mirror of
https://github.com/intel/llvm.git
synced 2026-01-22 23:49:22 +08:00
[clang-tidy][NFC] http -> https (#160128)
This commit is contained in:
committed by
GitHub
parent
f6a14a01d2
commit
78d0b1af74
@@ -9,7 +9,7 @@
|
||||
/// \file This file implements a clang-tidy tool.
|
||||
///
|
||||
/// This tool uses the Clang Tooling infrastructure, see
|
||||
/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
|
||||
/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
|
||||
/// for details on setting it up with LLVM source tree.
|
||||
///
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
@@ -10,7 +10,7 @@
|
||||
/// and ClangTidyError classes.
|
||||
///
|
||||
/// This tool uses the Clang Tooling infrastructure, see
|
||||
/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
|
||||
/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
|
||||
/// for details on setting it up with LLVM source tree.
|
||||
///
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::abseil {
|
||||
/// deduction (CTAD), in C++17 and higher.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html
|
||||
class CleanupCtadCheck : public utils::TransformerClangTidyCheck {
|
||||
public:
|
||||
CleanupCtadCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// ``absl::Time`` domain.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html
|
||||
class DurationAdditionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationAdditionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// domain.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html
|
||||
class DurationComparisonCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationComparisonCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// the right conversion function instead.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html
|
||||
class DurationConversionCastCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationConversionCastCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::abseil {
|
||||
// Find potential incorrect uses of integer division of absl::Duration objects.
|
||||
//
|
||||
// For the user-facing documentation see:
|
||||
// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html
|
||||
// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html
|
||||
|
||||
class DurationDivisionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::abseil {
|
||||
/// component.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html
|
||||
class DurationFactoryFloatCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationFactoryFloatCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::abseil {
|
||||
/// case of zero and suggests `ZeroDuration()`.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html
|
||||
class DurationFactoryScaleCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationFactoryScaleCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// `absl::Duration` domain.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html
|
||||
class DurationSubtractionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationSubtractionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// to numeric types and back again.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html
|
||||
class DurationUnnecessaryConversionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DurationUnnecessaryConversionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// is a single character string literal and replaces it with a character.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html
|
||||
class FasterStrsplitDelimiterCheck : public ClangTidyCheck {
|
||||
public:
|
||||
FasterStrsplitDelimiterCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// against doing so.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html
|
||||
class NoInternalDependenciesCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NoInternalDependenciesCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// Abseil's compatibility guidelines.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html
|
||||
class NoNamespaceCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NoNamespaceCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::abseil {
|
||||
/// StrCat(1, StrCat(2, 3)) ==> StrCat(1, 2, 3)
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html
|
||||
class RedundantStrcatCallsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
RedundantStrcatCallsCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// should be used instead.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html
|
||||
class StrCatAppendCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StrCatAppendCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::abseil {
|
||||
/// types) and suggests replacing with absl::StrContains.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html
|
||||
class StringFindStrContainsCheck : public utils::TransformerClangTidyCheck {
|
||||
public:
|
||||
StringFindStrContainsCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// domain.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html
|
||||
class TimeComparisonCheck : public ClangTidyCheck {
|
||||
public:
|
||||
TimeComparisonCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
|
||||
/// in the time domain instead of the numeric domain.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html
|
||||
class TimeSubtractionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
TimeSubtractionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::abseil {
|
||||
/// factories.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html
|
||||
class UpgradeDurationConversionsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
UpgradeDurationConversionsCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -109,7 +109,7 @@ namespace clang::tidy::%(namespace)s {
|
||||
%(description)s
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html
|
||||
class %(check_name_camel)s : public ClangTidyCheck {
|
||||
public:
|
||||
%(check_name_camel)s(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::altera {
|
||||
/// degradation.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html
|
||||
class IdDependentBackwardBranchCheck : public ClangTidyCheck {
|
||||
private:
|
||||
enum LoopType { UnknownLoop = -1, DoLoop = 0, WhileLoop = 1, ForLoop = 2 };
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::altera {
|
||||
/// `Verilog.cl`, or `VHDL.cl`.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html
|
||||
class KernelNameRestrictionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
KernelNameRestrictionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::altera {
|
||||
/// kernels, which may be inefficient or cause an error.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html
|
||||
class SingleWorkItemBarrierCheck : public ClangTidyCheck {
|
||||
const unsigned AOCVersion;
|
||||
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::altera {
|
||||
/// packing and/or aligning of said structs as needed.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html
|
||||
class StructPackAlignCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StructPackAlignCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -21,7 +21,7 @@ namespace clang::tidy::altera {
|
||||
/// they cannot be fully unrolled, and should be partially unrolled.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html
|
||||
class UnrollLoopsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
UnrollLoopsCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses accept4() without using the SOCK_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html
|
||||
class CloexecAccept4Check : public CloexecCheck {
|
||||
public:
|
||||
CloexecAccept4Check(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// accept() is better to be replaced by accept4().
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html
|
||||
class CloexecAcceptCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecAcceptCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// creat() is better to be replaced by open().
|
||||
/// Find the usage of creat() and redirect user to use open().
|
||||
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html
|
||||
class CloexecCreatCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecCreatCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::android {
|
||||
/// Find the usage of dup() and redirect user to use fcntl().
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html
|
||||
class CloexecDupCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecDupCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses epoll_create1() without using the EPOLL_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html
|
||||
class CloexecEpollCreate1Check : public CloexecCheck {
|
||||
public:
|
||||
CloexecEpollCreate1Check(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// epoll_create() is better to be replaced by epoll_create1().
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html
|
||||
class CloexecEpollCreateCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecEpollCreateCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::android {
|
||||
/// This check only works when corresponding argument is StringLiteral. No
|
||||
/// constant propagation.
|
||||
///
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html
|
||||
class CloexecFopenCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecFopenCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses inotify_init1() without using the IN_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html
|
||||
class CloexecInotifyInit1Check : public CloexecCheck {
|
||||
public:
|
||||
CloexecInotifyInit1Check(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// inotify_init() is better to be replaced by inotify_init1().
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html
|
||||
class CloexecInotifyInitCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecInotifyInitCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html
|
||||
class CloexecMemfdCreateCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses pipe2() without using the O_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html
|
||||
class CloexecPipe2Check : public CloexecCheck {
|
||||
public:
|
||||
CloexecPipe2Check(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Suggests to replace calls to pipe() with calls to pipe2().
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html
|
||||
class CloexecPipeCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecPipeCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::android {
|
||||
/// Finds code that uses socket() without using the SOCK_CLOEXEC flag.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html
|
||||
class CloexecSocketCheck : public CloexecCheck {
|
||||
public:
|
||||
CloexecSocketCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::boost {
|
||||
/// replaced with a boost ranges version instead
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html
|
||||
class UseRangesCheck : public utils::UseRangesCheck {
|
||||
public:
|
||||
UseRangesCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::boost {
|
||||
/// ``std::to_string`` and ``std::to_wstring`` calls.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html
|
||||
class UseToStringCheck : public ClangTidyCheck {
|
||||
public:
|
||||
UseToStringCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Catches assignments within the condition clause of an if statement.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html
|
||||
class AssignmentInIfConditionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
AssignmentInIfConditionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Finds ``pthread_kill`` function calls when thread is terminated by
|
||||
/// ``SIGTERM`` signal.
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html
|
||||
class BadSignalToKillThreadCheck : public ClangTidyCheck {
|
||||
public:
|
||||
BadSignalToKillThreadCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// ``std::bit_cast`` or ``memcpy``.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html
|
||||
class BitwisePointerCastCheck : public ClangTidyCheck {
|
||||
public:
|
||||
BitwisePointerCastCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
|
||||
/// the true and false expressions are Type I clones of each other.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html
|
||||
class BranchCloneCheck : public ClangTidyCheck {
|
||||
public:
|
||||
BranchCloneCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
|
||||
/// assignments.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html
|
||||
class CapturingThisInMemberVariableCheck : public ClangTidyCheck {
|
||||
public:
|
||||
CapturingThisInMemberVariableCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -15,7 +15,7 @@ namespace clang::tidy::bugprone {
|
||||
|
||||
/// Detects unsafe or redundant two-step casting operations involving ``void*``.
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html
|
||||
class CastingThroughVoidCheck : public ClangTidyCheck {
|
||||
public:
|
||||
CastingThroughVoidCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// behavior or logical errors.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html
|
||||
class ChainedComparisonCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ChainedComparisonCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// member virtual function and anything other than null-pointer-constant.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html
|
||||
class ComparePointerToMemberVirtualFunctionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ComparePointerToMemberVirtualFunctionCheck(StringRef Name,
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// the base class.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html
|
||||
class CopyConstructorInitCheck : public ClangTidyCheck {
|
||||
public:
|
||||
CopyConstructorInitCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// CRTP can be constructed outside itself and the derived class.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html
|
||||
class CrtpConstructorAccessibilityCheck : public ClangTidyCheck {
|
||||
public:
|
||||
CrtpConstructorAccessibilityCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Detect dangling references in value handlers like std::string_view.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html
|
||||
class DanglingHandleCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DanglingHandleCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// a base class
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html
|
||||
class DerivedMethodShadowingBaseMethodCheck : public ClangTidyCheck {
|
||||
public:
|
||||
DerivedMethodShadowingBaseMethodCheck(StringRef Name,
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// swapped (or badly ordered) arguments.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html
|
||||
class EasilySwappableParametersCheck : public ClangTidyCheck {
|
||||
public:
|
||||
EasilySwappableParametersCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Detects and suggests addressing issues with empty catch statements.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html
|
||||
class EmptyCatchCheck : public ClangTidyCheck {
|
||||
public:
|
||||
EmptyCatchCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -21,7 +21,7 @@ namespace clang::tidy::bugprone {
|
||||
/// given as option to the checker.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html
|
||||
class ExceptionEscapeCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -21,7 +21,7 @@ namespace clang::tidy::bugprone {
|
||||
/// \endcode
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html
|
||||
class FoldInitTypeCheck : public ClangTidyCheck {
|
||||
public:
|
||||
FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -34,7 +34,7 @@ namespace clang::tidy::bugprone {
|
||||
/// point.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html
|
||||
class ForwardDeclarationNamespaceCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -23,7 +23,7 @@ namespace clang::tidy::bugprone {
|
||||
/// C++ Design, item 26.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html
|
||||
class ForwardingReferenceOverloadCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ForwardingReferenceOverloadCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Diagnoses instances of an implicit widening of multiplication result.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html
|
||||
class ImplicitWideningOfMultiplicationResultCheck : public ClangTidyCheck {
|
||||
const ast_matchers::MatchFinder::MatchResult *Result;
|
||||
bool ShouldUseCXXStaticCast;
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// ambiguity in the variable's value.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html
|
||||
class IncDecInConditionsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
IncDecInConditionsCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// ``type`` type.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html
|
||||
class IncorrectEnableIfCheck : public ClangTidyCheck {
|
||||
public:
|
||||
IncorrectEnableIfCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// otherwise occur when calling ``shared_from_this``.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html
|
||||
class IncorrectEnableSharedFromThisCheck : public ClangTidyCheck {
|
||||
public:
|
||||
IncorrectEnableSharedFromThisCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// not changed at all).
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html
|
||||
class InfiniteLoopCheck : public ClangTidyCheck {
|
||||
public:
|
||||
InfiniteLoopCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// cause unintended loss of precision.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html
|
||||
class IntegerDivisionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
IntegerDivisionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// the enum has no enumerator with value of 0.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html
|
||||
class InvalidEnumDefaultInitializationCheck : public ClangTidyCheck {
|
||||
public:
|
||||
InvalidEnumDefaultInitializationCheck(StringRef Name,
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// (i.e., `operator()`).
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html
|
||||
class LambdaFunctionNameCheck : public ClangTidyCheck {
|
||||
public:
|
||||
struct SourceRangeLessThan {
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// is used to set value of a field with reference type.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html
|
||||
class MisleadingSetterOfReferenceCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MisleadingSetterOfReferenceCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// argument to a memory allocation function.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html
|
||||
class MisplacedOperatorInStrlenInAllocCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MisplacedOperatorInStrlenInAllocCheck(StringRef Name,
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// memory allocation function instead of its argument.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html
|
||||
class MisplacedPointerArithmeticInAllocCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MisplacedPointerArithmeticInAllocCheck(StringRef Name,
|
||||
|
||||
@@ -24,7 +24,7 @@ namespace clang::tidy::bugprone {
|
||||
// be the most common case. Enabled by default.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html
|
||||
class MisplacedWideningCastCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MisplacedWideningCastCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -30,7 +30,7 @@ namespace clang::tidy::bugprone {
|
||||
/// The check suggests replacing the std::move with a std::forward.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html
|
||||
class MoveForwardingReferenceCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// indirection.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html
|
||||
class MultiLevelImplicitPointerConversionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MultiLevelImplicitPointerConversionCheck(StringRef Name,
|
||||
|
||||
@@ -14,7 +14,7 @@
|
||||
namespace clang::tidy::bugprone {
|
||||
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html
|
||||
class MultipleNewInOneExpressionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MultipleNewInOneExpressionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// other ones will be executed unconditionally.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html
|
||||
class MultipleStatementMacroCheck : public ClangTidyCheck {
|
||||
public:
|
||||
MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// i += 0.1;
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html
|
||||
class NarrowingConversionsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NarrowingConversionsCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// attribute, then we warn the user of their error.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html
|
||||
class NoEscapeCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NoEscapeCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// `enum` type doesn't have a zero-value enumerator.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html
|
||||
class NonZeroEnumToBoolConversionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NonZeroEnumToBoolConversionCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// pointers.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html
|
||||
class NondeterministicPointerIterationOrderCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NondeterministicPointerIterationOrderCheck(StringRef Name,
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
|
||||
/// when the string is read.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html
|
||||
class NotNullTerminatedResultCheck : public ClangTidyCheck {
|
||||
public:
|
||||
NotNullTerminatedResultCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
|
||||
/// of the same optional-like type.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html
|
||||
class OptionalValueConversionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
OptionalValueConversionCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Finds calls to grand..-parent virtual methods instead of parent's.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html
|
||||
class ParentVirtualCallCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ParentVirtualCallCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// virtual function.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html
|
||||
class PointerArithmeticOnPolymorphicObjectCheck : public ClangTidyCheck {
|
||||
public:
|
||||
PointerArithmeticOnPolymorphicObjectCheck(StringRef Name,
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// in the outer `if` statement and were not changed.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html
|
||||
class RedundantBranchConditionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
RedundantBranchConditionCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -27,7 +27,7 @@ namespace clang::tidy::bugprone {
|
||||
/// double underscore occurring anywhere.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html
|
||||
class ReservedIdentifierCheck final : public RenamerClangTidyCheck {
|
||||
const bool Invert;
|
||||
const std::vector<StringRef> AllowedIdentifiersRaw;
|
||||
|
||||
@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
|
||||
/// xvalues as arguments.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html
|
||||
class ReturnConstRefFromParameterCheck : public ClangTidyCheck {
|
||||
public:
|
||||
ReturnConstRefFromParameterCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Checker for signal handler functions.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html
|
||||
class SignalHandlerCheck : public ClangTidyCheck {
|
||||
public:
|
||||
enum class AsyncSafeFunctionSetKind { Minimal, POSIX };
|
||||
|
||||
@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
|
||||
/// implicit conversion happens.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html
|
||||
class SignedCharMisuseCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// user wanted to use `.size()` instead.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html
|
||||
class SizeofContainerCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SizeofContainerCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Find suspicious usages of sizeof expressions.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html
|
||||
class SizeofExpressionCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SizeofExpressionCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
|
||||
/// condition parameter.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html
|
||||
class SpuriouslyWakeUpFunctionsCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SpuriouslyWakeUpFunctionsCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// as an alternative if it is an existing member function.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html
|
||||
class StandaloneEmptyCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StandaloneEmptyCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Finds suspicious string constructor and check their parameters.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html
|
||||
class StringConstructorCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StringConstructorCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Finds instances where an integer is assigned to a string.
|
||||
///
|
||||
/// For more details see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html
|
||||
class StringIntegerAssignmentCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StringIntegerAssignmentCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Find suspicious string literals with embedded NUL characters.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html
|
||||
class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck {
|
||||
public:
|
||||
StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -30,7 +30,7 @@ namespace clang::tidy::bugprone {
|
||||
/// to `nullptr`.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html
|
||||
class StringviewNullptrCheck : public utils::TransformerClangTidyCheck {
|
||||
public:
|
||||
StringviewNullptrCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// The checker detects various cases when an enum is probably misused (as a
|
||||
/// bitmask).
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html
|
||||
class SuspiciousEnumUsageCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -22,7 +22,7 @@ namespace clang::tidy::bugprone {
|
||||
/// #include "baz.h" // no diagnostic
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html
|
||||
class SuspiciousIncludeCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousIncludeCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
||||
@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
|
||||
/// arguments.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html
|
||||
class SuspiciousMemoryComparisonCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousMemoryComparisonCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
|
||||
/// Finds memset calls with potential mistakes in their arguments.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html
|
||||
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html
|
||||
class SuspiciousMemsetUsageCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousMemsetUsageCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user