| /external/clang/test/CodeGen/ |
| D | ubsan-strip-path-components.cpp | 1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %… 2 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 3 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 5 // Try to strip too much: 6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip… 7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path… 10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 13 …AR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\\5C)C… 16 …OVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|/)([^… [all …]
|
| /external/autotest/client/bin/ |
| D | fsinfo.py | 21 # Example string: '-j -q -i 8192 -b 4096'. There may be extra whitespaces. 24 for item in opt_string.split('-'): 25 item = item.strip() 28 opt_dict['-%s' % opt] = value 30 opt_dict['-%s' % item] = None 48 if '[defaults]' == line.strip(): 50 elif '[fs_types]' == line.strip(): 53 components = line.split('=', 1) 54 if len(components) == 2: 55 default_opt[components[0].strip()] = components[1].strip() [all …]
|
| /external/clang/docs/ |
| D | UndefinedBehaviorSanitizer.rst | 12 UBSan modifies the program at compile-time to catch various kinds of undefined 17 * Conversion to, from, or between floating-point types which would 20 See the full list of available :ref:`checks <ubsan-checks>` below. 22 UBSan has an optional run-time library which provides better error reporting. 33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined`` 38 .. code-block:: console 46 % clang++ -fsanitize=undefined test.cc 50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan, 55 * execute a trap instruction (doesn't require UBSan run-time support). 59 .. code-block:: console [all …]
|
| /external/perfetto/tools/ |
| D | find_scan_roots.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 17 # adb shell 'find /data -print0 | xargs -0 ls -ldZ' | awk '{print $5 " " $9}' 33 def Find(self, components): argument 34 if not components: 37 child = components[0] 39 return self.children[child].Find(components[1:]) 69 line = line.strip() 74 # u:object_r:system_data_file:s0 -> system_data_file. 76 # Strip leading slash. 77 components = path[1:].split('/') [all …]
|
| /external/clang/test/Driver/ |
| D | fubsan-strip-path-components.cpp | 1 // RUN: %clang %s -### -o %t.o -fsanitize-undefined-strip-path-components=42 2>&1 | FileCheck %s 2 // CHECK: "-fsanitize-undefined-strip-path-components=42"
|
| /external/flatbuffers/.bazelci/ |
| D | presubmit.yml | 1 --- 8 SWIFT_HOME: "$HOME/swift-$SWIFT_VERSION" 11 - "echo --- Downloading and extracting Swift $SWIFT_VERSION to $SWIFT_HOME" 12 - "mkdir $SWIFT_HOME" 13 …- "curl https://download.swift.org/swift-${SWIFT_VERSION}-release/ubuntu1804/swift-${SWIFT_VERSION… 15 - "//..." 17 - "//..." 22 SWIFT_HOME: "$HOME/swift-$SWIFT_VERSION" 25 - "echo --- Downloading and extracting Swift $SWIFT_VERSION to $SWIFT_HOME" 26 - "mkdir $SWIFT_HOME" [all …]
|
| /external/llvm/lib/Support/ |
| D | Triple.cpp | 1 //===--- Triple.cpp - Target triple helper class --------------------------===// 8 //===----------------------------------------------------------------------===// 269 .Case("x86-64", x86_64) in getArchTypeForLLVMName() 638 SmallVector<StringRef, 4> Components; in Triple() local 639 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple() 640 if (Components.size() > 0) { in Triple() 641 Arch = parseArch(Components[0]); in Triple() 642 SubArch = parseSubArch(Components[0]); in Triple() 643 if (Components.size() > 1) { in Triple() 644 Vendor = parseVendor(Components[1]); in Triple() [all …]
|
| /external/cronet/build/fuchsia/ |
| D | update_images.py | 3 # Use of this source code is governed by a BSD-style license that can be 35 return ReadFile('sdk-bucket.txt').strip() 53 """Read filename entries from sdk-hash-files.list (one per line), substitute 57 line.strip() for line in ReadFile('sdk-hash-files.list').replace( 60 image_hashes = [ReadFile(filename).strip() for filename in filenames] 83 if bucket == 'fuchsia-sdk': 105 components = boot_image.split('.') 106 if len(components) != 2: 109 device_type, arch = components 130 if bucket == 'fuchsia-sdk' or \ [all …]
|
| /external/swiftshader/third_party/llvm-10.0/llvm/lib/Support/ |
| D | Triple.cpp | 1 //===--- Triple.cpp - Target triple helper class --------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 300 .Case("x86-64", x86_64) in getArchTypeForLLVMName() 552 // "xcoff" must come before "coff" because of the order-dependendent in parseFormat() 735 SmallVector<StringRef, 4> Components; in Triple() local 736 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple() 737 if (Components.size() > 0) { in Triple() 738 Arch = parseArch(Components[0]); in Triple() 739 SubArch = parseSubArch(Components[0]); in Triple() [all …]
|
| /external/cronet/components/cronet/ |
| D | PRESUBMIT.py | 2 # Use of this source code is governed by a BSD-style license that can be 5 """Top-level presubmit script for src/components/cronet. 7 See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts 24 input_api.os_path.join(chromium_src_dir, 'components'), 48 r'^components/cronet/android/api/.*\.(java|template)$') 50 r'^components/cronet/android/java/.*\.(java|template)$') 57 files_to_check=[r'^components/cronet/android/.*\.(java|template)$']) 66 '%s:%d\n %s' % (local_path, line_number, line.strip())) 70 '%s:%d\n %s' % (local_path, line_number, line.strip())) 91 if path.startswith(os.path.join('components', 'cronet', 'tools')): [all …]
|
| /external/libffi/.travis/ |
| D | install.sh | 2 set -x 5 brew update > brew-update.log 2>&1 11 wget -qO - https://rl.gl/cli/rlgl-darwin-amd64.tgz | \ 12 tar --strip-components=2 -xvzf - ./rlgl/rlgl 17 wget -qO - http://rl.gl/cli/rlgl-linux-amd64.tgz | \ 18 tar --strip-components=2 -xvzf - ./rlgl/rlgl 20 sudo apt-get clean # clear the cache 21 sudo apt-get update 23 aarch64-linux-gnu | powerpc64le-unknown-linux-gnu | mips64el-linux-gnu | sparc64-linux-gnu) 25 alpha-linux-gnu | arm32v7-linux-gnu | m68k-linux-gnu | sh4-linux-gnu | s390x-linux-gnu ) [all …]
|
| /external/angle/build/fuchsia/ |
| D | update_images.py | 3 # Use of this source code is governed by a BSD-style license that can be 8 '-release' at the end of the image gcs file name to eliminate the difference 39 return ReadFile('sdk-bucket.txt').strip() 57 """Read filename entries from sdk-hash-files.list (one per line), substitute 61 line.strip() for line in ReadFile('sdk-hash-files.list').replace( 64 image_hashes = [ReadFile(filename).strip() for filename in filenames] 87 if bucket == 'fuchsia-sdk': 109 components = boot_image.split('.') 110 if len(components) != 2: 113 device_type, arch = components [all …]
|
| /external/skia/infra/bots/assets/gcloud_linux/ |
| D | create.py | 5 # Use of this source code is governed by a BSD-style license that can be 22 GCLOUD_BASE_NAME='google-cloud-sdk' 23 GCLOUD_ARCHIVE = '%s-343.0.0-linux-x86_64.tar.gz' % GCLOUD_BASE_NAME 30 subprocess.check_call(['curl', GCLOUD_URL, '-o', GCLOUD_ARCHIVE]) 33 subprocess.check_call(['tar', '-xzf', GCLOUD_ARCHIVE, 34 '--strip-components=1', 35 '-C', target_dir]) 42 subprocess.check_call([gcloud_exe, 'components', 43 'install', 'beta', 'cloud-datastore-emulator', 44 '--quiet'], env=env) [all …]
|
| /external/python/setuptools/pkg_resources/_vendor/jaraco/ |
| D | context.py | 32 # In the tar command, use --strip-components=1 to strip the first path and 34 # use -C to cause the files to be extracted to {target_dir}. This ensures 38 getter = 'wget {url} -O -' 39 extract = 'tar x{compression} --strip-components=1 -C {target_dir}' 45 runner('rm -Rf {target_dir}'.format(**vars())) 53 compression_indicator = url[-2:] 84 cmd.extend(['--branch', branch])
|
| /external/python/setuptools/setuptools/_vendor/jaraco/ |
| D | context.py | 32 # In the tar command, use --strip-components=1 to strip the first path and 34 # use -C to cause the files to be extracted to {target_dir}. This ensures 38 getter = 'wget {url} -O -' 39 extract = 'tar x{compression} --strip-components=1 -C {target_dir}' 45 runner('rm -Rf {target_dir}'.format(**vars())) 53 compression_indicator = url[-2:] 84 cmd.extend(['--branch', branch])
|
| /external/AFLplusplus/utils/dynamic_covfilter/ |
| D | make_symbol_list.py | 21 output = subprocess.check_output(["objdump", "-t", binfile]).decode("utf-8") 24 components = [x for x in line.split(" ") if x] variable 25 if not components: 28 start_addr = int(components[0], 16) 34 for comp in components[1:]: 45 func = components[-1] 56 "llvm-addr2line", 57 "--output-style=JSON", 58 "-f", "-C", "-a", "-e", 60 input="\n".join(addrs).encode("utf-8")).decode("utf-8") [all …]
|
| /external/swiftshader/third_party/llvm-16.0/llvm/lib/TargetParser/ |
| D | Triple.cpp | 1 //===--- Triple.cpp - Target triple helper class --------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 354 .Case("x86-64", x86_64) in getArchTypeForLLVMName() 648 // "xcoff" must come before "coff" because of the order-dependendent in parseFormat() 894 SmallVector<StringRef, 4> Components; in Triple() local 895 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple() 896 if (Components.size() > 0) { in Triple() 897 Arch = parseArch(Components[0]); in Triple() 898 SubArch = parseSubArch(Components[0]); in Triple() [all …]
|
| /external/harfbuzz_ng/src/ |
| D | gen-arabic-table.py | 3 """usage: ./gen-arabic-table.py ArabicShaping.txt UnicodeData.txt Blocks.txt 16 files = [open (x, encoding='utf-8') for x in sys.argv[1:]] 32 fields = [x.strip () for x in line.split (';')] 56 fields = [x.strip () for x in line.split (';')] 82 last = -100000 85 if u - last <= 1+16*5: 86 ranges[-1][-1] = u 124 offset += end - start + 1 143 …print (" if (hb_in_range<hb_codepoint_t> (u, 0x%04Xu, 0x%04Xu)) return joining_table[u - 0x%0… 180 fields = [x.strip () for x in line.split (';')] [all …]
|
| /external/libchrome/libchrome_tools/uprev/ |
| D | lazytree.py | 3 # Use of this source code is governed by a BSD-style license that can be 41 output = subprocess.check_output(['git', 'ls-tree', self._treehash]).split(b'\n') 56 def _remove(self, components): argument 57 """Removes components from self tree. 60 components: the path to remove, relative to self. Each element means 65 if len(components) == 1: 66 del self._files[components[0]] 70 dirname, components = components[0], components[1:] 72 subdir._remove(components) 82 components = path.split(b'/') [all …]
|
| /external/angle/build/config/siso/ |
| D | clang_code_coverage_wrapper.star | 1 # -*- bazel-starlark -*- 3 # Use of this source code is governed by a BSD-style license that can be 11 # in ordre to strip coverage flags without process invocation. 18 "-fprofile-instr-generate", 19 "-fcoverage-mapping", 20 "-mllvm", 21 "-runtime-counter-relocation=true", 26 "-mllvm", 27 "-limited-coverage-experimental=true", 53 …browser/media/router/providers/cast/cast_internal_message_util.cc", #pylint: disable=line-too-long [all …]
|
| /external/grpc-grpc/tools/bazelify_tests/ |
| D | grpc_run_distribtest_test.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -e 23 tar -xopf ${ARCHIVE_WITH_SUBMODULES} 28 mkdir -p input_artifacts 34 # of the archive itself (and strip the "artifact/" prefix) 39 mkdir -p "${archive_extract_dir}" 41 tar --strip-components=1 -xopf ../../../${input_artifact_archive} 46 ls -lR input_artifacts
|
| D | grpc_build_artifact_task.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -e 26 tar -xopf ${ARCHIVE_WITH_SUBMODULES} 31 mkdir -p input_artifacts 37 # of the archive itself (and strip the "artifact/" prefix) 42 mkdir -p "${archive_extract_dir}" 44 tar --strip-components=1 -xopf ../../../${input_artifact_archive} 49 mkdir -p artifacts 65 tar -czvf ../"${ARTIFACTS_OUT_FILE}" artifacts
|
| /external/fonttools/Lib/fontTools/ |
| D | afmLib.py | 15 -60 19 (65, 668, (8, -25, 660, 666)) 24 'TestFont-Regular' 35 >>> f[("A","V")] = -150 # Tighten kerning 39 >>> #f.write("testfont-squished.afm") 51 identifierRE = re.compile(r"^([A-Za-z]+).*") 55 r"(-?\d+)" # charnum 57 r"(-?\d+)" # width 59 r"([.A-Za-z0-9_]+)" # charname 61 r"(-?\d+)" # left [all …]
|
| /external/aws-sdk-java-v2/codegen/src/main/resources/software/amazon/awssdk/codegen/rules/ |
| D | AwsEndpointProviderUtils.java.resource | 46 return invokeSafely(() -> { 95 …URI newUrl = invokeSafely(() -> new URI(originalUrl.getScheme(), null, newHost, originalUrl.getPor… 106 * may add components to the path if it's modeled for the operation. Unfortunately, 111 …* To solve this issue, we pass in the endpoint set on the path, which allows us to the strip the p… 144 …* need to strip the client endpoint path from the marshalled request path to isolate just the part… 156 String[] components = splitHostLabelOnDots(prefix); 157 for (String component : components) {
|
| /external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/endpoints/internal/ |
| D | AwsEndpointProviderUtils.java | 59 return invokeSafely(() -> { in endpointBuiltIn() 108 …URI newUrl = invokeSafely(() -> new URI(originalUrl.getScheme(), null, newHost, originalUrl.getPor… in addHostPrefix() 119 * may add components to the path if it's modeled for the operation. Unfortunately, 124 …* To solve this issue, we pass in the endpoint set on the path, which allows us to the strip the p… 157 …* need to strip the client endpoint path from the marshalled request path to isolate just the part… 169 String[] components = splitHostLabelOnDots(prefix); in validatePrefixIsHostNameCompliant() local 170 for (String component : components) { in validatePrefixIsHostNameCompliant()
|