/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/ |
D | BUILD.gn | 1 import("//clang/lib/StaticAnalyzer/Frontend/enable.gni") 5 config("clang-tidy-config_Config") { 6 visibility = [ ":clang-tidy-config" ] 10 write_cmake_config("clang-tidy-config") { 11 input = "clang-tidy-config.h.cmake" 12 output = "$target_gen_dir/clang-tidy-config.h" 22 public_configs = [ ":clang-tidy-config_Config" ] 25 static_library("clang-tidy") { 29 ":clang-tidy-config", 30 "//clang/include/clang/StaticAnalyzer/Checkers", [all …]
|
/external/llvm-project/clang-tools-extra/docs/clang-tidy/ |
D | Contributing.rst | 5 :program:`clang-tidy` has several own checks and can run Clang static analyzer 8 Checks are organized in modules, which can be linked into :program:`clang-tidy` 9 with minimal or no code changes in :program:`clang-tidy`. 13 report them in a way similar to how Clang diagnostics work. A fix-it hint can be 16 The interface provided by :program:`clang-tidy` makes it easy to write useful 20 There are a few tools particularly useful when developing clang-tidy checks: 25 * :program:`clang-query` is invaluable for interactive prototyping of AST 26 matchers and exploration of the Clang AST; 27 * `clang-check`_ with the ``-ast-dump`` (and optionally ``-ast-dump-filter``) 31 :program:`clang-tidy` will not be built with support for the [all …]
|
D | index.rst | 2 Clang-Tidy title 12 The list of clang-tidy checks <checks/list> 13 Clang-tidy IDE/Editor Integrations <Integrations> 16 :program:`clang-tidy` is a clang-based C++ "linter" tool. Its purpose is to 19 static analysis. :program:`clang-tidy` is modular and provides a convenient 23 Using clang-tidy 26 :program:`clang-tidy` is a `LibTooling`_-based tool, and it's easier to work 29 compilation options on the command line after ``--``: 31 .. code-block:: console 33 $ clang-tidy test.cpp -- -Imy_project/include -DMY_DEFINES ... [all …]
|
D | Integrations.rst | 2 Clang-tidy IDE/Editor Integrations 6 .. _is available: https://clangd.llvm.org/installation.html#editor-plugins 7 .. _more: https://langserver.org/#implementations-client 9 Apart from being a standalone tool, :program:`clang-tidy` is integrated into 11 integrates :program:`clang-tidy` and `is available`_ in most major editors 14 The following table shows the most well-known :program:`clang-tidy` 17 …--------------------------------------+------------------------+---------------------------------+… 20 … | On-the-fly inspection | Check list configuration (GUI) | Options to checks (GUI) | Configura… 21 …--------------------------------------+------------------------+---------------------------------+… 22 … | \+\ | \-\ | \-\ | … [all …]
|
/external/llvm-project/clang-tools-extra/clang-tidy/tool/ |
D | run-clang-tidy.py | 3 #===- run-clang-tidy.py - Parallel clang-tidy runner --------*- python -*--===# 7 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 9 #===-----------------------------------------------------------------------===# 10 # FIXME: Integrate with clang-tidy-diff.py 14 Parallel clang-tidy runner 17 Runs clang-tidy over all files in a compilation database. Requires clang-tidy 18 and clang-apply-replacements in $PATH. 21 - Run clang-tidy on all files in the current working directory with a default 23 run-clang-tidy.py $PWD 25 - Fix all header guards. [all …]
|
D | CMakeLists.txt | 32 add_clang_tool(clang-tidy 35 add_dependencies(clang-tidy 36 clang-resource-headers 38 clang_target_link_libraries(clang-tidy 46 target_link_libraries(clang-tidy 54 install(PROGRAMS clang-tidy-diff.py 55 DESTINATION share/clang 56 COMPONENT clang-tidy) 57 install(PROGRAMS run-clang-tidy.py 58 DESTINATION share/clang [all …]
|
D | clang-tidy-diff.py | 3 #===- clang-tidy-diff.py - ClangTidy Diff Checker -----------*- python -*--===# 7 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 9 #===-----------------------------------------------------------------------===# 15 This script reads input from a unified diff, runs clang-tidy on all changed 16 files and outputs clang-tidy warnings in changed lines only. This is useful to 17 detect clang-tidy regressions in the lines touched by a specific patch. 20 git diff -U0 HEAD^ | clang-tidy-diff.py -p1 21 svn diff --diff-cmd=diff -x-U0 | \ 22 clang-tidy-diff.py -fix -checks=-*,modernize-use-override 68 sys.stdout.write(stdout.decode('utf-8') + '\n') [all …]
|
D | ClangTidyMain.cpp | 1 //===--- tools/extra/clang-tidy/ClangTidyMain.cpp - Clang tidy tool -------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 /// \file This file implements a clang-tidy tool. 11 /// This tool uses the Clang Tooling infrastructure, see 12 /// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html 15 //===----------------------------------------------------------------------===// 21 #include "clang/Tooling/CommonOptionsParser.h" 28 using namespace clang::tooling; 31 static cl::OptionCategory ClangTidyCategory("clang-tidy options"); [all …]
|
/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/hicpp/ |
D | BUILD.gn | 5 "//clang-tools-extra/clang-tidy", 6 "//clang-tools-extra/clang-tidy/bugprone", 7 "//clang-tools-extra/clang-tidy/cppcoreguidelines", 8 "//clang-tools-extra/clang-tidy/google", 9 "//clang-tools-extra/clang-tidy/misc", 10 "//clang-tools-extra/clang-tidy/modernize", 11 "//clang-tools-extra/clang-tidy/performance", 12 "//clang-tools-extra/clang-tidy/readability", 13 "//clang-tools-extra/clang-tidy/utils", 14 "//clang/lib/AST", [all …]
|
/external/llvm-project/clang-tools-extra/test/clang-tidy/infrastructure/ |
D | diagnostic.cpp | 1 // RUN: not clang-tidy -checks='-*,modernize-use-override' %s.nonexistent.cpp -- | FileCheck -check… 2 …ot clang-tidy -checks='-*,clang-diagnostic-*,google-explicit-constructor' %s -- -fan-unknown-optio… 3 …clang-tidy -checks='-*,google-explicit-constructor,clang-diagnostic-literal-conversion' %s -- -fan… 4 …clang-tidy -checks='-*,modernize-use-override,clang-diagnostic-macro-redefined' %s -- -DMACRO_FROM… 5 // RUN: not clang-tidy -checks='-*,modernize-use-override' %s -- -DCOMPILATION_ERROR | FileCheck -c… 8 // RUN: not clang-tidy -checks='-*,modernize-use-override' %s.nonexistent.cpp -- 2>&1 | FileCheck -… 9 … clang-tidy -checks='-*,clang-diagnostic-*,google-explicit-constructor' %s -- -fan-unknown-option … 10 …clang-tidy -checks='-*,google-explicit-constructor,clang-diagnostic-literal-conversion' %s -- -fan… 11 …clang-tidy -checks='-*,modernize-use-override,clang-diagnostic-macro-redefined' %s -- -DMACRO_FROM… 12 // RUN: not clang-tidy -checks='-*,modernize-use-override' %s -- -DCOMPILATION_ERROR 2>&1 | FileChe… [all …]
|
D | export-relpath.cpp | 1 // RUN: rm -rf %T/clang-tidy/export-relpath 2 // RUN: mkdir -p %T/clang-tidy/export-relpath/subdir 3 // RUN: cp %s %T/clang-tidy/export-relpath/subdir/source.cpp 4 …clang-tidy/export-relpath/subdir", "command": "clang++ source.cpp", "file": "%/T/clang-tidy/export… 6 // Check that running clang-tidy in './subdir' and storing results 9 // RUN: cd %T/clang-tidy/export-relpath 10 // RUN: clang-tidy -p subdir subdir/source.cpp -checks='-*,google-explicit-constructor,llvm-namespa… 11 // RUN: FileCheck -input-file=%T/clang-tidy/export-relpath/fixes.yaml -check-prefix=CHECK-YAML %s 16 // CHECK-YAML: ReplacementText: ' // namespace i' 19 // CHECK-YAML: ReplacementText: 'explicit '
|
D | use-color.cpp | 1 // RUN: clang-tidy -dump-config | FileCheck %s 2 // RUN: clang-tidy -dump-config -use-color | FileCheck -check-prefix=CHECK-CONFIG-COLOR %s 3 // RUN: clang-tidy -dump-config -use-color=false | FileCheck -check-prefix=CHECK-CONFIG-NO-COLOR %s 4 // RUN: clang-tidy -config='UseColor: true' -dump-config | FileCheck -check-prefix=CHECK-CONFIG-COL… 5 // RUN: clang-tidy -config='UseColor: false' -dump-config | FileCheck -check-prefix=CHECK-CONFIG-NO… 6 // RUN: clang-tidy -help | FileCheck -check-prefix=CHECK-OPT-PRESENT %s 8 // RUN: clang-tidy -checks='-*, modernize-use-override' -extra-arg=-std=c++11 -use-color=false %s |… 9 // RUN: clang-tidy -checks='-*, modernize-use-override' -extra-arg=-std=c++11 %s | FileCheck -check… 10 // RUN: clang-tidy -checks='-*, modernize-use-override' -extra-arg=-std=c++11 -use-color %s | FileC… 12 // CHECK-NOT: UseColor [all …]
|
D | config-files.cpp | 1 // RUN: clang-tidy -dump-config %S/Inputs/config-files/- -- | FileCheck %s -check-prefix=CHECK-BASE 2 // CHECK-BASE: Checks: {{.*}}from-parent 3 // CHECK-BASE: HeaderFilterRegex: parent 4 // RUN: clang-tidy -dump-config %S/Inputs/config-files/1/- -- | FileCheck %s -check-prefix=CHECK-CH… 5 // CHECK-CHILD1: Checks: {{.*}}from-child1 6 // CHECK-CHILD1: HeaderFilterRegex: child1 7 // RUN: clang-tidy -dump-config %S/Inputs/config-files/2/- -- | FileCheck %s -check-prefix=CHECK-CH… 8 // CHECK-CHILD2: Checks: {{.*}}from-parent 9 // CHECK-CHILD2: HeaderFilterRegex: parent 10 // RUN: clang-tidy -dump-config %S/Inputs/config-files/3/- -- | FileCheck %s -check-prefix=CHECK-CH… [all …]
|
D | clang-tidy-store-check-profile-one-tu.cpp | 1 // RUN: rm -rf %T/out 2 …clang-tidy -enable-check-profile -checks='-*,readability-function-size' -store-check-profile=%T/ou… 3 …/out/*-clang-tidy-store-check-profile-one-tu.cpp.json | FileCheck --match-full-lines -implicit-che… 4 // RUN: rm -rf %T/out 5 // RUN: clang-tidy -enable-check-profile -checks='-*,readability-function-size' -store-check-profil… 6 …/out/*-clang-tidy-store-check-profile-one-tu.cpp.json | FileCheck --match-full-lines -implicit-che… 8 // CHECK-CONSOLE-NOT: ===-------------------------------------------------------------------------=… 9 // CHECK-CONSOLE-NOT: {{.*}} --- Name --- 10 // CHECK-CONSOLE-NOT: {{.*}} readability-function-size 11 // CHECK-CONSOLE-NOT: {{.*}} Total [all …]
|
D | explain-checks.cpp | 1 // RUN: clang-tidy -checks=-*,modernize-use-nullptr -explain-config | FileCheck --check-prefix=CHEC… 2 // RUN: clang-tidy -config="{Checks: '-*,modernize-use-nullptr'}" -explain-config | FileCheck --che… 3 // RUN: clang-tidy -checks=modernize-use-nullptr -config="{Checks: '-*,modernize-use-nullptr'}" -ex… 4 …clang-tidy -checks=modernize-use-nullptr -config="{Checks: '-*,-modernize-use-nullptr'}" %S/Inputs… 5 // RUN: clang-tidy -checks=modernize-use-nullptr -config="{Checks: '-*,modernize-*'}" -explain-conf… 6 …clang-tidy -explain-config %S/Inputs/explain-config/a.cc -- | grep "'modernize-use-nullptr' is ena… 8 // CHECK-MESSAGE1: 'modernize-use-nullptr' is enabled in the command-line option '-checks'. 9 // CHECK-MESSAGE2: 'modernize-use-nullptr' is enabled in the command-line option '-config'. 10 // CHECK-MESSAGE3: 'modernize-use-nullptr' is enabled in the command-line option '-checks'. 11 // CHECK-MESSAGE4: 'modernize-use-nullptr' is enabled in the command-line option '-checks'. [all …]
|
/external/llvm-project/clang-tools-extra/docs/ |
D | ReleaseNotes.rst | 2 Extra Clang Tools 12.0.0 (In-Progress) Release Notes 13 These are in-progress notes for the upcoming Extra Clang Tools 12 release. 20 This document contains the release notes for the Extra Clang Tools, part of the 21 Clang release 12.0.0. Here we describe the status of the Extra Clang Tools in 26 For more information about Clang or LLVM, including information about 27 the latest release, please see the `Clang Web Site <https://clang.llvm.org>`_ or 31 main Clang web page, this document applies to the *next* release, not 35 What's New in Extra Clang Tools 12.0.0? 38 Some of the major new features and improvements to Extra Clang Tools are listed 39 here. Generic improvements to Extra Clang Tools as a whole or to its underlying [all …]
|
/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/unittests/clang-tidy/ |
D | BUILD.gn | 6 "//clang-tools-extra/clang-tidy", 7 "//clang-tools-extra/clang-tidy/android", 8 "//clang-tools-extra/clang-tidy/google", 9 "//clang-tools-extra/clang-tidy/llvm", 10 "//clang-tools-extra/clang-tidy/objc", 11 "//clang-tools-extra/clang-tidy/readability", 12 "//clang-tools-extra/clang-tidy/utils", 13 "//clang/lib/AST", 14 "//clang/lib/ASTMatchers", 15 "//clang/lib/Basic", [all …]
|
/external/llvm-project/clang-tools-extra/clang-tidy/ |
D | CMakeLists.txt | 7 ${CMAKE_CURRENT_SOURCE_DIR}/clang-tidy-config.h.cmake 8 ${CMAKE_CURRENT_BINARY_DIR}/clang-tidy-config.h) 116 DESTINATION include/clang-tidy 117 COMPONENT clang-tidy-headers 121 add_custom_target(clang-tidy-headers) 122 set_target_properties(clang-tidy-headers PROPERTIES FOLDER "Misc") 124 add_llvm_install_targets(install-clang-tidy-headers 125 DEPENDS clang-tidy-headers 126 COMPONENT clang-tidy-headers)
|
/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/cert/ |
D | BUILD.gn | 5 "//clang-tools-extra/clang-tidy", 6 "//clang-tools-extra/clang-tidy/google", 7 "//clang-tools-extra/clang-tidy/misc", 8 "//clang-tools-extra/clang-tidy/performance", 9 "//clang-tools-extra/clang-tidy/readability", 10 "//clang-tools-extra/clang-tidy/utils", 11 "//clang/lib/AST", 12 "//clang/lib/ASTMatchers", 13 "//clang/lib/Basic", 14 "//clang/lib/Lex",
|
/external/llvm-project/clang-tools-extra/clang-tidy/plugin/ |
D | ClangTidyPlugin.cpp | 1 //===- ClangTidyPlugin.cpp - clang-tidy as a clang plugin -----------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 13 #include "clang/Frontend/CompilerInstance.h" 14 #include "clang/Frontend/FrontendPluginRegistry.h" 15 #include "clang/Frontend/MultiplexConsumer.h" 17 namespace clang { namespace 18 namespace tidy { namespace 20 /// The core clang tidy plugin action. This just provides the AST consumer and 21 /// command line flag parsing for using clang-tidy as a clang plugin. [all …]
|
/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/tool/ |
D | BUILD.gn | 1 executable("clang-tidy") { 4 "//clang-tools-extra/clang-tidy", 5 "//clang-tools-extra/clang-tidy:all-checks", 6 "//clang-tools-extra/clang-tidy:clang-tidy-config", 7 "//clang/lib/AST", 8 "//clang/lib/ASTMatchers", 9 "//clang/lib/Basic", 10 "//clang/lib/Tooling", 11 "//clang/lib/Tooling/Core",
|
/external/llvm-project/clang-tools-extra/clangd/ |
D | ParsedAST.cpp | 1 //===--- ParsedAST.cpp -------------------------------------------*- C++-*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 10 #include "../clang-tidy/ClangTidyCheck.h" 11 #include "../clang-tidy/ClangTidyDiagnosticConsumer.h" 12 #include "../clang-tidy/ClangTidyModuleRegistry.h" 25 #include "clang/AST/ASTContext.h" 26 #include "clang/AST/Decl.h" 27 #include "clang/Basic/LangOptions.h" 28 #include "clang/Basic/SourceLocation.h" [all …]
|
/external/llvm-project/llvm/utils/gn/secondary/clang-tools-extra/clang-tidy/cppcoreguidelines/ |
D | BUILD.gn | 5 "//clang-tools-extra/clang-tidy", 6 "//clang-tools-extra/clang-tidy/misc", 7 "//clang-tools-extra/clang-tidy/modernize", 8 "//clang-tools-extra/clang-tidy/readability", 9 "//clang-tools-extra/clang-tidy/utils", 10 "//clang/lib/AST", 11 "//clang/lib/ASTMatchers", 12 "//clang/lib/Basic", 13 "//clang/lib/Lex", 14 "//clang/lib/Serialization", [all …]
|
/external/webrtc/tools_webrtc/ |
D | clang_tidy.py | 4 # Use of this source code is governed by a BSD-style license 10 """Invoke clang-tidy tool. 12 Usage: clang_tidy.py file.cc [clang-tidy-args...] 15 We use an embedded clang-tidy whose version doesn't match clang++. 24 #pylint: disable=relative-import 30 # This includes clang-analyzer-* checks. 33 CHECKER_OPTION = '-checks=*' 47 # when clang-tidy doesn't match most recent clang. 48 # Same battle for -f (e.g. -fcomplete-member-pointers). 49 command = [arg for arg in command if not (arg.startswith('-W') or [all …]
|
/external/toolchain-utils/compiler_wrapper/ |
D | clang_tidy_flag_test.go | 2 // Use of this source code is governed by a BSD-style license that can be 22 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"}, 23 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"}, 54 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 57 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil { 63 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil { 66 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil { 71 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 92 …if err := verifyArgOrder(cmd, "-checks=.*", mainCc, "--", "-resource-dir=.*", mainCc, "--some_arg"… 99 ctx.newCommand(clangX86_64, mainCc, "--some_arg"))) [all …]
|