Home
last modified time | relevance | path

Searched +full:clang +full:- +full:tidy (Results 1 – 25 of 204) sorted by relevance

123456789

/external/openthread/script/
Dclang-tidy31 CLANG_APPLY_REPLACEMENTS_VERSION="clang-apply-replacements version 9.0"
39 # Search for clang-tidy-9
40 if command -v clang-tidy-9 >/dev/null; then
41 clang_tidy=$(command -v clang-tidy-9)
42 elif command -v clang-tidy >/dev/null; then
43 clang_tidy=$(command -v clang-tidy)
44 case "$($clang_tidy --version)" in
48 die "$($clang_tidy --version); $CLANG_TIDY_VERSION required"
52 die "clang-tidy 9.0 required"
55 # Search for clang-apply-replacements-9
[all …]
Dmake-pretty35 # script/make-pretty
39 # script/make-pretty clang
40 # script/make-pretty clang-format
41 # script/make-pretty clang-tidy
45 # script/make-pretty markdown
49 # script/make-pretty python
53 # script/make-pretty shell
57 # script/make-pretty check clang
58 # script/make-pretty check clang-format
59 # script/make-pretty check clang-tidy
[all …]
/external/pigweed/docs/
Dautomated_analysis.rst1 .. _docs-automated-analysis:
11 -------
13 -------
18 * clang-tidy
22 * OSS-Fuzz
27 --------------
29 --------------
35 ------
45 your Pigweed-based project.
51 ----
[all …]
/external/webrtc/tools_webrtc/
Dclang_tidy.py5 # Use of this source code is governed by a BSD-style license
10 """Invoke clang-tidy tool.
12 Usage: clang_tidy.py file.cc [clang-tidy-args...]
15 We use an embedded clang-tidy whose version doesn't match clang++.
28 # This includes clang-analyzer-* checks.
31 CHECKER_OPTION = '-checks=*'
45 # when clang-tidy doesn't match most recent clang.
46 # Same battle for -f (e.g. -fcomplete-member-pointers).
49 if not (arg.startswith('-W') or arg.startswith('-f'))
55 # Replace clang++ by clang-tidy
[all …]
/external/pigweed/pw_toolchain/py/pw_toolchain/
Dclang_tidy.py8 # https://www.apache.org/licenses/LICENSE-2.0
15 """Invoke clang-tidy.
18 clang-tidy:
19 - add option `--source-exclude` to exclude matching sources from the
20 clang-tidy analysis.
21 - inputs the full compile command, with the cc binary name
22 - TODO(henrichataing): infer platform options from the full compile command
37 def _parse_args() -> argparse.Namespace:
42 '-v',
43 '--verbose',
[all …]
/external/toolchain-utils/compiler_wrapper/
Dclang_tidy_flag_test.go2 // Use of this source code is governed by a BSD-style license that can be
22 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"},
23 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"},
54 if err := verifyPath(cmd, "usr/bin/clang"); err != nil {
57 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil {
63 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil {
66 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil {
71 if err := verifyPath(cmd, "usr/bin/clang"); err != nil {
92 …if err := verifyArgOrder(cmd, "-checks=.*", mainCc, "--", "-resource-dir=.*", mainCc, "--some_arg"…
99 ctx.newCommand(clangX86_64, mainCc, "--some_arg")))
[all …]
Dclang_tidy_flag.go2 // Use of this source code is governed by a BSD-style license that can be
29 const prefix = "-clang-tidy-flag="
54 if lastArg != "-o" {
71 // Files generated from protobufs can result in _many_ clang-tidy complaints, and aren't
90 clangTidyPath := filepath.Join(filepath.Dir(clangCmd.Path), "clang-tidy")
92 args = append(args, cSrcFile, "--", "-resource-dir="+resourceDir)
106 f, err := ioutil.TempFile(fixesDir, "lints-")
108 return fmt.Errorf("making tempfile for tidy: %v", err)
112 // `f` is an 'anchor'; it ensures we won't create a similarly-named file in the future.
117 extraTidyFlags = append(extraTidyFlags, "--export-fixes="+fixesFilePath, "--header-filter=.*")
[all …]
/external/cronet/buildtools/third_party/libc++/trunk/test/tools/clang_tidy_checks/
DCMakeLists.txt12 find_package(Clang 16)
14 find_package(Clang 17)
29 message(STATUS "Could not find a suitable version of the Clang development package;
30 custom libc++ clang-tidy checks will not be available.")
35 …Clang_DIR_SAVE}" CACHE PATH "The directory containing a CMake configuration file for Clang." FORCE)
37 message(STATUS "Found system-installed LLVM ${LLVM_PACKAGE_VERSION} with headers in ${LLVM_INCLUDE_…
42 # which results in clang-tidy crashing
50 -fno-rtti
51 -fno-sanitize=address,hwaddress,undefined,thread,leak # ignore any sanitizers
54 if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang")
[all …]
Dabi_tag_on_virtual.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
14 // This clang-tidy check ensures that we don't place an abi_tag attribute on
28 // This test ensures that we don't re-introduce this issue in the code base.
31 abi_tag_on_virtual::abi_tag_on_virtual(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in abi_tag_on_virtual()
32 : clang::tidy::ClangTidyCheck(name, context) {} in abi_tag_on_virtual()
34 void abi_tag_on_virtual::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers()
[all …]
Drobust_against_adl.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
17 AST_MATCHER(clang::UnresolvedLookupExpr, requiresADL) { return Node.requiresADL(); } in AST_MATCHER()
19 AST_MATCHER(clang::CallExpr, isOperator) { return llvm::isa<clang::CXXOperatorCallExpr>(Node); } in AST_MATCHER()
21 AST_MATCHER(clang::UnresolvedLookupExpr, isCustomizationPoint) { in AST_MATCHER()
27 AST_MATCHER(clang::CXXMethodDecl, isStatic) { return Node.isStatic(); } in AST_MATCHER()
32 robust_against_adl_check::robust_against_adl_check(llvm::StringRef name, clang::tidy::ClangTidyCont… in robust_against_adl_check()
[all …]
Dlibcpp_module.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyModule.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
20 class LibcxxTestModule : public clang::tidy::ClangTidyModule {
22 void addCheckFactories(clang::tidy::ClangTidyCheckFactories& check_factories) override { in addCheckFactories()
23 check_factories.registerCheck<libcpp::abi_tag_on_virtual>("libcpp-avoid-abi-tag-on-virtual"); in addCheckFactories()
24 check_factories.registerCheck<libcpp::hide_from_abi>("libcpp-hide-from-abi"); in addCheckFactories()
25 check_factories.registerCheck<libcpp::proper_version_checks>("libcpp-cpp-version-check"); in addCheckFactories()
[all …]
Dproper_version_checks.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 #include <clang/Lex/Lexer.h>
12 #include <clang/Lex/PPCallbacks.h>
13 #include <clang/Lex/Preprocessor.h>
17 class proper_version_checks_callbacks : public clang::PPCallbacks {
19 …proper_version_checks_callbacks(clang::Preprocessor& preprocessor, clang::tidy::ClangTidyCheck& ch… in proper_version_checks_callbacks()
22 …void If(clang::SourceLocation location, clang::SourceRange condition_range, ConditionValueKind) ov… in If()
26 void Elif(clang::SourceLocation location, in Elif()
[all …]
Dhide_from_abi.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
15 AST_MATCHER(clang::ClassTemplateDecl, hasFullSpecializations) { return !Node.specializations().empt… in AST_MATCHER()
16 AST_MATCHER(clang::CXXRecordDecl, isTrivial) { return Node.isTrivial(); } in AST_MATCHER()
20 hide_from_abi::hide_from_abi(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in hide_from_abi()
21 : clang::tidy::ClangTidyCheck(name, context) {} in hide_from_abi()
23 void hide_from_abi::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers()
[all …]
Dproper_version_checks.hpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
12 class proper_version_checks : public clang::tidy::ClangTidyCheck {
14 proper_version_checks(llvm::StringRef, clang::tidy::ClangTidyContext*);
15 void registerPPCallbacks(const clang::SourceManager& source_manager,
16 clang::Preprocessor* preprocessor,
17 clang::Preprocessor* module_expander) override;
/external/pigweed/pw_toolchain/
Dstatic_analysis_toolchain.gni7 # https://www.apache.org/licenses/LICENSE-2.0
22 # from the analysis. clang-tidy provides no alternative option.
24 # For example, the following disables clang-tidy on all source files in the
31 # Disable clang-tidy for specific include paths. In the clang-tidy command,
33 # are switched from -I to -isystem, which causes clang-tidy to ignore them.
34 # Unfortunately, clang-tidy provides no other way to filter header files.
40 # While the following ignores all third-party header files:
49 # The generated toolchain runs clang-tidy on all source files that are not
62 # static_analysis.clang_tidy_path: (optional) String indicating clang-tidy bin
79 # Clang tidy is invoked by a wrapper script which implements the missing
[all …]
Ddocs.rst1 .. _module-pw_toolchain:
11 ----------
13 ----------
15 Pigweed. Various GCC and Clang toolchains for multiple platforms are provided.
16 Toolchains names typically include the compiler (``clang`` or ``gcc`` and
19 --------------------
20 Non-C/C++ toolchains
21 --------------------
28 Non-C/C++ toolchains can be used to consolidate actions that should only occur
29 once in a multi-toolchain build. Build targets from all toolchains can refer to
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/distrib/
Drun_clang_tidy.py8 # http://www.apache.org/licenses/LICENSE-2.0
27 clang_tidy = os.environ.get('CLANG_TIDY', 'clang-tidy')
29 argp = argparse.ArgumentParser(description='Run clang-tidy against core')
30 argp.add_argument('files', nargs='+', help='Files to tidy')
31 argp.add_argument('--fix', dest='fix', action='store_true')
32 argp.add_argument('-j',
33 '--jobs',
40 # Explicitly passing the .clang-tidy config by reading it.
42 # in a different source tree so clang-tidy cannot find the right config file
44 with open(".clang-tidy") as f:
[all …]
/external/toolchain-utils/compiler_wrapper/testdata/android_golden/
Dclang_path.json6 "path": "/tmp/stable/clang",
15 "path": "/tmp/stable/clang.real",
27 "path": "/tmp/stable/clang",
39 "path": "/tmp/stable/clang.real",
57 "path": "/tmp/stable/clang",
66 "path": "/tmp/stable/clang.real",
78 "path": "/tmp/stable/clang++",
87 "path": "/tmp/stable/clang++.real",
99 "path": "/tmp/stable/clang-tidy",
108 "path": "/tmp/stable/clang-tidy.real",
[all …]
/external/grpc-grpc/templates/tools/dockerfile/
Dclang5.include1 RUN apt-get update && apt-get -y install wget xz-utils
2 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
3 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
4 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format
5 ENV CLANG_FORMAT=clang-format
6 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy
7 ENV CLANG_TIDY=clang-tidy
/external/rust/cxx/.github/workflows/
Dci.yml14 runs-on: ${{matrix.os || 'ubuntu'}}-latest
16 fail-fast: false
19 - rust: nightly
20 - rust: beta
21 - rust: stable
22 - rust: 1.60.0
23 - name: macOS
26 - name: Windows (msvc)
27 rust: nightly-x86_64-pc-windows-msvc
32 RUSTFLAGS: --cfg deny_warnings -Dwarnings
[all …]
/external/vixl/tools/
Dclang_tidy.py44 'clang-tidy-{}.{}'.format(CLANG_TIDY_VERSION_MAJOR,
49 description = '''This tool runs `clang-tidy` on C++ files.''',
53 parser.add_argument('--jobs', '-j', metavar='N', type=int, nargs='?',
59 parser.add_argument('--clang-tidy', default=DEFAULT_CLANG_TIDY,
60 help='Path to clang-tidy.')
66 cmd = '%s -version' % clang_tidy
72 util.abort("Failed to get clang-tidy's version: %s" % version)
82 # We've incorrectly invoked or configured clang-tidy. This should never
143 return -1
145 opts = ['--', '-DVIXL_INCLUDE_TARGET_AARCH64', '-DVIXL_CODE_BUFFER_MALLOC',
[all …]
/external/grpc-grpc/tools/dockerfile/grpc_clang_format/
DDockerfile7 # http://www.apache.org/licenses/LICENSE-2.0
17 RUN apt-get update && apt-get -y install wget xz-utils
18 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
19 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
20 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format
21 ENV CLANG_FORMAT=clang-format
22 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy
23 ENV CLANG_TIDY=clang-tidy
/external/drm_hwcomposer/.ci/
DMakefile5 CLANG := clang++-14 macro
6 CLANG_TIDY := clang-tidy-14
10 CXXFLAGS := -fPIC -Wall -Wextra -Werror -DPLATFORM_SDK_VERSION=31 -D__ANDROID_API__=31
11 CXXFLAGS += -D_LIBCPP_ENABLE_THREAD_SAFETY_ANNOTATIONS
12 CXXFLAGS += -fvisibility-inlines-hidden -std=gnu++17 -DHWC2_USE_CPP11 -DHWC2_INCLUDE_STRINGIFICATIO…
41 -llvmlibc* -fuchsia-* -altera-* \
42 -llvm-header-guard \
43 -cppcoreguidelines-pro-type-vararg \
44 -hicpp-vararg \
45 -hicpp-signed-bitwise \
[all …]
/external/grpc-grpc/tools/dockerfile/grpc_clang_tidy/
DDockerfile7 # http://www.apache.org/licenses/LICENSE-2.0
17 RUN apt-get update && apt-get -y install wget xz-utils
18 RUN wget http://releases.llvm.org/5.0.0/clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
19 RUN tar xf clang+llvm-5.0.0-linux-x86_64-ubuntu14.04.tar.xz
20 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-format /usr/local/bin/clang-format
21 ENV CLANG_FORMAT=clang-format
22 RUN ln -s /clang+llvm-5.0.0-linux-x86_64-ubuntu14.04/bin/clang-tidy /usr/local/bin/clang-tidy
23 ENV CLANG_TIDY=clang-tidy
30 RUN apt-get update && apt-get install -y \
31 python-all-dev \
[all …]
/external/licenseclassifier/v2/assets/Supplement/NCSA/
Dllvm.txt19 ------- ---------
32 clang-tidy clang-tidy/cert
33 clang-tidy clang-tidy/hicpp

123456789