diff options
author | Yabin Cui <yabinc@google.com> | 2020-04-29 10:54:45 -0700 |
---|---|---|
committer | Yabin Cui <yabinc@google.com> | 2020-04-29 10:54:45 -0700 |
commit | f71cc7fa68ac644595257d6fdebc2e543cb7041c (patch) | |
tree | 81eef62411c6d9a4c89870cc811173f0c7bed2c3 /clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h | |
parent | 27fa4eeb5967e0bae5aef6de643739bef2a58726 (diff) | |
download | prebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.tar.gz prebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.tar.bz2 prebuilts_clang_host_linux-x86-f71cc7fa68ac644595257d6fdebc2e543cb7041c.zip |
Update prebuilt Clang to r383902.
clang 11.0.1 (based on r383902) from build 6443078.
Bug: http://b/149839606
Test: N/A
Change-Id: Id966d7b2cbaf3d2711a1e528c41a173ae28f6c11
Diffstat (limited to 'clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h')
-rw-r--r-- | clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h b/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h new file mode 100644 index 00000000..eb3319c7 --- /dev/null +++ b/clang-r383902/include/clang-tidy/android/CloexecOpenCheck.h @@ -0,0 +1,39 @@ +//===--- CloexecOpenCheck.h - clang-tidy-----------------------------------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H + +#include "CloexecCheck.h" + +namespace clang { +namespace tidy { +namespace android { + +/// Finds code that opens file without using the O_CLOEXEC flag. +/// +/// open(), openat(), and open64() had better to include O_CLOEXEC in their +/// flags argument. Only consider simple cases that the corresponding argument +/// is constant or binary operation OR among constants like 'O_CLOEXEC' or +/// 'O_CLOEXEC | O_RDONLY'. No constant propagation is performed. +/// +/// Only the symbolic 'O_CLOEXEC' macro definition is checked, not the concrete +/// value. +class CloexecOpenCheck : public CloexecCheck { +public: + CloexecOpenCheck(StringRef Name, ClangTidyContext *Context) + : CloexecCheck(Name, Context) {} + void registerMatchers(ast_matchers::MatchFinder *Finder) override; + void check(const ast_matchers::MatchFinder::MatchResult &Result) override; +}; + +} // namespace android +} // namespace tidy +} // namespace clang + +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_OPEN_H |