@@ -31782,7 +31782,7 @@ static StringRef getInstrStrFromOpNo(const SmallVectorImpl<StringRef> &AsmStrs,
31782
31782
for (auto &AsmStr : AsmStrs) {
31783
31783
// Match the OpNo string. We should match exactly to exclude match
31784
31784
// sub-string, e.g. "$12" contain "$1"
31785
- if (AsmStr.endswith (OpNoStr1))
31785
+ if (AsmStr.ends_with (OpNoStr1))
31786
31786
I = AsmStr.size() - OpNoStr1.size();
31787
31787
31788
31788
// Get the index of operand in AsmStr.
@@ -56317,7 +56317,7 @@ static bool matchAsm(StringRef S, ArrayRef<const char *> Pieces) {
56317
56317
S = S.substr(S.find_first_not_of(" \t")); // Skip leading whitespace.
56318
56318
56319
56319
for (StringRef Piece : Pieces) {
56320
- if (!S.startswith (Piece)) // Check if the piece matches.
56320
+ if (!S.starts_with (Piece)) // Check if the piece matches.
56321
56321
return false;
56322
56322
56323
56323
S = S.substr(Piece.size());
@@ -57456,7 +57456,7 @@ X86TargetLowering::EmitKCFICheck(MachineBasicBlock &MBB,
57456
57456
assert(Target.isSymbol() && "Unexpected target operand for a direct call");
57457
57457
// X86TargetLowering::EmitLoweredIndirectThunk always uses r11 for
57458
57458
// 64-bit indirect thunk calls.
57459
- assert(StringRef(Target.getSymbolName()).endswith ("_r11") &&
57459
+ assert(StringRef(Target.getSymbolName()).ends_with ("_r11") &&
57460
57460
"Unexpected register for an indirect thunk call");
57461
57461
TargetReg = X86::R11;
57462
57462
break;
0 commit comments