aboutsummaryrefslogtreecommitdiffstats
path: root/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h
diff options
context:
space:
mode:
authorYabin Cui <yabinc@google.com>2020-04-29 10:54:45 -0700
committerYabin Cui <yabinc@google.com>2020-04-29 10:54:45 -0700
commitf71cc7fa68ac644595257d6fdebc2e543cb7041c (patch)
tree81eef62411c6d9a4c89870cc811173f0c7bed2c3 /clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h
parent27fa4eeb5967e0bae5aef6de643739bef2a58726 (diff)
downloadprebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.tar.gz
prebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.tar.bz2
prebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.zip
Update prebuilt Clang to r383902.
clang 11.0.1 (based on r383902) from build 6443078. Bug: http://b/149839606 Test: N/A Change-Id: Id966d7b2cbaf3d2711a1e528c41a173ae28f6c11
Diffstat (limited to 'clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h')
-rw-r--r--clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h39
1 files changed, 39 insertions, 0 deletions
diff --git a/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h b/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h
new file mode 100644
index 00000000..eb3319c7
--- /dev/null
+++ b/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h
@@ -0,0 +1,39 @@
+//===--- CloexecOpenCheck.h - clang-tidy-----------------------------------===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+//
+//===----------------------------------------------------------------------===//
+
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H
+
+#include "CloexecCheck.h"
+
+namespace clang {
+namespace tidy {
+namespace android {
+
+/// Finds code that opens file without using the O_CLOEXEC flag.
+///
+/// open(), openat(), and open64() had better to include O_CLOEXEC in their
+/// flags argument. Only consider simple cases that the corresponding argument
+/// is constant or binary operation OR among constants like 'O_CLOEXEC' or
+/// 'O_CLOEXEC | O_RDONLY'. No constant propagation is performed.
+///
+/// Only the symbolic 'O_CLOEXEC' macro definition is checked, not the concrete
+/// value.
+class CloexecOpenCheck : public CloexecCheck {
+public:
+ CloexecOpenCheck(StringRef Name, ClangTidyContext *Context)
+ : CloexecCheck(Name, Context) {}
+ void registerMatchers(ast_matchers::MatchFinder *Finder) override;
+ void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
+};
+
+} // namespace android
+} // namespace tidy
+} // namespace clang
+
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H