summaryrefslogtreecommitdiffstats
path: root/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
diff options
context:
space:
mode:
authorAlexander Kornienko <alexfh@google.com>2018-02-28 23:47:15 +0000
committerAlexander Kornienko <alexfh@google.com>2018-02-28 23:47:15 +0000
commiteb9d944419a6048fdbd20b4d7766552df92b7f2a (patch)
treebfce3e00bcd75d1a2c4cefcee68803c6e15ea370 /clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
parent51ec5a9ce35ac7dcb8c88d4cdfff100d86e72457 (diff)
downloadbcm5719-llvm-eb9d944419a6048fdbd20b4d7766552df92b7f2a.tar.gz
bcm5719-llvm-eb9d944419a6048fdbd20b4d7766552df92b7f2a.zip
[clang-tidy] Another batch of checks to rename from misc- to bugprone-.
Summary: clang-tidy/rename_check.py {misc,bugprone}-suspicious-semicolon clang-tidy/rename_check.py {misc,bugprone}-suspicious-string-compare clang-tidy/rename_check.py {misc,bugprone}-swapped-arguments clang-tidy/rename_check.py {misc,bugprone}-undelegated-constructor --check_class_name UndelegatedConstructor Reviewers: hokein, sammccall, aaron.ballman Subscribers: klimek, mgorny, xazax.hun, cfe-commits Differential Revision: https://reviews.llvm.org/D43870 llvm-svn: 326386
Diffstat (limited to 'clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp')
-rw-r--r--clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp102
1 files changed, 0 insertions, 102 deletions
diff --git a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
deleted file mode 100644
index e4dc5ca056a..00000000000
--- a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
+++ /dev/null
@@ -1,102 +0,0 @@
-//===--- SwappedArgumentsCheck.cpp - clang-tidy ---------------------------===//
-//
-// The LLVM Compiler Infrastructure
-//
-// This file is distributed under the University of Illinois Open Source
-// License. See LICENSE.TXT for details.
-//
-//===----------------------------------------------------------------------===//
-
-#include "SwappedArgumentsCheck.h"
-#include "clang/AST/ASTContext.h"
-#include "clang/Lex/Lexer.h"
-#include "clang/Tooling/FixIt.h"
-#include "llvm/ADT/SmallPtrSet.h"
-
-using namespace clang::ast_matchers;
-
-namespace clang {
-namespace tidy {
-namespace misc {
-
-void SwappedArgumentsCheck::registerMatchers(MatchFinder *Finder) {
- Finder->addMatcher(callExpr().bind("call"), this);
-}
-
-/// \brief Look through lvalue to rvalue and nop casts. This filters out
-/// implicit conversions that have no effect on the input but block our view for
-/// other implicit casts.
-static const Expr *ignoreNoOpCasts(const Expr *E) {
- if (auto *Cast = dyn_cast<CastExpr>(E))
- if (Cast->getCastKind() == CK_LValueToRValue ||
- Cast->getCastKind() == CK_NoOp)
- return ignoreNoOpCasts(Cast->getSubExpr());
- return E;
-}
-
-/// \brief Restrict the warning to implicit casts that are most likely
-/// accidental. User defined or integral conversions fit in this category,
-/// lvalue to rvalue or derived to base does not.
-static bool isImplicitCastCandidate(const CastExpr *Cast) {
- return Cast->getCastKind() == CK_UserDefinedConversion ||
- Cast->getCastKind() == CK_FloatingToBoolean ||
- Cast->getCastKind() == CK_FloatingToIntegral ||
- Cast->getCastKind() == CK_IntegralToBoolean ||
- Cast->getCastKind() == CK_IntegralToFloating ||
- Cast->getCastKind() == CK_MemberPointerToBoolean ||
- Cast->getCastKind() == CK_PointerToBoolean;
-}
-
-void SwappedArgumentsCheck::check(const MatchFinder::MatchResult &Result) {
- const ASTContext &Ctx = *Result.Context;
- const auto *Call = Result.Nodes.getNodeAs<CallExpr>("call");
-
- llvm::SmallPtrSet<const Expr *, 4> UsedArgs;
- for (unsigned I = 1, E = Call->getNumArgs(); I < E; ++I) {
- const Expr *LHS = Call->getArg(I - 1);
- const Expr *RHS = Call->getArg(I);
-
- // Only need to check RHS, as LHS has already been covered. We don't want to
- // emit two warnings for a single argument.
- if (UsedArgs.count(RHS))
- continue;
-
- const auto *LHSCast = dyn_cast<ImplicitCastExpr>(ignoreNoOpCasts(LHS));
- const auto *RHSCast = dyn_cast<ImplicitCastExpr>(ignoreNoOpCasts(RHS));
-
- // Look if this is a potentially swapped argument pair. First look for
- // implicit casts.
- if (!LHSCast || !RHSCast || !isImplicitCastCandidate(LHSCast) ||
- !isImplicitCastCandidate(RHSCast))
- continue;
-
- // If the types that go into the implicit casts match the types of the other
- // argument in the declaration there is a high probability that the
- // arguments were swapped.
- // TODO: We could make use of the edit distance between the argument name
- // and the name of the passed variable in addition to this type based
- // heuristic.
- const Expr *LHSFrom = ignoreNoOpCasts(LHSCast->getSubExpr());
- const Expr *RHSFrom = ignoreNoOpCasts(RHSCast->getSubExpr());
- if (LHS->getType() == RHS->getType() ||
- LHS->getType() != RHSFrom->getType() ||
- RHS->getType() != LHSFrom->getType())
- continue;
-
- // Emit a warning and fix-its that swap the arguments.
- diag(Call->getLocStart(), "argument with implicit conversion from %0 "
- "to %1 followed by argument converted from "
- "%2 to %3, potentially swapped arguments.")
- << LHS->getType() << LHSFrom->getType() << RHS->getType()
- << RHSFrom->getType()
- << tooling::fixit::createReplacement(*LHS, *RHS, Ctx)
- << tooling::fixit::createReplacement(*RHS, *LHS, Ctx);
-
- // Remember that we emitted a warning for this argument.
- UsedArgs.insert(RHSCast);
- }
-}
-
-} // namespace misc
-} // namespace tidy
-} // namespace clang
OpenPOWER on IntegriCloud