diff options
| author | Kirill Bobyrev <omtcyfz@gmail.com> | 2016-08-01 12:06:18 +0000 |
|---|---|---|
| committer | Kirill Bobyrev <omtcyfz@gmail.com> | 2016-08-01 12:06:18 +0000 |
| commit | 11cea45ccef4e7878f60b2c296569362a2b26b97 (patch) | |
| tree | 4635ef77fc331f47b8c4cdf0289ba547b410d381 /clang-tools-extra | |
| parent | d10be623838db6d82c7ede9ea5d4cf267ff2dc8f (diff) | |
| download | bcm5719-llvm-11cea45ccef4e7878f60b2c296569362a2b26b97.tar.gz bcm5719-llvm-11cea45ccef4e7878f60b2c296569362a2b26b97.zip | |
[clang-tidy] remove trailing whitespaces and retab
llvm-svn: 277340
Diffstat (limited to 'clang-tools-extra')
26 files changed, 54 insertions, 54 deletions
diff --git a/clang-tools-extra/clang-tidy/cert/LICENSE.TXT b/clang-tools-extra/clang-tidy/cert/LICENSE.TXT index b332152c0ef..d8395cccead 100644 --- a/clang-tools-extra/clang-tidy/cert/LICENSE.TXT +++ b/clang-tools-extra/clang-tidy/cert/LICENSE.TXT @@ -7,7 +7,7 @@ additions: Any file referencing a CERT Secure Coding guideline: Please allow this letter to serve as confirmation that open source projects on http://llvm.org are permitted to link via hypertext to the CERT(R) secure coding -guidelines available at https://www.securecoding.cert.org. +guidelines available at https://www.securecoding.cert.org. The foregoing is permitted by the Terms of Use as follows: "Linking to the Service diff --git a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp index 5266daf8bc9..765513b1f8e 100644 --- a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp +++ b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp @@ -127,7 +127,7 @@ ConversionKind ClassifyFormatString(StringRef Fmt, const LangOptions &LO, Handler H; analyze_format_string::ParseScanfString(H, Fmt.begin(), Fmt.end(), LO, TI); - + return H.get(); } diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h index b376e64d0d7..0afffb64f06 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h @@ -15,7 +15,7 @@ namespace clang { namespace tidy { namespace cppcoreguidelines { - + /// This check flags all array to pointer decays /// /// For the user-facing documentation see: diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp index 5331cdacddc..4b6fb420716 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { namespace cppcoreguidelines { - + void ProTypeConstCastCheck::registerMatchers(MatchFinder *Finder) { if (!getLangOpts().CPlusPlus) return; diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h index fda082e1c2b..92a3a1b5db0 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h @@ -15,7 +15,7 @@ namespace clang { namespace tidy { namespace cppcoreguidelines { - + /// This check flags all instances of const_cast /// /// For the user-facing documentation see: diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp index 002f8f1ed2d..153e1cae810 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { namespace cppcoreguidelines { - + void ProTypeStaticCastDowncastCheck::registerMatchers(MatchFinder *Finder) { if (!getLangOpts().CPlusPlus) return; diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h index d718feca2f8..77224237f79 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h @@ -15,7 +15,7 @@ namespace clang { namespace tidy { namespace cppcoreguidelines { - + /// Checks for usages of static_cast, where a base class is downcasted to a derived class. /// /// For the user-facing documentation see: diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h index 62185354182..508ce6411cf 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h @@ -30,7 +30,7 @@ public: void registerMatchers(ast_matchers::MatchFinder *Finder) override; void check(const ast_matchers::MatchFinder::MatchResult &Result) override; void onEndOfTranslationUnit() override; - + enum class SpecialMemberFunctionKind { Destructor, CopyConstructor, @@ -44,12 +44,12 @@ public: using ClassDefiningSpecialMembersMap = llvm::DenseMap<ClassDefId, llvm::SmallVector<SpecialMemberFunctionKind, 5>>; private: - + static llvm::StringRef toString(SpecialMemberFunctionKind K); static std::string join(llvm::ArrayRef<SpecialMemberFunctionKind> SMFS, llvm::StringRef AndOr); - + ClassDefiningSpecialMembersMap ClassWithSpecialMembers; }; @@ -60,7 +60,7 @@ private: namespace llvm { /// Specialisation of DenseMapInfo to allow ClassDefId objects in DenseMaps /// FIXME: Move this to the corresponding cpp file as is done for -/// clang-tidy/readability/IdentifierNamingCheck.cpp. +/// clang-tidy/readability/IdentifierNamingCheck.cpp. template <> struct DenseMapInfo< clang::tidy::cppcoreguidelines::SpecialMemberFunctionsCheck::ClassDefId> { diff --git a/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp b/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp index ebfb8c03298..cfc94c479b5 100644 --- a/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp @@ -154,7 +154,7 @@ void MacroParenthesesPPCallbacks::replacementList(const Token &MacroNameTok, void MacroParenthesesPPCallbacks::argument(const Token &MacroNameTok, const MacroInfo *MI) { - + // Skip variable declaration. bool VarDecl = possibleVarDecl(MI, MI->tokens_begin()); diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp index 45fa838345d..abaf4b178ce 100644 --- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp +++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp @@ -120,7 +120,7 @@ public: CheckFactories.registerCheck<SuspiciousSemicolonCheck>( "misc-suspicious-semicolon"); CheckFactories.registerCheck<SuspiciousStringCompareCheck>( - "misc-suspicious-string-compare"); + "misc-suspicious-string-compare"); CheckFactories.registerCheck<SwappedArgumentsCheck>( "misc-swapped-arguments"); CheckFactories.registerCheck<ThrowByValueCatchByReferenceCheck>( diff --git a/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp b/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp index acb6de47697..c696c4c65c7 100644 --- a/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp @@ -133,7 +133,7 @@ void MoveConstructorInitCheck::handleMoveConstructor( QualType QT = Initializer->getInit()->getType(); if (QT.isTriviallyCopyableType(*Result.Context)) return; - + const auto *RD = QT->getAsCXXRecordDecl(); if (RD && RD->isTriviallyCopyable()) return; diff --git a/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp b/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp index 188d28ae2c4..7555d3b7e16 100644 --- a/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp @@ -15,7 +15,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace misc { void SizeofContainerCheck::registerMatchers(MatchFinder *Finder) { Finder->addMatcher( diff --git a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp index 6a7dc6cb565..a0e32222770 100644 --- a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp @@ -22,7 +22,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace misc { StaticAssertCheck::StaticAssertCheck(StringRef Name, ClangTidyContext *Context) : ClangTidyCheck(Name, Context) {} diff --git a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h index 284fdebc784..faefce1723d 100644 --- a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h +++ b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h @@ -16,7 +16,7 @@ namespace clang { namespace tidy { -namespace misc { +namespace misc { /// Replaces `assert()` with `static_assert()` if the condition is evaluatable /// at compile time. diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp index 65af4a10b7b..69166860345 100644 --- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace misc { void StringIntegerAssignmentCheck::registerMatchers(MatchFinder *Finder) { if (!getLangOpts().CPlusPlus) diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h index e977b57f915..7d89c0c1174 100644 --- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h @@ -14,7 +14,7 @@ namespace clang { namespace tidy { -namespace misc { +namespace misc { /// Finds instances where an integer is assigned to a string. /// diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp index 3881a1f404e..605cfd975f4 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp @@ -99,7 +99,7 @@ void SuspiciousMissingCommaCheck::check( const auto *ConcatenatedLiteral = Result.Nodes.getNodeAs<StringLiteral>("str"); assert(InitializerList && ConcatenatedLiteral); - + // Skip small arrays as they often generate false-positive. unsigned int Size = InitializerList->getNumInits(); if (Size < SizeThreshold) return; diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h index 21cb680a438..428495943db 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h +++ b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h @@ -23,7 +23,7 @@ namespace misc { class SuspiciousMissingCommaCheck : public ClangTidyCheck { public: SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context); - void storeOptions(ClangTidyOptions::OptionMap &Opts) override; + void storeOptions(ClangTidyOptions::OptionMap &Opts) override; void registerMatchers(ast_matchers::MatchFinder *Finder) override; void check(const ast_matchers::MatchFinder::MatchResult &Result) override; diff --git a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp index b6ffbe9ac2b..389be350675 100644 --- a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp @@ -91,7 +91,7 @@ void SwappedArgumentsCheck::check(const MatchFinder::MatchResult &Result) { << RHSFrom->getType() << tooling::fixit::createReplacement(*LHS, *RHS, Ctx) << tooling::fixit::createReplacement(*RHS, *LHS, Ctx); - + // Remember that we emitted a warning for this argument. UsedArgs.insert(RHSCast); } diff --git a/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp b/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp index 5e89bd1d445..8b8c379ac69 100644 --- a/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace misc { ThrowByValueCatchByReferenceCheck::ThrowByValueCatchByReferenceCheck( StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h index 54f66f7c144..0525ba845cb 100644 --- a/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h @@ -15,7 +15,7 @@ namespace clang { namespace tidy { -namespace misc { +namespace misc { /// Finds unused namespace alias declarations. class UnusedAliasDeclsCheck : public ClangTidyCheck { diff --git a/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h index 45b7f935b2c..f8b27dee711 100644 --- a/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h @@ -14,7 +14,7 @@ namespace clang { namespace tidy { -namespace misc { +namespace misc { /// Finds unused parameters and fixes them, so that `-Wunused-parameter` can be /// turned on. diff --git a/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp b/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp index 6bc5c009e0b..6161d6dfc94 100644 --- a/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp +++ b/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp @@ -183,7 +183,7 @@ void PassByValueCheck::check(const MatchFinder::MatchResult &Result) { // If the parameter is trivial to copy, don't move it. Moving a trivivally // copyable type will cause a problem with misc-move-const-arg - if (ParamDecl->getType().isTriviallyCopyableType(*Result.Context)) + if (ParamDecl->getType().isTriviallyCopyableType(*Result.Context)) return; auto Diag = diag(ParamDecl->getLocStart(), "pass by value and use std::move"); diff --git a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp index 71dc4551c56..f00133c4987 100644 --- a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp +++ b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp @@ -157,8 +157,8 @@ void UnnecessaryValueParamCheck::handleMoveFix(const ParmVarDecl &Var, if (CopyArgument.getLocStart().isMacroID()) return; const auto &SM = Context.getSourceManager(); - auto EndLoc = Lexer::getLocForEndOfToken(CopyArgument.getLocation(), 0, SM, - Context.getLangOpts()); + auto EndLoc = Lexer::getLocForEndOfToken(CopyArgument.getLocation(), 0, SM, + Context.getLangOpts()); Diag << FixItHint::CreateInsertion(CopyArgument.getLocStart(), "std::move(") << FixItHint::CreateInsertion(EndLoc, ")"); if (auto IncludeFixit = Inserter->CreateIncludeInsertion( diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst index 0b1bb6beed4..94ceb98ca6f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst @@ -10,13 +10,13 @@ This can be misleading especially for member function slicing, for example: .. code:: c++ - struct B { int a; virtual int f(); }; - struct D : B { int b; int f() override; }; - void use(B b) { // Missing reference, intended ? - b.f(); // Calls B::f. - } - D d; - use(d); // Slice. + struct B { int a; virtual int f(); }; + struct D : B { int b; int f() override; }; + void use(B b) { // Missing reference, intended ? + b.f(); // Calls B::f. + } + D d; + use(d); // Slice. See the relevant CppCoreGuidelines sections for details: https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es63-dont-slice diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst index 1622dd65ebb..65c23832d1e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst @@ -20,25 +20,25 @@ Before: .. code:: c++ - std::vector<MyClass> v; - v.push_back(MyClass(21, 37)); + std::vector<MyClass> v; + v.push_back(MyClass(21, 37)); - std::vector<std::pair<int,int>> w; + std::vector<std::pair<int,int>> w; - w.push_back(std::pair<int,int>(21, 37)); - w.push_back(std::make_pair(21L, 37L)); + w.push_back(std::pair<int,int>(21, 37)); + w.push_back(std::make_pair(21L, 37L)); After: .. code:: c++ - std::vector<MyClass> v; - v.emplace_back(21, 37); + std::vector<MyClass> v; + v.emplace_back(21, 37); - std::vector<std::pair<int,int>> w; - w.emplace_back(21, 37); - // This will be fixed to w.push_back(21, 37); in next version - w.emplace_back(std::make_pair(21L, 37L); + std::vector<std::pair<int,int>> w; + w.emplace_back(21, 37); + // This will be fixed to w.push_back(21, 37); in next version + w.emplace_back(std::make_pair(21L, 37L); The other situation is when we pass arguments that will be converted to a type inside a container. @@ -47,15 +47,15 @@ Before: .. code:: c++ - std::vector<boost::optional<std::string> > v; - v.push_back("abc"); + std::vector<boost::optional<std::string> > v; + v.push_back("abc"); After: .. code:: c++ - std::vector<boost::optional<std::string> > v; - v.emplace_back("abc"); + std::vector<boost::optional<std::string> > v; + v.emplace_back("abc"); In some cases the transformation would be valid, but the code @@ -63,11 +63,11 @@ wouldn't be exception safe. In this case the calls of ``push_back`` won't be replaced. .. code:: c++ - + std::vector<std::unique_ptr<int>> v; - v.push_back(std::unique_ptr<int>(new int(0))); - auto *ptr = new int(1); - v.push_back(std::unique_ptr<int>(ptr)); + v.push_back(std::unique_ptr<int>(new int(0))); + auto *ptr = new int(1); + v.push_back(std::unique_ptr<int>(ptr)); This is because replacing it with ``emplace_back`` could cause a leak of this pointer if ``emplace_back`` would throw exception before emplacement |

