/external/llvm-project/clang/docs/ |
D | ClangFormattedStatus.rst | 4 .none { background-color: #FFCC99 } 5 .part { background-color: #FFFF99 } 6 .good { background-color: #2CCCFF } 7 .total { font-weight: bold; } 16 Clang Formatted Status 20 …s of: December 04, 2020 17:56:14 (`840e651dc6d <https://github.com/llvm/llvm-project/commit/840e65… 23 .. list-table:: LLVM Clang-Format Status 25 :header-rows: 1 27 * - Directory 28 - Total Files [all …]
|
D | ClangCheck.rst | 8 .. code-block:: console 15 $ ~/clang/build/bin/clang-check snippet.cc -ast-dump -- 16 Processing: /Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc. 17 /Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:2:12: error: expected ';' at end of 26 …(FunctionDecl 0x7ff3a302a8d0 </Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:1:1, line… 27 (CompoundStmt 0x7ff3a302aa10 <line:1:10, line:3:1> 28 (DeclStmt 0x7ff3a302a9f8 <line:2:3, line:3:1> 29 (VarDecl 0x7ff3a302a980 <line:2:3, col:11> a 'int' 34 The '--' at the end is important as it prevents :program:`clang-check` from 36 use :program:`clang-check` in a project, see :doc:`HowToSetupToolingForLLVM`.
|
D | IntroductionToTheClangAST.rst | 2 Introduction to the Clang AST 5 This document gives a gentle introduction to the mysteries of the Clang 7 Clang, or use tools that work based on Clang's AST, like the AST 14 `Slides <https://llvm.org/devmtg/2013-04/klimek-slides.pdf>`_ 19 Clang's AST is different from ASTs produced by some other compilers in 23 Clang's AST a good fit for refactoring tools. 25 Documentation for all Clang AST nodes is available via the generated 26 `Doxygen <https://clang.llvm.org/doxygen>`_. The doxygen online 28 make a search for clang and the AST node's class name usually turn up 30 clang ParenExpr). [all …]
|
/external/llvm-project/clang/utils/ClangVisualizers/ |
D | clang.natvis | 1 <?xml version="1.0" encoding="utf-8"?> 2 <!-- 8 For later versions of Visual Studio, no setup is required--> 11 <Type Name="clang::Type"> 12 <!-- To visualize clang::Types, we need to look at TypeBits.TC to determine the actual 14 because clang::Type has no virtual members hence no RTTI). 17 "cmn": Visualization that is common to all clang::Type subclasses 18 … "poly": Visualization that is specific to the actual clang::Type subclass. The subtype-specific 19 … <DisplayString> is typically as C++-like as possible (like in dump()) with <Expand> 21 …": Only occasionally used when we need to distinguish between an ordinary view and a C++-like view. [all …]
|
/external/tensorflow/tensorflow/core/kernels/image/ |
D | resize_nearest_neighbor_op_test.cc | 7 http://www.apache.org/licenses/LICENSE-2.0 102 // 3, 4 in TEST_P() 103 AddInputFromArray<float>(TensorShape({1, 2, 2, 1}), {1, 2, 3, 4}); in TEST_P() 109 // clang-format off in TEST_P() 112 // clang-format on in TEST_P() 120 // 3, 4 in TEST_P() 121 AddInputFromArray<float>(TensorShape({1, 2, 2, 1}), {1, 2, 3, 4}); in TEST_P() 127 // clang-format off in TEST_P() 130 // clang-format on in TEST_P() 137 // 3, 4 in TEST_P() [all …]
|
/external/clang/test/Modules/ |
D | extensions.c | 2 // RUN: rm -rf %t 3 …-fmodules -fimplicit-module-maps -fdisable-module-hash -ftest-module-file-extension=clang.testA:1:… 6 // RUN: llvm-bcanalyzer %t/ExtensionTestA.pcm | FileCheck -check-prefix=CHECK-BCANALYZER %s 7 // RUN: %clang_cc1 -module-file-info %t/ExtensionTestA.pcm | FileCheck -check-prefix=CHECK-INFO %s 10 // RUN: rm -rf %t 11 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:5:0:user_info_for_A -f… 12 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:3:0:user_info_for_A -f… 16 // using different "versions" of the extensions. Above, the "-verify" test 18 // RUN: rm -rf %t 19 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:5:1:user_info_for_A -f… [all …]
|
/external/llvm-project/clang/test/Modules/ |
D | extensions.c | 2 // RUN: rm -rf %t 3 …-fmodules -fimplicit-module-maps -fdisable-module-hash -ftest-module-file-extension=clang.testA:1:… 6 // RUN: llvm-bcanalyzer %t/ExtensionTestA.pcm | FileCheck -check-prefix=CHECK-BCANALYZER %s 7 // RUN: %clang_cc1 -module-file-info %t/ExtensionTestA.pcm | FileCheck -check-prefix=CHECK-INFO %s 10 // RUN: rm -rf %t 11 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:5:0:user_info_for_A -f… 12 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:3:0:user_info_for_A -f… 16 // using different "versions" of the extensions. Above, the "-verify" test 18 // RUN: rm -rf %t 19 …-fmodules -fimplicit-module-maps -ftest-module-file-extension=clang.testA:1:5:1:user_info_for_A -f… [all …]
|
/external/llvm-project/llvm/test/DebugInfo/Generic/ |
D | debug-names-many-cu.ll | 1 ; RUN: %llc_dwarf -accel-tables=Dwarf -filetype=obj -o %t < %s 2 ; RUN: llvm-dwarfdump -debug-names %t | FileCheck %s 3 ; RUN: llvm-dwarfdump -debug-names -verify %t | FileCheck --check-prefix=VERIFY %s 11 ; CHECK: CU[0]: 0x{{[0-9a-f]*}} 12 ; CHECK: CU[1]: 0x{{[0-9a-f]*}} 14 ; CHECK: CU[256]: 0x{{[0-9a-f]*}} 16 ; CHECK: Abbreviation [[ABBREV:0x[0-9a-f]*]] 17 ; CHECK-NEXT: Tag: DW_TAG_variable 18 ; CHECK-NEXT: DW_IDX_compile_unit: DW_FORM_data2 19 ; CHECK-NEXT: DW_IDX_die_offset: DW_FORM_ref4 [all …]
|
/external/angle/third_party/vulkan-deps/spirv-tools/src/test/opt/ |
D | strip_debug_info_test.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 28 // clang-format off in TEST_F() 33 "%3 = OpString \"minimal.vert\"", in TEST_F() 38 "OpLine %3 10 10", in TEST_F() 40 "OpLine %3 100 100", in TEST_F() 43 "OpLine %3 1 1", in TEST_F() 45 "OpLine %3 2 2", in TEST_F() 46 "OpLine %3 3 3", in TEST_F() 48 "OpLine %3 4 4", in TEST_F() 51 "OpLine %3 4 4", in TEST_F() [all …]
|
/external/deqp-deps/SPIRV-Tools/test/opt/ |
D | strip_debug_info_test.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 28 // clang-format off in TEST_F() 33 "%3 = OpString \"minimal.vert\"", in TEST_F() 38 "OpLine %3 10 10", in TEST_F() 40 "OpLine %3 100 100", in TEST_F() 43 "OpLine %3 1 1", in TEST_F() 45 "OpLine %3 2 2", in TEST_F() 46 "OpLine %3 3 3", in TEST_F() 48 "OpLine %3 4 4", in TEST_F() 51 "OpLine %3 4 4", in TEST_F() [all …]
|
/external/swiftshader/third_party/SPIRV-Tools/test/opt/ |
D | strip_debug_info_test.cpp | 7 // http://www.apache.org/licenses/LICENSE-2.0 28 // clang-format off in TEST_F() 33 "%3 = OpString \"minimal.vert\"", in TEST_F() 38 "OpLine %3 10 10", in TEST_F() 40 "OpLine %3 100 100", in TEST_F() 43 "OpLine %3 1 1", in TEST_F() 45 "OpLine %3 2 2", in TEST_F() 46 "OpLine %3 3 3", in TEST_F() 48 "OpLine %3 4 4", in TEST_F() 51 "OpLine %3 4 4", in TEST_F() [all …]
|
/external/llvm-project/clang/test/Sema/ |
D | attr-type-safety.c | 1 // RUN: %clang_cc1 -fsyntax-only -fdouble-square-bracket-attributes -verify %s 7 extern struct A datatype_wrong1 [[clang::type_tag_for_datatype]]; // expected-error {{'type_tag_for… 9 extern struct A datatype_wrong2 [[clang::type_tag_for_datatype(mpi,1,2)]]; // expected-error {{expe… 11 extern struct A datatype_wrong3 [[clang::type_tag_for_datatype(mpi,not_a_type)]]; // expected-error… 13 extern struct A datatype_wrong4 [[clang::type_tag_for_datatype(mpi,int,int)]]; // expected-error {{… 15 extern struct A datatype_wrong5 [[clang::type_tag_for_datatype(mpi,int,not_a_flag)]]; // expected-e… 17 extern struct A datatype_wrong6 [[clang::type_tag_for_datatype(mpi,int,layout_compatible,not_a_flag… 19 extern struct A A_tag [[clang::type_tag_for_datatype(a,int)]]; 20 extern struct A B_tag [[clang::type_tag_for_datatype(b,int)]]; 22 static const int C_tag [[clang::type_tag_for_datatype(c,int)]] = 10; [all …]
|
D | pragma-clang-section.c | 1 // RUN: %clang_cc1 -fsyntax-only -verify %s -triple arm-none-eabi 2 #pragma clang section bss = "mybss.1" data = "mydata.1" rodata = "myrodata.1" text = "mytext.1" // … 3 #pragma clang section bss="" data="" rodata="" text="" 4 #pragma clang section 6 #pragma clang section dss="mybss.2" // expected-error {{expected one of [bss|data|rodata|text|relro… 7 #pragma clang section deta="mydata.2" // expected-error {{expected one of [bss|data|rodata|text|rel… 8 #pragma clang section rodeta="rodata.2" // expected-error {{expected one of [bss|data|rodata|text|r… 9 #pragma clang section taxt="text.2" // expected-error {{expected one of [bss|data|rodata|text|relro… 11 #pragma clang section section bss="mybss.2" // expected-error {{expected one of [bss|data|rodata|t… 13 #pragma clang section bss "mybss.2" // expected-error {{expected '=' following '#pragma clang sec… [all …]
|
/external/toolchain-utils/compiler_wrapper/ |
D | clang_tidy_flag_test.go | 2 // Use of this source code is governed by a BSD-style license that can be 22 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"}, 23 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"}, 39 if ctx.cmdCount != 3 { 40 t.Errorf("expected 3 calls. Got: %d", ctx.cmdCount) 54 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 57 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil { 63 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil { 66 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil { 70 case 3: [all …]
|
/external/clang/test/Driver/ |
D | fsanitize-coverage.c | 1 … RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | File… 2 …clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %… 3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref… 4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type 5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address 7 …UN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | Fil… 8 …RUN: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | Fil… 9 … RUN: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | File… 10 …N: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | Fi… 11 … RUN: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | File… [all …]
|
/external/clang/test/PCH/ |
D | pragma-loop.cpp | 1 // RUN: %clang_cc1 -emit-pch -o %t.a %s 2 // RUN: %clang_cc1 -include-pch %t.a %s -ast-print -o - | FileCheck %s 7 // CHECK: #pragma clang loop unroll_count(16) 8 // CHECK: #pragma clang loop interleave_count(8) 9 // CHECK: #pragma clang loop vectorize_width(4) 10 // CHECK: #pragma clang loop distribute(enable) 11 // CHECK: #pragma clang loop unroll(disable) 12 // CHECK: #pragma clang loop interleave(disable) 13 // CHECK: #pragma clang loop vectorize(enable) 14 // CHECK: #pragma clang loop distribute(disable) [all …]
|
/external/llvm-project/clang/test/PCH/ |
D | pragma-loop.cpp | 1 // RUN: %clang_cc1 -emit-pch -o %t.a %s 2 // RUN: %clang_cc1 -include-pch %t.a %s -ast-print -o - | FileCheck %s 4 // CHECK: #pragma clang loop vectorize_width(4) 5 // CHECK: #pragma clang loop interleave_count(8) 6 // CHECK: #pragma clang loop unroll_count(16){{$}} 7 // CHECK: #pragma clang loop vectorize(enable) 8 // CHECK: #pragma clang loop interleave(disable) 9 // CHECK: #pragma clang loop unroll(disable) 10 // CHECK: #pragma clang loop distribute(enable) 11 // CHECK: #pragma clang loop vectorize(disable) [all …]
|
/external/clang/test/SemaCXX/ |
D | switch-implicit-fallthrough.cpp | 1 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 -Wimplicit-fallthrough %s 6 if (n - 1) { in fallthrough() 8 } else if (n - 2) { in fallthrough() 10 } else if (n - 3) { in fallthrough() 13 case -1: // no warning here, ignore fall-through from unreachable code in fallthrough() 15 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 17 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 19 …3: // expected-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[… in fallthrough() 22 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 25 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() [all …]
|
/external/rust/crates/grpcio-sys/grpc/third_party/re2/ |
D | .travis.yml | 5 - os: linux 10 - ubuntu-toolchain-r-test 12 - g++-4.8 14 - MATRIX_EVAL="CC=gcc-4.8 CXX=g++-4.8" 15 - os: linux 20 - ubuntu-toolchain-r-test 22 - g++-4.9 24 - MATRIX_EVAL="CC=gcc-4.9 CXX=g++-4.9" 25 - os: linux 30 - ubuntu-toolchain-r-test [all …]
|
/external/llvm-project/clang/test/SemaCXX/ |
D | switch-implicit-fallthrough.cpp | 1 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 -Wimplicit-fallthrough %s 6 if (n - 1) { in fallthrough() 8 } else if (n - 2) { in fallthrough() 10 } else if (n - 3) { in fallthrough() 13 case -1: // no warning here, ignore fall-through from unreachable code in fallthrough() 15 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 17 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 19 …3: // expected-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[… in fallthrough() 22 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() 25 …-warning{{unannotated fall-through between switch labels}} expected-note{{insert '[[clang::fallthr… in fallthrough() [all …]
|
/external/clang/docs/ |
D | ClangCheck.rst | 8 .. code-block:: console 15 $ ~/clang/build/bin/clang-check snippet.cc -ast-dump -- 16 Processing: /Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc. 17 /Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:2:12: error: expected ';' at end of 26 …(FunctionDecl 0x7ff3a302a8d0 </Users/danieljasper/clang/llvm/tools/clang/docs/snippet.cc:1:1, line… 27 (CompoundStmt 0x7ff3a302aa10 <line:1:10, line:3:1> 28 (DeclStmt 0x7ff3a302a9f8 <line:2:3, line:3:1> 29 (VarDecl 0x7ff3a302a980 <line:2:3, col:11> a 'int' 34 The '--' at the end is important as it prevents `clang-check` from search for a 35 compilation database. For more information on how to setup and use `clang-check`
|
D | IntroductionToTheClangAST.rst | 2 Introduction to the Clang AST 5 This document gives a gentle introduction to the mysteries of the Clang 7 Clang, or use tools that work based on Clang's AST, like the AST 14 `Slides <http://llvm.org/devmtg/2013-04/klimek-slides.pdf>`_ 19 Clang's AST is different from ASTs produced by some other compilers in 23 Clang's AST a good fit for refactoring tools. 25 Documentation for all Clang AST nodes is available via the generated 26 `Doxygen <http://clang.llvm.org/doxygen>`_. The doxygen online 28 make a search for clang and the AST node's class name usually turn up 30 clang ParenExpr). [all …]
|
/external/llvm-project/libcxx/utils/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/libcxx/utils/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/openscreen/discovery/mdns/ |
D | mdns_writer_unittest.cc | 2 // Use of this source code is governed by a BSD-style license that can be 36 std::vector<uint8_t> buffer(entry.MaxWireSize() - 1); in TestWriteEntryInsufficientBuffer() 47 // clang-format off in TEST() 53 // clang-format on in TEST() 62 // clang-format off in TEST() 73 // clang-format on in TEST() 86 // clang-format off in TEST() 95 // clang-format on in TEST() 111 // clang-format off in TEST() 113 0x32, '1', '2', '3', '4', '5', '6', '7', '8', '9', '0', '1', '2', '3', in TEST() [all …]
|