| /external/openthread/script/ |
| D | clang-tidy | 31 CLANG_APPLY_REPLACEMENTS_VERSION="clang-apply-replacements version 9.0" 39 # Search for clang-tidy-9 40 if command -v clang-tidy-9 >/dev/null; then 41 clang_tidy=$(command -v clang-tidy-9) 42 elif command -v clang-tidy >/dev/null; then 43 clang_tidy=$(command -v clang-tidy) 44 case "$($clang_tidy --version)" in 48 die "$($clang_tidy --version); $CLANG_TIDY_VERSION required" 52 die "clang-tidy 9.0 required" 55 # Search for clang-apply-replacements-9 [all …]
|
| D | make-pretty | 35 # script/make-pretty 39 # script/make-pretty clang 40 # script/make-pretty clang-format 41 # script/make-pretty clang-tidy 45 # script/make-pretty markdown 49 # script/make-pretty python 53 # script/make-pretty shell 57 # script/make-pretty check clang 58 # script/make-pretty check clang-format 59 # script/make-pretty check clang-tidy [all …]
|
| /external/pigweed/docs/ |
| D | automated_analysis.rst | 1 .. _docs-automated-analysis: 11 ------- 13 ------- 18 * clang-tidy 22 * OSS-Fuzz 27 -------------- 29 -------------- 35 ------ 45 your Pigweed-based project. 51 ---- [all …]
|
| /external/webrtc/tools_webrtc/ |
| D | clang_tidy.py | 5 # Use of this source code is governed by a BSD-style license 10 """Invoke clang-tidy tool. 12 Usage: clang_tidy.py file.cc [clang-tidy-args...] 15 We use an embedded clang-tidy whose version doesn't match clang++. 28 # This includes clang-analyzer-* checks. 31 CHECKER_OPTION = '-checks=*' 45 # when clang-tidy doesn't match most recent clang. 46 # Same battle for -f (e.g. -fcomplete-member-pointers). 49 if not (arg.startswith('-W') or arg.startswith('-f')) 55 # Replace clang++ by clang-tidy [all …]
|
| /external/pigweed/pw_toolchain/py/pw_toolchain/ |
| D | clang_tidy.py | 8 # https://www.apache.org/licenses/LICENSE-2.0 15 """Invoke clang-tidy. 18 clang-tidy: 19 - add option `--source-exclude` to exclude matching sources from the 20 clang-tidy analysis. 21 - inputs the full compile command, with the cc binary name 22 - TODO(henrichataing): infer platform options from the full compile command 37 def _parse_args() -> argparse.Namespace: 42 '-v', 43 '--verbose', [all …]
|
| /external/toolchain-utils/compiler_wrapper/ |
| D | clang_tidy_flag_test.go | 2 // Use of this source code is governed by a BSD-style license that can be 22 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"}, 23 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"}, 54 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 57 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil { 63 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil { 66 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil { 71 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 92 …if err := verifyArgOrder(cmd, "-checks=.*", mainCc, "--", "-resource-dir=.*", mainCc, "--some_arg"… 99 ctx.newCommand(clangX86_64, mainCc, "--some_arg"))) [all …]
|
| D | clang_tidy_flag.go | 2 // Use of this source code is governed by a BSD-style license that can be 29 const prefix = "-clang-tidy-flag=" 54 if lastArg != "-o" { 71 // Files generated from protobufs can result in _many_ clang-tidy complaints, and aren't 90 clangTidyPath := filepath.Join(filepath.Dir(clangCmd.Path), "clang-tidy") 92 args = append(args, cSrcFile, "--", "-resource-dir="+resourceDir) 106 f, err := ioutil.TempFile(fixesDir, "lints-") 108 return fmt.Errorf("making tempfile for tidy: %v", err) 112 // `f` is an 'anchor'; it ensures we won't create a similarly-named file in the future. 117 extraTidyFlags = append(extraTidyFlags, "--export-fixes="+fixesFilePath, "--header-filter=.*") [all …]
|
| /external/cronet/buildtools/third_party/libc++/trunk/test/tools/clang_tidy_checks/ |
| D | CMakeLists.txt | 12 find_package(Clang 16) 14 find_package(Clang 17) 29 message(STATUS "Could not find a suitable version of the Clang development package; 30 custom libc++ clang-tidy checks will not be available.") 35 …Clang_DIR_SAVE}" CACHE PATH "The directory containing a CMake configuration file for Clang." FORCE) 37 message(STATUS "Found system-installed LLVM ${LLVM_PACKAGE_VERSION} with headers in ${LLVM_INCLUDE_… 42 # which results in clang-tidy crashing 50 -fno-rtti 51 -fno-sanitize=address,hwaddress,undefined,thread,leak # ignore any sanitizers 54 if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") [all …]
|
| D | abi_tag_on_virtual.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 14 // This clang-tidy check ensures that we don't place an abi_tag attribute on 28 // This test ensures that we don't re-introduce this issue in the code base. 31 abi_tag_on_virtual::abi_tag_on_virtual(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in abi_tag_on_virtual() 32 : clang::tidy::ClangTidyCheck(name, context) {} in abi_tag_on_virtual() 34 void abi_tag_on_virtual::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers() [all …]
|
| D | robust_against_adl.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 17 AST_MATCHER(clang::UnresolvedLookupExpr, requiresADL) { return Node.requiresADL(); } in AST_MATCHER() 19 AST_MATCHER(clang::CallExpr, isOperator) { return llvm::isa<clang::CXXOperatorCallExpr>(Node); } in AST_MATCHER() 21 AST_MATCHER(clang::UnresolvedLookupExpr, isCustomizationPoint) { in AST_MATCHER() 27 AST_MATCHER(clang::CXXMethodDecl, isStatic) { return Node.isStatic(); } in AST_MATCHER() 32 robust_against_adl_check::robust_against_adl_check(llvm::StringRef name, clang::tidy::ClangTidyCont… in robust_against_adl_check() [all …]
|
| D | libcpp_module.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyModule.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 20 class LibcxxTestModule : public clang::tidy::ClangTidyModule { 22 void addCheckFactories(clang::tidy::ClangTidyCheckFactories& check_factories) override { in addCheckFactories() 23 check_factories.registerCheck<libcpp::abi_tag_on_virtual>("libcpp-avoid-abi-tag-on-virtual"); in addCheckFactories() 24 check_factories.registerCheck<libcpp::hide_from_abi>("libcpp-hide-from-abi"); in addCheckFactories() 25 check_factories.registerCheck<libcpp::proper_version_checks>("libcpp-cpp-version-check"); in addCheckFactories() [all …]
|
| D | proper_version_checks.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 #include <clang/Lex/Lexer.h> 12 #include <clang/Lex/PPCallbacks.h> 13 #include <clang/Lex/Preprocessor.h> 17 class proper_version_checks_callbacks : public clang::PPCallbacks { 19 …proper_version_checks_callbacks(clang::Preprocessor& preprocessor, clang::tidy::ClangTidyCheck& ch… in proper_version_checks_callbacks() 22 …void If(clang::SourceLocation location, clang::SourceRange condition_range, ConditionValueKind) ov… in If() 26 void Elif(clang::SourceLocation location, in Elif() [all …]
|
| D | hide_from_abi.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 15 AST_MATCHER(clang::ClassTemplateDecl, hasFullSpecializations) { return !Node.specializations().empt… in AST_MATCHER() 16 AST_MATCHER(clang::CXXRecordDecl, isTrivial) { return Node.isTrivial(); } in AST_MATCHER() 20 hide_from_abi::hide_from_abi(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in hide_from_abi() 21 : clang::tidy::ClangTidyCheck(name, context) {} in hide_from_abi() 23 void hide_from_abi::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers() [all …]
|
| D | proper_version_checks.hpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 12 class proper_version_checks : public clang::tidy::ClangTidyCheck { 14 proper_version_checks(llvm::StringRef, clang::tidy::ClangTidyContext*); 15 void registerPPCallbacks(const clang::SourceManager& source_manager, 16 clang::Preprocessor* preprocessor, 17 clang::Preprocessor* module_expander) override;
|
| /external/pigweed/pw_toolchain/ |
| D | static_analysis_toolchain.gni | 7 # https://www.apache.org/licenses/LICENSE-2.0 22 # from the analysis. clang-tidy provides no alternative option. 24 # For example, the following disables clang-tidy on all source files in the 31 # Disable clang-tidy for specific include paths. In the clang-tidy command, 33 # are switched from -I to -isystem, which causes clang-tidy to ignore them. 34 # Unfortunately, clang-tidy provides no other way to filter header files. 40 # While the following ignores all third-party header files: 49 # The generated toolchain runs clang-tidy on all source files that are not 62 # static_analysis.clang_tidy_path: (optional) String indicating clang-tidy bin 79 # Clang tidy is invoked by a wrapper script which implements the missing [all …]
|
| D | docs.rst | 1 .. _module-pw_toolchain: 11 ---------- 13 ---------- 15 Pigweed. Various GCC and Clang toolchains for multiple platforms are provided. 16 Toolchains names typically include the compiler (``clang`` or ``gcc`` and 19 -------------------- 20 Non-C/C++ toolchains 21 -------------------- 28 Non-C/C++ toolchains can be used to consolidate actions that should only occur 29 once in a multi-toolchain build. Build targets from all toolchains can refer to [all …]
|
| /external/rust/crates/grpcio-sys/grpc/tools/distrib/ |
| D | run_clang_tidy.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 27 clang_tidy = os.environ.get('CLANG_TIDY', 'clang-tidy') 29 argp = argparse.ArgumentParser(description='Run clang-tidy against core') 30 argp.add_argument('files', nargs='+', help='Files to tidy') 31 argp.add_argument('--fix', dest='fix', action='store_true') 32 argp.add_argument('-j', 33 '--jobs', 40 # Explicitly passing the .clang-tidy config by reading it. 42 # in a different source tree so clang-tidy cannot find the right config file 44 with open(".clang-tidy") as f: [all …]
|
| /external/toolchain-utils/compiler_wrapper/testdata/android_golden/ |
| D | clang_path.json | 6 "path": "/tmp/stable/clang", 15 "path": "/tmp/stable/clang.real", 27 "path": "/tmp/stable/clang", 39 "path": "/tmp/stable/clang.real", 57 "path": "/tmp/stable/clang", 66 "path": "/tmp/stable/clang.real", 78 "path": "/tmp/stable/clang++", 87 "path": "/tmp/stable/clang++.real", 99 "path": "/tmp/stable/clang-tidy", 108 "path": "/tmp/stable/clang-tidy.real", [all …]
|
| /external/grpc-grpc/templates/tools/dockerfile/ |
| D | clang5.include | 1 RUN apt-get update && apt-get -y install wget xz-utils 2 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 3 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 4 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format 5 ENV CLANG_FORMAT=clang-format 6 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy 7 ENV CLANG_TIDY=clang-tidy
|
| /external/rust/cxx/.github/workflows/ |
| D | ci.yml | 14 runs-on: ${{matrix.os || 'ubuntu'}}-latest 16 fail-fast: false 19 - rust: nightly 20 - rust: beta 21 - rust: stable 22 - rust: 1.60.0 23 - name: macOS 26 - name: Windows (msvc) 27 rust: nightly-x86_64-pc-windows-msvc 32 RUSTFLAGS: --cfg deny_warnings -Dwarnings [all …]
|
| /external/vixl/tools/ |
| D | clang_tidy.py | 44 'clang-tidy-{}.{}'.format(CLANG_TIDY_VERSION_MAJOR, 49 description = '''This tool runs `clang-tidy` on C++ files.''', 53 parser.add_argument('--jobs', '-j', metavar='N', type=int, nargs='?', 59 parser.add_argument('--clang-tidy', default=DEFAULT_CLANG_TIDY, 60 help='Path to clang-tidy.') 66 cmd = '%s -version' % clang_tidy 72 util.abort("Failed to get clang-tidy's version: %s" % version) 82 # We've incorrectly invoked or configured clang-tidy. This should never 143 return -1 145 opts = ['--', '-DVIXL_INCLUDE_TARGET_AARCH64', '-DVIXL_CODE_BUFFER_MALLOC', [all …]
|
| /external/grpc-grpc/tools/dockerfile/grpc_clang_format/ |
| D | Dockerfile | 7 # http://www.apache.org/licenses/LICENSE-2.0 17 RUN apt-get update && apt-get -y install wget xz-utils 18 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 19 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 20 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format 21 ENV CLANG_FORMAT=clang-format 22 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy 23 ENV CLANG_TIDY=clang-tidy
|
| /external/drm_hwcomposer/.ci/ |
| D | Makefile | 5 CLANG := clang++-14 macro 6 CLANG_TIDY := clang-tidy-14 10 CXXFLAGS := -fPIC -Wall -Wextra -Werror -DPLATFORM_SDK_VERSION=31 -D__ANDROID_API__=31 11 CXXFLAGS += -D_LIBCPP_ENABLE_THREAD_SAFETY_ANNOTATIONS 12 CXXFLAGS += -fvisibility-inlines-hidden -std=gnu++17 -DHWC2_USE_CPP11 -DHWC2_INCLUDE_STRINGIFICATIO… 41 -llvmlibc* -fuchsia-* -altera-* \ 42 -llvm-header-guard \ 43 -cppcoreguidelines-pro-type-vararg \ 44 -hicpp-vararg \ 45 -hicpp-signed-bitwise \ [all …]
|
| /external/grpc-grpc/tools/dockerfile/grpc_clang_tidy/ |
| D | Dockerfile | 7 # http://www.apache.org/licenses/LICENSE-2.0 17 RUN apt-get update && apt-get -y install wget xz-utils 18 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 19 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz 20 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format 21 ENV CLANG_FORMAT=clang-format 22 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy 23 ENV CLANG_TIDY=clang-tidy 30 RUN apt-get update && apt-get install -y \ 31 python-all-dev \ [all …]
|
| /external/licenseclassifier/v2/assets/Supplement/NCSA/ |
| D | llvm.txt | 19 ------- --------- 32 clang-tidy clang-tidy/cert 33 clang-tidy clang-tidy/hicpp
|