Home
last modified time | relevance | path

Searched +refs:clang +refs:format +refs:buffer (Results 1 – 25 of 46) sorted by relevance

12

/external/clang/docs/
DClangFormat.rst13 :program:`clang-format` is located in `clang/tools/clang-format` and can be used
14 to format C/C++/Obj-C code.
18 $ clang-format -help
19 OVERVIEW: A tool to format C/C++/Java/JavaScript/Objective-C/Protobuf code.
27 USAGE: clang-format [options] [<file> ...]
31 Clang-format options:
33 -assume-filename=<string> - When reading from stdin, clang-format assumes this
37 clang-format from an editor integration
41 fallback in case clang-format is invoked with
42 -style=file, but can not find the .clang-format
[all …]
DPCHInternals.rst12 Using Precompiled Headers with ``clang``
15 The Clang compiler frontend, ``clang -cc1``, supports two command line options
18 To generate PCH files using ``clang -cc1``, use the option `-emit-pch`:
22 $ clang -cc1 test.h -emit-pch -o test.h.pch
24 This option is transparently used by ``clang`` when generating PCH files. The
32 $ clang -cc1 -include-pch test.h.pch test.c -o test.s
65 AST file format required for modules are discussed in the section on
72 compressed bitstream as `LLVM's bitcode file format
127 An AST file produced by clang is an object file container with a ``clangast``
137 within `LLVM's bitstream format <http://llvm.org/docs/BitCodeFormat.html>`_.
[all …]
DInternalsManual.rst80 ``clang/Basic/Diagnostic*Kinds.td`` files, depending on what library will be
82 diagnostic, the severity of the diagnostic and the English translation + format
129 The format string for the diagnostic is very simple, but it has some power. It
132 some simple format strings:
137 "format string contains '\\0' within the string body"
143 These examples show some important points of format strings. You can use any
156 order as they are specified, you could have a format string with "``%1 %0``"
161 Here are some "best practices" for writing the English format string:
182 including variable names, types, labels, etc. The "``select``" format can be
198 **"s" format**
[all …]
/external/llvm/test/DebugInfo/Sparc/
Dgnu-window-save.ll7 ; SPARC64: file format ELF64-sparc
23 ; SPARC32: file format ELF32-sparc
51 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
52 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
58 …inct !DICompileUnit(language: DW_LANG_C99, producer: "clang version 3.5 (http://llvm.org/git/clang
68 !11 = !{!"clang version 3.5 (http://llvm.org/git/clang.git 6a0714fee07fb7c4e32d3972b4fe2ce2f5678cf4…
/external/selinux/libselinux/utils/
DMakefile12 COMPILER ?= clang
20 -Wmissing-declarations -Wmissing-noreturn -Wmissing-format-attribute \
28 -Wno-format-nonliteral -Wframe-larger-than=$(MAX_STACK_SIZE) -Wp,-D_FORTIFY_SOURCE=2 \
29 -fstack-protector-all --param=ssp-buffer-size=4 -fexceptions \
/external/compiler-rt/test/BlocksRuntime/
Dtestfilerunner.m29 static bool readErrorFile(char *buffer, const char *from);
98 bool lookforIn(char *lookfor, const char *format, pid_t child) {
99 char buffer[512];
101 sprintf(buffer, format, child);
102 bool gotOutput = readErrorFile(got, buffer);
104 printf("**** didn't get an output file %s to analyze!!??\n", buffer);
109 printf("didn't find '%s' in output file %s\n", lookfor, buffer);
112 unlink(buffer);
127 char buffer[512];
130 sprintf(buffer, "/tmp/errorfile_%d", getpid());
[all …]
/external/fmtlib/fmt/
Dformat.h110 # pragma clang diagnostic push
111 # pragma clang diagnostic ignored "-Wdocumentation-unknown-command"
112 # pragma clang diagnostic ignored "-Wpadded"
407 char buffer[2]; // The buffer size must be >= 2 or _ecvt_s will fail. in isnegative() local
408 _ecvt_s(buffer, sizeof(buffer), x, 0, &dec, &sign); in isnegative()
837 FMT_API static int format_float(char *buffer, std::size_t size,
838 const char *format, unsigned width, int precision, T value);
843 (char *buffer, std::size_t size,
844 const char* format, unsigned width, int precision, double value);
846 (char *buffer, std::size_t size,
[all …]
/external/fmtlib/
DREADME.rst25 but still very fast, replacement-based `format API
26 <http://fmtlib.net/latest/api.html#format-api>`_ with positional arguments
30 * Format API with `format string syntax
32 similar to the one used by `str.format
33 <https://docs.python.org/2/library/stdtypes.html#str.format>`_ in Python.
38 * High speed: performance of the format API is close to that of
48 * Safety: the library is fully type safe, errors in format strings are
49 reported using exceptions, automatic memory management prevents buffer
70 fmt::print("Hello, {}!", "world"); // uses Python-like format string syntax
71 fmt::printf("Hello, %s!", "world"); // uses printf format string syntax
[all …]
DChangeLog.rst7 * Corrected buffer growth when formatting time (`#367 <https://github.com/fmtlib/fmt/issues/367>`_)
9 * Removed warnings under MSVC and clang (`#318 <https://github.com/fmtlib/fmt/issues/318>`_, `#250 …
25 #include "fmt/format.h"
27 Including ``format.h`` from the ``cppformat`` directory is deprecated
61 std::string s = fmt::format("The date is {}", Date(2012, 12, 9));
77 format specifier (`#265 <https://github.com/fmtlib/fmt/issues/265>`_):
173 * Implemented a workaround for a bug in Apple LLVM version 4.2 of clang
200 Including ``format.h`` from the top-level directory is deprecated
247 * [Experimental] User-defined literals for format and named arguments
269 fmt::format("{0:{1}}", 42, 5); // gives " 42"
[all …]
/external/flatbuffers/docs/source/
DFlatBuffers.md18 binary buffer in such a way that it can still be accessed directly
23 your data is that of the buffer. It requires 0 additional allocations
26 buffer to be in memory. Access is close to the speed of raw
28 allow for format evolution and optional fields. It is aimed at
58 with any recent gcc/clang and VS2010. Comes with build files for the tests &
73 format) and very convenient when used together with dynamically typed
115 - Use the `FlatBufferBuilder` class to construct a flat binary buffer.
117 buffer recursively, often as simply as making a single function call.
119 - Store or send your buffer somewhere!
122 from the binary buffer, and from there traverse it conveniently
/external/clang/docs/CommandGuide/
Dclang.rst1 clang - the Clang C, C++, and Objective-C compiler
7 :program:`clang` [*options*] *filename ...*
12 :program:`clang` is a C, C++, and Objective-C compiler which encompasses
20 The clang executable is actually a small driver which controls the overall
63 the same driver. Please see <http://clang-analyzer.llvm.org> for more details
271 option transparently switches the Clang module format to object file
330 assembly files, otherwise this generates LLVM bitcode format object files
432 Adds an implicit #define into the predefines buffer which is read before the
437 Adds an implicit #undef into the predefines buffer which is read before the
442 Adds an implicit #include into the predefines buffer which is read before the
[all …]
/external/skia/gn/
DBUILD.gn14 cc = "$ndk/toolchains/llvm/prebuilt/$ndk_host/bin/clang.exe"
15 cxx = "$ndk/toolchains/llvm/prebuilt/$ndk_host/bin/clang++.exe"
18 cc = "$ndk/toolchains/llvm/prebuilt/$ndk_host/bin/clang"
19 cxx = "$ndk/toolchains/llvm/prebuilt/$ndk_host/bin/clang++"
49 is_clang = is_android || is_ios || is_mac || (cc == "clang" && cxx == "clang++")
357 "-Wno-format-nonliteral",
552 # inputs_newline works around a fixed per-line buffer size in the linker.
582 # inputs_newline works around a fixed per-line buffer size in the linker.
601 # inputs_newline works around a fixed per-line buffer size in the linker.
/external/selinux/libselinux/src/
DMakefile33 COMPILER ?= clang
64 -Wmissing-declarations -Wmissing-noreturn -Wmissing-format-attribute \
72 -Wno-format-nonliteral -Wframe-larger-than=$(MAX_STACK_SIZE) \
73 -fstack-protector-all --param=ssp-buffer-size=4 -fexceptions \
/external/llvm/docs/
DLibFuzzer.rst42 git clone https://chromium.googlesource.com/chromium/src/tools/clang
44 TMP_CLANG/clang/scripts/update.py
47 ``./third_party/llvm-build/Release+Asserts/bin/clang``)
86 clang++ -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer
108clang -fsanitize-coverage=edge -fsanitize=address your_lib.cc fuzz_target.cc libFuzzer.a -o my_fuz…
382 clang++ -fsanitize=address -fsanitize-coverage=edge test_fuzzer.cc libFuzzer.a
410 …(cd pcre2-10.20; ./autogen.sh; CC="clang -fsanitize=address $COV_FLAGS" ./configure --prefix=`pwd`…
430 clang++ -g -fsanitize=address $COV_FLAGS -c -std=c++11 -I inst/include/ pcre_fuzzer.cc
432clang++ -g -fsanitize=address -Wl,--whole-archive inst/lib/*.a -Wl,-no-whole-archive libFuzzer.a p…
509 make -j 32 CC="clang -g -fsanitize=address $COV_FLAGS")
[all …]
DSourceLevelDebugging.rst12 information in LLVM. It describes the :ref:`actual format that the LLVM debug
13 information takes <format>`, which is useful for those interested in creating
49 :ref:`implementation-defined format <ccxx_frontend>` (the C/C++ front-end
69 the Microsoft debug info format, which is usable with Microsoft debuggers such
70 as Visual Studio and WinDBG. LLVM's debug information format is mostly derived
134 Debugging information format
215 In order to handle this, the LLVM debug format uses the metadata attached to
257 …af" "no-infs-fp-math"="false" "no-nans-fp-math"="false" "stack-protector-buffer-size"="8" "unsafe-…
264 …!0 = !DICompileUnit(language: DW_LANG_C99, file: !1, producer: "clang version 3.7.0 (trunk 231150)…
274 !10 = !{!"clang version 3.7.0 (trunk 231150) (llvm/trunk 231154)"}
[all …]
DExceptionHandling.rst12 exception handling in LLVM. It describes the format that LLVM exception
36 exception frame format can be found at `Exception Frames
436 a destination address by `llvm.eh.sjlj.longjmp`_. The buffer format and the
438 ``__builtin_setjmp`` implementation allowing code built with the clang and GCC
441 The single parameter is a pointer to a five word buffer in which the calling
458 a buffer populated by `llvm.eh.sjlj.setjmp`_. The frame pointer and stack
459 pointer are restored from the buffer, then control is transferred to the
502 The format of this call frame information (CFI) is often platform-dependent,
503 however. ARM, for example, defines their own format. Apple has their own compact
504 unwind info format. On Windows, another format is used for all architectures
[all …]
/external/clang/include/clang/Basic/
DAttrDocs.td13 NOTE: This file is automatically generated by running clang-tblgen
124 …let Heading = "assert_capability (assert_shared_capability, clang::assert_capability, clang::asser…
133 …let Heading = "acquire_capability (acquire_shared_capability, clang::acquire_capability, clang::ac…
141 …= "try_acquire_capability (try_acquire_shared_capability, clang::try_acquire_capability, clang::tr…
152 …let Heading = "release_capability (release_shared_capability, clang::release_capability, clang::re…
186 a future version of clang. Also, the ABI is not standardized and the name
232 "chosen when the buffer size is known but 'maxlen' is not")))
289 on when overloads are resolved. In the example below, clang will emit a
325 instruct clang to call ``__builtin_object_size(param, Type)`` at each callsite
547 // void nodupfunc() [[clang::noduplicate]];
[all …]
/external/vixl/doc/
Dchangelog.md5 + Improve code formatting and add tests using clang-format.
55 + Move code buffer management out of the Assembler.
/external/pdfium/docs/
Dgetting-started.md80 clang -I $PDF_DIR/public -o init init.c -L $PDF_DIR/out/Debug -lstdc++ -framework AppKit $PDF_LIBS
102 loading from memory you'll provide a data buffer containing the PDF and its
151 fprintf(stderr, "File not in PDF format or corrupted");
/external/clang/include/clang/Driver/
DCC1Options.td1 //===--- CC1Options.td - Options for clang -cc1 ---------------------------===//
10 // This file defines the options accepted by clang -cc1 and clang -cc1as.
178 HelpText<"Generate debug info with external references to clang modules"
279 HelpText<"Enable PGO instrumentation. The accepted value is clang, llvm, "
312 HelpText<"File for serializing diagnostics in a binary format">;
314 def fdiagnostics_format : Separate<["-"], "fdiagnostics-format">,
412 def fmodule_format_EQ : Joined<["-"], "fmodule-format=">,
413 HelpText<"Select the container format for clang modules and PCH. "
565 def stack_protector_buffer_size : Separate<["-"], "stack-protector-buffer-size">,
566 HelpText<"Lower bound for a buffer to be considered for stack protection">;
/external/harfbuzz_ng/
DNEWS335 * Bound buffer growth during shaping to 32x,
336 * Fix assertions and other issues at OOM / buffer max-growth.
503 - Fix out-of-bounds access in Context lookup format 3.
528 respecing buffer direction and language, down to vertical writing.
537 * hb_buffer_clear_contents() does not reset buffer flags now.
542 actually uses the buffer. As such, don't clear it in
552 - hb_feature_from_string() now accepts CSS font-feature-settings format.
596 Another way to put it is: if there's pre-context text in the buffer,
630 - With all changes in this release, the buffer will contain fully
634 - Fix minor invalid buffer access.
[all …]
/external/skia/src/sksl/
DSkSLParser.cpp17 #pragma clang diagnostic pop
551 Layout::Format format = Layout::Format::kUnspecified; in layout() local
560 originUpperLeft, overrideCoverage, blendSupportAllEquations, format, in layout()
565 YY_BUFFER_STATE buffer; in layout() local
566 buffer = layout_scan_string(t.fText.c_str(), fLayoutScanner); in layout()
568 layout_delete_buffer(buffer, fLayoutScanner); in layout()
632 } else if (Layout::ReadFormat(t.fText, &format)) { in layout()
648 originUpperLeft, overrideCoverage, blendSupportAllEquations, format, in layout()
/external/clang/test/ARCMT/
Dobjcmt-arc-cf-annotations.m.result8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin")
16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end")
138 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2)));
296 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC…
793 // <rdar://problem/6257780> clang checker fails to catch use-after-release
983 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods
992 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}}
997 // misinterpreted by clang scan-build
1153 // <rdar://problem/7299394> clang false positive: retained instance passed to
1203 // pixel buffer object. These test cases show how the analyzer stops tracking
[all …]
Dobjcmt-arc-cf-annotations.m8 #define CF_IMPLICIT_BRIDGING_ENABLED _Pragma("clang arc_cf_code_audited begin")
16 #define CF_IMPLICIT_BRIDGING_DISABLED _Pragma("clang arc_cf_code_audited end")
132 extern void NSLog(NSString *format, ...) __attribute__((format(__NSString__, 1, 2)));
278 - (CGImageRef)createCGImage:(CIImage *)im fromRect:(CGRect)r format:(CIFormat)f colorSpace:(CGC…
751 // <rdar://problem/6257780> clang checker fails to catch use-after-release
941 // <rdar://problem/6902710> clang: false positives w/QC and CoreImage methods
950 [context createCGImage:img fromRect:rect format:form colorSpace:cs]; // expected-warning{{leak}}
955 // misinterpreted by clang scan-build
1111 // <rdar://problem/7299394> clang false positive: retained instance passed to
1161 // pixel buffer object. These test cases show how the analyzer stops tracking
[all …]
/external/clang/include/clang/StaticAnalyzer/Checkers/
DCheckers.td10 include "clang/StaticAnalyzer/Checkers/CheckerBase.td"
306 HelpText<"Warn when 'mkstemp' is passed fewer than 6 X's in the format string">,
330 HelpText<"Warn about buffer overflows (older checker)">,
334 HelpText<"Warn about buffer overflows (newer checker)">,
425 HelpText<"Checks for overlap in two buffer arguments">,

12