 – 25 of 352) sorted by relevance

12345678910>>...15

/external/clang/test/Driver/
Dpic.c4 // CHECK-NO-PIC: "-mrelocation-model" "static"
5 // CHECK-NO-PIC-NOT: "-pic-level"
6 // CHECK-NO-PIC-NOT: "-pic-is-pie"
8 // CHECK-PIC1: "-mrelocation-model" "pic"
9 // CHECK-PIC1: "-pic-level" "1"
10 // CHECK-PIC1-NOT: "-pic-is-pie"
12 // CHECK-PIC2: "-mrelocation-model" "pic"
13 // CHECK-PIC2: "-pic-level" "2"
14 // CHECK-PIC2-NOT: "-pic-is-pie"
16 // CHECK-STATIC: "-static"
[all …]
Dps4-pic.c1 // REQUIRES: x86-registered-target
7 // CHECK-NO-PIC: "-mrelocation-model" "static"
8 // CHECK-NO-PIC-NOT: "-pic-level"
9 // CHECK-NO-PIC-NOT: "-pic-is-pie"
11 // CHECK-DYNAMIC-NO-PIC2: unsupported option '-mdynamic-no-pic'
12 // CHECK-DYNAMIC-NO-PIC2: "-mrelocation-model" "dynamic-no-pic"
14 // CHECK-PIC2: "-mrelocation-model" "pic"
15 // CHECK-PIC2: "-pic-level" "2"
17 // CHECK-PIE2: "-mrelocation-model" "pic"
18 // CHECK-PIE2: "-pic-is-pie"
[all …]
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
Dfreebsd-mips-as.c3 // RUN: %clang -target mips-unknown-freebsd -### \
4 // RUN: -no-integrated-as -c %s 2>&1 \
5 // RUN: | FileCheck -check-prefix=MIPS32-EB-AS %s
6 // MIPS32-EB-AS: as{{(.exe)?}}" "-march" "mips32r2" "-mabi" "32" "-EB"
7 // MIPS32-EB-AS-NOT: "-KPIC"
9 // RUN: %clang -target mips-unknown-freebsd -### \
10 // RUN: -no-integrated-as -fPIC -c %s 2>&1 \
11 // RUN: | FileCheck -check-prefix=MIPS32-EB-PIC %s
12 // MIPS32-EB-PIC: as{{(.exe)?}}" "-march" "mips32r2" "-mabi" "32" "-EB"
13 // MIPS32-EB-PIC: "-KPIC"
[all …]
Dfreebsd.c1 // RUN: %clang -no-canonical-prefixes \
2 // RUN: -target aarch64-pc-freebsd11 %s \
3 // RUN: --sysroot=%S/Inputs/basic_freebsd64_tree -### 2>&1 \
4 // RUN: | FileCheck --check-prefix=CHECK-ARM64 %s
5 // CHECK-ARM64: "-cc1" "-triple" "aarch64-pc-freebsd11"
6 // CHECK-ARM64: ld{{.*}}" "--sysroot=[[SYSROOT:[^"]+]]"
7-ARM64: "--eh-frame-hdr" "-dynamic-linker" "{{.*}}ld-elf{{.*}}" "-o" "a.out" "{{.*}}crt1.o" "{{.*}…
9 // RUN: %clang -no-canonical-prefixes \
10 // RUN: -target powerpc-pc-freebsd8 %s \
11 // RUN: --sysroot=%S/Inputs/basic_freebsd_tree -### 2>&1 \
[all …]
Dnetbsd.c1 // RUN: %clang -no-canonical-prefixes -target x86_64--netbsd \
2 // RUN: --sysroot=%S/Inputs/basic_netbsd_tree %s -### 2>&1 \
3 // RUN: | FileCheck -check-prefix=STATIC %s
4 // RUN: %clang -no-canonical-prefixes -target x86_64--netbsd \
5 // RUN: -pie --sysroot=%S/Inputs/basic_netbsd_tree %s -### 2>&1 \
6 // RUN: | FileCheck -check-prefix=PIE %s
7 // RUN: %clang -no-canonical-prefixes -target x86_64--netbsd \
8 // RUN: -shared --sysroot=%S/Inputs/basic_netbsd_tree %s -### 2>&1 \
9 // RUN: | FileCheck -check-prefix=SHARED %s
11 // RUN: %clang -no-canonical-prefixes -target x86_64--netbsd \
[all …]
Dcloudabi.c1 // RUN: %clang %s -### -target x86_64-unknown-cloudabi 2>&1 | FileCheck %s -check-prefix=SAFESTACK
2 // SAFESTACK: "-cc1" "-triple" "x86_64-unknown-cloudabi" {{.*}} "-ffunction-sections" "-fdata-secti…
3 …CK: "-Bstatic" "-pie" "--no-dynamic-linker" "-zrelro" "--eh-frame-hdr" "--gc-sections" "-o" "a.out…
5 // RUN: %clang %s -### -target x86_64-unknown-cloudabi -fno-sanitize=safe-stack 2>&1 | FileCheck %s…
6 // NOSAFESTACK: "-cc1" "-triple" "x86_64-unknown-cloudabi" {{.*}} "-ffunction-sections" "-fdata-sec…
7 // NOSAFESTACK-NOT: "-fsanitize=safe-stack"
8 …CK: "-Bstatic" "-pie" "--no-dynamic-linker" "-zrelro" "--eh-frame-hdr" "--gc-sections" "-o" "a.out…
/external/androidplot/Examples/DemoApp/src/com/androidplot/demos/
DSimplePieChartActivity.java8 * http://www.apache.org/licenses/LICENSE-2.0
24 import com.androidplot.pie.PieChart;
25 import com.androidplot.pie.PieRenderer;
26 import com.androidplot.pie.Segment;
27 import com.androidplot.pie.SegmentFormatter;
38 private PieChart pie; field in SimplePieChartActivity
53 pie = (PieChart) findViewById(R.id.mySimplePieChart); in onCreate()
67 pie.getRenderer(PieRenderer.class).setDonutSize(seekBar.getProgress()/100f, in onCreate()
69 pie.redraw(); in onCreate()
105 pie.addSeries(s1, sf1); in onCreate()
[all …]
/external/iproute2/man/man8/
Dtc-pie.81 .TH PIE 8 "16 January 2014" "iproute2" "Linux"
3 PIE \- Proportional Integral controller-Enhanced AQM algorithm
5 .B tc qdisc ... pie
27 Proportional Integral controller-Enhanced (PIE) is a control theoretic active
92 # tc qdisc add dev eth0 root pie
93 # tc -s qdisc show
94 qdisc pie 8034: dev eth0 root refcnt 2 limit 200p target 19000us tupdate 29000us alpha 2 beta 20
100 # tc qdisc add dev eth0 root pie limit 100 target 20ms tupdate 30ms ecn
101 # tc -s qdisc show
102 qdisc pie 8036: dev eth0 root refcnt 2 limit 200p target 19000 tupdate 29000 alpha 2 beta 20 ecn
[all …]
/external/compiler-rt/test/profile/Linux/
Dcoverage_test.cpp1 // RUN: %clang_profgen -fuse-ld=gold -O2 -fdata-sections -ffunction-sections -fcoverage-mapping -Wl…
3 // RUN: llvm-profdata merge -o %t.profdata %t.profraw
4 // RUN: llvm-cov show %t -instr-profile %t.profdata -filename-equivalence 2>&1 | FileCheck %s
5 …r than 2.26 has a bug that per-func profile data will be wrongly garbage collected when GC is turn…
6 // RUN: %clang_profgen -O2 -fcoverage-mapping -o %t.2 %s
8 // RUN: llvm-profdata merge -o %t.2.profdata %t.2.profraw
9 // RUN: llvm-cov show %t.2 -instr-profile %t.2.profdata -filename-equivalence 2>&1 | FileCheck %s
12 // RUN: %clang_profgen -O2 -fcoverage-mapping -Wl,--gc-sections -o %t.3 %s
13 // RUN: llvm-objdump -h %t.3 | FileCheck --check-prefix COVMAP %s
14 // Check PIE option
[all …]
/external/toolchain-utils/go/
Dgo_target2 set -e -o pipefail
8 # position independent executable (PIE) for ASLR.
22 -ldflags | -ldflags=*) return 0 ;;
23 -linkmode | -linkmode=*) return 0 ;;
24 -buildmode | -buildmode=*) return 0 ;;
25 -installsuffix | -installsuffix=*) return 0 ;;
26 -extld | -extld=*) return 0 ;;
27 -extldflags | -extldflags=*) return 0 ;;
38 # Add "-buildmode=pie" to "go build|install|run|test" commands.
41 [[ "${GOOS}" == "android" ]] || pie_flags+=( "-buildmode=pie" )
[all …]
/external/compiler-rt/test/tsan/
Dpie_test.cc1 // Check if tsan work with PIE binaries.
2 // RUN: %clang_tsan %s -pie -fpic -o %t && %run %t
4 // Some kernels might map PIE segments outside the current segment
/external/swiftshader/third_party/llvm-7.0/llvm/test/Linker/
Dmodule-flags-pic-2-a.ll1 ; RUN: llvm-link %s %p/Inputs/module-flags-pic-2-b.ll -S -o - | FileCheck %s
3 ; test linking modules with two different PIC and PIE levels
6 !1 = !{ i32 7, !"PIE Level", i32 1 }
11 ; CHECK: !1 = !{i32 7, !"PIE Level", i32 2}
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/X86/
Dglobal-access-pie-copyrelocs.ll1 ; RUN: llc < %s -emulated-tls -mcpu=generic -mtriple=x86_64-linux-gnu -relocation-model=pic -pie-co…
2 ; RUN: | FileCheck -check-prefix=X64 %s
3 ; RUN: llc < %s -emulated-tls -mcpu=generic -mtriple=i386-linux-gnu -relocation-model=pic -pie-copy
4 ; RUN: | FileCheck -check-prefix=X32 %s
6 ; RUN: llc < %s -mcpu=generic -mtriple=x86_64-linux-gnu -relocation-model=pic -pie-copy-relocations…
7 ; RUN: | FileCheck -check-prefix=X64 %s
8 ; RUN: llc < %s -mcpu=generic -mtriple=i386-linux-gnu -relocation-model=pic -pie-copy-relocations \
9 ; RUN: | FileCheck -check-prefix=X32 %s
15 ; X32-LABEL: my_access_global_a:
17 ; X32-NEXT: movl a@GOTOFF(%eax), %eax
[all …]
/external/tensorflow/tensorflow/lite/tools/benchmark/
DBUILD12 common_copts = ["-Wall"] + tflite_copts()
28 "-pie", # Android 5.0 and later supports only PIE
29 "-lm", # some builtin ops, e.g., tanh, need -lm
47 "-pie", # Android 5.0 and later supports only PIE
48 "-lm", # some builtin ops, e.g., tanh, need -lm
64 "--graph=$(location //tensorflow/lite:testdata/multi_add.bin)",
/external/icu/icu4c/source/data/unit/
Des_GT.txt57 cubic-centimeter{
58 per{"{0} por pie cúbico"}
83 dnam{"pie"}
92 acre-foot{
93 dnam{"acre pie"}
/external/toolchain-utils/go/chromeos/
Dbuild_go2 set -e -o pipefail
8 # It assumes that the "x86_64-cros-linux-gnu" toolchain is already installed.
9 # It assumes that the "armv7a-cros-linux-gnueabi" toolchain is already installed.
10 # It assumes that the "aarch64-cros-linux-gnu" toolchain is already installed.
12 if [[ ! -e "make.bash" && -e "src/make.bash" ]]
19 CC_FOR_TARGET="x86_64-cros-linux-gnu-clang" \
20 CXX_FOR_TARGET="x86_64-cros-linux-gnu-clang++" \
21 ./make.bash --no-clean
23 CC="x86_64-cros-linux-gnu-clang" \
24 CXX="x86_64-cros-linux-gnu-clang++" \
[all …]
/external/bcc/cmake/
DFindCompilerFlag.cmake5 set(COMPILER_NOPIE_FLAG "-nopie")
8 set(CMAKE_REQUIRED_FLAGS "-no-pie")
12 set(COMPILER_NOPIE_FLAG "-no-pie")
/external/compiler-rt/test/asan/TestCases/
Dinterface_test.cc2 // RUN: %clang_asan %s -o %t && %run %t
3 // RUN: %clang_asan -x c %s -o %t && %run %t
4 // RUN: %clang %s -pie -o %t && %run %t
5 // RUN: %clang -x c %s -pie -o %t && %run %t
Dsanity_check_pure_c.c2 // RUN: %clang_asan -O2 %s -o %t
5 // Sanity checking a test in pure C with -pie.
6 // RUN: %clang_asan -O2 %s -pie -fPIE -o %t
8 // XFAIL: arm-linux-gnueabi
9 // XFAIL: armv7l-unknown-linux-gnueabihf
16 // CHECK: heap-use-after-free in main()
18 // CHECK: main{{.*}}sanity_check_pure_c.c:[[@LINE-4]] in main()
20 // CHECK: main{{.*}}sanity_check_pure_c.c:[[@LINE-7]] in main()
/external/u-boot/arch/arc/
DMakefile1 # SPDX-License-Identifier: GPL-2.0+
3 libs-y += arch/arc/cpu/$(CPU)/
4 libs-y += arch/arc/lib/
6 # MetaWare debugger doesn't support PIE (position-independent executable)
7 # so the only way to load U-Boot in MDB is to fake it by:
8 # 1. Reset PIE flag in ELF header
16 mdbtrick: u-boot
17 $(Q)printf '\x02' | dd of=u-boot bs=1 seek=$(EXEC_TYPE_OFFSET) count=1 \
19 $(Q)$(CROSS_COMPILE)strip -g u-boot
/external/tensorflow/tensorflow/lite/examples/minimal/
DBUILD17 "-pie", # Android 5.0 and later supports only PIE
18 "-lm", # some builtin ops, e.g., tanh, need -lm
/external/modp_b64/
DMakefile7 # http://www.apache.org/licenses/LICENSE-2.0
17 CXXFLAGS += -I$(SRC)/modp_b64/
18 CXX_STATIC_LIBRARY(libmodpb64.pie.a): $(CXX_OBJECTS)
20 all: CXX_STATIC_LIBRARY(libmodpb64.pie.a)
/external/linux-kselftest/tools/testing/selftests/powerpc/pmu/ebb/
DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 $(MAKE) -C ../../
5 # The EBB handler is 64-bit code and everything links against it
6 CFLAGS += -m64
8 # Toolchains may build PIE by default which breaks the assembly
9 LDFLAGS += -no-pie
/external/swiftshader/third_party/llvm-7.0/llvm/test/Bitcode/
Dupgrade-module-flag.ll1 ; RUN: llvm-as < %s | llvm-dis | FileCheck %s
2 ; RUN: verify-uselistorder < %s
7 !1 = !{i32 1, !"PIE Level", i32 1}
8 !2 = !{i32 1, !"Objective-C Image Info Version", i32 0}
9 !3 = !{i32 1, !"Objective-C Image Info Section", !"__DATA, __objc_imageinfo, regular, no_dead_strip…
12 ; CHECK: !1 = !{i32 7, !"PIE Level", i32 1}
13 ; CHECK: !2 = !{i32 1, !"Objective-C Image Info Version", i32 0}
14 ; CHECK: !3 = !{i32 1, !"Objective-C Image Info Section", !"__DATA,__objc_imageinfo,regular,no_dead…
15 ; CHECK: !4 = !{i32 4, !"Objective-C Class Properties", i32 0}

12345678910>>...15