Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
fp2-dev
/
platform
/
external
/
clang
/
e8d411997899a87e1a9f63ad3f52b38e7931687c
/
test
/
CodeGen
/
bitfield-2.c
e8d4119
Add indents to AST dumping and removed parenthesis from AST nodes.
by Richard Trieu
· 12 years ago
d538ed9
Implement AST dumper for Decls. http://llvm-reviews.chandlerc.com/D52
by Alexander Kornienko
· 12 years ago
72d2dab
Rework the bitfield access IR generation to address PR13619 and
by Chandler Carruth
· 12 years ago
9cbe4f0
clang side to match the LLVM IR type system rewrite patch.
by Chris Lattner
· 13 years ago
f16aa10
Go back to asking CodeGenTypes whether a type is zero-initializable.
by John McCall
· 14 years ago
52968a1
IRgen: Fix another case where we generated an invalid access component when we
by Daniel Dunbar
· 14 years ago
4651efb
IRgen: Fix case where we might generate an access component with width == 0, if
by Daniel Dunbar
· 14 years ago
89da874
IRgen: Set alignment correctly on bit-field accesses.
by Daniel Dunbar
· 14 years ago
e1467a4
IRgen: Rewrite bit-field access policy to not access data beyond the bounds of the structure, which we also now verify as part of the post-layout consistency checks.
by Daniel Dunbar
· 14 years ago
8ab78a7
IRgen: Always use i8 arrays to access union bit-fields. This is ugly, but
by Daniel Dunbar
· 14 years ago
4803535
Fix an assert when assigning a boolean value to a bitfield of type _Bool.
by Anders Carlsson
· 14 years ago
2677261
IRgen: (Reapply 101222, with fixes) Move EmitStoreThroughBitfieldLValue to use new CGBitfieldInfo::AccessInfo decomposition, instead of computing the access policy itself.
by Daniel Dunbar
· 14 years ago
96c250a
Speculatively revert "IRgen: Move EmitStoreThroughBitfieldLValue to use new CGBitfieldInfo::AccessInfo decomposition, instead of computing the access policy itself.", I think it might be breaking bootstrap.
by Daniel Dunbar
· 14 years ago
89cdaa9
IRgen: Move EmitStoreThroughBitfieldLValue to use new CGBitfieldInfo::AccessInfo decomposition, instead of computing the access policy itself.
by Daniel Dunbar
· 14 years ago