diff options
author | Alexander Kornienko <alexfh@google.com> | 2018-02-28 23:47:15 +0000 |
---|---|---|
committer | Alexander Kornienko <alexfh@google.com> | 2018-02-28 23:47:15 +0000 |
commit | eb9d944419a6048fdbd20b4d7766552df92b7f2a (patch) | |
tree | bfce3e00bcd75d1a2c4cefcee68803c6e15ea370 /clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp | |
parent | 51ec5a9ce35ac7dcb8c88d4cdfff100d86e72457 (diff) | |
download | bcm5719-llvm-eb9d944419a6048fdbd20b4d7766552df92b7f2a.tar.gz bcm5719-llvm-eb9d944419a6048fdbd20b4d7766552df92b7f2a.zip |
[clang-tidy] Another batch of checks to rename from misc- to bugprone-.
Summary:
clang-tidy/rename_check.py {misc,bugprone}-suspicious-semicolon
clang-tidy/rename_check.py {misc,bugprone}-suspicious-string-compare
clang-tidy/rename_check.py {misc,bugprone}-swapped-arguments
clang-tidy/rename_check.py {misc,bugprone}-undelegated-constructor --check_class_name UndelegatedConstructor
Reviewers: hokein, sammccall, aaron.ballman
Subscribers: klimek, mgorny, xazax.hun, cfe-commits
Differential Revision: https://reviews.llvm.org/D43870
llvm-svn: 326386
Diffstat (limited to 'clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp')
-rw-r--r-- | clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp | 102 |
1 files changed, 0 insertions, 102 deletions
diff --git a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp deleted file mode 100644 index e4dc5ca056a..00000000000 --- a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp +++ /dev/null @@ -1,102 +0,0 @@ -//===--- SwappedArgumentsCheck.cpp - clang-tidy ---------------------------===// -// -// The LLVM Compiler Infrastructure -// -// This file is distributed under the University of Illinois Open Source -// License. See LICENSE.TXT for details. -// -//===----------------------------------------------------------------------===// - -#include "SwappedArgumentsCheck.h" -#include "clang/AST/ASTContext.h" -#include "clang/Lex/Lexer.h" -#include "clang/Tooling/FixIt.h" -#include "llvm/ADT/SmallPtrSet.h" - -using namespace clang::ast_matchers; - -namespace clang { -namespace tidy { -namespace misc { - -void SwappedArgumentsCheck::registerMatchers(MatchFinder *Finder) { - Finder->addMatcher(callExpr().bind("call"), this); -} - -/// \brief Look through lvalue to rvalue and nop casts. This filters out -/// implicit conversions that have no effect on the input but block our view for -/// other implicit casts. -static const Expr *ignoreNoOpCasts(const Expr *E) { - if (auto *Cast = dyn_cast<CastExpr>(E)) - if (Cast->getCastKind() == CK_LValueToRValue || - Cast->getCastKind() == CK_NoOp) - return ignoreNoOpCasts(Cast->getSubExpr()); - return E; -} - -/// \brief Restrict the warning to implicit casts that are most likely -/// accidental. User defined or integral conversions fit in this category, -/// lvalue to rvalue or derived to base does not. -static bool isImplicitCastCandidate(const CastExpr *Cast) { - return Cast->getCastKind() == CK_UserDefinedConversion || - Cast->getCastKind() == CK_FloatingToBoolean || - Cast->getCastKind() == CK_FloatingToIntegral || - Cast->getCastKind() == CK_IntegralToBoolean || - Cast->getCastKind() == CK_IntegralToFloating || - Cast->getCastKind() == CK_MemberPointerToBoolean || - Cast->getCastKind() == CK_PointerToBoolean; -} - -void SwappedArgumentsCheck::check(const MatchFinder::MatchResult &Result) { - const ASTContext &Ctx = *Result.Context; - const auto *Call = Result.Nodes.getNodeAs<CallExpr>("call"); - - llvm::SmallPtrSet<const Expr *, 4> UsedArgs; - for (unsigned I = 1, E = Call->getNumArgs(); I < E; ++I) { - const Expr *LHS = Call->getArg(I - 1); - const Expr *RHS = Call->getArg(I); - - // Only need to check RHS, as LHS has already been covered. We don't want to - // emit two warnings for a single argument. - if (UsedArgs.count(RHS)) - continue; - - const auto *LHSCast = dyn_cast<ImplicitCastExpr>(ignoreNoOpCasts(LHS)); - const auto *RHSCast = dyn_cast<ImplicitCastExpr>(ignoreNoOpCasts(RHS)); - - // Look if this is a potentially swapped argument pair. First look for - // implicit casts. - if (!LHSCast || !RHSCast || !isImplicitCastCandidate(LHSCast) || - !isImplicitCastCandidate(RHSCast)) - continue; - - // If the types that go into the implicit casts match the types of the other - // argument in the declaration there is a high probability that the - // arguments were swapped. - // TODO: We could make use of the edit distance between the argument name - // and the name of the passed variable in addition to this type based - // heuristic. - const Expr *LHSFrom = ignoreNoOpCasts(LHSCast->getSubExpr()); - const Expr *RHSFrom = ignoreNoOpCasts(RHSCast->getSubExpr()); - if (LHS->getType() == RHS->getType() || - LHS->getType() != RHSFrom->getType() || - RHS->getType() != LHSFrom->getType()) - continue; - - // Emit a warning and fix-its that swap the arguments. - diag(Call->getLocStart(), "argument with implicit conversion from %0 " - "to %1 followed by argument converted from " - "%2 to %3, potentially swapped arguments.") - << LHS->getType() << LHSFrom->getType() << RHS->getType() - << RHSFrom->getType() - << tooling::fixit::createReplacement(*LHS, *RHS, Ctx) - << tooling::fixit::createReplacement(*RHS, *LHS, Ctx); - - // Remember that we emitted a warning for this argument. - UsedArgs.insert(RHSCast); - } -} - -} // namespace misc -} // namespace tidy -} // namespace clang |