Home
last modified time | relevance | path

Searched +full:- +full:- +full:strip +full:- +full:components (Results 1 – 25 of 600) sorted by relevance

12345678910>>...24

/external/clang/test/CodeGen/
Dubsan-strip-path-components.cpp1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %…
2-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
3-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
5 // Try to strip too much:
6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip…
7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path
10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
13 …AR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\\5C)C…
16 …OVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|/)([^…
[all …]
/external/autotest/client/bin/
Dfsinfo.py21 # Example string: '-j -q -i 8192 -b 4096'. There may be extra whitespaces.
24 for item in opt_string.split('-'):
25 item = item.strip()
28 opt_dict['-%s' % opt] = value
30 opt_dict['-%s' % item] = None
48 if '[defaults]' == line.strip():
50 elif '[fs_types]' == line.strip():
53 components = line.split('=', 1)
54 if len(components) == 2:
55 default_opt[components[0].strip()] = components[1].strip()
[all …]
/external/clang/docs/
DUndefinedBehaviorSanitizer.rst12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
38 .. code-block:: console
46 % clang++ -fsanitize=undefined test.cc
50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan,
55 * execute a trap instruction (doesn't require UBSan run-time support).
59 .. code-block:: console
[all …]
/external/perfetto/tools/
Dfind_scan_roots.py8 # http://www.apache.org/licenses/LICENSE-2.0
17 # adb shell 'find /data -print0 | xargs -0 ls -ldZ' | awk '{print $5 " " $9}'
33 def Find(self, components): argument
34 if not components:
37 child = components[0]
39 return self.children[child].Find(components[1:])
69 line = line.strip()
74 # u:object_r:system_data_file:s0 -> system_data_file.
76 # Strip leading slash.
77 components = path[1:].split('/')
[all …]
/external/clang/test/Driver/
Dfubsan-strip-path-components.cpp1 // RUN: %clang %s -### -o %t.o -fsanitize-undefined-strip-path-components=42 2>&1 | FileCheck %s
2 // CHECK: "-fsanitize-undefined-strip-path-components=42"
/external/flatbuffers/.bazelci/
Dpresubmit.yml1 ---
8 SWIFT_HOME: "$HOME/swift-$SWIFT_VERSION"
11 - "echo --- Downloading and extracting Swift $SWIFT_VERSION to $SWIFT_HOME"
12 - "mkdir $SWIFT_HOME"
13- "curl https://download.swift.org/swift-${SWIFT_VERSION}-release/ubuntu1804/swift-${SWIFT_VERSION…
15 - "//..."
17 - "//..."
22 SWIFT_HOME: "$HOME/swift-$SWIFT_VERSION"
25 - "echo --- Downloading and extracting Swift $SWIFT_VERSION to $SWIFT_HOME"
26 - "mkdir $SWIFT_HOME"
[all …]
/external/llvm/lib/Support/
DTriple.cpp1 //===--- Triple.cpp - Target triple helper class --------------------------===//
8 //===----------------------------------------------------------------------===//
269 .Case("x86-64", x86_64) in getArchTypeForLLVMName()
638 SmallVector<StringRef, 4> Components; in Triple() local
639 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple()
640 if (Components.size() > 0) { in Triple()
641 Arch = parseArch(Components[0]); in Triple()
642 SubArch = parseSubArch(Components[0]); in Triple()
643 if (Components.size() > 1) { in Triple()
644 Vendor = parseVendor(Components[1]); in Triple()
[all …]
/external/cronet/build/fuchsia/
Dupdate_images.py3 # Use of this source code is governed by a BSD-style license that can be
35 return ReadFile('sdk-bucket.txt').strip()
53 """Read filename entries from sdk-hash-files.list (one per line), substitute
57 line.strip() for line in ReadFile('sdk-hash-files.list').replace(
60 image_hashes = [ReadFile(filename).strip() for filename in filenames]
83 if bucket == 'fuchsia-sdk':
105 components = boot_image.split('.')
106 if len(components) != 2:
109 device_type, arch = components
130 if bucket == 'fuchsia-sdk' or \
[all …]
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Support/
DTriple.cpp1 //===--- Triple.cpp - Target triple helper class --------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
300 .Case("x86-64", x86_64) in getArchTypeForLLVMName()
552 // "xcoff" must come before "coff" because of the order-dependendent in parseFormat()
735 SmallVector<StringRef, 4> Components; in Triple() local
736 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple()
737 if (Components.size() > 0) { in Triple()
738 Arch = parseArch(Components[0]); in Triple()
739 SubArch = parseSubArch(Components[0]); in Triple()
[all …]
/external/cronet/components/cronet/
DPRESUBMIT.py2 # Use of this source code is governed by a BSD-style license that can be
5 """Top-level presubmit script for src/components/cronet.
7 See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts
24 input_api.os_path.join(chromium_src_dir, 'components'),
48 r'^components/cronet/android/api/.*\.(java|template)$')
50 r'^components/cronet/android/java/.*\.(java|template)$')
57 files_to_check=[r'^components/cronet/android/.*\.(java|template)$'])
66 '%s:%d\n %s' % (local_path, line_number, line.strip()))
70 '%s:%d\n %s' % (local_path, line_number, line.strip()))
91 if path.startswith(os.path.join('components', 'cronet', 'tools')):
[all …]
/external/libffi/.travis/
Dinstall.sh2 set -x
5 brew update > brew-update.log 2>&1
11 wget -qO - https://rl.gl/cli/rlgl-darwin-amd64.tgz | \
12 tar --strip-components=2 -xvzf - ./rlgl/rlgl
17 wget -qO - http://rl.gl/cli/rlgl-linux-amd64.tgz | \
18 tar --strip-components=2 -xvzf - ./rlgl/rlgl
20 sudo apt-get clean # clear the cache
21 sudo apt-get update
23 aarch64-linux-gnu | powerpc64le-unknown-linux-gnu | mips64el-linux-gnu | sparc64-linux-gnu)
25 alpha-linux-gnu | arm32v7-linux-gnu | m68k-linux-gnu | sh4-linux-gnu | s390x-linux-gnu )
[all …]
/external/angle/build/fuchsia/
Dupdate_images.py3 # Use of this source code is governed by a BSD-style license that can be
8 '-release' at the end of the image gcs file name to eliminate the difference
39 return ReadFile('sdk-bucket.txt').strip()
57 """Read filename entries from sdk-hash-files.list (one per line), substitute
61 line.strip() for line in ReadFile('sdk-hash-files.list').replace(
64 image_hashes = [ReadFile(filename).strip() for filename in filenames]
87 if bucket == 'fuchsia-sdk':
109 components = boot_image.split('.')
110 if len(components) != 2:
113 device_type, arch = components
[all …]
/external/skia/infra/bots/assets/gcloud_linux/
Dcreate.py5 # Use of this source code is governed by a BSD-style license that can be
22 GCLOUD_BASE_NAME='google-cloud-sdk'
23 GCLOUD_ARCHIVE = '%s-343.0.0-linux-x86_64.tar.gz' % GCLOUD_BASE_NAME
30 subprocess.check_call(['curl', GCLOUD_URL, '-o', GCLOUD_ARCHIVE])
33 subprocess.check_call(['tar', '-xzf', GCLOUD_ARCHIVE,
34 '--strip-components=1',
35 '-C', target_dir])
42 subprocess.check_call([gcloud_exe, 'components',
43 'install', 'beta', 'cloud-datastore-emulator',
44 '--quiet'], env=env)
[all …]
/external/python/setuptools/pkg_resources/_vendor/jaraco/
Dcontext.py32 # In the tar command, use --strip-components=1 to strip the first path and
34 # use -C to cause the files to be extracted to {target_dir}. This ensures
38 getter = 'wget {url} -O -'
39 extract = 'tar x{compression} --strip-components=1 -C {target_dir}'
45 runner('rm -Rf {target_dir}'.format(**vars()))
53 compression_indicator = url[-2:]
84 cmd.extend(['--branch', branch])
/external/python/setuptools/setuptools/_vendor/jaraco/
Dcontext.py32 # In the tar command, use --strip-components=1 to strip the first path and
34 # use -C to cause the files to be extracted to {target_dir}. This ensures
38 getter = 'wget {url} -O -'
39 extract = 'tar x{compression} --strip-components=1 -C {target_dir}'
45 runner('rm -Rf {target_dir}'.format(**vars()))
53 compression_indicator = url[-2:]
84 cmd.extend(['--branch', branch])
/external/AFLplusplus/utils/dynamic_covfilter/
Dmake_symbol_list.py21 output = subprocess.check_output(["objdump", "-t", binfile]).decode("utf-8")
24 components = [x for x in line.split(" ") if x] variable
25 if not components:
28 start_addr = int(components[0], 16)
34 for comp in components[1:]:
45 func = components[-1]
56 "llvm-addr2line",
57 "--output-style=JSON",
58 "-f", "-C", "-a", "-e",
60 input="\n".join(addrs).encode("utf-8")).decode("utf-8")
[all …]
/external/swiftshader/third_party/llvm-16.0/llvm/lib/TargetParser/
DTriple.cpp1 //===--- Triple.cpp - Target triple helper class --------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
354 .Case("x86-64", x86_64) in getArchTypeForLLVMName()
648 // "xcoff" must come before "coff" because of the order-dependendent in parseFormat()
894 SmallVector<StringRef, 4> Components; in Triple() local
895 StringRef(Data).split(Components, '-', /*MaxSplit*/ 3); in Triple()
896 if (Components.size() > 0) { in Triple()
897 Arch = parseArch(Components[0]); in Triple()
898 SubArch = parseSubArch(Components[0]); in Triple()
[all …]
/external/harfbuzz_ng/src/
Dgen-arabic-table.py3 """usage: ./gen-arabic-table.py ArabicShaping.txt UnicodeData.txt Blocks.txt
16 files = [open (x, encoding='utf-8') for x in sys.argv[1:]]
32 fields = [x.strip () for x in line.split (';')]
56 fields = [x.strip () for x in line.split (';')]
82 last = -100000
85 if u - last <= 1+16*5:
86 ranges[-1][-1] = u
124 offset += end - start + 1
143 …print (" if (hb_in_range<hb_codepoint_t> (u, 0x%04Xu, 0x%04Xu)) return joining_table[u - 0x%0…
180 fields = [x.strip () for x in line.split (';')]
[all …]
/external/libchrome/libchrome_tools/uprev/
Dlazytree.py3 # Use of this source code is governed by a BSD-style license that can be
41 output = subprocess.check_output(['git', 'ls-tree', self._treehash]).split(b'\n')
56 def _remove(self, components): argument
57 """Removes components from self tree.
60 components: the path to remove, relative to self. Each element means
65 if len(components) == 1:
66 del self._files[components[0]]
70 dirname, components = components[0], components[1:]
72 subdir._remove(components)
82 components = path.split(b'/')
[all …]
/external/angle/build/config/siso/
Dclang_code_coverage_wrapper.star1 # -*- bazel-starlark -*-
3 # Use of this source code is governed by a BSD-style license that can be
11 # in ordre to strip coverage flags without process invocation.
18 "-fprofile-instr-generate",
19 "-fcoverage-mapping",
20 "-mllvm",
21 "-runtime-counter-relocation=true",
26 "-mllvm",
27 "-limited-coverage-experimental=true",
53 …browser/media/router/providers/cast/cast_internal_message_util.cc", #pylint: disable=line-too-long
[all …]
/external/grpc-grpc/tools/bazelify_tests/
Dgrpc_run_distribtest_test.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -e
23 tar -xopf ${ARCHIVE_WITH_SUBMODULES}
28 mkdir -p input_artifacts
34 # of the archive itself (and strip the "artifact/" prefix)
39 mkdir -p "${archive_extract_dir}"
41 tar --strip-components=1 -xopf ../../../${input_artifact_archive}
46 ls -lR input_artifacts
Dgrpc_build_artifact_task.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -e
26 tar -xopf ${ARCHIVE_WITH_SUBMODULES}
31 mkdir -p input_artifacts
37 # of the archive itself (and strip the "artifact/" prefix)
42 mkdir -p "${archive_extract_dir}"
44 tar --strip-components=1 -xopf ../../../${input_artifact_archive}
49 mkdir -p artifacts
65 tar -czvf ../"${ARTIFACTS_OUT_FILE}" artifacts
/external/fonttools/Lib/fontTools/
DafmLib.py15 -60
19 (65, 668, (8, -25, 660, 666))
24 'TestFont-Regular'
35 >>> f[("A","V")] = -150 # Tighten kerning
39 >>> #f.write("testfont-squished.afm")
51 identifierRE = re.compile(r"^([A-Za-z]+).*")
55 r"(-?\d+)" # charnum
57 r"(-?\d+)" # width
59 r"([.A-Za-z0-9_]+)" # charname
61 r"(-?\d+)" # left
[all …]
/external/aws-sdk-java-v2/codegen/src/main/resources/software/amazon/awssdk/codegen/rules/
DAwsEndpointProviderUtils.java.resource46 return invokeSafely(() -> {
95 …URI newUrl = invokeSafely(() -> new URI(originalUrl.getScheme(), null, newHost, originalUrl.getPor…
106 * may add components to the path if it's modeled for the operation. Unfortunately,
111 …* To solve this issue, we pass in the endpoint set on the path, which allows us to the strip the p…
144 …* need to strip the client endpoint path from the marshalled request path to isolate just the part…
156 String[] components = splitHostLabelOnDots(prefix);
157 for (String component : components) {
/external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/endpoints/internal/
DAwsEndpointProviderUtils.java59 return invokeSafely(() -> { in endpointBuiltIn()
108 …URI newUrl = invokeSafely(() -> new URI(originalUrl.getScheme(), null, newHost, originalUrl.getPor… in addHostPrefix()
119 * may add components to the path if it's modeled for the operation. Unfortunately,
124 …* To solve this issue, we pass in the endpoint set on the path, which allows us to the strip the p…
157 …* need to strip the client endpoint path from the marshalled request path to isolate just the part…
169 String[] components = splitHostLabelOnDots(prefix); in validatePrefixIsHostNameCompliant() local
170 for (String component : components) { in validatePrefixIsHostNameCompliant()

12345678910>>...24