Go to the documentation of this file.
9 #include "../ClangTidy.h"
10 #include "../ClangTidyModule.h"
11 #include "../ClangTidyModuleRegistry.h"
12 #include "../bugprone/BadSignalToKillThreadCheck.h"
13 #include "../bugprone/ReservedIdentifierCheck.h"
14 #include "../bugprone/SignedCharMisuseCheck.h"
15 #include "../bugprone/SpuriouslyWakeUpFunctionsCheck.h"
16 #include "../bugprone/UnhandledSelfAssignmentCheck.h"
17 #include "../google/UnnamedNamespaceInHeaderCheck.h"
18 #include "../misc/NewDeleteOverloadsCheck.h"
19 #include "../misc/NonCopyableObjects.h"
20 #include "../misc/StaticAssertCheck.h"
21 #include "../misc/ThrowByValueCatchByReferenceCheck.h"
22 #include "../performance/MoveConstructorInitCheck.h"
23 #include "../readability/UppercaseLiteralSuffixCheck.h"
120 Opts[
"cert-dcl16-c.NewSuffixes"] =
"L;LL;LU;LLU";
121 Opts[
"cert-oop54-cpp.WarnOnlyIfThisHasSuspiciousField"] =
"0";
122 Opts[
"cert-str34-c.DiagnoseSignedUnsignedCharComparisons"] =
"0";
130 static ClangTidyModuleRegistry::Add<cert::CERTModule>
132 "Adds lint checks corresponding to CERT secure coding guidelines.");
The check flags dereferences and non-pointer declarations of objects that are not meant to be passed ...
Checks if an object of type with extended alignment is allocated by using the default operator new.
Execution of a command processor can lead to security vulnerabilities, and is generally not required.
Pseudorandom number generators are not genuinely random.
Checks if the overloaded postfix ++ and – operator return a constant object.
Guards against any C-style variadic function definitions (not declarations).
Finds pthread_kill function calls when thread is terminated by SIGTERM signal.
OptionMap CheckOptions
Key-value mapping used to store check-specific options.
Modification of the std or posix namespace can result in undefined behavior.
Finds those signed char -> integer conversions which might indicate a programming error.
Contains options for clang-tidy.
Finds user-defined copy assignment operators which do not protect the code against self-assignment ei...
A collection of ClangTidyCheckFactory instances.
Detects when the integral literal or floating point literal has non-uppercase suffix,...
Finds cnd_wait, cnd_timedwait, wait, wait_for, or wait_until function calls when the function is not ...
Checks whether the constructor for a static or thread_local object will throw.
Checks whether a thrown object is nothrow copy constructible.
This check diagnoses when the loop induction expression of a for loop has floating-point type.
Random number generator must be seeded properly.
Finds assignments to the copied object and its direct or indirect members in copy constructors and co...
Replaces assert() with static_assert() if the condition is evaluatable at compile time.
Guards against use of string conversion functions that do not have reasonable error handling for conv...
static ClangTidyModuleRegistry::Add< bugprone::BugproneModule > X("bugprone-module", "Adds checks for bugprone code constructs.")
Checks for usages of identifiers reserved for use by the implementation.
Flags use of the C standard library functions 'memset', 'memcpy' and 'memcmp' and similar derivatives...
ClangTidyOptions getModuleOptions() override
Gets default options for checks defined in this module.
volatile int CERTModuleAnchorSource
Guards against use of setjmp/longjmp in C++ code.
===– Representation.cpp - ClangDoc Representation --------—*- C++ -*-===//
void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override
Implement this function in order to register all CheckFactories belonging to this module.
checks for locations that do not throw by value
A clang-tidy module groups a number of ClangTidyChecks and gives them a prefixed name.
std::map< std::string, ClangTidyValue > OptionMap
void registerCheck(llvm::StringRef CheckName)
Registers the CheckType with the name Name.