Searched +refs:clang +refs:format +refs:buffer (Results 1 – 25 of 33) sorted by relevance
12
/external/clang/docs/ |
D | ClangFormat.rst | 13 :program:`clang-format` is located in `clang/tools/clang-format` and can be used 14 to format C/C++/Obj-C code. 18 $ clang-format -help 19 OVERVIEW: A tool to format C/C++/Java/JavaScript/Objective-C/Protobuf code. 27 USAGE: clang-format [options] [<file> ...] 31 Clang-format options: 33 -assume-filename=<string> - When reading from stdin, clang-format assumes this 37 clang-format from an editor integration 41 fallback in case clang-format is invoked with 42 -style=file, but can not find the .clang-format [all …]
|
D | PCHInternals.rst | 12 Using Precompiled Headers with ``clang`` 15 The Clang compiler frontend, ``clang -cc1``, supports two command line options 18 To generate PCH files using ``clang -cc1``, use the option :option:`-emit-pch`: 22 $ clang -cc1 test.h -emit-pch -o test.h.pch 24 This option is transparently used by ``clang`` when generating PCH files. The 32 $ clang -cc1 -include-pch test.h.pch test.c -o test.s 65 AST file format required for modules are discussed in the section on 72 compressed bitstream as `LLVM's bitcode file format 127 An AST file produced by clang is an object file container with a ``clangast`` 137 within `LLVM's bitstream format <http://llvm.org/docs/BitCodeFormat.html>`_. [all …]
|
D | InternalsManual.rst | 80 ``clang/Basic/Diagnostic*Kinds.td`` files, depending on what library will be 82 diagnostic, the severity of the diagnostic and the English translation + format 129 The format string for the diagnostic is very simple, but it has some power. It 132 some simple format strings: 137 "format string contains '\\0' within the string body" 143 These examples show some important points of format strings. You can use any 156 order as they are specified, you could have a format string with "``%1 %0``" 161 Here are some "best practices" for writing the English format string: 182 including variable names, types, labels, etc. The "``select``" format can be 198 **"s" format** [all …]
|
D | Modules.rst | 99 … the full complexity of the language. Maintaining a stable binary module format across architectur… 236 The C and C++ preprocessor assumes that the input text is a single linear buffer, but with modules … 677 format and the linker. The notion is similar to Microsoft Visual 762 … in the grammar to describe specific behavior of other declarations. The format of attributes is f… 858 To detect and help address some of these problems, the ``clang-tools-extra`` repository contains a … 877 ``clang/lib/Headers/module.modulemap`` 880 ``clang/test/Modules/`` 883 ``clang/include/clang/Basic/Module.h`` 886 ``clang/include/clang/Lex/ModuleMap.h`` 890 …Information about the serialized AST format used for precompiled headers and modules. The actual i…
|
/external/llvm/test/DebugInfo/Sparc/ |
D | gnu-window-save.ll | 7 ; SPARC64: file format ELF64-sparc 23 ; SPARC32: file format ELF32-sparc 51 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-… 52 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-… 58 …inct !DICompileUnit(language: DW_LANG_C99, producer: "clang version 3.5 (http://llvm.org/git/clang… 69 !11 = !{!"clang version 3.5 (http://llvm.org/git/clang.git 6a0714fee07fb7c4e32d3972b4fe2ce2f5678cf4…
|
/external/compiler-rt/test/BlocksRuntime/ |
D | testfilerunner.m | 29 static bool readErrorFile(char *buffer, const char *from); 98 bool lookforIn(char *lookfor, const char *format, pid_t child) { 99 char buffer[512]; 101 sprintf(buffer, format, child); 102 bool gotOutput = readErrorFile(got, buffer); 104 printf("**** didn't get an output file %s to analyze!!??\n", buffer); 109 printf("didn't find '%s' in output file %s\n", lookfor, buffer); 112 unlink(buffer); 127 char buffer[512]; 130 sprintf(buffer, "/tmp/errorfile_%d", getpid()); [all …]
|
/external/llvm/docs/ |
D | LibFuzzer.rst | 98 # Get lib/Fuzzer. Assuming that you already have fresh clang in PATH. 101 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer 103 clang++ -fsanitize=address -fsanitize-coverage=edge test_fuzzer.cc Fuzzer*.o 117 # Get lib/Fuzzer. Assuming that you already have fresh clang in PATH. 120 …(cd pcre; ./autogen.sh; CC="clang -fsanitize=address $COV_FLAGS" ./configure --prefix=`pwd`/../ins… 122 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer 142 clang++ -g -fsanitize=address $COV_FLAGS -c -std=c++11 -I inst/include/ pcre_fuzzer.cc 144 …clang++ -g -fsanitize=address -Wl,--whole-archive inst/lib/*.a -Wl,-no-whole-archive Fuzzer*.o pcr… 215 make -j 32 CC="clang -g -fsanitize=address $COV_FLAGS") 218 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer [all …]
|
D | SourceLevelDebugging.rst | 12 information in LLVM. It describes the :ref:`actual format that the LLVM debug 13 information takes <format>`, which is useful for those interested in creating 49 :ref:`implementation-defined format <ccxx_frontend>` (the C/C++ front-end 132 Debugging information format 213 In order to handle this, the LLVM debug format uses the metadata attached to 255 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-… 262 …!0 = !DICompileUnit(language: DW_LANG_C99, file: !1, producer: "clang version 3.7.0 (trunk 231150)… 272 !10 = !{!"clang version 3.7.0 (trunk 231150) (llvm/trunk 231154)"} 345 The C and C++ front-ends represent information about the program in a format 409 "clang version 3.7.0 (trunk 231150) (llvm/trunk 231154)", [all …]
|
D | ExceptionHandling.rst | 12 exception handling in LLVM. It describes the format that LLVM exception 36 exception frame format can be found at `Exception Frames 436 a destination address by `llvm.eh.sjlj.longjmp`_. The buffer format and the 438 ``__builtin_setjmp`` implementation allowing code built with the clang and GCC 441 The single parameter is a pointer to a five word buffer in which the calling 458 a buffer populated by `llvm.eh.sjlj.setjmp`_. The frame pointer and stack 459 pointer are restored from the buffer, then control is transferred to the 502 The format of this call frame information (CFI) is often platform-dependent, 503 however. ARM, for example, defines their own format. Apple has their own compact 504 unwind info format. On Windows, another format is used for all architectures [all …]
|
/external/clang/docs/CommandGuide/ |
D | clang.rst | 1 clang - the Clang C, C++, and Objective-C compiler 7 :program:`clang` [*options*] *filename ...* 12 :program:`clang` is a C, C++, and Objective-C compiler which encompasses 20 The clang executable is actually a small driver which controls the overall 63 the same driver. Please see <http://clang-analyzer.llvm.org> for more details 263 types defined in clang modules or precompiled headers instead of 265 This option implies `-fmodule-format=obj`. 315 assembly files, otherwise this generates LLVM bitcode format object files 417 Adds an implicit #define into the predefines buffer which is read before the 422 Adds an implicit #undef into the predefines buffer which is read before the [all …]
|
/external/clang/include/clang/Basic/ |
D | AttrDocs.td | 13 NOTE: This file is automatically generated by running clang-tblgen 124 …let Heading = "assert_capability (assert_shared_capability, clang::assert_capability, clang::asser… 133 …let Heading = "acquire_capability (acquire_shared_capability, clang::acquire_capability, clang::ac… 141 …= "try_acquire_capability (try_acquire_shared_capability, clang::try_acquire_capability, clang::tr… 152 …let Heading = "release_capability (release_shared_capability, clang::release_capability, clang::re… 186 a future version of clang. Also, the ABI is not standardized and the name 232 "chosen when the buffer size is known but 'maxlen' is not"))) 276 instruct clang to call ``__builtin_object_size(param, Type)`` at each callsite 489 // void nodupfunc() [[clang::noduplicate]]; 729 The ``clang::fallthrough`` attribute is used along with the [all …]
|
/external/clang/include/clang/Driver/ |
D | CC1Options.td | 1 //===--- CC1Options.td - Options for clang -cc1 ---------------------------===// 10 // This file defines the options accepted by clang -cc1 and clang -cc1as. 174 HelpText<"Generate debug info with external references to clang modules" 291 HelpText<"File for serializing diagnostics in a binary format">; 293 def fdiagnostics_format : Separate<["-"], "fdiagnostics-format">, 392 def fmodule_format_EQ : Joined<["-"], "fmodule-format=">, 393 HelpText<"Select the container format for clang modules and PCH. " 541 def stack_protector_buffer_size : Separate<["-"], "stack-protector-buffer-size">, 542 HelpText<"Lower bound for a buffer to be considered for stack protection">;
|
/external/harfbuzz_ng/ |
D | NEWS | 185 * Bound buffer growth during shaping to 32x, 186 * Fix assertions and other issues at OOM / buffer max-growth. 353 - Fix out-of-bounds access in Context lookup format 3. 378 respecing buffer direction and language, down to vertical writing. 387 * hb_buffer_clear_contents() does not reset buffer flags now. 392 actually uses the buffer. As such, don't clear it in 402 - hb_feature_from_string() now accepts CSS font-feature-settings format. 446 Another way to put it is: if there's pre-context text in the buffer, 480 - With all changes in this release, the buffer will contain fully 484 - Fix minor invalid buffer access. [all …]
|
/external/clang/test/ARCMT/ |
D | objcmt-arc-cf-annotations.m | 8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin") 16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end") 132 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2))); 278 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC… 751 // <rdar://problem/6257780> clang checker fails to catch use-after-release 941 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods 950 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}} 955 // misinterpreted by clang scan-build 1111 // <rdar://problem/7299394> clang false positive: retained instance passed to 1161 // pixel buffer object. These test cases show how the analyzer stops tracking [all …]
|
D | objcmt-arc-cf-annotations.m.result | 8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin") 16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end") 138 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2))); 296 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC… 793 // <rdar://problem/6257780> clang checker fails to catch use-after-release 983 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods 992 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}} 997 // misinterpreted by clang scan-build 1153 // <rdar://problem/7299394> clang false positive: retained instance passed to 1203 // pixel buffer object. These test cases show how the analyzer stops tracking [all …]
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
D | Checkers.td | 10 include "clang/StaticAnalyzer/Checkers/CheckerBase.td" 304 HelpText<"Warn when 'mkstemp' is passed fewer than 6 X's in the format string">, 328 HelpText<"Warn about buffer overflows (older checker)">, 332 HelpText<"Warn about buffer overflows (newer checker)">, 423 HelpText<"Checks for overlap in two buffer arguments">,
|
/external/valgrind/ |
D | NEWS | 294 342008 valgrind.h needs type cast [..] for clang/llvm in 64-bit mode 296 342063 wrong format specifier for test mcblocklistsearch in gdbserver_tests 399 348565 Fix detection of command line option availability for clang 403 348890 Fix clang warning about unsupported --param inline-unit-growth=900 750 329694 clang warns about using uninitialized variable 765 331257 Fix type of jump buffer in test none/tests/faultstatus 802 334727 Build fails with -Werror=format-security 975 buffer. This avoids virtual memory usage spikes when Valgrind 1089 307955 Building valgrind 3.7.0-r4 fails in Gentoo AMD64 when using clang 1138 315345 cl-format.xml and callgrind/dump.c don't agree on using cfl= or cfi= [all …]
|
/external/libxml2/ |
D | NEWS | 222 Fix an output buffer flushing conversion bug (Mikhail Titov), 231 Fix some buffer conversion issues (Daniel Veillard), 232 When calling xmlNodeDump make sure we grow the buffer quickly (Daniel, 273 Silence a clang warning (Daniel Veillard), 356 Improvements for old buffer compatibility (Daniel Veillard), 371 Harden the buffer code and make it more compatible (Daniel Veillard), 377 Convert the writer to new output buffer and save APIs (Daniel Veillard), 383 Convert C14N to the new Input buffer (Daniel Veillard), 538 Fix -Wempty-body warning from clang (Nico Weber), 595 Fix xmllint to use format=1 for default formatting (Adam Spragg), [all …]
|
/external/zlib/src/ |
D | ChangeLog | 41 - Check for input buffer malloc failure in examples/gzappend.c 99 - Recognize clang as gcc 409 - Avoid buffer overrun in contrib/masmx64/gvmat64.asm [Simpson] 530 - Allow negative bits in inflatePrime() to delete existing bit buffer 647 - Add error return to gzread() for format or i/o error [Levin] 674 - Increase sprintf() buffer size in gzdopen() to allow for large numbers 880 - Fix printf format in example.c 910 - Improve setting of zlib format compression level flags 961 - Fix bug in gzread() on concatenated file with 0x1f at end of buffer 962 and next buffer doesn't start with 0x8b [all …]
|
/external/opencv3/3rdparty/zlib/ |
D | ChangeLog | 41 - Check for input buffer malloc failure in examples/gzappend.c 99 - Recognize clang as gcc 409 - Avoid buffer overrun in contrib/masmx64/gvmat64.asm [Simpson] 530 - Allow negative bits in inflatePrime() to delete existing bit buffer 647 - Add error return to gzread() for format or i/o error [Levin] 674 - Increase sprintf() buffer size in gzdopen() to allow for large numbers 880 - Fix printf format in example.c 910 - Improve setting of zlib format compression level flags 961 - Fix bug in gzread() on concatenated file with 0x1f at end of buffer 962 and next buffer doesn't start with 0x8b [all …]
|
/external/libpng/ |
D | CHANGES | 147 Try to fix Linux "setjmp" buffer size problems 169 Added macros to read 16- and 32-bit ints directly from buffer, to be 319 Changed format of the PNG_LIBPNG_VER integer to xyyzz instead of xyz 977 Increased the first part of msg buffer from 16 to 18 in png_chunk_error(). 1039 Increased the first part of msg buffer from 16 to 18 in png_chunk_warning(). 1314 Check for buffer overflow before reading CRC in pngpread.c (Warwick Allison) 1322 Detect buffer overflow in pngpread.c when IDAT is corrupted with extra data. 1460 Fixed buffer overflow vulnerability (CVE-2004-0597) in png_handle_tRNS(). 1533 Fixed bug, introduced in libpng-1.2.7, that overruns a buffer during 1744 Increased sprintf buffer from 50 to 52 chars in pngrutil.c to avoid [all …]
|
/external/bison/ |
D | ChangeLog | 597 because "clang-mp-2.9 -o test -g test.c" launches "/usr/bin/dsymutil 978 NEWS: warnings with clang 979 warnings: avoid warnings from clang 1019 NEWS: warnings with clang 1024 warnings: avoid warnings from clang 1056 This is Apple clang version 3.1 (tags/Apple/clang-318.0.61). 1062 * data/glr.c (LONGJMP): abort after longjmp to pacify clang. 1233 graphs: change the output format of the rules 1372 NEWS: warnings with clang 1377 warnings: avoid warnings from clang [all …]
|
/external/opencv3/3rdparty/libtiff/ |
D | ChangeLog | 6 warnings with clang. 11 calculating required buffer sizes (CVE-2012-2113). 46 in JPEGFixupTagsSubsampling() or else buffer sized may be wrong. 67 * libtiff/tif_jpeg.c: avoid overrunning the end of the output buffer in 88 * libtiff/tif_pixarlog.c: Allocate working buffer one word larger since we "forward 190 * tools/tiff2ps.c (PSDataBW): Zero buffer *after* checking for 263 * libtiff/tif_thunder.c: Correct potential buffer overflow with 280 margin, thus overrunning our buffer of run lengths. Per CVE-2011-0192. 284 buffer overrun. 321 * libtiff/tif_win32.c: avoid error/warning buffer overrun problem [all …]
|
/external/libevent/ |
D | ChangeLog | 20 o Add -Qunused-arguments for clang on macos (b56611d Trond Norbye) 59 o Fix a typo in a comment in buffer.h. Spotted by Alt_F4 (773b0a5) 162 o Don't do clang version detection when disabling some flags (083296b Sebastian Hahn) 234 o improve test to remove at least one buffer from src (7eb52eb Greg Hazel) 409 o Add an assert to appease clang's static analyzer (b0ff7eb Sebastian Hahn) 425 o Fix compilation under LLVM/clang with --enable-gcc-warnings (ad9ff58 Sebastian Hahn) 579 o Fix even more win64 warnings: buffer, event_tagging, http, evdns, evrpc (545a611) 730 …o Change bufferevent_openssl::do_write so it doesn't call SSL_write with a 0 length buffer (c99131… 826 o Fix a memory leak when appending/prepending to a buffer with unused space. (45068a3) 903 o Do not use evbuffer_expand() to add the first chain to a buffer (5c0ebb3) [all …]
|
/external/vulkan-validation-layers/tests/gtest-1.7.0/include/gtest/internal/ |
D | gtest-port.h.orig | 273 // gcc and clang define __GXX_EXPERIMENTAL_CXX0X__ when 275 // value for __cplusplus, and recent versions of clang, gcc, and 527 // can build with clang but need to use gcc4.2's libstdc++). 1832 # define GTEST_SNPRINTF_(buffer, size, format, ...) \ 1833 _snprintf_s(buffer, size, size, format, __VA_ARGS__)
|
12