search for: clangtool

Displaying 20 results from an estimated 23 matches for "clangtool".

Did you mean: clangtools
2013 May 10
0
[LLVMdev] CommandLine: using cl::Positional with enum
...-" prefix is present in any of the arguments. ./prog <option1> | ( <option2> arg1 arg2) | ( <option3> arg1 ) The problem is clear: in this case, the arguments can't be optional. So I thought to delete all the "cl:opt" and process the arguments before calling: ClangTool Tool(OptionsParser.getCompilations(), OptionsParser.getSourcePathList()); in order to give an error if the arguments provided were not correct. But, if arguments are correct, then the next error is shown: warning: /home/user/clang-llvm/build/arg1: 'linker' input unused error: unable to ha...
2013 May 12
0
[LLVMdev] CommandLine: using cl::Positional with enum
...of the arguments. > > ./prog <option1> | ( <option2> arg1 arg2) | ( <option3> arg1 ) > > The problem is clear: in this case, the arguments can't be optional. So I > thought to delete all the "cl:opt" and process the arguments before calling: > > ClangTool Tool(OptionsParser.getCompilations(), > OptionsParser.getSourcePathList()); Oh you're using Clang stuff. I know nothing about this so I can't really help you here. > in order to give an error if the arguments provided were not correct. But, > if arguments are correct, then the n...
2013 May 14
0
[LLVMdev] CommandLine: using cl::Positional with enum
...t;> ./prog <option1> | ( <option2> arg1 arg2) | ( <option3> arg1 ) >> >> The problem is clear: in this case, the arguments can't be optional. So I >> thought to delete all the "cl:opt" and process the arguments before calling: >> >> ClangTool Tool(OptionsParser.getCompilations(), >> OptionsParser.getSourcePathList()); >> > Oh you're using Clang stuff. I know nothing about this so I can't > really help you here. > > >> in order to give an error if the arguments provided were not correct. But, >...
2013 Feb 27
3
[LLVMdev] GSoC 2013
On Wed, Feb 27, 2013 at 4:32 PM, Dmitry Mikushin <dmitry at kernelgen.org> wrote: > Hi Anton, > > I think it would be worth to remove this signature in the bottom line: > > Last modified: $Date: 2009/12/16 09:03:23 $ > > Otherwise, new people may think this page is long time abandoned :) It indicates that it *is* long-abandoned! We need to start actively adding to it.
2018 Nov 15
2
[cfe-dev] "devirtualizing" files in the VFS
...81/plugins/cpp_reparse/service/src/databasefilesystem.cpp#L191-L224> > > These files *do not necessarily* (in 99% of the cases, not at all) exist on the hard drive at the moment of the code wanting to pull the file, hence why we implemented this to give the file source buffer from DB. The ClangTool that needs this still gets the memoryFS for its own purposes, and for the clang libraries, the realFS is still under there. > > Perhaps the "Status" type could be extended to carry extra information? https://github.com/Ericsson/CodeCompass/blob/a1a7b10e3a9e2e4f493135ea68566cee54adc...
2018 Nov 15
3
"devirtualizing" files in the VFS
I'd like to get some more perspectives on the role of the VirtualFileSystem abstraction in llvm/Support. (The VFS layer has recently moved from Clang to LLVM, so crossposting to both lists) https://reviews.llvm.org/D54277 proposed adding a function to VirtualFileSystem to get the underlying "real file" path from a VFS path. LLDB is starting to use VFS for some filesystem
2018 Jun 19
2
Naming clash: -DCLS=n and CLS in code
...but which of course then breakes the syntax... I think such "reserved" names like CLS that can be passed to the compiler(s), should be avoided as identifiers for naming variables, constants, enum members, macros etc. [2845/3381] Building CXX object tools/clang/lib/Tooling/CMakeFiles/clangTooling.dir/Execution.cpp.o FAILED: /usr/local/gcc-latest/bin/g++-latest -DEXPENSIVE_CHECKS -D_DEBUG -D_GLIBCXX_DEBUG -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS -Itools/clang/lib/Frontend/Rewrite -I/sw/src/clang_llvm_dev/clang/lib/Frontend/Rewrite -I/sw/src/...
2019 Aug 14
9
[9.0.0 Release] Release Candidate 2 is here
Hello everyone, 9.0.0-rc2 was tagged yesterday from the release_90 branch at r368683. In the Git monorepo it's available as the llvmorg-9.0.0-rc2 tag. Source code and docs are available at https://prereleases.llvm.org/9.0.0/#rc2 Binaries will be added as they become available. The tag went in roughly one week behind schedule (see "Upcoming Releases" at https://llvm.org), but
2013 Jan 21
0
[LLVMdev] LLD vs LLVM coding style...
On Jan 19, 2013, at 1:55 AM, Chandler Carruth wrote: > We're looking more at doing some serious hacking on LLD, and I'd like to avoid doing lots of work in the codebase only to change the style around later. > > My understanding was that LLD was always intended to be a fully integrated LLVM project much like Clang, with a shared coding standard to go with the shared support
2015 Jul 22
2
[LLVMdev] (no subject)
Hello, I have tried a lot fix this error but am not able to can you please find me a solution am trying to compile the SAFECode in Cygwin Environment to work for windows. used make -j4 command to make the files in cygwin i have got this error make[5]: Leaving directory '/home/uidr7475/Work/LLVM_OBJ/projects/safecode/tools/clang/include' /usr/bin/cp: cannot stat
2013 Jan 19
2
[LLVMdev] LLD vs LLVM coding style...
Greetings folks, We're looking more at doing some serious hacking on LLD, and I'd like to avoid doing lots of work in the codebase only to change the style around later. My understanding was that LLD was always intended to be a fully integrated LLVM project much like Clang, with a shared coding standard to go with the shared support libraries. Can we start that migration? I'm really
2013 Jan 21
4
[LLVMdev] LLD vs LLVM coding style...
...developed initially to support the existing conventions in LLVM and Clang, and it would be a large (and of questionable utility) effort to add support for another convention as well. In essence, the desire for tools *also* advocates for the projects being consistent. [1] http://clang.llvm.org/docs/ClangTools.html#clang-format But none of this argues that the LLVM style is The Right Style. If there are ways to improve the coding conventions with LLVM and Clang, we should absolutely do that. The projects remain small enough that if you can show a convention which is superior, we can easily adopt it fo...
2013 Oct 07
5
[LLVMdev] Open work items with a small scope
Dear Clang/LLVM community! We (a group of 3 highly motivated CS grad students) are taking a class about compilers and optimizations. This class offers the option of doing a implementation project (instead of reading/writing x papers) for its main part. Of course hacking is much more fun than ... ;) So my question is do you know of any open points, compiler passes, optimizations in the LLVM /
2017 Jun 28
2
Building llvm with clang and lld on arm and the llvm arm backend relocation on position independent code
...target clangRewrite [ 72%] Built target clangARCMigrate [ 72%] Built target ClangDriverOptions [ 75%] Built target clangDriver [ 75%] Built target clangSerialization [ 77%] Built target clangFrontend [ 77%] Built target clangRewriteFrontend [ 77%] Built target clangFrontendTool [ 77%] Built target clangTooling [ 77%] Built target clangToolingCore [ 77%] Built target clangToolingRefactor [ 77%] Built target clangIndex [ 78%] Built target clangStaticAnalyzerCore [ 83%] Built target clangStaticAnalyzerCheckers [ 83%] Built target clangStaticAnalyzerFrontend [ 83%] Built target clangFormat [ 85%] Built ta...
2017 Jun 28
3
Building llvm with clang and lld on arm and the llvm arm backend relocation on position independent code
...t; [ 72%] Built target ClangDriverOptions >> [ 75%] Built target clangDriver >> [ 75%] Built target clangSerialization >> [ 77%] Built target clangFrontend >> [ 77%] Built target clangRewriteFrontend >> [ 77%] Built target clangFrontendTool >> [ 77%] Built target clangTooling >> [ 77%] Built target clangToolingCore >> [ 77%] Built target clangToolingRefactor >> [ 77%] Built target clangIndex >> [ 78%] Built target clangStaticAnalyzerCore >> [ 83%] Built target clangStaticAnalyzerCheckers >> [ 83%] Built target clangStaticAnalyzerFr...
2017 Jun 28
3
Building llvm with clang and lld on arm and the llvm arm backend relocation on position independent code
...t;>> [ 75%] Built target clangDriver >>> [ 75%] Built target clangSerialization >>> [ 77%] Built target clangFrontend >>> [ 77%] Built target clangRewriteFrontend >>> [ 77%] Built target clangFrontendTool >>> [ 77%] Built target clangTooling >>> [ 77%] Built target clangToolingCore >>> [ 77%] Built target clangToolingRefactor >>> [ 77%] Built target clangIndex >>> [ 78%] Built target clangStaticAnalyzerCore >>> [ 83%] Built target clangStaticAnalyzerCheckers >&g...
2017 Jun 28
2
Building llvm with clang and lld on arm and the llvm arm backend relocation on position independent code
...ilt target clangDriver >>>> [ 75%] Built target clangSerialization >>>> [ 77%] Built target clangFrontend >>>> [ 77%] Built target clangRewriteFrontend >>>> [ 77%] Built target clangFrontendTool >>>> [ 77%] Built target clangTooling >>>> [ 77%] Built target clangToolingCore >>>> [ 77%] Built target clangToolingRefactor >>>> [ 77%] Built target clangIndex >>>> [ 78%] Built target clangStaticAnalyzerCore >>>> [ 83%] Built target clangStaticAnalyze...
2017 Jun 30
3
Building llvm with clang and lld on arm and the llvm arm backend relocation on position independent code
...er >>>>>> [ 75%] Built target clangSerialization >>>>>> [ 77%] Built target clangFrontend >>>>>> [ 77%] Built target clangRewriteFrontend >>>>>> [ 77%] Built target clangFrontendTool >>>>>> [ 77%] Built target clangTooling >>>>>> [ 77%] Built target clangToolingCore >>>>>> [ 77%] Built target clangToolingRefactor >>>>>> [ 77%] Built target clangIndex >>>>>> [ 78%] Built target clangStaticAnalyzerCore >>>>>> [ 83%] Built targe...
2017 Feb 11
2
Asan self host problems: Failed to deallocate
Trying to run a self host "ninja check-clang" with ASan enabled I hit a /lot/ of errors like this (strangely I hit none of these in check-llvm, only in check-clang): Any ideas? ==10525==ERROR: AddressSanitizer failed to deallocate 0x10800 (67584) bytes at address 0x631000014800 ==10525==AddressSanitizer CHECK failed:
2017 Feb 15
2
Asan self host problems: Failed to deallocate
...DS:STATIC= //Dependencies for target clangTidyReadabilityModule_LIB_DEPENDS:STATIC= //Dependencies for target clangTidySafetyModule_LIB_DEPENDS:STATIC= //Dependencies for target clangTidyUtils_LIB_DEPENDS:STATIC= //Dependencies for target clangTidy_LIB_DEPENDS:STATIC= //Dependencies for target clangToolingCore_LIB_DEPENDS:STATIC= //Dependencies for target clangTooling_LIB_DEPENDS:STATIC= //Dependencies for the target clang_rt.asan-dynamic-x86_64_LIB_DEPENDS:STATIC=general;c;general;dl;general;rt;general;pthread;general;stdc++; //Dependencies for target clang_rt.asan-preinit-x86_64_LIB_DEPENDS:S...