Home
last modified time | relevance | path

Searched +refs:clang +refs:format +refs:buffer (Results 1 – 25 of 33) sorted by relevance

12

/external/clang/docs/
DClangFormat.rst13 :program:`clang-format` is located in `clang/tools/clang-format` and can be used
14 to format C/C++/Obj-C code.
18 $ clang-format -help
19 OVERVIEW: A tool to format C/C++/Java/JavaScript/Objective-C/Protobuf code.
27 USAGE: clang-format [options] [<file> ...]
31 Clang-format options:
33 -assume-filename=<string> - When reading from stdin, clang-format assumes this
37 clang-format from an editor integration
41 fallback in case clang-format is invoked with
42 -style=file, but can not find the .clang-format
[all …]
DPCHInternals.rst12 Using Precompiled Headers with ``clang``
15 The Clang compiler frontend, ``clang -cc1``, supports two command line options
18 To generate PCH files using ``clang -cc1``, use the option :option:`-emit-pch`:
22 $ clang -cc1 test.h -emit-pch -o test.h.pch
24 This option is transparently used by ``clang`` when generating PCH files. The
32 $ clang -cc1 -include-pch test.h.pch test.c -o test.s
65 AST file format required for modules are discussed in the section on
72 compressed bitstream as `LLVM's bitcode file format
127 An AST file produced by clang is an object file container with a ``clangast``
137 within `LLVM's bitstream format <http://llvm.org/docs/BitCodeFormat.html>`_.
[all …]
DInternalsManual.rst80 ``clang/Basic/Diagnostic*Kinds.td`` files, depending on what library will be
82 diagnostic, the severity of the diagnostic and the English translation + format
129 The format string for the diagnostic is very simple, but it has some power. It
132 some simple format strings:
137 "format string contains '\\0' within the string body"
143 These examples show some important points of format strings. You can use any
156 order as they are specified, you could have a format string with "``%1 %0``"
161 Here are some "best practices" for writing the English format string:
182 including variable names, types, labels, etc. The "``select``" format can be
198 **"s" format**
[all …]
DModules.rst99 … the full complexity of the language. Maintaining a stable binary module format across architectur…
236 The C and C++ preprocessor assumes that the input text is a single linear buffer, but with modules …
677 format and the linker. The notion is similar to Microsoft Visual
762 … in the grammar to describe specific behavior of other declarations. The format of attributes is f…
858 To detect and help address some of these problems, the ``clang-tools-extra`` repository contains a …
877 ``clang/lib/Headers/module.modulemap``
880 ``clang/test/Modules/``
883 ``clang/include/clang/Basic/Module.h``
886 ``clang/include/clang/Lex/ModuleMap.h``
890 …Information about the serialized AST format used for precompiled headers and modules. The actual i…
/external/llvm/test/DebugInfo/Sparc/
Dgnu-window-save.ll7 ; SPARC64: file format ELF64-sparc
23 ; SPARC32: file format ELF32-sparc
51 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
52 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
58 …inct !DICompileUnit(language: DW_LANG_C99, producer: "clang version 3.5 (http://llvm.org/git/clang
69 !11 = !{!"clang version 3.5 (http://llvm.org/git/clang.git 6a0714fee07fb7c4e32d3972b4fe2ce2f5678cf4…
/external/compiler-rt/test/BlocksRuntime/
Dtestfilerunner.m29 static bool readErrorFile(char *buffer, const char *from);
98 bool lookforIn(char *lookfor, const char *format, pid_t child) {
99 char buffer[512];
101 sprintf(buffer, format, child);
102 bool gotOutput = readErrorFile(got, buffer);
104 printf("**** didn't get an output file %s to analyze!!??\n", buffer);
109 printf("didn't find '%s' in output file %s\n", lookfor, buffer);
112 unlink(buffer);
127 char buffer[512];
130 sprintf(buffer, "/tmp/errorfile_%d", getpid());
[all …]
/external/llvm/docs/
DLibFuzzer.rst98 # Get lib/Fuzzer. Assuming that you already have fresh clang in PATH.
101 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer
103 clang++ -fsanitize=address -fsanitize-coverage=edge test_fuzzer.cc Fuzzer*.o
117 # Get lib/Fuzzer. Assuming that you already have fresh clang in PATH.
120 …(cd pcre; ./autogen.sh; CC="clang -fsanitize=address $COV_FLAGS" ./configure --prefix=`pwd`/../ins…
122 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer
142 clang++ -g -fsanitize=address $COV_FLAGS -c -std=c++11 -I inst/include/ pcre_fuzzer.cc
144clang++ -g -fsanitize=address -Wl,--whole-archive inst/lib/*.a -Wl,-no-whole-archive Fuzzer*.o pcr…
215 make -j 32 CC="clang -g -fsanitize=address $COV_FLAGS")
218 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer
[all …]
DSourceLevelDebugging.rst12 information in LLVM. It describes the :ref:`actual format that the LLVM debug
13 information takes <format>`, which is useful for those interested in creating
49 :ref:`implementation-defined format <ccxx_frontend>` (the C/C++ front-end
132 Debugging information format
213 In order to handle this, the LLVM debug format uses the metadata attached to
255 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
262 …!0 = !DICompileUnit(language: DW_LANG_C99, file: !1, producer: "clang version 3.7.0 (trunk 231150)…
272 !10 = !{!"clang version 3.7.0 (trunk 231150) (llvm/trunk 231154)"}
345 The C and C++ front-ends represent information about the program in a format
409 "clang version 3.7.0 (trunk 231150) (llvm/trunk 231154)",
[all …]
DExceptionHandling.rst12 exception handling in LLVM. It describes the format that LLVM exception
36 exception frame format can be found at `Exception Frames
436 a destination address by `llvm.eh.sjlj.longjmp`_. The buffer format and the
438 ``__builtin_setjmp`` implementation allowing code built with the clang and GCC
441 The single parameter is a pointer to a five word buffer in which the calling
458 a buffer populated by `llvm.eh.sjlj.setjmp`_. The frame pointer and stack
459 pointer are restored from the buffer, then control is transferred to the
502 The format of this call frame information (CFI) is often platform-dependent,
503 however. ARM, for example, defines their own format. Apple has their own compact
504 unwind info format. On Windows, another format is used for all architectures
[all …]
/external/clang/docs/CommandGuide/
Dclang.rst1 clang - the Clang C, C++, and Objective-C compiler
7 :program:`clang` [*options*] *filename ...*
12 :program:`clang` is a C, C++, and Objective-C compiler which encompasses
20 The clang executable is actually a small driver which controls the overall
63 the same driver. Please see <http://clang-analyzer.llvm.org> for more details
263 types defined in clang modules or precompiled headers instead of
265 This option implies `-fmodule-format=obj`.
315 assembly files, otherwise this generates LLVM bitcode format object files
417 Adds an implicit #define into the predefines buffer which is read before the
422 Adds an implicit #undef into the predefines buffer which is read before the
[all …]
/external/clang/include/clang/Basic/
DAttrDocs.td13 NOTE: This file is automatically generated by running clang-tblgen
124 …let Heading = "assert_capability (assert_shared_capability, clang::assert_capability, clang::asser…
133 …let Heading = "acquire_capability (acquire_shared_capability, clang::acquire_capability, clang::ac…
141 …= "try_acquire_capability (try_acquire_shared_capability, clang::try_acquire_capability, clang::tr…
152 …let Heading = "release_capability (release_shared_capability, clang::release_capability, clang::re…
186 a future version of clang. Also, the ABI is not standardized and the name
232 "chosen when the buffer size is known but 'maxlen' is not")))
276 instruct clang to call ``__builtin_object_size(param, Type)`` at each callsite
489 // void nodupfunc() [[clang::noduplicate]];
729 The ``clang::fallthrough`` attribute is used along with the
[all …]
/external/clang/include/clang/Driver/
DCC1Options.td1 //===--- CC1Options.td - Options for clang -cc1 ---------------------------===//
10 // This file defines the options accepted by clang -cc1 and clang -cc1as.
174 HelpText<"Generate debug info with external references to clang modules"
291 HelpText<"File for serializing diagnostics in a binary format">;
293 def fdiagnostics_format : Separate<["-"], "fdiagnostics-format">,
392 def fmodule_format_EQ : Joined<["-"], "fmodule-format=">,
393 HelpText<"Select the container format for clang modules and PCH. "
541 def stack_protector_buffer_size : Separate<["-"], "stack-protector-buffer-size">,
542 HelpText<"Lower bound for a buffer to be considered for stack protection">;
/external/harfbuzz_ng/
DNEWS185 * Bound buffer growth during shaping to 32x,
186 * Fix assertions and other issues at OOM / buffer max-growth.
353 - Fix out-of-bounds access in Context lookup format 3.
378 respecing buffer direction and language, down to vertical writing.
387 * hb_buffer_clear_contents() does not reset buffer flags now.
392 actually uses the buffer. As such, don't clear it in
402 - hb_feature_from_string() now accepts CSS font-feature-settings format.
446 Another way to put it is: if there's pre-context text in the buffer,
480 - With all changes in this release, the buffer will contain fully
484 - Fix minor invalid buffer access.
[all …]
/external/clang/test/ARCMT/
Dobjcmt-arc-cf-annotations.m8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin")
16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end")
132 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2)));
278 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC…
751 // <rdar://problem/6257780> clang checker fails to catch use-after-release
941 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods
950 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}}
955 // misinterpreted by clang scan-build
1111 // <rdar://problem/7299394> clang false positive: retained instance passed to
1161 // pixel buffer object. These test cases show how the analyzer stops tracking
[all …]
Dobjcmt-arc-cf-annotations.m.result8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin")
16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end")
138 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2)));
296 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC…
793 // <rdar://problem/6257780> clang checker fails to catch use-after-release
983 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods
992 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}}
997 // misinterpreted by clang scan-build
1153 // <rdar://problem/7299394> clang false positive: retained instance passed to
1203 // pixel buffer object. These test cases show how the analyzer stops tracking
[all …]
/external/clang/lib/StaticAnalyzer/Checkers/
DCheckers.td10 include "clang/StaticAnalyzer/Checkers/CheckerBase.td"
304 HelpText<"Warn when 'mkstemp' is passed fewer than 6 X's in the format string">,
328 HelpText<"Warn about buffer overflows (older checker)">,
332 HelpText<"Warn about buffer overflows (newer checker)">,
423 HelpText<"Checks for overlap in two buffer arguments">,
/external/valgrind/
DNEWS294 342008 valgrind.h needs type cast [..] for clang/llvm in 64-bit mode
296 342063 wrong format specifier for test mcblocklistsearch in gdbserver_tests
399 348565 Fix detection of command line option availability for clang
403 348890 Fix clang warning about unsupported --param inline-unit-growth=900
750 329694 clang warns about using uninitialized variable
765 331257 Fix type of jump buffer in test none/tests/faultstatus
802 334727 Build fails with -Werror=format-security
975 buffer. This avoids virtual memory usage spikes when Valgrind
1089 307955 Building valgrind 3.7.0-r4 fails in Gentoo AMD64 when using clang
1138 315345 cl-format.xml and callgrind/dump.c don't agree on using cfl= or cfi=
[all …]
/external/libxml2/
DNEWS222 Fix an output buffer flushing conversion bug (Mikhail Titov),
231 Fix some buffer conversion issues (Daniel Veillard),
232 When calling xmlNodeDump make sure we grow the buffer quickly (Daniel,
273 Silence a clang warning (Daniel Veillard),
356 Improvements for old buffer compatibility (Daniel Veillard),
371 Harden the buffer code and make it more compatible (Daniel Veillard),
377 Convert the writer to new output buffer and save APIs (Daniel Veillard),
383 Convert C14N to the new Input buffer (Daniel Veillard),
538 Fix -Wempty-body warning from clang (Nico Weber),
595 Fix xmllint to use format=1 for default formatting (Adam Spragg),
[all …]
/external/zlib/src/
DChangeLog41 - Check for input buffer malloc failure in examples/gzappend.c
99 - Recognize clang as gcc
409 - Avoid buffer overrun in contrib/masmx64/gvmat64.asm [Simpson]
530 - Allow negative bits in inflatePrime() to delete existing bit buffer
647 - Add error return to gzread() for format or i/o error [Levin]
674 - Increase sprintf() buffer size in gzdopen() to allow for large numbers
880 - Fix printf format in example.c
910 - Improve setting of zlib format compression level flags
961 - Fix bug in gzread() on concatenated file with 0x1f at end of buffer
962 and next buffer doesn't start with 0x8b
[all …]
/external/opencv3/3rdparty/zlib/
DChangeLog41 - Check for input buffer malloc failure in examples/gzappend.c
99 - Recognize clang as gcc
409 - Avoid buffer overrun in contrib/masmx64/gvmat64.asm [Simpson]
530 - Allow negative bits in inflatePrime() to delete existing bit buffer
647 - Add error return to gzread() for format or i/o error [Levin]
674 - Increase sprintf() buffer size in gzdopen() to allow for large numbers
880 - Fix printf format in example.c
910 - Improve setting of zlib format compression level flags
961 - Fix bug in gzread() on concatenated file with 0x1f at end of buffer
962 and next buffer doesn't start with 0x8b
[all …]
/external/libpng/
DCHANGES147 Try to fix Linux "setjmp" buffer size problems
169 Added macros to read 16- and 32-bit ints directly from buffer, to be
319 Changed format of the PNG_LIBPNG_VER integer to xyyzz instead of xyz
977 Increased the first part of msg buffer from 16 to 18 in png_chunk_error().
1039 Increased the first part of msg buffer from 16 to 18 in png_chunk_warning().
1314 Check for buffer overflow before reading CRC in pngpread.c (Warwick Allison)
1322 Detect buffer overflow in pngpread.c when IDAT is corrupted with extra data.
1460 Fixed buffer overflow vulnerability (CVE-2004-0597) in png_handle_tRNS().
1533 Fixed bug, introduced in libpng-1.2.7, that overruns a buffer during
1744 Increased sprintf buffer from 50 to 52 chars in pngrutil.c to avoid
[all …]
/external/bison/
DChangeLog597 because "clang-mp-2.9 -o test -g test.c" launches "/usr/bin/dsymutil
978 NEWS: warnings with clang
979 warnings: avoid warnings from clang
1019 NEWS: warnings with clang
1024 warnings: avoid warnings from clang
1056 This is Apple clang version 3.1 (tags/Apple/clang-318.0.61).
1062 * data/glr.c (LONGJMP): abort after longjmp to pacify clang.
1233 graphs: change the output format of the rules
1372 NEWS: warnings with clang
1377 warnings: avoid warnings from clang
[all …]
/external/opencv3/3rdparty/libtiff/
DChangeLog6 warnings with clang.
11 calculating required buffer sizes (CVE-2012-2113).
46 in JPEGFixupTagsSubsampling() or else buffer sized may be wrong.
67 * libtiff/tif_jpeg.c: avoid overrunning the end of the output buffer in
88 * libtiff/tif_pixarlog.c: Allocate working buffer one word larger since we "forward
190 * tools/tiff2ps.c (PSDataBW): Zero buffer *after* checking for
263 * libtiff/tif_thunder.c: Correct potential buffer overflow with
280 margin, thus overrunning our buffer of run lengths. Per CVE-2011-0192.
284 buffer overrun.
321 * libtiff/tif_win32.c: avoid error/warning buffer overrun problem
[all …]
/external/libevent/
DChangeLog20 o Add -Qunused-arguments for clang on macos (b56611d Trond Norbye)
59 o Fix a typo in a comment in buffer.h. Spotted by Alt_F4 (773b0a5)
162 o Don't do clang version detection when disabling some flags (083296b Sebastian Hahn)
234 o improve test to remove at least one buffer from src (7eb52eb Greg Hazel)
409 o Add an assert to appease clang's static analyzer (b0ff7eb Sebastian Hahn)
425 o Fix compilation under LLVM/clang with --enable-gcc-warnings (ad9ff58 Sebastian Hahn)
579 o Fix even more win64 warnings: buffer, event_tagging, http, evdns, evrpc (545a611)
730 …o Change bufferevent_openssl::do_write so it doesn't call SSL_write with a 0 length buffer (c99131…
826 o Fix a memory leak when appending/prepending to a buffer with unused space. (45068a3)
903 o Do not use evbuffer_expand() to add the first chain to a buffer (5c0ebb3)
[all …]
/external/vulkan-validation-layers/tests/gtest-1.7.0/include/gtest/internal/
Dgtest-port.h.orig273 // gcc and clang define __GXX_EXPERIMENTAL_CXX0X__ when
275 // value for __cplusplus, and recent versions of clang, gcc, and
527 // can build with clang but need to use gcc4.2's libstdc++).
1832 # define GTEST_SNPRINTF_(buffer, size, format, ...) \
1833 _snprintf_s(buffer, size, size, format, __VA_ARGS__)

12