Home
last modified time | relevance | path

Searched +full:clang +full:- +full:analyzer (Results 1 – 25 of 77) sorted by relevance

1234

/third_party/curl/lib/
DMakefile.am21 # SPDX-License-Identifier: curl
28 EXTRA_DIST = Makefile.mk config-win32.h config-win32ce.h config-plan9.h \
29 config-riscos.h config-mac.h curl_config.h.in config-dos.h libcurl.rc \
30 config-amigaos.h config-win32ce.h config-os400.h setup-os400.h \
31 $(CMAKE_DIST) setup-win32.h .checksrc Makefile.soname
41 # This might hold -Werror
53 AM_CPPFLAGS = -I$(top_srcdir)/include \
54 -I$(top_builddir)/lib \
55 -I$(top_srcdir)/lib
62 AM_CPPFLAGS += -DBUILDING_LIBCURL
[all …]
Descape.c21 * SPDX-License-Identifier: curl
41 /* for ABI-compatibility with previous versions */
47 /* for ABI-compatibility with previous versions */
72 while(length--) { in curl_easy_escape()
95 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 0, 0, 0, 0, 0, /* 0x30 - 0x3f */
96 0, 10, 11, 12, 13, 14, 15, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x40 - 0x4f */
97 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, /* 0x50 - 0x5f */
98 0, 10, 11, 12, 13, 14, 15 /* 0x60 - 0x66 */
102 #define onehex2dec(x) hextable[x - '0']
111 * - REJECT_NADA: accept everything
[all …]
/third_party/skia/m133/third_party/externals/expat/expat/
Dapply-clang-tidy.sh31 set -e -u -o pipefail
33 cd "$(dirname "$(type -P "$0")")"
36 readability-avoid-const-params-in-decls
37 readability-named-parameter
43 clang-analyzer-optin.performance.Padding
46 clang-analyzer-security.insecureAPI.strcpy
48 # Disabling because buggy, see https://github.com/llvm/llvm-project/issues/40656
49 clang-analyzer-valist.Uninitialized
53 checks="${checks_to_enable_flat// /,},-${checks_to_disable_flat// /,-}"
56 --checks="${checks}"
[all …]
DChanges14 !! - <blink>fixing a complex non-public security issue</blink>, !!
15 !! - teaming up on researching and fixing future security reports and !!
16 !! ClusterFuzz findings with few-days-max response times in communication !!
19 !! - implementing and auto-testing XML 1.0r5 support !!
21 !! - smart ideas on fixing the Autotools CMake files generation issue !!
23 !! - the Windows binaries topic (needs requirements engineering first), !!
24 !! - pushing migration from `int` to `size_t` further !!
25 !! including edge-cases test coverage (needs discussion before anything). !!
27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !!
30 !! THANK YOU! Sebastian Pipping -- Berlin, 2024-03-09 !!
[all …]
/third_party/curl/src/
DMakefile.am21 # SPDX-License-Identifier: curl
38 # $(top_srcdir)/src is for curl's src/tool_setup.h and "curl-private" files
40 AM_CPPFLAGS = -I$(top_srcdir)/include \
41 -I$(top_builddir)/lib \
42 -I$(top_builddir)/src \
43 -I$(top_srcdir)/lib \
44 -I$(top_srcdir)/src
53 AM_CPPFLAGS += -DCURL_STATICLIB
55 AM_CPPFLAGS += -DBUILDING_CURL
68 # This might hold -Werror
[all …]
/third_party/benchmark/
D.clang-tidy1 ---
2 Checks: 'clang-analyzer-*,readability-redundant-*,performance-*'
3 WarningsAsErrors: 'clang-analyzer-*,readability-redundant-*,performance-*'
/third_party/vixl/
D.clang-tidy1 ---
2 # We use the clang-tidy defaults and the Google styles as a baseline, with a
4 # -clang-analyzer-security.insecureAPI.rand:
10 # -google-readability-todo:
12 # -google-readability-function-size:
14 # particularly involving macro-generated encoding tables and so on.
15 # -google-build-using-namespace:
16 # We do this in internal contexts (typically in .cc files), but clang-tidy
18 # -google-explicit-constructor:
23 # google-readability-braces-around-statements
[all …]
/third_party/rust/rust/src/tools/rust-analyzer/.github/workflows/
Drelease.yaml4 - cron: "0 0 * * *" # midnight UTC
10 - release
11 - trigger-nightly
16 RUSTFLAGS: "-D warnings -W unreachable-pub"
20 CARGO_TARGET_AARCH64_UNKNOWN_LINUX_GNU_LINKER: aarch64-linux-gnu-gcc
21 CARGO_TARGET_ARM_UNKNOWN_LINUX_GNUEABIHF_LINKER: arm-linux-gnueabihf-gcc
28 - os: windows-latest
29 target: x86_64-pc-windows-msvc
30 code-target: win32-x64
31 - os: windows-latest
[all …]
/third_party/fsverity-utils/.github/workflows/
Dci.yml1 # SPDX-License-Identifier: MIT
4 # Use of this source code is governed by an MIT-style
12 static-linking-test:
14 runs-on: ubuntu-latest
16 - uses: actions/checkout@v4
17 - run: scripts/run-tests.sh static_linking
19 dynamic-linking-test:
21 runs-on: ubuntu-latest
23 - uses: actions/checkout@v4
24 - run: scripts/run-tests.sh dynamic_linking
[all …]
/third_party/grpc/tools/dockerfile/grpc_scan_build/
DDockerfile7 # http://www.apache.org/licenses/LICENSE-2.0
15 FROM grpc/clang:latest
17 RUN apt-get update && apt-get install -y \
20 libgtest-dev \
21 && apt-get clean
23 RUN git clone --recursive https://github.com/grpc/grpc.git
29 (cd grpc ; git submodule update --init --recursive) && \
30 …llvm/tools/clang/tools/scan-build/scan-build -o /tmp/grpc --use-analyzer=/usr/local/bin/clang make…
31 …llvm/tools/clang/tools/scan-view/scan-view /tmp/grpc/`ls /tmp/grpc` --host 0.0.0.0 --no-browser --
/third_party/rust/crates/cxx/
D.clang-tidy2 clang-analyzer-*,
3 clang-diagnostic-*,
4 cppcoreguidelines-*,
5 modernize-*,
6 -cppcoreguidelines-macro-usage,
7 -cppcoreguidelines-owning-memory,
8 -cppcoreguidelines-pro-bounds-array-to-pointer-decay,
9 -cppcoreguidelines-pro-bounds-pointer-arithmetic,
10 -cppcoreguidelines-pro-type-const-cast,
11 -cppcoreguidelines-pro-type-member-init,
[all …]
/third_party/skia/m133/third_party/externals/libwebp/infra/
Drun_static_analysis.sh32 set -xe
36 readonly WORKSPACE=${WORKSPACE:-"$(mktemp -d -t webp.scanbuild.XXX)"}
52 # Wrap clang-tools scan-build.
54 # OUTPUT_DIR target directory where scan-build report is generated.
55 # MODE scan-build mode
57 # $* scan-build additional args.
59 # scan-build retcode
62 scan-build -o "${OUTPUT_DIR}" --use-analyzer="$(command -v clang)" \
63 -analyzer-config mode="${MODE}" "$*"
71 readonly OUTPUT_DIR="${WORKSPACE}/output-${MODE}"
[all …]
/third_party/ninja/.github/workflows/
Dlinux.yml11 runs-on: [ubuntu-latest]
15 - uses: actions/checkout@v2
16 - uses: codespell-project/actions-codespell@master
19 - name: Install dependencies
21 … curl -L -O https://github.com/Kitware/CMake/releases/download/v3.16.4/cmake-3.16.4-Linux-x86_64.sh
22 chmod +x cmake-3.16.4-Linux-x86_64.sh
23 ./cmake-3.16.4-Linux-x86_64.sh --skip-license --prefix=/usr/local
24 …curl -L -O https://www.mirrorservice.org/sites/dl.fedoraproject.org/pub/epel/7/x86_64/Packages/p/p…
25 …curl -L -O https://www.mirrorservice.org/sites/dl.fedoraproject.org/pub/epel/7/x86_64/Packages/p/p…
26 rpm -U --quiet p7zip-16.02-20.el7.x86_64.rpm
[all …]
/third_party/rust/rust/src/tools/rust-analyzer/xtask/src/
Ddist.rs20 pub(crate) fn run(self, sh: &Shell) -> anyhow::Result<()> { in run()
36 dist_server(sh, &format!("{version}-standalone"), &target)?; in run()
40 dist_server(sh, "0.0.0-standalone", &target)?; in run()
51 ) -> anyhow::Result<()> { in dist_client()
64 &format!(r#""version": "{VERSION_DEV}.0-dev""#), in dist_client()
68 .replace(r#""$generated-start": {},"#, "") in dist_client()
69 .replace(",\n \"$generated-end\": {}", "") in dist_client()
76 fn dist_server(sh: &Shell, release: &str, target: &Target) -> anyhow::Result<()> { in dist_server()
85 if target.name.contains("-linux-") { in dist_server()
86 env::set_var("CC", "clang"); in dist_server()
[all …]
/third_party/fsverity-utils/scripts/
Drun-tests.sh2 # SPDX-License-Identifier: MIT
5 # Use of this source code is governed by an MIT-style
10 # Test script for fsverity-utils. Runs 'make check' in lots of configurations,
14 # fsverity-utils into a kvm-xfstests test appliance and run
15 # 'kvm-xfstests -c ext4,f2fs -g verity'
17 set -e -u -o pipefail
31 TMPDIR=$(mktemp -d -t libfsverity_test.XXXXXXXXX)
32 trap 'rm -r "$TMPDIR"' EXIT
36 echo "Starting fsverity-utils tests. See run-tests.log for full output."
37 rm -f run-tests.log
[all …]
/third_party/json/cmake/
Dci.cmake12 execute_process(COMMAND ${ASTYLE_TOOL} --version OUTPUT_VARIABLE ASTYLE_TOOL_VERSION ERROR_VARIABLE…
13 string(REGEX MATCH "[0-9]+(\\.[0-9]+)+" ASTYLE_TOOL_VERSION "${ASTYLE_TOOL_VERSION}")
16 …program(CLANG_TOOL NAMES clang++-HEAD clang++ clang++-17 clang++-16 clang++-15 clang++-14 clang++-
17 execute_process(COMMAND ${CLANG_TOOL} --version OUTPUT_VARIABLE CLANG_TOOL_VERSION ERROR_VARIABLE C…
18 string(REGEX MATCH "[0-9]+(\\.[0-9]+)+" CLANG_TOOL_VERSION "${CLANG_TOOL_VERSION}")
19 message(STATUS "�� Clang ${CLANG_TOOL_VERSION} (${CLANG_TOOL})")
21 …m(CLANG_TIDY_TOOL NAMES clang-tidy-17 clang-tidy-16 clang-tidy-15 clang-tidy-14 clang-tidy-13 clan…
22 execute_process(COMMAND ${CLANG_TIDY_TOOL} --version OUTPUT_VARIABLE CLANG_TIDY_TOOL_VERSION ERROR_…
23 string(REGEX MATCH "[0-9]+(\\.[0-9]+)+" CLANG_TIDY_TOOL_VERSION "${CLANG_TIDY_TOOL_VERSION}")
24 message(STATUS "�� Clang-Tidy ${CLANG_TIDY_TOOL_VERSION} (${CLANG_TIDY_TOOL})")
[all …]
/third_party/lame/
Dconfigure.in24 AC_INIT([lame],[3.100],[lame-dev@lists.sf.net])
80 COMPILER_TYPE="`${CC} --version | head -1 | sed -e '1,$s/version.*//g'`"
87 *clang*)
88 AC_MSG_RESULT(clang)
101 GCC_version="`${CC} --version | sed -n '1s/^[[^ ]]* (.*) //;s/ .*$//;1p'`"
103 [[0-9]]*[[0-9]]*)
115 AC_MSG_CHECKING(version of clang)
116 CLANG_version="`${CC} --version | sed -n 's/.*clang version //;s/ .*$//;1p'`"
172 if test $ac_cv_sizeof_short -eq 0 \
173 -o $ac_cv_sizeof_unsigned_short -eq 0 \
[all …]
/third_party/json/
DMakefile7 # find GNU sed to use `-i` parameter
8 SED:=$(shell command -v gsed || which sed)
16 SRCS=$(shell find include -type f | sort)
19 …TS_SRCS=$(shell find tests -type f \( -name '*.hpp' -o -name '*.cpp' -o -name '*.cu' \) -not -path…
32 …@echo "amalgamate - amalgamate files single_include/nlohmann/json{,_fwd}.hpp from the include/nloh…
33 @echo "ChangeLog.md - generate ChangeLog file"
34 @echo "check-amalgamation - check whether sources have been amalgamated"
35 @echo "clean - remove built files"
36 @echo "doctest - compile example files and check their output"
37 @echo "fuzz_testing - prepare fuzz testing of the JSON parser"
[all …]
/third_party/skia/m133/third_party/externals/libyuv/docs/
Dgetting_started.md5 ## Pre-requisites
7 …need to have depot tools installed: https://www.chromium.org/developers/how-tos/install-depot-tools
14 gclient config --name src https://chromium.googlesource.com/libyuv/libyuv
62 call gn gen out\Release "--args=is_debug=false target_cpu=\"x64\""
63 call gn gen out\Debug "--args=is_debug=true target_cpu=\"x64\""
64 ninja -v -C out\Release
65 ninja -v -C out\Debug
67 call gn gen out\Release "--args=is_debug=false target_cpu=\"x86\""
68 call gn gen out\Debug "--args=is_debug=true target_cpu=\"x86\""
69 ninja -v -C out\Release
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Option/
DOptTable.h1 //===- OptTable.h - Option Table --------------------------------*- C++ -*-===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
78 assert(id > 0 && id - 1 < getNumOptions() && "Invalid Option ID."); in getInfo()
79 return OptionInfos[id - 1]; in getInfo()
117 /// Get the meta-variable name to use when describing
126 /// \param [in] Option - Key flag like "-stdlib=" when "-stdlib=l"
127 /// was passed to clang.
129 /// \param [in] Arg - Value which we want to autocomplete like "l"
130 /// when "-stdlib=l" was passed to clang.
[all …]
/third_party/mesa3d/include/android_stub/log/
Dlog_main.h2 * Copyright (C) 2005-2017 The Android Open Source Project
8 * http://www.apache.org/licenses/LICENSE-2.0
43 /* --------------------------------------------------------------------- */
46 * This file uses ", ## __VA_ARGS__" zero-argument token pasting to
47 * work around issues with debug-only syntax errors in assertions
52 #pragma clang diagnostic push
53 #pragma clang diagnostic ignored "-Wgnu-zero-variadic-macro-arguments"
57 * Use __VA_ARGS__ if running a static analyzer,
105 /* --------------------------------------------------------------------- */
131 * is -inverted- from the normal assert() semantics.
[all …]
/third_party/skia/third_party/externals/expat/expat/
DChanges7 #616 #649 #650 CVE-2022-43680 -- Fix heap use-after-free after overeager
9 XML_ExternalEntityParserCreate in out-of-memory situations
13 #629 #640 CVE-2022-40674 -- Heap use-after-free vulnerability in
17 #531 #534 CVE-2021-45960 -- Fix issues with left shifts by >=29 places
27 (which needs argument "-n" when running xmlwf).
47 #551 CVE-2022-23990 -- Fix unsigned integer overflow in function
52 #34 #466 #484 CVE-2013-0340/CWE-776 -- Protect against billion laughs attacks
53 (denial-of-service; flavors targeting CPU time or RAM or both,
61 - A new error code XML_ERROR_AMPLIFICATION_LIMIT_BREACH to
63 - Two new API functions ..
[all …]
/third_party/protobuf/src/google/protobuf/
Dmetadata_lite.h1 // Protocol Buffers - Google's data interchange format
4 // Use of this source code is governed by a BSD-style
6 // https://developers.google.com/open-source/licenses/bsd
35 // used by sub-structure allocation. This optimization allows for
36 // "zero-overhead" storage of the Arena pointer, relative to the above baseline
41 // UFS+Arena-container pointer. Besides it uses bit 1 == 0 to indicate arena
67 return PtrValue<ContainerBase>()->arena; in arena()
85 return PtrValue<Container<T>>()->unknown_fields; in unknown_fields()
94 return &PtrValue<Container<T>>()->unknown_fields; in mutable_unknown_fields()
103 // pointer. We cannot simply swap ptr_ with other->ptr_ because we need to in Swap()
[all …]
/third_party/rust/rust/src/bootstrap/
Ddist.rs8 //! out to `rust-installer` still. This may one day be replaced with bits and
36 pub fn pkgname(builder: &Builder<'_>, component: &str) -> String { in pkgname()
37 format!("{}-{}", component, builder.rust_package_vers()) in pkgname()
40 pub(crate) fn distdir(builder: &Builder<'_>) -> PathBuf { in distdir()
44 pub fn tmpdir(builder: &Builder<'_>) -> PathBuf { in tmpdir()
48 fn should_build_extended_tool(builder: &Builder<'_>, tool: &str) -> bool { in should_build_extended_tool()
64 fn should_run(run: ShouldRun<'_>) -> ShouldRun<'_> { in should_run()
66 run.alias("rust-docs").default_condition(default) in should_run()
73 /// Builds the `rust-docs` installer component.
74 fn run(self, builder: &Builder<'_>) -> Option<GeneratedTarball> { in run()
[all …]
/third_party/cJSON/
DCHANGELOG.md4 ------
5 * Fix null reference in cJSON_SetValuestring(CVE-2023-50472), see #809
6 * Fix null reference in cJSON_InsertItemInArray(CVE-2023-50471), see #809 and #810
11 ------
18 ------
23 * Fix 'cjson_utils-static' target not exist, see #625
30 ------
40 ------
48 ---------
57 ------
[all …]

1234