| /external/openthread/script/ |
| D | clang-tidy | 31 CLANG_APPLY_REPLACEMENTS_VERSION="clang-apply-replacements version 14.0" 39 # Search for clang-tidy-14 40 if command -v clang-tidy-14 >/dev/null; then 41 clang_tidy=$(command -v clang-tidy-14) 42 elif command -v clang-tidy >/dev/null; then 43 clang_tidy=$(command -v clang-tidy) 44 case "$($clang_tidy --version)" in 48 die "$($clang_tidy --version); $CLANG_TIDY_VERSION required" 52 die "clang-tidy 14.0 required" 55 # Search for clang-apply-replacements-14 [all …]
|
| D | make-pretty | 35 # script/make-pretty 39 # script/make-pretty clang 40 # script/make-pretty clang-format 41 # script/make-pretty clang-tidy 45 # script/make-pretty markdown 49 # script/make-pretty python 53 # script/make-pretty shell 57 # script/make-pretty check clang 58 # script/make-pretty check clang-format 59 # script/make-pretty check clang-tidy [all …]
|
| D | bootstrap | 34 set -euxo pipefail 40 # add clang-format and clang-tidy for pretty 41 …sudo apt-get --no-install-recommends install -y clang-format-14 clang-tidy-14 || echo 'WARNING: co… 44 …python3 -m pip install yapf==0.31.0 || echo 'WARNING: could not install yapf, which is useful if y… 47 …python3 -m pip install mdv || echo 'WARNING: could not install mdv, which is required to post mark… 50 …command -v shfmt || sudo apt-get install shfmt || echo 'WARNING: could not install shfmt, which is… 57 # apt-get update and install dependencies 58 sudo apt-get update 59 sudo apt-get --no-install-recommends install -y g++ lsb-release cmake ninja-build shellcheck 63 PLATFORM=$(lsb_release -is) [all …]
|
| /external/pigweed/docs/ |
| D | automated_analysis.rst | 1 .. _docs-automated-analysis: 11 ------- 13 ------- 18 * clang-tidy 22 * OSS-Fuzz 27 -------------- 29 -------------- 35 ------ 45 your Pigweed-based project. 51 ---- [all …]
|
| /external/pigweed/pw_toolchain/py/pw_toolchain/ |
| D | clang_tidy.py | 8 # https://www.apache.org/licenses/LICENSE-2.0 15 """Invoke clang-tidy. 18 clang-tidy: 19 - add option `--source-exclude` to exclude matching sources from the 20 clang-tidy analysis. 21 - inputs the full compile command, with the cc binary name 22 - TODO(henrichataing): infer platform options from the full compile command 39 def _parse_args() -> argparse.Namespace: 44 '-v', 45 '--verbose', [all …]
|
| D | clang_apply_replacements.py | 9 # https://www.apache.org/licenses/LICENSE-2.0 16 """Applies clang-tidy suggested fixes. 18 This uses the clang-apply-replacements tool to apply code changes described in 19 a YAML file generated by clang-tidy. 29 _REMOVE_CHANGE_FILES_FLAG = "--remove-change-desc-files" 30 _IGNORE_INSERT_CONFLICT_FLAG = "--ignore-insert-conflict" 38 ) -> int: 39 """Runs the clang-apply-replacements tool to apply clang-tidy fixes. 42 root: The directory under which clang-apply-replacements will search 43 for YAML fix files generated by clang-tidy. [all …]
|
| /external/cronet/third_party/libc++/src/test/libcxx/ |
| D | clang_tidy.gen.py | 1 #===----------------------------------------------------------------------===## 5 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 #===----------------------------------------------------------------------===## 9 # Run our custom libc++ clang-tidy checks on all public headers. 20 //--- {header}.sh.cpp 22 // REQUIRES{BLOCKLIT}: has-clang-tidy 24 // The GCC compiler flags are not always compatible with clang-tidy. 29 // TODO: run clang-tidy with modules enabled once they are supported 30 …clang-tidy}} %s --warnings-as-errors=* -header-filter=.* --checks='-*,libcpp-*' --load=%{{test-too… 31 …IT}: %{{clang-tidy}} %s --warnings-as-errors=* -header-filter=.* --config-file=%{{libcxx}}/.clang-…
|
| /external/expat/expat/ |
| D | apply-clang-tidy.sh | 31 set -e -u -o pipefail 33 cd "$(dirname "$(type -P "$0")")" 36 readability-avoid-const-params-in-decls 37 readability-named-parameter 43 clang-analyzer-optin.performance.Padding 46 clang-analyzer-security.insecureAPI.strcpy 48 # Disabling because buggy, see https://github.com/llvm/llvm-project/issues/40656 49 clang-analyzer-valist.Uninitialized 53 checks="${checks_to_enable_flat// /,},-${checks_to_disable_flat// /,-}" 56 --checks="${checks}" [all …]
|
| /external/webrtc/tools_webrtc/ |
| D | clang_tidy.py | 5 # Use of this source code is governed by a BSD-style license 10 """Invoke clang-tidy tool. 12 Usage: clang_tidy.py file.cc [clang-tidy-args...] 15 We use an embedded clang-tidy whose version doesn't match clang++. 28 # This includes clang-analyzer-* checks. 31 CHECKER_OPTION = '-checks=*' 45 # when clang-tidy doesn't match most recent clang. 46 # Same battle for -f (e.g. -fcomplete-member-pointers). 49 if not (arg.startswith('-W') or arg.startswith('-f')) 55 # Replace clang++ by clang-tidy [all …]
|
| /external/toolchain-utils/compiler_wrapper/ |
| D | clang_tidy_flag.go | 2 // Use of this source code is governed by a BSD-style license that can be 29 const prefix = "-clang-tidy-flag=" 54 if lastArg != "-o" { 71 // Files generated from protobufs can result in _many_ clang-tidy complaints, and aren't 90 clangTidyPath := filepath.Join(filepath.Dir(clangCmd.Path), "clang-tidy") 92 args = append(args, cSrcFile, "--", "-resource-dir="+resourceDir) 102 fixesDir := filepath.Join(getCompilerArtifactsDir(env), "linting-output", "clang-tidy") 107 f, err := ioutil.TempFile(fixesDir, "lints-") 109 return fmt.Errorf("making tempfile for tidy: %v", err) 113 // `f` is an 'anchor'; it ensures we won't create a similarly-named file in the future. [all …]
|
| D | clang_tidy_flag_test.go | 2 // Use of this source code is governed by a BSD-style license that can be 23 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"}, 24 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"}, 55 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 58 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil { 64 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil { 67 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil { 72 if err := verifyPath(cmd, "usr/bin/clang"); err != nil { 93 …if err := verifyArgOrder(cmd, "-checks=.*", mainCc, "--", "-resource-dir=.*", mainCc, "--some_arg"… 100 ctx.newCommand(clangX86_64, mainCc, "--some_arg"))) [all …]
|
| /external/cronet/third_party/google_benchmark/src/.github/workflows/ |
| D | clang-tidy.yml | 1 name: clang-tidy 9 name: run-clang-tidy 10 runs-on: ubuntu-latest 12 fail-fast: false 14 - uses: actions/checkout@v3 16 - name: install clang-tidy 17 run: sudo apt update && sudo apt -y install clang-tidy 19 - name: create build environment 20 run: cmake -E make_directory ${{ runner.workspace }}/_build 22 - name: configure cmake [all …]
|
| /external/google-benchmark/.github/workflows/ |
| D | clang-tidy.yml | 1 name: clang-tidy 9 name: run-clang-tidy 10 runs-on: ubuntu-latest 12 fail-fast: false 14 - uses: actions/checkout@v3 16 - name: install clang-tidy 17 run: sudo apt update && sudo apt -y install clang-tidy 19 - name: create build environment 20 run: cmake -E make_directory ${{ runner.workspace }}/_build 22 - name: configure cmake [all …]
|
| /external/cronet/third_party/libc++/src/test/tools/clang_tidy_checks/ |
| D | CMakeLists.txt | 8 find_package(Clang 17) 10 find_package(Clang 18) 26 message(STATUS "Could not find a suitable version of the Clang development package; 27 custom libc++ clang-tidy checks will not be available.") 32 …Clang_DIR_SAVE}" CACHE PATH "The directory containing a CMake configuration file for Clang." FORCE) 34 message(STATUS "Found system-installed LLVM ${LLVM_PACKAGE_VERSION} with headers in ${LLVM_INCLUDE_… 39 # which results in clang-tidy crashing 47 -fno-rtti 48 -fno-sanitize=address,hwaddress,undefined,thread,leak # ignore any sanitizers 51 if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang") [all …]
|
| D | abi_tag_on_virtual.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 14 // This clang-tidy check ensures that we don't place an abi_tag attribute on 28 // This test ensures that we don't re-introduce this issue in the code base. 31 abi_tag_on_virtual::abi_tag_on_virtual(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in abi_tag_on_virtual() 32 : clang::tidy::ClangTidyCheck(name, context) {} in abi_tag_on_virtual() 34 void abi_tag_on_virtual::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers() [all …]
|
| D | robust_against_adl.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyCheck.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 17 AST_MATCHER(clang::UnresolvedLookupExpr, requiresADL) { return Node.requiresADL(); } in AST_MATCHER() 19 AST_MATCHER(clang::CallExpr, isOperator) { return llvm::isa<clang::CXXOperatorCallExpr>(Node); } in AST_MATCHER() 21 AST_MATCHER(clang::UnresolvedLookupExpr, isCustomizationPoint) { in AST_MATCHER() 27 AST_MATCHER(clang::CXXMethodDecl, isStatic) { return Node.isStatic(); } in AST_MATCHER() 32 robust_against_adl_check::robust_against_adl_check(llvm::StringRef name, clang::tidy::ClangTidyCont… in robust_against_adl_check() [all …]
|
| D | libcpp_module.cpp | 1 //===----------------------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 #include "clang-tidy/ClangTidyModule.h" 10 #include "clang-tidy/ClangTidyModuleRegistry.h" 21 class LibcxxTestModule : public clang::tidy::ClangTidyModule { 23 void addCheckFactories(clang::tidy::ClangTidyCheckFactories& check_factories) override { in addCheckFactories() 24 check_factories.registerCheck<libcpp::abi_tag_on_virtual>("libcpp-avoid-abi-tag-on-virtual"); in addCheckFactories() 25 …ories.registerCheck<libcpp::header_exportable_declarations>("libcpp-header-exportable-declarations… in addCheckFactories() 26 check_factories.registerCheck<libcpp::hide_from_abi>("libcpp-hide-from-abi"); in addCheckFactories() [all …]
|
| /external/pigweed/pw_toolchain/ |
| D | static_analysis_toolchain.gni | 7 # https://www.apache.org/licenses/LICENSE-2.0 26 # from the analysis. clang-tidy provides no alternative option. 28 # For example, the following disables clang-tidy on all source files in the 35 # Disable clang-tidy for specific include paths. In the clang-tidy command, 37 # are switched from -I to -isystem, which causes clang-tidy to ignore them. 38 # Unfortunately, clang-tidy provides no other way to filter header files. 44 # While the following ignores all third-party header files: 51 # Third-party software with Pigweed-supported build files that do not pass all 52 # clang-tidy checks. 62 # The generated toolchain runs clang-tidy on all source files that are not [all …]
|
| D | docs.rst | 1 .. _module-pw_toolchain: 11 ------------- 13 ------------- 15 Pigweed. Various GCC and Clang toolchains for multiple platforms are provided. 16 Toolchains names typically include the compiler (``clang`` or ``gcc`` and 19 Non-C/C++ toolchains 27 Non-C/C++ toolchains can be used to consolidate actions that should only occur 28 once in a multi-toolchain build. Build targets from all toolchains can refer to 29 these actions in a non-C/C++ toolchain so they only execute once instead of once 39 The clang-based toolchain provided by Pigweed can be substituted with another [all …]
|
| /external/pigweed/ |
| D | .gn | 7 # https://www.apache.org/licenses/LICENSE-2.0 30 # TODO(b/292098416): This should stay false until a cross-platform constraint 41 # Exclude third-party headers from static analysis. 44 # Exclude GoogleTest, which fails some clang-tidy checks. 48 # Exclude Boringssl, which fails some clang-tidy checks. 51 # Exclude mbedtls, which fails some clang-tidy checks. 62 # Code generated by third-party tool. 65 # Exclude GoogleTest, which fails some clang-tidy checks. 69 # Exclude Boringssl, which fails some clang-tidy checks. 72 # Exclude mbedtls, which fails some clang-tidy checks.
|
| /external/expat/.github/workflows/ |
| D | clang-tidy.yml | 8 # Copyright (c) 2021-2024 Sebastian Pipping <sebastian@pipping.org> 31 name: Enforce clang-tidy clean code 37 - cron: '0 2 * * 5' # Every Friday at 2am 45 name: Enforce clang-tidy clean code 46 runs-on: ubuntu-22.04 48 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 50 - name: Install clang-tidy 18 51 run: |- 52 set -x 53 source /etc/os-release [all …]
|
| /external/rust/crates/grpcio-sys/grpc/tools/distrib/ |
| D | run_clang_tidy.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 27 clang_tidy = os.environ.get('CLANG_TIDY', 'clang-tidy') 29 argp = argparse.ArgumentParser(description='Run clang-tidy against core') 30 argp.add_argument('files', nargs='+', help='Files to tidy') 31 argp.add_argument('--fix', dest='fix', action='store_true') 32 argp.add_argument('-j', 33 '--jobs', 37 argp.add_argument('--only-changed', dest='only_changed', action='store_true') 41 # Explicitly passing the .clang-tidy config by reading it. 43 # in a different source tree so clang-tidy cannot find the right config file [all …]
|
| /external/grpc-grpc/tools/distrib/ |
| D | run_clang_tidy.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 29 clang_tidy = os.environ.get("CLANG_TIDY", "clang-tidy") 31 argp = argparse.ArgumentParser(description="Run clang-tidy against core") 32 argp.add_argument("files", nargs="+", help="Files to tidy") 33 argp.add_argument("--fix", dest="fix", action="store_true") 35 "-j", 36 "--jobs", 41 argp.add_argument("--only-changed", dest="only_changed", action="store_true") 45 # Explicitly passing the .clang-tidy config by reading it. 47 # in a different source tree so clang-tidy cannot find the right config file [all …]
|
| /external/toolchain-utils/compiler_wrapper/testdata/android_golden/ |
| D | clang_path.json | 9 "path": "/tmp/stable/clang.real" 19 "path": "/tmp/stable/clang" 30 "path": "/tmp/stable/clang.real" 43 "path": "/tmp/stable/clang" 57 "path": "/tmp/stable/clang.real" 70 "path": "/tmp/stable/clang" 81 "path": "/tmp/stable/clang++.real" 91 "path": "/tmp/stable/clang++" 102 "path": "/tmp/stable/clang-tidy.real" 112 "path": "/tmp/stable/clang-tidy" [all …]
|
| /external/drm_hwcomposer/.ci/ |
| D | Makefile | 6 CLANG := clang++-15 macro 7 CLANG_TIDY := clang-tidy-15 11 CXXFLAGS := -Wall -Wextra -Werror 12 CXXFLAGS += -D_LIBCPP_ENABLE_THREAD_SAFETY_ANNOTATIONS 13 CXXFLAGS += -fvisibility-inlines-hidden -std=gnu++17 -DHWC2_USE_CPP11 -DHWC2_INCLUDE_STRINGIFICATIO… 17 # clang-tidy doesn't like -mcpu=xxx flag 18 CXXARGS := $(patsubst -mcpu=%,,$(CXXARGS)) 20 CXXARGS := $(subst -nostdlibinc,,$(CXXARGS)) 21 CXXARGS += -I. -I./tests/test_include $(CXXFLAGS) 40 -llvmlibc* -fuchsia-* -altera-* \ [all …]
|