Home
last modified time | relevance | path

Searched +full:clang +full:- +full:tidy (Results 1 – 25 of 244) sorted by relevance

12345678910

/external/openthread/script/
Dclang-tidy31 CLANG_APPLY_REPLACEMENTS_VERSION="clang-apply-replacements version 14.0"
39 # Search for clang-tidy-14
40 if command -v clang-tidy-14 >/dev/null; then
41 clang_tidy=$(command -v clang-tidy-14)
42 elif command -v clang-tidy >/dev/null; then
43 clang_tidy=$(command -v clang-tidy)
44 case "$($clang_tidy --version)" in
48 die "$($clang_tidy --version); $CLANG_TIDY_VERSION required"
52 die "clang-tidy 14.0 required"
55 # Search for clang-apply-replacements-14
[all …]
Dmake-pretty35 # script/make-pretty
39 # script/make-pretty clang
40 # script/make-pretty clang-format
41 # script/make-pretty clang-tidy
45 # script/make-pretty markdown
49 # script/make-pretty python
53 # script/make-pretty shell
57 # script/make-pretty check clang
58 # script/make-pretty check clang-format
59 # script/make-pretty check clang-tidy
[all …]
Dbootstrap34 set -euxo pipefail
40 # add clang-format and clang-tidy for pretty
41 …sudo apt-get --no-install-recommends install -y clang-format-14 clang-tidy-14 || echo 'WARNING: co…
44 …python3 -m pip install yapf==0.31.0 || echo 'WARNING: could not install yapf, which is useful if y…
47 …python3 -m pip install mdv || echo 'WARNING: could not install mdv, which is required to post mark…
50 …command -v shfmt || sudo apt-get install shfmt || echo 'WARNING: could not install shfmt, which is…
57 # apt-get update and install dependencies
58 sudo apt-get update
59 sudo apt-get --no-install-recommends install -y g++ lsb-release cmake ninja-build shellcheck
63 PLATFORM=$(lsb_release -is)
[all …]
/external/pigweed/docs/
Dautomated_analysis.rst1 .. _docs-automated-analysis:
11 -------
13 -------
18 * clang-tidy
22 * OSS-Fuzz
27 --------------
29 --------------
35 ------
45 your Pigweed-based project.
51 ----
[all …]
/external/pigweed/pw_toolchain/py/pw_toolchain/
Dclang_tidy.py8 # https://www.apache.org/licenses/LICENSE-2.0
15 """Invoke clang-tidy.
18 clang-tidy:
19 - add option `--source-exclude` to exclude matching sources from the
20 clang-tidy analysis.
21 - inputs the full compile command, with the cc binary name
22 - TODO(henrichataing): infer platform options from the full compile command
39 def _parse_args() -> argparse.Namespace:
44 '-v',
45 '--verbose',
[all …]
Dclang_apply_replacements.py9 # https://www.apache.org/licenses/LICENSE-2.0
16 """Applies clang-tidy suggested fixes.
18 This uses the clang-apply-replacements tool to apply code changes described in
19 a YAML file generated by clang-tidy.
29 _REMOVE_CHANGE_FILES_FLAG = "--remove-change-desc-files"
30 _IGNORE_INSERT_CONFLICT_FLAG = "--ignore-insert-conflict"
38 ) -> int:
39 """Runs the clang-apply-replacements tool to apply clang-tidy fixes.
42 root: The directory under which clang-apply-replacements will search
43 for YAML fix files generated by clang-tidy.
[all …]
/external/cronet/third_party/libc++/src/test/libcxx/
Dclang_tidy.gen.py1 #===----------------------------------------------------------------------===##
5 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 #===----------------------------------------------------------------------===##
9 # Run our custom libc++ clang-tidy checks on all public headers.
20 //--- {header}.sh.cpp
22 // REQUIRES{BLOCKLIT}: has-clang-tidy
24 // The GCC compiler flags are not always compatible with clang-tidy.
29 // TODO: run clang-tidy with modules enabled once they are supported
30clang-tidy}} %s --warnings-as-errors=* -header-filter=.* --checks='-*,libcpp-*' --load=%{{test-too…
31 …IT}: %{{clang-tidy}} %s --warnings-as-errors=* -header-filter=.* --config-file=%{{libcxx}}/.clang-…
/external/expat/expat/
Dapply-clang-tidy.sh31 set -e -u -o pipefail
33 cd "$(dirname "$(type -P "$0")")"
36 readability-avoid-const-params-in-decls
37 readability-named-parameter
43 clang-analyzer-optin.performance.Padding
46 clang-analyzer-security.insecureAPI.strcpy
48 # Disabling because buggy, see https://github.com/llvm/llvm-project/issues/40656
49 clang-analyzer-valist.Uninitialized
53 checks="${checks_to_enable_flat// /,},-${checks_to_disable_flat// /,-}"
56 --checks="${checks}"
[all …]
/external/webrtc/tools_webrtc/
Dclang_tidy.py5 # Use of this source code is governed by a BSD-style license
10 """Invoke clang-tidy tool.
12 Usage: clang_tidy.py file.cc [clang-tidy-args...]
15 We use an embedded clang-tidy whose version doesn't match clang++.
28 # This includes clang-analyzer-* checks.
31 CHECKER_OPTION = '-checks=*'
45 # when clang-tidy doesn't match most recent clang.
46 # Same battle for -f (e.g. -fcomplete-member-pointers).
49 if not (arg.startswith('-W') or arg.startswith('-f'))
55 # Replace clang++ by clang-tidy
[all …]
/external/toolchain-utils/compiler_wrapper/
Dclang_tidy_flag.go2 // Use of this source code is governed by a BSD-style license that can be
29 const prefix = "-clang-tidy-flag="
54 if lastArg != "-o" {
71 // Files generated from protobufs can result in _many_ clang-tidy complaints, and aren't
90 clangTidyPath := filepath.Join(filepath.Dir(clangCmd.Path), "clang-tidy")
92 args = append(args, cSrcFile, "--", "-resource-dir="+resourceDir)
102 fixesDir := filepath.Join(getCompilerArtifactsDir(env), "linting-output", "clang-tidy")
107 f, err := ioutil.TempFile(fixesDir, "lints-")
109 return fmt.Errorf("making tempfile for tidy: %v", err)
113 // `f` is an 'anchor'; it ensures we won't create a similarly-named file in the future.
[all …]
Dclang_tidy_flag_test.go2 // Use of this source code is governed by a BSD-style license that can be
23 {"./x86_64-cros-linux-gnu-clang", ".*/clang-tidy"},
24 {"./x86_64-cros-linux-gnu-clang++", ".*/clang-tidy"},
55 if err := verifyPath(cmd, "usr/bin/clang"); err != nil {
58 if err := verifyArgOrder(cmd, "--print-resource-dir"); err != nil {
64 if err := verifyPath(cmd, "usr/bin/clang-tidy"); err != nil {
67 if err := verifyArgOrder(cmd, "-resource-dir=someResourcePath", mainCc); err != nil {
72 if err := verifyPath(cmd, "usr/bin/clang"); err != nil {
93 …if err := verifyArgOrder(cmd, "-checks=.*", mainCc, "--", "-resource-dir=.*", mainCc, "--some_arg"…
100 ctx.newCommand(clangX86_64, mainCc, "--some_arg")))
[all …]
/external/cronet/third_party/google_benchmark/src/.github/workflows/
Dclang-tidy.yml1 name: clang-tidy
9 name: run-clang-tidy
10 runs-on: ubuntu-latest
12 fail-fast: false
14 - uses: actions/checkout@v3
16 - name: install clang-tidy
17 run: sudo apt update && sudo apt -y install clang-tidy
19 - name: create build environment
20 run: cmake -E make_directory ${{ runner.workspace }}/_build
22 - name: configure cmake
[all …]
/external/google-benchmark/.github/workflows/
Dclang-tidy.yml1 name: clang-tidy
9 name: run-clang-tidy
10 runs-on: ubuntu-latest
12 fail-fast: false
14 - uses: actions/checkout@v3
16 - name: install clang-tidy
17 run: sudo apt update && sudo apt -y install clang-tidy
19 - name: create build environment
20 run: cmake -E make_directory ${{ runner.workspace }}/_build
22 - name: configure cmake
[all …]
/external/cronet/third_party/libc++/src/test/tools/clang_tidy_checks/
DCMakeLists.txt8 find_package(Clang 17)
10 find_package(Clang 18)
26 message(STATUS "Could not find a suitable version of the Clang development package;
27 custom libc++ clang-tidy checks will not be available.")
32 …Clang_DIR_SAVE}" CACHE PATH "The directory containing a CMake configuration file for Clang." FORCE)
34 message(STATUS "Found system-installed LLVM ${LLVM_PACKAGE_VERSION} with headers in ${LLVM_INCLUDE_…
39 # which results in clang-tidy crashing
47 -fno-rtti
48 -fno-sanitize=address,hwaddress,undefined,thread,leak # ignore any sanitizers
51 if ("${CMAKE_CXX_COMPILER_ID}" STREQUAL "Clang")
[all …]
Dabi_tag_on_virtual.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
14 // This clang-tidy check ensures that we don't place an abi_tag attribute on
28 // This test ensures that we don't re-introduce this issue in the code base.
31 abi_tag_on_virtual::abi_tag_on_virtual(llvm::StringRef name, clang::tidy::ClangTidyContext* context) in abi_tag_on_virtual()
32 : clang::tidy::ClangTidyCheck(name, context) {} in abi_tag_on_virtual()
34 void abi_tag_on_virtual::registerMatchers(clang::ast_matchers::MatchFinder* finder) { in registerMatchers()
[all …]
Drobust_against_adl.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyCheck.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
17 AST_MATCHER(clang::UnresolvedLookupExpr, requiresADL) { return Node.requiresADL(); } in AST_MATCHER()
19 AST_MATCHER(clang::CallExpr, isOperator) { return llvm::isa<clang::CXXOperatorCallExpr>(Node); } in AST_MATCHER()
21 AST_MATCHER(clang::UnresolvedLookupExpr, isCustomizationPoint) { in AST_MATCHER()
27 AST_MATCHER(clang::CXXMethodDecl, isStatic) { return Node.isStatic(); } in AST_MATCHER()
32 robust_against_adl_check::robust_against_adl_check(llvm::StringRef name, clang::tidy::ClangTidyCont… in robust_against_adl_check()
[all …]
Dlibcpp_module.cpp1 //===----------------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "clang-tidy/ClangTidyModule.h"
10 #include "clang-tidy/ClangTidyModuleRegistry.h"
21 class LibcxxTestModule : public clang::tidy::ClangTidyModule {
23 void addCheckFactories(clang::tidy::ClangTidyCheckFactories& check_factories) override { in addCheckFactories()
24 check_factories.registerCheck<libcpp::abi_tag_on_virtual>("libcpp-avoid-abi-tag-on-virtual"); in addCheckFactories()
25 …ories.registerCheck<libcpp::header_exportable_declarations>("libcpp-header-exportable-declarations… in addCheckFactories()
26 check_factories.registerCheck<libcpp::hide_from_abi>("libcpp-hide-from-abi"); in addCheckFactories()
[all …]
/external/pigweed/pw_toolchain/
Dstatic_analysis_toolchain.gni7 # https://www.apache.org/licenses/LICENSE-2.0
26 # from the analysis. clang-tidy provides no alternative option.
28 # For example, the following disables clang-tidy on all source files in the
35 # Disable clang-tidy for specific include paths. In the clang-tidy command,
37 # are switched from -I to -isystem, which causes clang-tidy to ignore them.
38 # Unfortunately, clang-tidy provides no other way to filter header files.
44 # While the following ignores all third-party header files:
51 # Third-party software with Pigweed-supported build files that do not pass all
52 # clang-tidy checks.
62 # The generated toolchain runs clang-tidy on all source files that are not
[all …]
Ddocs.rst1 .. _module-pw_toolchain:
11 -------------
13 -------------
15 Pigweed. Various GCC and Clang toolchains for multiple platforms are provided.
16 Toolchains names typically include the compiler (``clang`` or ``gcc`` and
19 Non-C/C++ toolchains
27 Non-C/C++ toolchains can be used to consolidate actions that should only occur
28 once in a multi-toolchain build. Build targets from all toolchains can refer to
29 these actions in a non-C/C++ toolchain so they only execute once instead of once
39 The clang-based toolchain provided by Pigweed can be substituted with another
[all …]
/external/pigweed/
D.gn7 # https://www.apache.org/licenses/LICENSE-2.0
30 # TODO(b/292098416): This should stay false until a cross-platform constraint
41 # Exclude third-party headers from static analysis.
44 # Exclude GoogleTest, which fails some clang-tidy checks.
48 # Exclude Boringssl, which fails some clang-tidy checks.
51 # Exclude mbedtls, which fails some clang-tidy checks.
62 # Code generated by third-party tool.
65 # Exclude GoogleTest, which fails some clang-tidy checks.
69 # Exclude Boringssl, which fails some clang-tidy checks.
72 # Exclude mbedtls, which fails some clang-tidy checks.
/external/expat/.github/workflows/
Dclang-tidy.yml8 # Copyright (c) 2021-2024 Sebastian Pipping <sebastian@pipping.org>
31 name: Enforce clang-tidy clean code
37 - cron: '0 2 * * 5' # Every Friday at 2am
45 name: Enforce clang-tidy clean code
46 runs-on: ubuntu-22.04
48 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
50 - name: Install clang-tidy 18
51 run: |-
52 set -x
53 source /etc/os-release
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/distrib/
Drun_clang_tidy.py8 # http://www.apache.org/licenses/LICENSE-2.0
27 clang_tidy = os.environ.get('CLANG_TIDY', 'clang-tidy')
29 argp = argparse.ArgumentParser(description='Run clang-tidy against core')
30 argp.add_argument('files', nargs='+', help='Files to tidy')
31 argp.add_argument('--fix', dest='fix', action='store_true')
32 argp.add_argument('-j',
33 '--jobs',
37 argp.add_argument('--only-changed', dest='only_changed', action='store_true')
41 # Explicitly passing the .clang-tidy config by reading it.
43 # in a different source tree so clang-tidy cannot find the right config file
[all …]
/external/grpc-grpc/tools/distrib/
Drun_clang_tidy.py8 # http://www.apache.org/licenses/LICENSE-2.0
29 clang_tidy = os.environ.get("CLANG_TIDY", "clang-tidy")
31 argp = argparse.ArgumentParser(description="Run clang-tidy against core")
32 argp.add_argument("files", nargs="+", help="Files to tidy")
33 argp.add_argument("--fix", dest="fix", action="store_true")
35 "-j",
36 "--jobs",
41 argp.add_argument("--only-changed", dest="only_changed", action="store_true")
45 # Explicitly passing the .clang-tidy config by reading it.
47 # in a different source tree so clang-tidy cannot find the right config file
[all …]
/external/toolchain-utils/compiler_wrapper/testdata/android_golden/
Dclang_path.json9 "path": "/tmp/stable/clang.real"
19 "path": "/tmp/stable/clang"
30 "path": "/tmp/stable/clang.real"
43 "path": "/tmp/stable/clang"
57 "path": "/tmp/stable/clang.real"
70 "path": "/tmp/stable/clang"
81 "path": "/tmp/stable/clang++.real"
91 "path": "/tmp/stable/clang++"
102 "path": "/tmp/stable/clang-tidy.real"
112 "path": "/tmp/stable/clang-tidy"
[all …]
/external/drm_hwcomposer/.ci/
DMakefile6 CLANG := clang++-15 macro
7 CLANG_TIDY := clang-tidy-15
11 CXXFLAGS := -Wall -Wextra -Werror
12 CXXFLAGS += -D_LIBCPP_ENABLE_THREAD_SAFETY_ANNOTATIONS
13 CXXFLAGS += -fvisibility-inlines-hidden -std=gnu++17 -DHWC2_USE_CPP11 -DHWC2_INCLUDE_STRINGIFICATIO…
17 # clang-tidy doesn't like -mcpu=xxx flag
18 CXXARGS := $(patsubst -mcpu=%,,$(CXXARGS))
20 CXXARGS := $(subst -nostdlibinc,,$(CXXARGS))
21 CXXARGS += -I. -I./tests/test_include $(CXXFLAGS)
40 -llvmlibc* -fuchsia-* -altera-* \
[all …]

12345678910