xref: /aosp_15_r20/external/dtc/tests/line_directives.dts (revision cd60bc56d4bea3af4ec04523e4d71c2b272c8aff)
1*cd60bc56SAndroid Build Coastguard Worker/dts-v1/;
2*cd60bc56SAndroid Build Coastguard Worker
3*cd60bc56SAndroid Build Coastguard Worker/* common format */
4*cd60bc56SAndroid Build Coastguard Worker#line 3 "foo.dts"
5*cd60bc56SAndroid Build Coastguard Worker/* newer gcc format */
6*cd60bc56SAndroid Build Coastguard Worker# 9 "baz.dts" 1
7*cd60bc56SAndroid Build Coastguard Worker/* flags are optional */
8*cd60bc56SAndroid Build Coastguard Worker# 6 "bar.dts"
9*cd60bc56SAndroid Build Coastguard Worker
10*cd60bc56SAndroid Build Coastguard Worker/ {
11*cd60bc56SAndroid Build Coastguard Worker/*
12*cd60bc56SAndroid Build Coastguard Worker * Make sure optional flags don't consume integer data on next line. The issue
13*cd60bc56SAndroid Build Coastguard Worker * was that the {WS} in the trailing ({WS}+[0-9]+)? could cross the * line-
14*cd60bc56SAndroid Build Coastguard Worker * break, and consume the leading "0" of the hex constant, leaving "x12345678"
15*cd60bc56SAndroid Build Coastguard Worker * to be parsed as a number, which is invalid syntax.
16*cd60bc56SAndroid Build Coastguard Worker */
17*cd60bc56SAndroid Build Coastguard Worker	prop1 = <
18*cd60bc56SAndroid Build Coastguard Worker# 10 "qux.dts"
19*cd60bc56SAndroid Build Coastguard Worker		0x12345678
20*cd60bc56SAndroid Build Coastguard Worker	>;
21*cd60bc56SAndroid Build Coastguard Worker/*
22*cd60bc56SAndroid Build Coastguard Worker * Check processing of escapes in filenames
23*cd60bc56SAndroid Build Coastguard Worker */
24*cd60bc56SAndroid Build Coastguard Worker# 100 "\".dts"
25*cd60bc56SAndroid Build Coastguard Worker# 200 "\\.dts"
26*cd60bc56SAndroid Build Coastguard Worker};
27