diff options
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp | 12 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h (renamed from clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h) | 10 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h (renamed from clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.h) | 12 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h (renamed from clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.h) | 12 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.cpp (renamed from clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h (renamed from clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h) | 12 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/misc/CMakeLists.txt | 4 | ||||
-rw-r--r-- | clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp | 12 | ||||
-rw-r--r-- | clang-tools-extra/docs/ReleaseNotes.rst | 16 | ||||
-rw-r--r-- | clang-tools-extra/docs/clang-tidy/checks/bugprone-string-integer-assignment.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-string-integer-assignment.rst) | 6 | ||||
-rw-r--r-- | clang-tools-extra/docs/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-string-literal-with-embedded-nul.rst) | 6 | ||||
-rw-r--r-- | clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-enum-usage.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-enum-usage.rst) | 6 | ||||
-rw-r--r-- | clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-missing-comma.rst (renamed from clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-missing-comma.rst) | 6 | ||||
-rw-r--r-- | clang-tools-extra/docs/clang-tidy/checks/list.rst | 8 | ||||
-rw-r--r-- | clang-tools-extra/test/clang-tidy/bugprone-string-integer-assignment.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-string-integer-assignment.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/test/clang-tidy/bugprone-string-literal-with-embedded-nul.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-string-literal-with-embedded-nul.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage-strict.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage-strict.cpp) | 4 | ||||
-rw-r--r-- | clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage.cpp) | 2 | ||||
-rw-r--r-- | clang-tools-extra/test/clang-tidy/bugprone-suspicious-missing-comma.cpp (renamed from clang-tools-extra/test/clang-tidy/misc-suspicious-missing-comma.cpp) | 6 |
23 files changed, 87 insertions, 75 deletions
diff --git a/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp b/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp index 5e67672fa53..8ce22721740 100644 --- a/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp +++ b/clang-tools-extra/clang-tidy/bugprone/BugproneTidyModule.cpp @@ -28,7 +28,11 @@ #include "MoveForwardingReferenceCheck.h" #include "MultipleStatementMacroCheck.h" #include "StringConstructorCheck.h" +#include "StringIntegerAssignmentCheck.h" +#include "StringLiteralWithEmbeddedNulCheck.h" +#include "SuspiciousEnumUsageCheck.h" #include "SuspiciousMemsetUsageCheck.h" +#include "SuspiciousMissingCommaCheck.h" #include "ThrowKeywordMissingCheck.h" #include "UndefinedMemoryManipulationCheck.h" #include "UseAfterMoveCheck.h" @@ -77,8 +81,16 @@ public: "bugprone-multiple-statement-macro"); CheckFactories.registerCheck<StringConstructorCheck>( "bugprone-string-constructor"); + CheckFactories.registerCheck<StringIntegerAssignmentCheck>( + "bugprone-string-integer-assignment"); + CheckFactories.registerCheck<StringLiteralWithEmbeddedNulCheck>( + "bugprone-string-literal-with-embedded-nul"); + CheckFactories.registerCheck<SuspiciousEnumUsageCheck>( + "bugprone-suspicious-enum-usage"); CheckFactories.registerCheck<SuspiciousMemsetUsageCheck>( "bugprone-suspicious-memset-usage"); + CheckFactories.registerCheck<SuspiciousMissingCommaCheck>( + "bugprone-suspicious-missing-comma"); CheckFactories.registerCheck<ThrowKeywordMissingCheck>( "bugprone-throw-keyword-missing"); CheckFactories.registerCheck<UndefinedMemoryManipulationCheck>( diff --git a/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt b/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt index 73b4e55f589..42e7b4fdf7b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt +++ b/clang-tools-extra/clang-tidy/bugprone/CMakeLists.txt @@ -20,7 +20,11 @@ add_clang_library(clangTidyBugproneModule MoveForwardingReferenceCheck.cpp MultipleStatementMacroCheck.cpp StringConstructorCheck.cpp + StringIntegerAssignmentCheck.cpp + StringLiteralWithEmbeddedNulCheck.cpp + SuspiciousEnumUsageCheck.cpp SuspiciousMemsetUsageCheck.cpp + SuspiciousMissingCommaCheck.cpp ThrowKeywordMissingCheck.cpp UndefinedMemoryManipulationCheck.cpp UseAfterMoveCheck.cpp diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.cpp index 4e8c488d0c9..f3736489ceb 100644 --- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp +++ b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace bugprone { void StringIntegerAssignmentCheck::registerMatchers(MatchFinder *Finder) { if (!getLangOpts().CPlusPlus) @@ -81,6 +81,6 @@ void StringIntegerAssignmentCheck::check( } } -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h index 7963362acca..42fa53e9637 100644 --- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h @@ -7,14 +7,14 @@ // //===----------------------------------------------------------------------===// -#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_INTEGER_ASSIGNMENT_H -#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_INTEGER_ASSIGNMENT_H +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGINTEGERASSIGNMENTCHECK_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGINTEGERASSIGNMENTCHECK_H #include "../ClangTidy.h" namespace clang { namespace tidy { -namespace misc { +namespace bugprone { /// Finds instances where an integer is assigned to a string. /// @@ -28,8 +28,8 @@ public: void check(const ast_matchers::MatchFinder::MatchResult &Result) override; }; -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang -#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_INTEGER_ASSIGNMENT_H +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGINTEGERASSIGNMENTCHECK_H diff --git a/clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.cpp index 7567f6f644b..eaa610fc64e 100644 --- a/clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.cpp +++ b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.cpp @@ -15,7 +15,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace bugprone { namespace { AST_MATCHER(StringLiteral, containsNul) { @@ -80,6 +80,6 @@ void StringLiteralWithEmbeddedNulCheck::check( } } -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang diff --git a/clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h index e4a87fc280b..f5341c31449 100644 --- a/clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h @@ -7,19 +7,19 @@ // //===----------------------------------------------------------------------===// -#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_LITERAL_WITH_EMBEDDED_NUL_H -#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_LITERAL_WITH_EMBEDDED_NUL_H +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGLITERALWITHEMBEDDEDNULCHECK_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGLITERALWITHEMBEDDEDNULCHECK_H #include "../ClangTidy.h" namespace clang { namespace tidy { -namespace misc { +namespace bugprone { /// Find suspicious string literals with embedded NUL characters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-string-literal-with-embedded-nul.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.html class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck { public: StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context) @@ -28,8 +28,8 @@ public: void check(const ast_matchers::MatchFinder::MatchResult &Result) override; }; -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang -#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_STRING_LITERAL_WITH_EMBEDDED_NUL_H +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_STRINGLITERALWITHEMBEDDEDNULCHECK_H diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.cpp index 416a418a44f..1abad4eb163 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.cpp +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.cpp @@ -16,7 +16,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace bugprone { static const char DifferentEnumErrorMessage[] = "enum values are from different enum types"; @@ -214,6 +214,6 @@ void SuspiciousEnumUsageCheck::check(const MatchFinder::MatchResult &Result) { checkSuspiciousBitmaskUsage(RhsExpr, EnumDec); } -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h index d5321792774..9c1b53d78c2 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousEnumUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h @@ -7,19 +7,19 @@ // //===----------------------------------------------------------------------===// -#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_ENUM_USAGE_H -#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_ENUM_USAGE_H +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSENUMUSAGECHECK_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSENUMUSAGECHECK_H #include "../ClangTidy.h" namespace clang { namespace tidy { -namespace misc { +namespace bugprone { /// The checker detects various cases when an enum is probably misused (as a /// bitmask). /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-suspicious-enum-usage.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-enum-usage.html class SuspiciousEnumUsageCheck : public ClangTidyCheck { public: SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context); @@ -32,8 +32,8 @@ private: const bool StrictMode; }; -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang -#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_ENUM_USAGE_H +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSENUMUSAGECHECK_H diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.cpp index a3ed38fb31b..3831dc3eaee 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.cpp @@ -15,7 +15,7 @@ using namespace clang::ast_matchers; namespace clang { namespace tidy { -namespace misc { +namespace bugprone { namespace { @@ -124,6 +124,6 @@ void SuspiciousMissingCommaCheck::check( "suspicious string literal, probably missing a comma"); } -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h index bf74ad11c09..4ae3ecf060f 100644 --- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h @@ -7,20 +7,20 @@ // //===----------------------------------------------------------------------===// -#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_MISSING_COMMA_H -#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_MISSING_COMMA_H +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSMISSINGCOMMACHECK_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSMISSINGCOMMACHECK_H #include "../ClangTidy.h" namespace clang { namespace tidy { -namespace misc { +namespace bugprone { /// This check finds string literals which are probably concatenated /// accidentally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-suspicious-missing-comma.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html class SuspiciousMissingCommaCheck : public ClangTidyCheck { public: SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context); @@ -37,8 +37,8 @@ private: const unsigned MaxConcatenatedTokens; }; -} // namespace misc +} // namespace bugprone } // namespace tidy } // namespace clang -#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_MISSING_COMMA_H +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSMISSINGCOMMACHECK_H diff --git a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt index e0e9627f3cb..a4fe4fb99b2 100644 --- a/clang-tools-extra/clang-tidy/misc/CMakeLists.txt +++ b/clang-tools-extra/clang-tidy/misc/CMakeLists.txt @@ -12,10 +12,6 @@ add_clang_library(clangTidyMiscModule SizeofContainerCheck.cpp SizeofExpressionCheck.cpp StaticAssertCheck.cpp - StringIntegerAssignmentCheck.cpp - StringLiteralWithEmbeddedNulCheck.cpp - SuspiciousEnumUsageCheck.cpp - SuspiciousMissingCommaCheck.cpp SuspiciousSemicolonCheck.cpp SuspiciousStringCompareCheck.cpp SwappedArgumentsCheck.cpp diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp index 4ed7c47dec7..c9f81ecbbb5 100644 --- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp +++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp @@ -19,10 +19,6 @@ #include "SizeofContainerCheck.h" #include "SizeofExpressionCheck.h" #include "StaticAssertCheck.h" -#include "StringIntegerAssignmentCheck.h" -#include "StringLiteralWithEmbeddedNulCheck.h" -#include "SuspiciousEnumUsageCheck.h" -#include "SuspiciousMissingCommaCheck.h" #include "SuspiciousSemicolonCheck.h" #include "SuspiciousStringCompareCheck.h" #include "SwappedArgumentsCheck.h" @@ -59,14 +55,6 @@ public: CheckFactories.registerCheck<SizeofExpressionCheck>( "misc-sizeof-expression"); CheckFactories.registerCheck<StaticAssertCheck>("misc-static-assert"); - CheckFactories.registerCheck<StringIntegerAssignmentCheck>( - "misc-string-integer-assignment"); - CheckFactories.registerCheck<StringLiteralWithEmbeddedNulCheck>( - "misc-string-literal-with-embedded-nul"); - CheckFactories.registerCheck<SuspiciousEnumUsageCheck>( - "misc-suspicious-enum-usage"); - CheckFactories.registerCheck<SuspiciousMissingCommaCheck>( - "misc-suspicious-missing-comma"); CheckFactories.registerCheck<SuspiciousSemicolonCheck>( "misc-suspicious-semicolon"); CheckFactories.registerCheck<SuspiciousStringCompareCheck>( diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst index af682516c98..5a886241a62 100644 --- a/clang-tools-extra/docs/ReleaseNotes.rst +++ b/clang-tools-extra/docs/ReleaseNotes.rst @@ -100,9 +100,9 @@ Improvements to clang-tidy Warns if SIMD intrinsics are used which can be replaced by ``std::experimental::simd`` operations. - + - New alias `hicpp-avoid-goto - <http://clang.llvm.org/extra/clang-tidy/checks/hicpp-avoid-goto.html>`_ to + <http://clang.llvm.org/extra/clang-tidy/checks/hicpp-avoid-goto.html>`_ to `cppcoreguidelines-avoid-goto <http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-goto.html>`_ added. @@ -124,6 +124,18 @@ Improvements to clang-tidy - The 'misc-string-compare' check was renamed to `readability-string-compare <http://clang.llvm.org/extra/clang-tidy/checks/readability-string-compare.html>`_ +- The 'misc-string-integer-assignment' check was renamed to `bugprone-string-integer-assignment + <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-integer-assignment.html>`_ + +- The 'misc-string-literal-with-embedded-nul' check was renamed to `bugprone-string-literal-with-embedded-nul + <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.html>`_ + +- The 'misc-suspicious-enum-usage' check was renamed to `bugprone-suspicious-enum-usage + <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-enum-usage.html>`_ + +- The 'misc-suspicious-missing-comma' check was renamed to `bugprone-suspicious-missing-comma + <http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html>`_ + Improvements to include-fixer ----------------------------- diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-string-integer-assignment.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-string-integer-assignment.rst index d882e8d0d9d..6401f008d2e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc-string-integer-assignment.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-string-integer-assignment.rst @@ -1,7 +1,7 @@ -.. title:: clang-tidy - misc-string-integer-assignment +.. title:: clang-tidy - bugprone-string-integer-assignment -misc-string-integer-assignment -============================== +bugprone-string-integer-assignment +================================== The check finds assignments of an integer to ``std::basic_string<CharT>`` (``std::string``, ``std::wstring``, etc.). The source of the problem is the diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-string-literal-with-embedded-nul.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst index 29af0a4c613..c1c4d3261df 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc-string-literal-with-embedded-nul.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst @@ -1,7 +1,7 @@ -.. title:: clang-tidy - misc-string-literal-with-embedded-nul +.. title:: clang-tidy - bugprone-string-literal-with-embedded-nul -misc-string-literal-with-embedded-nul -===================================== +bugprone-string-literal-with-embedded-nul +========================================= Finds occurrences of string literal with embedded NUL character and validates their usage. diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-enum-usage.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-enum-usage.rst index 0a5a4842820..5e765be3ef6 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-enum-usage.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-enum-usage.rst @@ -1,7 +1,7 @@ -.. title:: clang-tidy - misc-suspicious-enum-usage +.. title:: clang-tidy - bugprone-suspicious-enum-usage -misc-suspicious-enum-usage -========================== +bugprone-suspicious-enum-usage +============================== The checker detects various cases when an enum is probably misused (as a bitmask ). diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-missing-comma.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-missing-comma.rst index 291f27ea23f..9fe9153117c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc-suspicious-missing-comma.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-missing-comma.rst @@ -1,7 +1,7 @@ -.. title:: clang-tidy - misc-suspicious-missing-comma +.. title:: clang-tidy - bugprone-suspicious-missing-comma -misc-suspicious-missing-comma -============================= +bugprone-suspicious-missing-comma +================================= String literals placed side-by-side are concatenated at translation phase 6 (after the preprocessor). This feature is used to represent long string diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst index a632f5deb0d..013d5c138f8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -35,7 +35,11 @@ Clang-Tidy Checks bugprone-move-forwarding-reference bugprone-multiple-statement-macro bugprone-string-constructor + bugprone-string-integer-assignment + bugprone-string-literal-with-embedded-nul + bugprone-suspicious-enum-usage bugprone-suspicious-memset-usage + bugprone-suspicious-missing-comma bugprone-throw-keyword-missing bugprone-undefined-memory-manipulation bugprone-use-after-move @@ -139,10 +143,6 @@ Clang-Tidy Checks misc-sizeof-container misc-sizeof-expression misc-static-assert - misc-string-integer-assignment - misc-string-literal-with-embedded-nul - misc-suspicious-enum-usage - misc-suspicious-missing-comma misc-suspicious-semicolon misc-suspicious-string-compare misc-swapped-arguments diff --git a/clang-tools-extra/test/clang-tidy/misc-string-integer-assignment.cpp b/clang-tools-extra/test/clang-tidy/bugprone-string-integer-assignment.cpp index cb823410777..c4e13fc4c68 100644 --- a/clang-tools-extra/test/clang-tidy/misc-string-integer-assignment.cpp +++ b/clang-tools-extra/test/clang-tidy/bugprone-string-integer-assignment.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s misc-string-integer-assignment %t +// RUN: %check_clang_tidy %s bugprone-string-integer-assignment %t namespace std { template<typename T> @@ -21,7 +21,7 @@ int main() { int x = 5; s = 6; -// CHECK-MESSAGES: :[[@LINE-1]]:7: warning: an integer is interpreted as a character code when assigning {{.*}} [misc-string-integer-assignment] +// CHECK-MESSAGES: :[[@LINE-1]]:7: warning: an integer is interpreted as a character code when assigning {{.*}} [bugprone-string-integer-assignment] // CHECK-FIXES: {{^}} s = '6';{{$}} s = 66; // CHECK-MESSAGES: :[[@LINE-1]]:7: warning: an integer is interpreted as a chara diff --git a/clang-tools-extra/test/clang-tidy/misc-string-literal-with-embedded-nul.cpp b/clang-tools-extra/test/clang-tidy/bugprone-string-literal-with-embedded-nul.cpp index 2605dd4eccb..f939f5282eb 100644 --- a/clang-tools-extra/test/clang-tidy/misc-string-literal-with-embedded-nul.cpp +++ b/clang-tools-extra/test/clang-tidy/bugprone-string-literal-with-embedded-nul.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s misc-string-literal-with-embedded-nul %t +// RUN: %check_clang_tidy %s bugprone-string-literal-with-embedded-nul %t namespace std { template <typename T> @@ -25,7 +25,7 @@ bool operator==(const char*, const std::string&); const char Valid[] = "This is valid \x12."; const char Strange[] = "This is strange \0x12 and must be fixed"; -// CHECK-MESSAGES: :[[@LINE-1]]:24: warning: suspicious embedded NUL character [misc-string-literal-with-embedded-nul] +// CHECK-MESSAGES: :[[@LINE-1]]:24: warning: suspicious embedded NUL character [bugprone-string-literal-with-embedded-nul] const char textA[] = "\0x01\0x02\0x03\0x04"; // CHECK-MESSAGES: :[[@LINE-1]]:22: warning: suspicious embedded NUL character diff --git a/clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage-strict.cpp b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage-strict.cpp index 404c89319a5..d9ed8cede2a 100644 --- a/clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage-strict.cpp +++ b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage-strict.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s misc-suspicious-enum-usage %t -- -config="{CheckOptions: [{key: misc-suspicious-enum-usage.StrictMode, value: 1}]}" -- +// RUN: %check_clang_tidy %s bugprone-suspicious-enum-usage %t -- -config="{CheckOptions: [{key: bugprone-suspicious-enum-usage.StrictMode, value: 1}]}" -- enum A { A = 1, @@ -17,7 +17,7 @@ enum X { Y = 16, Z = 4, ZZ = 3 - // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: enum type seems like a bitmask (contains mostly power-of-2 literals), but this literal is not a power-of-2 [misc-suspicious-enum-usage] + // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: enum type seems like a bitmask (contains mostly power-of-2 literals), but this literal is not a power-of-2 [bugprone-suspicious-enum-usage] // CHECK-MESSAGES: :70:13: note: used here as a bitmask }; // CHECK-MESSAGES: :[[@LINE+2]]:1: warning: enum type seems like a bitmask (contains mostly power-of-2 literals) but some literals are not power-of-2 diff --git a/clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage.cpp b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage.cpp index 52d666dfcb8..e1a54d45908 100644 --- a/clang-tools-extra/test/clang-tidy/misc-suspicious-enum-usage.cpp +++ b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-enum-usage.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s misc-suspicious-enum-usage %t -- -config="{CheckOptions: [{key: misc-suspicious-enum-usage.StrictMode, value: 0}]}" -- +// RUN: %check_clang_tidy %s bugprone-suspicious-enum-usage %t -- -config="{CheckOptions: [{key: bugprone-suspicious-enum-usage.StrictMode, value: 0}]}" -- enum Empty { }; diff --git a/clang-tools-extra/test/clang-tidy/misc-suspicious-missing-comma.cpp b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-missing-comma.cpp index 0744d8f681a..f0393101183 100644 --- a/clang-tools-extra/test/clang-tidy/misc-suspicious-missing-comma.cpp +++ b/clang-tools-extra/test/clang-tidy/bugprone-suspicious-missing-comma.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s misc-suspicious-missing-comma %t +// RUN: %check_clang_tidy %s bugprone-suspicious-missing-comma %t const char* Cartoons[] = { "Bugs Bunny", @@ -9,7 +9,7 @@ const char* Cartoons[] = { "Fred Flintstone", "Popeye", }; -// CHECK-MESSAGES: :[[@LINE-4]]:3: warning: suspicious string literal, probably missing a comma [misc-suspicious-missing-comma] +// CHECK-MESSAGES: :[[@LINE-4]]:3: warning: suspicious string literal, probably missing a comma [bugprone-suspicious-missing-comma] const wchar_t* Colors[] = { L"Red", L"Yellow", L"Blue", L"Green", L"Purple", L"Rose", L"White", L"Black" @@ -68,7 +68,7 @@ const char* IncorrectlyIndentedArray[] = { "a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l" }; -// CHECK-MESSAGES: :[[@LINE-6]]:3: warning: suspicious string literal, probably missing a comma [misc-suspicious-missing-comma] +// CHECK-MESSAGES: :[[@LINE-6]]:3: warning: suspicious string literal, probably missing a comma [bugprone-suspicious-missing-comma] const char* TooManyConcatenatedTokensArray[] = { "Dummy line", |