summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlexander Kornienko <alexfh@google.com>2017-11-24 14:16:29 +0000
committerAlexander Kornienko <alexfh@google.com>2017-11-24 14:16:29 +0000
commitd4ac4afda75c9ef174e85eea7f40a6ae6cc50ab4 (patch)
treec43c0be034454ea297f0ccdc84302e9636abed63
parent70cdb5b3914803ca89a96a867a47936d049a4b32 (diff)
downloadbcm5719-llvm-d4ac4afda75c9ef174e85eea7f40a6ae6cc50ab4.tar.gz
bcm5719-llvm-d4ac4afda75c9ef174e85eea7f40a6ae6cc50ab4.zip
[clang-tidy] Move a few more checks from misc to bugprone.
Summary: clang_tidy/rename_check.py misc-assert-side-effect bugprone-assert-side-effect clang_tidy/rename_check.py misc-bool-pointer-implicit-conversion bugprone-bool-pointer-implicit-conversion clang_tidy/rename_check.py misc-fold-init-type bugprone-fold-init-type clang_tidy/rename_check.py misc-forward-declaration-namespace bugprone-forward-declaration-namespace clang_tidy/rename_check.py misc-inaccurate-erase bugprone-inaccurate-erase clang_tidy/rename_check.py misc-move-forwarding-reference bugprone-move-forwarding-reference clang_tidy/rename_check.py misc-multiple-statement-macro bugprone-multiple-statement-macro clang_tidy/rename_check.py misc-use-after-move bugprone-use-after-move clang_tidy/rename_check.py misc-virtual-near-miss bugprone-virtual-near-miss Manually fixed a reference to UseAfterMoveCheck in the hicpp module. Manually fixed header guards. Reviewers: hokein Reviewed By: hokein Subscribers: nemanjai, mgorny, javed.absar, xazax.hun, kbarton, cfe-commits Differential Revision: https://reviews.llvm.org/D40426 llvm-svn: 318950
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/ArgumentCommentCheck.h6
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.h (renamed from clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.h)10
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.h (renamed from clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.h)10
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp27
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt9
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h (renamed from clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h (renamed from clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.h (renamed from clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.h)10
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h (renamed from clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h (renamed from clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h (renamed from clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.cpp)4
-rw-r--r--clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h (renamed from clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.h)12
-rw-r--r--clang-tools-extra/clang-tidy/hicpp/HICPPTidyModule.cpp4
-rw-r--r--clang-tools-extra/clang-tidy/misc/CMakeLists.txt9
-rw-r--r--clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp24
-rw-r--r--clang-tools-extra/docs/ReleaseNotes.rst27
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-assert-side-effect.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-assert-side-effect.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-bool-pointer-implicit-conversion.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-fold-init-type.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-fold-init-type.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-forward-declaration-namespace.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-forward-declaration-namespace.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-inaccurate-erase.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-inaccurate-erase.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-move-forwarding-reference.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-multiple-statement-macro.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-multiple-statement-macro.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-use-after-move.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-use-after-move.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/bugprone-virtual-near-miss.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-virtual-near-miss.rst)6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst4
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/list.rst20
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-assert-side-effect.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-assert-side-effect.cpp)4
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-bool-pointer-implicit-conversion.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-bool-pointer-implicit-conversion.cpp)2
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-fold-init-type.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-fold-init-type.cpp)2
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-forward-declaration-namespace.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-forward-declaration-namespace.cpp)6
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-inaccurate-erase.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-inaccurate-erase.cpp)4
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-move-forwarding-reference.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-move-forwarding-reference.cpp)2
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-multiple-statement-macro.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-multiple-statement-macro.cpp)4
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-use-after-move.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-use-after-move.cpp)2
-rw-r--r--clang-tools-extra/test/clang-tidy/bugprone-virtual-near-miss.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-virtual-near-miss.cpp)4
-rw-r--r--clang-tools-extra/test/clang-tidy/cppcoreguidelines-owning-memory.cpp2
46 files changed, 192 insertions, 162 deletions
diff --git a/clang-tools-extra/clang-tidy/bugprone/ArgumentCommentCheck.h b/clang-tools-extra/clang-tidy/bugprone/ArgumentCommentCheck.h
index 050780decc8..2f5a751b5d4 100644
--- a/clang-tools-extra/clang-tidy/bugprone/ArgumentCommentCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/ArgumentCommentCheck.h
@@ -7,8 +7,8 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ARGUMENTCOMMENTCHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ARGUMENTCOMMENTCHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ARGUMENTCOMMENTCHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ARGUMENTCOMMENTCHECK_H
#include "../ClangTidy.h"
#include "llvm/Support/Regex.h"
@@ -52,4 +52,4 @@ private:
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ARGUMENTCOMMENTCHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ARGUMENTCOMMENTCHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.cpp
index 0b63c0d33a4..244e7552164 100644
--- a/clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.cpp
@@ -22,7 +22,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
namespace {
@@ -122,6 +122,6 @@ void AssertSideEffectCheck::check(const MatchFinder::MatchResult &Result) {
diag(Loc, "found %0() with side effect") << AssertMacroName;
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.h b/clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.h
index 2bb25e2d4a4..0f386c9de47 100644
--- a/clang-tools-extra/clang-tidy/misc/AssertSideEffectCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/AssertSideEffectCheck.h
@@ -7,8 +7,8 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ASSERTSIDEEFFECTCHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ASSERTSIDEEFFECTCHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ASSERTSIDEEFFECTCHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ASSERTSIDEEFFECTCHECK_H
#include "../ClangTidy.h"
#include "llvm/ADT/SmallVector.h"
@@ -17,7 +17,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Finds `assert()` with side effect.
///
@@ -45,8 +45,8 @@ private:
SmallVector<StringRef, 5> AssertMacros;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_ASSERTSIDEEFFECTCHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_ASSERTSIDEEFFECTCHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.cpp
index f831125838d..ed2c2db952f 100644
--- a/clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.cpp
@@ -13,7 +13,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
void BoolPointerImplicitConversionCheck::registerMatchers(MatchFinder *Finder) {
// Look for ifs that have an implicit bool* to bool conversion in the
@@ -68,6 +68,6 @@ void BoolPointerImplicitConversionCheck::check(
<< FixItHint::CreateInsertion(Var->getLocStart(), "*");
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.h b/clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.h
index d8a90f35729..b3416a92bca 100644
--- a/clang-tools-extra/clang-tidy/misc/BoolPointerImplicitConversionCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/BoolPointerImplicitConversionCheck.h
@@ -7,14 +7,14 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Checks for conditions based on implicit conversion from a bool pointer to
/// bool.
@@ -35,8 +35,8 @@ public:
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_BOOLPOINTERIMPLICITCONVERSIONCHECK_H
diff --git a/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp b/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp
index e96dc812f84..d17eb27c4fb 100644
--- a/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp
@@ -11,13 +11,22 @@
#include "../ClangTidyModule.h"
#include "../ClangTidyModuleRegistry.h"
#include "ArgumentCommentCheck.h"
+#include "AssertSideEffectCheck.h"
+#include "BoolPointerImplicitConversionCheck.h"
#include "CopyConstructorInitCheck.h"
#include "DanglingHandleCheck.h"
+#include "FoldInitTypeCheck.h"
+#include "ForwardDeclarationNamespaceCheck.h"
+#include "InaccurateEraseCheck.h"
#include "IntegerDivisionCheck.h"
#include "MisplacedOperatorInStrlenInAllocCheck.h"
+#include "MoveForwardingReferenceCheck.h"
+#include "MultipleStatementMacroCheck.h"
#include "StringConstructorCheck.h"
#include "SuspiciousMemsetUsageCheck.h"
#include "UndefinedMemoryManipulationCheck.h"
+#include "UseAfterMoveCheck.h"
+#include "VirtualNearMissCheck.h"
namespace clang {
namespace tidy {
@@ -28,20 +37,38 @@ public:
void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override {
CheckFactories.registerCheck<ArgumentCommentCheck>(
"bugprone-argument-comment");
+ CheckFactories.registerCheck<AssertSideEffectCheck>(
+ "bugprone-assert-side-effect");
+ CheckFactories.registerCheck<BoolPointerImplicitConversionCheck>(
+ "bugprone-bool-pointer-implicit-conversion");
CheckFactories.registerCheck<CopyConstructorInitCheck>(
"bugprone-copy-constructor-init");
CheckFactories.registerCheck<DanglingHandleCheck>(
"bugprone-dangling-handle");
+ CheckFactories.registerCheck<FoldInitTypeCheck>(
+ "bugprone-fold-init-type");
+ CheckFactories.registerCheck<ForwardDeclarationNamespaceCheck>(
+ "bugprone-forward-declaration-namespace");
+ CheckFactories.registerCheck<InaccurateEraseCheck>(
+ "bugprone-inaccurate-erase");
CheckFactories.registerCheck<IntegerDivisionCheck>(
"bugprone-integer-division");
CheckFactories.registerCheck<MisplacedOperatorInStrlenInAllocCheck>(
"bugprone-misplaced-operator-in-strlen-in-alloc");
+ CheckFactories.registerCheck<MoveForwardingReferenceCheck>(
+ "bugprone-move-forwarding-reference");
+ CheckFactories.registerCheck<MultipleStatementMacroCheck>(
+ "bugprone-multiple-statement-macro");
CheckFactories.registerCheck<StringConstructorCheck>(
"bugprone-string-constructor");
CheckFactories.registerCheck<SuspiciousMemsetUsageCheck>(
"bugprone-suspicious-memset-usage");
CheckFactories.registerCheck<UndefinedMemoryManipulationCheck>(
"bugprone-undefined-memory-manipulation");
+ CheckFactories.registerCheck<UseAfterMoveCheck>(
+ "bugprone-use-after-move");
+ CheckFactories.registerCheck<VirtualNearMissCheck>(
+ "bugprone-virtual-near-miss");
}
};
diff --git a/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt b/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt
index fe9b999b619..dab77bda3c4 100644
--- a/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt
+++ b/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt
@@ -2,14 +2,23 @@ set(LLVM_LINK_COMPONENTS support)
add_clang_library(clangTidyBugproneModule
ArgumentCommentCheck.cpp
+ AssertSideEffectCheck.cpp
+ BoolPointerImplicitConversionCheck.cpp
BugproneTidyModule.cpp
CopyConstructorInitCheck.cpp
DanglingHandleCheck.cpp
+ FoldInitTypeCheck.cpp
+ ForwardDeclarationNamespaceCheck.cpp
+ InaccurateEraseCheck.cpp
IntegerDivisionCheck.cpp
MisplacedOperatorInStrlenInAllocCheck.cpp
+ MoveForwardingReferenceCheck.cpp
+ MultipleStatementMacroCheck.cpp
StringConstructorCheck.cpp
SuspiciousMemsetUsageCheck.cpp
UndefinedMemoryManipulationCheck.cpp
+ UseAfterMoveCheck.cpp
+ VirtualNearMissCheck.cpp
LINK_LIBS
clangAnalysis
diff --git a/clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.cpp
index c5d27201b8b..6d7fd2852ad 100644
--- a/clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.cpp
@@ -15,7 +15,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
void FoldInitTypeCheck::registerMatchers(MatchFinder *Finder) {
// We match functions of interest and bind the iterator and init value types.
@@ -135,6 +135,6 @@ void FoldInitTypeCheck::check(const MatchFinder::MatchResult &Result) {
doCheck(*Iter2ValueType, *InitType, *Result.Context, *CallNode);
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.h b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h
index df4ec88fa04..e6170de0ae2 100644
--- a/clang-tools-extra/clang-tidy/misc/FoldInitTypeCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h
@@ -7,14 +7,14 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FOLD_INIT_TYPE_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FOLD_INIT_TYPE_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FOLD_INIT_TYPE_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FOLD_INIT_TYPE_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Find and flag invalid initializer values in folds, e.g. std::accumulate.
/// Example:
@@ -24,7 +24,7 @@ namespace misc {
/// \endcode
///
/// For the user-facing documentation see:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-fold-init-type.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-fold-init-type.html
class FoldInitTypeCheck : public ClangTidyCheck {
public:
FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context)
@@ -37,8 +37,8 @@ private:
const ASTContext &Context, const CallExpr &CallNode);
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FOLD_INIT_TYPE_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FOLD_INIT_TYPE_H
diff --git a/clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.cpp
index 1487e8f1861..9ea5b553da2 100644
--- a/clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.cpp
@@ -19,7 +19,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
void ForwardDeclarationNamespaceCheck::registerMatchers(MatchFinder *Finder) {
// Match all class declarations/definitions *EXCEPT*
@@ -169,6 +169,6 @@ void ForwardDeclarationNamespaceCheck::onEndOfTranslationUnit() {
}
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.h b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h
index dd7042d3691..c3d30186895 100644
--- a/clang-tools-extra/clang-tidy/misc/ForwardDeclarationNamespaceCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h
@@ -7,8 +7,8 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FORWARDDECLARATIONNAMESPACECHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FORWARDDECLARATIONNAMESPACECHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FORWARDDECLARATIONNAMESPACECHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FORWARDDECLARATIONNAMESPACECHECK_H
#include "../ClangTidy.h"
#include "llvm/ADT/SmallPtrSet.h"
@@ -17,7 +17,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Checks if an unused forward declaration is in a wrong namespace.
///
@@ -37,7 +37,7 @@ namespace misc {
/// point.
///
/// For the user-facing documentation see:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-forward-declaration-namespace.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forward-declaration-namespace.html
class ForwardDeclarationNamespaceCheck : public ClangTidyCheck {
public:
ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context)
@@ -52,8 +52,8 @@ private:
llvm::SmallPtrSet<const Type *, 16> FriendTypes;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_FORWARDDECLARATIONNAMESPACECHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_FORWARDDECLARATIONNAMESPACECHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.cpp
index fd86d1723e3..cf1be0e7b30 100644
--- a/clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.cpp
@@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
namespace {
AST_MATCHER(Decl, isInStdNamespace) { return Node.isInStdNamespace(); }
@@ -76,6 +76,6 @@ void InaccurateEraseCheck::check(const MatchFinder::MatchResult &Result) {
<< Hint;
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.h b/clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.h
index 623e1c236eb..d6b372908ec 100644
--- a/clang-tools-extra/clang-tidy/misc/InaccurateEraseCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/InaccurateEraseCheck.h
@@ -7,14 +7,14 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_INACCURATEERASECHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_INACCURATEERASECHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_INACCURATEERASECHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_INACCURATEERASECHECK_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Checks for inaccurate use of the `erase()` method.
///
@@ -31,8 +31,8 @@ public:
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_INACCURATEERASECHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_INACCURATEERASECHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.cpp
index 12c19dd9c20..516ee193033 100644
--- a/clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.cpp
@@ -17,7 +17,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
static void replaceMoveWithForward(const UnresolvedLookupExpr *Callee,
const ParmVarDecl *ParmVar,
@@ -128,6 +128,6 @@ void MoveForwardingReferenceCheck::check(
*Result.Context);
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.h b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h
index 2e6ec363488..c61de757d74 100644
--- a/clang-tools-extra/clang-tidy/misc/MoveForwardingReferenceCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h
@@ -7,14 +7,14 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MOVEFORWARDINGREFERENCECHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MOVEFORWARDINGREFERENCECHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MOVEFORWARDINGREFERENCECHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MOVEFORWARDINGREFERENCECHECK_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// The check warns if std::move is applied to a forwarding reference (i.e. an
/// rvalue reference of a function template argument type).
@@ -33,7 +33,7 @@ namespace misc {
/// The check suggests replacing the std::move with a std::forward.
///
/// For the user-facing documentation see:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-move-forwarding-reference.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-move-forwarding-reference.html
class MoveForwardingReferenceCheck : public ClangTidyCheck {
public:
MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context)
@@ -42,8 +42,8 @@ public:
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MOVEFORWARDINGREFERENCECHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MOVEFORWARDINGREFERENCECHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.cpp
index 9d485fd211b..9fa2f43c1f7 100644
--- a/clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.cpp
@@ -15,7 +15,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
namespace {
@@ -101,6 +101,6 @@ void MultipleStatementMacroCheck::check(
"unconditionally executed");
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.h b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h
index 77a6b27dcde..efc659910ba 100644
--- a/clang-tools-extra/clang-tidy/misc/MultipleStatementMacroCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h
@@ -7,21 +7,21 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MULTIPLE_STATEMENT_MACRO_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MULTIPLE_STATEMENT_MACRO_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MULTIPLE_STATEMENT_MACRO_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MULTIPLE_STATEMENT_MACRO_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// Detect multiple statement macros that are used in unbraced conditionals.
/// Only the first statement of the macro will be inside the conditional and the
/// other ones will be executed unconditionally.
///
/// For the user-facing documentation see:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-multiple-statement-macro.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-multiple-statement-macro.html
class MultipleStatementMacroCheck : public ClangTidyCheck {
public:
MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context)
@@ -30,8 +30,8 @@ public:
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_MULTIPLE_STATEMENT_MACRO_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_MULTIPLE_STATEMENT_MACRO_H
diff --git a/clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.cpp
index 99673766a53..6fa4cab3c3b 100644
--- a/clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.cpp
@@ -20,7 +20,7 @@ using namespace clang::tidy::utils;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
namespace {
@@ -429,6 +429,6 @@ void UseAfterMoveCheck::check(const MatchFinder::MatchResult &Result) {
emitDiagnostic(MovingCall, Arg, Use, this, Result.Context);
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.h b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h
index 2f6be5be300..f6dea68d242 100644
--- a/clang-tools-extra/clang-tidy/misc/UseAfterMoveCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h
@@ -7,20 +7,20 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_USEAFTERMOVECHECK_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_USEAFTERMOVECHECK_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_USEAFTERMOVECHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_USEAFTERMOVECHECK_H
#include "../ClangTidy.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// The check warns if an object is used after it has been moved, without an
/// intervening reinitialization.
///
/// For details, see the user-facing documentation:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-use-after-move.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-use-after-move.html
class UseAfterMoveCheck : public ClangTidyCheck {
public:
UseAfterMoveCheck(StringRef Name, ClangTidyContext *Context)
@@ -29,8 +29,8 @@ public:
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_USEAFTERMOVECHECK_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_USEAFTERMOVECHECK_H
diff --git a/clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.cpp
index fd74bb6692e..6b3f49879af 100644
--- a/clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.cpp
+++ b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.cpp
@@ -17,7 +17,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
AST_MATCHER(CXXMethodDecl, isStatic) { return Node.isStatic(); }
@@ -269,6 +269,6 @@ void VirtualNearMissCheck::check(const MatchFinder::MatchResult &Result) {
}
}
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.h b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h
index 3d3b9eba762..ea1e256605d 100644
--- a/clang-tools-extra/clang-tidy/misc/VirtualNearMissCheck.h
+++ b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h
@@ -7,15 +7,15 @@
//
//===----------------------------------------------------------------------===//
-#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_VIRTUAL_NEAR_MISS_H
-#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_VIRTUAL_NEAR_MISS_H
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_VIRTUAL_NEAR_MISS_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_VIRTUAL_NEAR_MISS_H
#include "../ClangTidy.h"
#include "llvm/ADT/DenseMap.h"
namespace clang {
namespace tidy {
-namespace misc {
+namespace bugprone {
/// \brief Checks for near miss of virtual methods.
///
@@ -23,7 +23,7 @@ namespace misc {
/// very similar name and an identical signature defined in a base class.
///
/// For the user-facing documentation see:
-/// http://clang.llvm.org/extra/clang-tidy/checks/misc-virtual-near-miss.html
+/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-virtual-near-miss.html
class VirtualNearMissCheck : public ClangTidyCheck {
public:
VirtualNearMissCheck(StringRef Name, ClangTidyContext *Context)
@@ -58,8 +58,8 @@ private:
const unsigned EditDistanceThreshold = 1;
};
-} // namespace misc
+} // namespace bugprone
} // namespace tidy
} // namespace clang
-#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_VIRTUAL_NEAR_MISS_H
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_VIRTUAL_NEAR_MISS_H
diff --git a/clang-tools-extra/clang-tidy/hicpp/HICPPTidyModule.cpp b/clang-tools-extra/clang-tidy/hicpp/HICPPTidyModule.cpp
index 359cd579648..4a60ebd20a5 100644
--- a/clang-tools-extra/clang-tidy/hicpp/HICPPTidyModule.cpp
+++ b/clang-tools-extra/clang-tidy/hicpp/HICPPTidyModule.cpp
@@ -10,6 +10,7 @@
#include "../ClangTidy.h"
#include "../ClangTidyModule.h"
#include "../ClangTidyModuleRegistry.h"
+#include "../bugprone/UseAfterMoveCheck.h"
#include "../cppcoreguidelines/NoMallocCheck.h"
#include "../cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h"
#include "../cppcoreguidelines/ProTypeMemberInitCheck.h"
@@ -22,7 +23,6 @@
#include "../misc/NoexceptMoveConstructorCheck.h"
#include "../misc/StaticAssertCheck.h"
#include "../misc/UndelegatedConstructor.h"
-#include "../misc/UseAfterMoveCheck.h"
#include "../modernize/DeprecatedHeadersCheck.h"
#include "../modernize/UseAutoCheck.h"
#include "../modernize/UseEmplaceCheck.h"
@@ -59,7 +59,7 @@ public:
"hicpp-function-size");
CheckFactories.registerCheck<readability::IdentifierNamingCheck>(
"hicpp-named-parameter");
- CheckFactories.registerCheck<misc::UseAfterMoveCheck>(
+ CheckFactories.registerCheck<bugprone::UseAfterMoveCheck>(
"hicpp-invalid-access-moved");
CheckFactories.registerCheck<cppcoreguidelines::ProTypeMemberInitCheck>(
"hicpp-member-init");
diff --git a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
index f67c1365949..8a4dcbd5638 100644
--- a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
+++ b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt
@@ -1,16 +1,11 @@
set(LLVM_LINK_COMPONENTS support)
add_clang_library(clangTidyMiscModule
- AssertSideEffectCheck.cpp
ForwardingReferenceOverloadCheck.cpp
LambdaFunctionNameCheck.cpp
MisplacedConstCheck.cpp
UnconventionalAssignOperatorCheck.cpp
- BoolPointerImplicitConversionCheck.cpp
DefinitionsInHeadersCheck.cpp
- FoldInitTypeCheck.cpp
- ForwardDeclarationNamespaceCheck.cpp
- InaccurateEraseCheck.cpp
IncorrectRoundings.cpp
InefficientAlgorithmCheck.cpp
MacroParenthesesCheck.cpp
@@ -19,8 +14,6 @@ add_clang_library(clangTidyMiscModule
MisplacedWideningCastCheck.cpp
MoveConstantArgumentCheck.cpp
MoveConstructorInitCheck.cpp
- MoveForwardingReferenceCheck.cpp
- MultipleStatementMacroCheck.cpp
NewDeleteOverloadsCheck.cpp
NoexceptMoveConstructorCheck.cpp
NonCopyableObjects.cpp
@@ -43,8 +36,6 @@ add_clang_library(clangTidyMiscModule
UnusedParametersCheck.cpp
UnusedRAIICheck.cpp
UnusedUsingDeclsCheck.cpp
- UseAfterMoveCheck.cpp
- VirtualNearMissCheck.cpp
LINK_LIBS
clangAnalysis
diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
index fbc999f2a0a..1dddd4e2832 100644
--- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
+++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
@@ -10,13 +10,8 @@
#include "../ClangTidy.h"
#include "../ClangTidyModule.h"
#include "../ClangTidyModuleRegistry.h"
-#include "AssertSideEffectCheck.h"
-#include "BoolPointerImplicitConversionCheck.h"
#include "DefinitionsInHeadersCheck.h"
-#include "FoldInitTypeCheck.h"
-#include "ForwardDeclarationNamespaceCheck.h"
#include "ForwardingReferenceOverloadCheck.h"
-#include "InaccurateEraseCheck.h"
#include "IncorrectRoundings.h"
#include "InefficientAlgorithmCheck.h"
#include "LambdaFunctionNameCheck.h"
@@ -26,8 +21,6 @@
#include "MisplacedWideningCastCheck.h"
#include "MoveConstantArgumentCheck.h"
#include "MoveConstructorInitCheck.h"
-#include "MoveForwardingReferenceCheck.h"
-#include "MultipleStatementMacroCheck.h"
#include "NewDeleteOverloadsCheck.h"
#include "NoexceptMoveConstructorCheck.h"
#include "NonCopyableObjects.h"
@@ -51,8 +44,6 @@
#include "UnusedParametersCheck.h"
#include "UnusedRAIICheck.h"
#include "UnusedUsingDeclsCheck.h"
-#include "UseAfterMoveCheck.h"
-#include "VirtualNearMissCheck.h"
namespace clang {
namespace tidy {
@@ -61,8 +52,6 @@ namespace misc {
class MiscModule : public ClangTidyModule {
public:
void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override {
- CheckFactories.registerCheck<AssertSideEffectCheck>(
- "misc-assert-side-effect");
CheckFactories.registerCheck<ForwardingReferenceOverloadCheck>(
"misc-forwarding-reference-overload");
CheckFactories.registerCheck<LambdaFunctionNameCheck>(
@@ -70,14 +59,8 @@ public:
CheckFactories.registerCheck<MisplacedConstCheck>("misc-misplaced-const");
CheckFactories.registerCheck<UnconventionalAssignOperatorCheck>(
"misc-unconventional-assign-operator");
- CheckFactories.registerCheck<BoolPointerImplicitConversionCheck>(
- "misc-bool-pointer-implicit-conversion");
CheckFactories.registerCheck<DefinitionsInHeadersCheck>(
"misc-definitions-in-headers");
- CheckFactories.registerCheck<FoldInitTypeCheck>("misc-fold-init-type");
- CheckFactories.registerCheck<ForwardDeclarationNamespaceCheck>(
- "misc-forward-declaration-namespace");
- CheckFactories.registerCheck<InaccurateEraseCheck>("misc-inaccurate-erase");
CheckFactories.registerCheck<IncorrectRoundings>(
"misc-incorrect-roundings");
CheckFactories.registerCheck<InefficientAlgorithmCheck>(
@@ -92,10 +75,6 @@ public:
"misc-move-const-arg");
CheckFactories.registerCheck<MoveConstructorInitCheck>(
"misc-move-constructor-init");
- CheckFactories.registerCheck<MoveForwardingReferenceCheck>(
- "misc-move-forwarding-reference");
- CheckFactories.registerCheck<MultipleStatementMacroCheck>(
- "misc-multiple-statement-macro");
CheckFactories.registerCheck<NewDeleteOverloadsCheck>(
"misc-new-delete-overloads");
CheckFactories.registerCheck<NoexceptMoveConstructorCheck>(
@@ -136,9 +115,6 @@ public:
CheckFactories.registerCheck<UnusedRAIICheck>("misc-unused-raii");
CheckFactories.registerCheck<UnusedUsingDeclsCheck>(
"misc-unused-using-decls");
- CheckFactories.registerCheck<UseAfterMoveCheck>("misc-use-after-move");
- CheckFactories.registerCheck<VirtualNearMissCheck>(
- "misc-virtual-near-miss");
}
};
diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst
index 2e143dea204..4e456fdabbb 100644
--- a/clang-tools-extra/docs/ReleaseNotes.rst
+++ b/clang-tools-extra/docs/ReleaseNotes.rst
@@ -57,6 +57,33 @@ The improvements are...
Improvements to clang-tidy
--------------------------
+- The 'misc-virtual-near-miss' check was renamed to `bugprone-virtual-near-miss
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-virtual-near-miss.html>`_
+
+- The 'misc-use-after-move' check was renamed to `bugprone-use-after-move
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-use-after-move.html>`_
+
+- The 'misc-multiple-statement-macro' check was renamed to `bugprone-multiple-statement-macro
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-multiple-statement-macro.html>`_
+
+- The 'misc-move-forwarding-reference' check was renamed to `bugprone-move-forwarding-reference
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-move-forwarding-reference.html>`_
+
+- The 'misc-inaccurate-erase' check was renamed to `bugprone-inaccurate-erase
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-inaccurate-erase.html>`_
+
+- The 'misc-forward-declaration-namespace' check was renamed to `bugprone-forward-declaration-namespace
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forward-declaration-namespace.html>`_
+
+- The 'misc-fold-init-type' check was renamed to `bugprone-fold-init-type
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-fold-init-type.html>`_
+
+- The 'misc-bool-pointer-implicit-conversion' check was renamed to `bugprone-bool-pointer-implicit-conversion
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.html>`_
+
+- The 'misc-assert-side-effect' check was renamed to `bugprone-assert-side-effect
+ <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-assert-side-effect.html>`_
+
- The 'misc-dangling-handle' check was renamed to `bugprone-dangling-handle
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-dangling-handle.html>`_
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-assert-side-effect.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-assert-side-effect.rst
index 3f8b4696793..dc7a3c9a4bd 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-assert-side-effect.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-assert-side-effect.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-assert-side-effect
+.. title:: clang-tidy - bugprone-assert-side-effect
-misc-assert-side-effect
-=======================
+bugprone-assert-side-effect
+===========================
Finds ``assert()`` with side effect.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-bool-pointer-implicit-conversion.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst
index db9a2f4a60e..e42ee5f6095 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-bool-pointer-implicit-conversion.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-bool-pointer-implicit-conversion
+.. title:: clang-tidy - bugprone-bool-pointer-implicit-conversion
-misc-bool-pointer-implicit-conversion
-=====================================
+bugprone-bool-pointer-implicit-conversion
+=========================================
Checks for conditions based on implicit conversion from a ``bool`` pointer to
``bool``.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-fold-init-type.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-fold-init-type.rst
index ff1c6f0fd04..ebe3d22c001 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-fold-init-type.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-fold-init-type.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-fold-init-type
+.. title:: clang-tidy - bugprone-fold-init-type
-misc-fold-init-type
-===================
+bugprone-fold-init-type
+=======================
The check flags type mismatches in
`folds <https://en.wikipedia.org/wiki/Fold_(higher-order_function)>`_
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-forward-declaration-namespace.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-forward-declaration-namespace.rst
index 2dd1c463b9b..99ecb63e7b9 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-forward-declaration-namespace.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-forward-declaration-namespace.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-forward-declaration-namespace
+.. title:: clang-tidy - bugprone-forward-declaration-namespace
-misc-forward-declaration-namespace
-==================================
+bugprone-forward-declaration-namespace
+======================================
Checks if an unused forward declaration is in a wrong namespace.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-inaccurate-erase.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-inaccurate-erase.rst
index f55bfa73b9f..7df47b03e63 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-inaccurate-erase.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-inaccurate-erase.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-inaccurate-erase
+.. title:: clang-tidy - bugprone-inaccurate-erase
-misc-inaccurate-erase
-=====================
+bugprone-inaccurate-erase
+=========================
Checks for inaccurate use of the ``erase()`` method.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-move-forwarding-reference.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst
index 327f7205392..3b57d50549e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-move-forwarding-reference.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-move-forwarding-reference.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-move-forwarding-reference
+.. title:: clang-tidy - bugprone-move-forwarding-reference
-misc-move-forwarding-reference
-==============================
+bugprone-move-forwarding-reference
+==================================
Warns if ``std::move`` is called on a forwarding reference, for example:
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-multiple-statement-macro.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-multiple-statement-macro.rst
index a0a65946f3d..708dc9506f7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-multiple-statement-macro.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-multiple-statement-macro.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-multiple-statement-macro
+.. title:: clang-tidy - bugprone-multiple-statement-macro
-misc-multiple-statement-macro
-=============================
+bugprone-multiple-statement-macro
+=================================
Detect multiple statement macros that are used in unbraced conditionals. Only
the first statement of the macro will be inside the conditional and the other
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-use-after-move.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-use-after-move.rst
index e65860803ab..05b0e094d5c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-use-after-move.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-use-after-move.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-use-after-move
+.. title:: clang-tidy - bugprone-use-after-move
-misc-use-after-move
-===================
+bugprone-use-after-move
+=======================
Warns if an object is used after it has been moved, for example:
diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-virtual-near-miss.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-virtual-near-miss.rst
index 6871989779b..ac27479713c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/misc-virtual-near-miss.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-virtual-near-miss.rst
@@ -1,7 +1,7 @@
-.. title:: clang-tidy - misc-virtual-near-miss
+.. title:: clang-tidy - bugprone-virtual-near-miss
-misc-virtual-near-miss
-======================
+bugprone-virtual-near-miss
+==========================
Warn if a function is a near miss (ie. the name is very similar and the function
signiture is the same) to a virtual function from a base class.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst
index fa0ed3707d1..4fac3f55213 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp-invalid-access-moved.rst
@@ -1,10 +1,10 @@
.. title:: clang-tidy - hicpp-invalid-access-moved
.. meta::
- :http-equiv=refresh: 5;URL=misc-use-after-move.html
+ :http-equiv=refresh: 5;URL=bugprone-use-after-move.html
hicpp-invalid-access-moved
==========================
-This check is an alias for `misc-use-after-move <misc-use-after-move.html>`_.
+This check is an alias for `bugprone-use-after-move <bugprone-use-after-move.html>`_.
Implements parts of the `rule 8.4.1 <http://www.codingstandard.com/rule/8-4-1-do-not-access-an-invalid-object-or-an-object-with-indeterminate-value/>`_ to check if moved-from objects are accessed.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 3f99f5b698f..ab740b2b1ca 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -18,13 +18,22 @@ Clang-Tidy Checks
android-cloexec-socket
boost-use-to-string
bugprone-argument-comment
+ bugprone-assert-side-effect
+ bugprone-bool-pointer-implicit-conversion
bugprone-copy-constructor-init
bugprone-dangling-handle
+ bugprone-fold-init-type
+ bugprone-forward-declaration-namespace
+ bugprone-inaccurate-erase
bugprone-integer-division
bugprone-misplaced-operator-in-strlen-in-alloc
+ bugprone-move-forwarding-reference
+ bugprone-multiple-statement-macro
bugprone-string-constructor
bugprone-suspicious-memset-usage
bugprone-undefined-memory-manipulation
+ bugprone-use-after-move
+ bugprone-virtual-near-miss
cert-dcl03-c (redirects to misc-static-assert) <cert-dcl03-c>
cert-dcl21-cpp
cert-dcl50-cpp
@@ -82,7 +91,7 @@ Clang-Tidy Checks
hicpp-exception-baseclass
hicpp-explicit-conversions (redirects to google-explicit-constructor) <hicpp-explicit-conversions>
hicpp-function-size (redirects to readability-function-size) <hicpp-function-size>
- hicpp-invalid-access-moved (redirects to misc-use-after-move) <hicpp-invalid-access-moved>
+ hicpp-invalid-access-moved (redirects to bugprone-use-after-move) <hicpp-invalid-access-moved>
hicpp-member-init (redirects to cppcoreguidelines-pro-type-member-init) <hicpp-member-init>
hicpp-move-const-arg (redirects to misc-move-const-arg) <hicpp-move-const-arg>
hicpp-named-parameter (redirects to readability-named-parameter) <hicpp-named-parameter>
@@ -107,13 +116,8 @@ Clang-Tidy Checks
llvm-include-order
llvm-namespace-comment
llvm-twine-local
- misc-assert-side-effect
- misc-bool-pointer-implicit-conversion
misc-definitions-in-headers
- misc-fold-init-type
- misc-forward-declaration-namespace
misc-forwarding-reference-overload
- misc-inaccurate-erase
misc-incorrect-roundings
misc-inefficient-algorithm
misc-lambda-function-name
@@ -123,8 +127,6 @@ Clang-Tidy Checks
misc-misplaced-widening-cast
misc-move-const-arg
misc-move-constructor-init
- misc-move-forwarding-reference
- misc-multiple-statement-macro
misc-new-delete-overloads
misc-noexcept-move-constructor
misc-non-copyable-objects
@@ -148,8 +150,6 @@ Clang-Tidy Checks
misc-unused-parameters
misc-unused-raii
misc-unused-using-decls
- misc-use-after-move
- misc-virtual-near-miss
modernize-avoid-bind
modernize-deprecated-headers
modernize-loop-convert
diff --git a/clang-tools-extra/test/clang-tidy/misc-assert-side-effect.cpp b/clang-tools-extra/test/clang-tidy/bugprone-assert-side-effect.cpp
index 8cb4ebffa54..0933402e90c 100644
--- a/clang-tools-extra/test/clang-tidy/misc-assert-side-effect.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-assert-side-effect.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-assert-side-effect %t -- -config="{CheckOptions: [{key: misc-assert-side-effect.CheckFunctionCalls, value: 1}, {key: misc-assert-side-effect.AssertMacros, value: 'assert,assert2,my_assert,convoluted_assert,msvc_assert'}]}" -- -fexceptions
+// RUN: %check_clang_tidy %s bugprone-assert-side-effect %t -- -config="{CheckOptions: [{key: bugprone-assert-side-effect.CheckFunctionCalls, value: 1}, {key: bugprone-assert-side-effect.AssertMacros, value: 'assert,assert2,my_assert,convoluted_assert,msvc_assert'}]}" -- -fexceptions
//===--- assert definition block ------------------------------------------===//
int abort() { return 0; }
@@ -68,7 +68,7 @@ int main() {
assert(X == 1);
assert(X = 1);
- // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: found assert() with side effect [misc-assert-side-effect]
+ // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: found assert() with side effect [bugprone-assert-side-effect]
my_assert(X = 1);
// CHECK-MESSAGES: :[[@LINE-1]]:3: warning: found my_assert() with side effect
convoluted_assert(X = 1);
diff --git a/clang-tools-extra/test/clang-tidy/misc-bool-pointer-implicit-conversion.cpp b/clang-tools-extra/test/clang-tidy/bugprone-bool-pointer-implicit-conversion.cpp
index bb71ce193ac..37c6939b590 100644
--- a/clang-tools-extra/test/clang-tidy/misc-bool-pointer-implicit-conversion.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-bool-pointer-implicit-conversion.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-bool-pointer-implicit-conversion %t
+// RUN: %check_clang_tidy %s bugprone-bool-pointer-implicit-conversion %t
bool *SomeFunction();
void SomeOtherFunction(bool*);
diff --git a/clang-tools-extra/test/clang-tidy/misc-fold-init-type.cpp b/clang-tools-extra/test/clang-tidy/bugprone-fold-init-type.cpp
index 43ba95ca7a5..e7fdf395c50 100644
--- a/clang-tools-extra/test/clang-tidy/misc-fold-init-type.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-fold-init-type.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-fold-init-type %t
+// RUN: %check_clang_tidy %s bugprone-fold-init-type %t
namespace std {
template <class InputIt, class T>
diff --git a/clang-tools-extra/test/clang-tidy/misc-forward-declaration-namespace.cpp b/clang-tools-extra/test/clang-tidy/bugprone-forward-declaration-namespace.cpp
index 2940acd93e7..d9381486888 100644
--- a/clang-tools-extra/test/clang-tidy/misc-forward-declaration-namespace.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-forward-declaration-namespace.cpp
@@ -1,11 +1,11 @@
-// RUN: %check_clang_tidy %s misc-forward-declaration-namespace %t
+// RUN: %check_clang_tidy %s bugprone-forward-declaration-namespace %t
namespace {
// This is a declaration in a wrong namespace.
class T_A;
-// CHECK-MESSAGES: :[[@LINE-1]]:7: warning: declaration 'T_A' is never referenced, but a declaration with the same name found in another namespace 'na' [misc-forward-declaration-namespace]
+// CHECK-MESSAGES: :[[@LINE-1]]:7: warning: declaration 'T_A' is never referenced, but a declaration with the same name found in another namespace 'na' [bugprone-forward-declaration-namespace]
// CHECK-MESSAGES: note: a declaration of 'T_A' is found here
-// CHECK-MESSAGES: :[[@LINE-3]]:7: warning: no definition found for 'T_A', but a definition with the same name 'T_A' found in another namespace '(global)' [misc-forward-declaration-namespace]
+// CHECK-MESSAGES: :[[@LINE-3]]:7: warning: no definition found for 'T_A', but a definition with the same name 'T_A' found in another namespace '(global)' [bugprone-forward-declaration-namespace]
// CHECK-MESSAGES: note: a definition of 'T_A' is found here
}
diff --git a/clang-tools-extra/test/clang-tidy/misc-inaccurate-erase.cpp b/clang-tools-extra/test/clang-tidy/bugprone-inaccurate-erase.cpp
index 71b68a6bd9b..d29fa9cdd4e 100644
--- a/clang-tools-extra/test/clang-tidy/misc-inaccurate-erase.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-inaccurate-erase.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-inaccurate-erase %t
+// RUN: %check_clang_tidy %s bugprone-inaccurate-erase %t
namespace std {
template <typename T> struct vec_iterator {
@@ -66,7 +66,7 @@ int main() {
std::vector<int> v;
v.erase(remove(v.begin(), v.end(), 10));
- // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: this call will remove at most one item even when multiple items should be removed [misc-inaccurate-erase]
+ // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: this call will remove at most one item even when multiple items should be removed [bugprone-inaccurate-erase]
// CHECK-FIXES: {{^ }}v.erase(remove(v.begin(), v.end(), 10), v.end());{{$}}
v.erase(remove(v.begin(), v.end(), 20), v.end());
diff --git a/clang-tools-extra/test/clang-tidy/misc-move-forwarding-reference.cpp b/clang-tools-extra/test/clang-tidy/bugprone-move-forwarding-reference.cpp
index a0307dde4ba..befca292de8 100644
--- a/clang-tools-extra/test/clang-tidy/misc-move-forwarding-reference.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-move-forwarding-reference.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-move-forwarding-reference %t -- -- -std=c++14 -fno-delayed-template-parsing
+// RUN: %check_clang_tidy %s bugprone-move-forwarding-reference %t -- -- -std=c++14 -fno-delayed-template-parsing
namespace std {
template <typename> struct remove_reference;
diff --git a/clang-tools-extra/test/clang-tidy/misc-multiple-statement-macro.cpp b/clang-tools-extra/test/clang-tidy/bugprone-multiple-statement-macro.cpp
index c943ee7c0f0..5b88d8dcf1d 100644
--- a/clang-tools-extra/test/clang-tidy/misc-multiple-statement-macro.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-multiple-statement-macro.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-multiple-statement-macro %t
+// RUN: %check_clang_tidy %s bugprone-multiple-statement-macro %t
void F();
@@ -35,7 +35,7 @@ void F();
void positives() {
if (1)
BAD_MACRO(1);
- // CHECK-MESSAGES: :[[@LINE-1]]:5: warning: multiple statement macro used without braces; some statements will be unconditionally executed [misc-multiple-statement-macro]
+ // CHECK-MESSAGES: :[[@LINE-1]]:5: warning: multiple statement macro used without braces; some statements will be unconditionally executed [bugprone-multiple-statement-macro]
if (1) {
} else
BAD_MACRO(1);
diff --git a/clang-tools-extra/test/clang-tidy/misc-use-after-move.cpp b/clang-tools-extra/test/clang-tidy/bugprone-use-after-move.cpp
index b0e96a6b908..43e632211b1 100644
--- a/clang-tools-extra/test/clang-tidy/misc-use-after-move.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-use-after-move.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-use-after-move %t -- -- -std=c++11 -fno-delayed-template-parsing
+// RUN: %check_clang_tidy %s bugprone-use-after-move %t -- -- -std=c++11 -fno-delayed-template-parsing
typedef decltype(nullptr) nullptr_t;
diff --git a/clang-tools-extra/test/clang-tidy/misc-virtual-near-miss.cpp b/clang-tools-extra/test/clang-tidy/bugprone-virtual-near-miss.cpp
index a6bf2221689..553d2f45a98 100644
--- a/clang-tools-extra/test/clang-tidy/misc-virtual-near-miss.cpp
+++ b/clang-tools-extra/test/clang-tidy/bugprone-virtual-near-miss.cpp
@@ -1,4 +1,4 @@
-// RUN: %check_clang_tidy %s misc-virtual-near-miss %t
+// RUN: %check_clang_tidy %s bugprone-virtual-near-miss %t
class NoDefinedClass1;
class NoDefinedClass2;
@@ -15,7 +15,7 @@ struct Derived : Base {
// Should not warn "do you want to override 'gunk'?", because gunk is already
// overriden by this class.
virtual void funk();
- // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: method 'Derived::funk' has a similar name and the same signature as virtual method 'Base::func'; did you mean to override it? [misc-virtual-near-miss]
+ // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: method 'Derived::funk' has a similar name and the same signature as virtual method 'Base::func'; did you mean to override it? [bugprone-virtual-near-miss]
// CHECK-FIXES: virtual void func();
void func2();
diff --git a/clang-tools-extra/test/clang-tidy/cppcoreguidelines-owning-memory.cpp b/clang-tools-extra/test/clang-tidy/cppcoreguidelines-owning-memory.cpp
index 967c086257c..47b12fbaf33 100644
--- a/clang-tools-extra/test/clang-tidy/cppcoreguidelines-owning-memory.cpp
+++ b/clang-tools-extra/test/clang-tidy/cppcoreguidelines-owning-memory.cpp
@@ -54,7 +54,7 @@ unique_ptr<int *> returns_no_owner5() {
}
/// FIXME: CSA finds it, but the report is misleading. Ownersemantics can catch this
-/// by flow analysis similar to misc-use-after-move.
+/// by flow analysis similar to bugprone-use-after-move.
void csa_not_finding_leak() {
gsl::owner<int *> o1 = new int(42); // Ok
OpenPOWER on IntegriCloud