forked from OSchip/llvm-project
368 lines
13 KiB
C++
368 lines
13 KiB
C++
//===--- tools/extra/clang-tidy/ClangTidy.cpp - Clang tidy tool -----------===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
///
|
|
/// \file This file implements a clang-tidy tool.
|
|
///
|
|
/// This tool uses the Clang Tooling infrastructure, see
|
|
/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
|
|
/// for details on setting it up with LLVM source tree.
|
|
///
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "ClangTidy.h"
|
|
#include "ClangTidyDiagnosticConsumer.h"
|
|
#include "ClangTidyModuleRegistry.h"
|
|
#include "clang/AST/ASTConsumer.h"
|
|
#include "clang/AST/ASTContext.h"
|
|
#include "clang/AST/Decl.h"
|
|
#include "clang/ASTMatchers/ASTMatchFinder.h"
|
|
#include "clang/Frontend/ASTConsumers.h"
|
|
#include "clang/Frontend/CompilerInstance.h"
|
|
#include "clang/Frontend/FrontendActions.h"
|
|
#include "clang/Frontend/FrontendDiagnostic.h"
|
|
#include "clang/Frontend/MultiplexConsumer.h"
|
|
#include "clang/Frontend/TextDiagnosticPrinter.h"
|
|
#include "clang/Lex/PPCallbacks.h"
|
|
#include "clang/Lex/Preprocessor.h"
|
|
#include "clang/Rewrite/Frontend/FixItRewriter.h"
|
|
#include "clang/Rewrite/Frontend/FrontendActions.h"
|
|
#include "clang/StaticAnalyzer/Frontend/AnalysisConsumer.h"
|
|
#include "clang/Tooling/Refactoring.h"
|
|
#include "clang/Tooling/Tooling.h"
|
|
#include "llvm/Support/Path.h"
|
|
#include "llvm/Support/Process.h"
|
|
#include "llvm/Support/Signals.h"
|
|
#include <algorithm>
|
|
#include <utility>
|
|
|
|
using namespace clang::ast_matchers;
|
|
using namespace clang::driver;
|
|
using namespace clang::tooling;
|
|
using namespace llvm;
|
|
|
|
template class llvm::Registry<clang::tidy::ClangTidyModule>;
|
|
|
|
namespace clang {
|
|
namespace tidy {
|
|
|
|
namespace {
|
|
static const char *AnalyzerCheckNamePrefix = "clang-analyzer-";
|
|
|
|
static StringRef StaticAnalyzerChecks[] = {
|
|
#define GET_CHECKERS
|
|
#define CHECKER(FULLNAME, CLASS, DESCFILE, HELPTEXT, GROUPINDEX, HIDDEN) \
|
|
FULLNAME,
|
|
#include "../../../lib/StaticAnalyzer/Checkers/Checkers.inc"
|
|
#undef CHECKER
|
|
#undef GET_CHECKERS
|
|
};
|
|
|
|
class AnalyzerDiagnosticConsumer : public ento::PathDiagnosticConsumer {
|
|
public:
|
|
AnalyzerDiagnosticConsumer(ClangTidyContext &Context) : Context(Context) {}
|
|
|
|
void FlushDiagnosticsImpl(std::vector<const ento::PathDiagnostic *> &Diags,
|
|
FilesMade *filesMade) override {
|
|
for (const ento::PathDiagnostic *PD : Diags) {
|
|
SmallString<64> CheckName(AnalyzerCheckNamePrefix);
|
|
CheckName += PD->getCheckName();
|
|
Context.diag(CheckName, PD->getLocation().asLocation(),
|
|
PD->getShortDescription())
|
|
<< PD->path.back()->getRanges();
|
|
|
|
for (const auto &DiagPiece :
|
|
PD->path.flatten(/*ShouldFlattenMacros=*/true)) {
|
|
Context.diag(CheckName, DiagPiece->getLocation().asLocation(),
|
|
DiagPiece->getString(), DiagnosticIDs::Note)
|
|
<< DiagPiece->getRanges();
|
|
}
|
|
}
|
|
}
|
|
|
|
StringRef getName() const override { return "ClangTidyDiags"; }
|
|
bool supportsLogicalOpControlFlow() const override { return true; }
|
|
bool supportsCrossFileDiagnostics() const override { return true; }
|
|
|
|
private:
|
|
ClangTidyContext &Context;
|
|
};
|
|
|
|
class ErrorReporter {
|
|
public:
|
|
ErrorReporter(bool ApplyFixes)
|
|
: Files(FileSystemOptions()), DiagOpts(new DiagnosticOptions()),
|
|
DiagPrinter(new TextDiagnosticPrinter(llvm::outs(), &*DiagOpts)),
|
|
Diags(IntrusiveRefCntPtr<DiagnosticIDs>(new DiagnosticIDs), &*DiagOpts,
|
|
DiagPrinter),
|
|
SourceMgr(Diags, Files), Rewrite(SourceMgr, LangOpts),
|
|
ApplyFixes(ApplyFixes), TotalFixes(0), AppliedFixes(0) {
|
|
DiagOpts->ShowColors = llvm::sys::Process::StandardOutHasColors();
|
|
DiagPrinter->BeginSourceFile(LangOpts);
|
|
}
|
|
|
|
void reportDiagnostic(const ClangTidyError &Error) {
|
|
const ClangTidyMessage &Message = Error.Message;
|
|
SourceLocation Loc = getLocation(Message.FilePath, Message.FileOffset);
|
|
// Contains a pair for each attempted fix: location and whether the fix was
|
|
// applied successfully.
|
|
SmallVector<std::pair<SourceLocation, bool>, 4> FixLocations;
|
|
{
|
|
auto Level = static_cast<DiagnosticsEngine::Level>(Error.DiagLevel);
|
|
DiagnosticBuilder Diag =
|
|
Diags.Report(Loc, Diags.getCustomDiagID(Level, "%0 [%1]"))
|
|
<< Message.Message << Error.CheckName;
|
|
for (const tooling::Replacement &Fix : Error.Fix) {
|
|
SourceLocation FixLoc = getLocation(Fix.getFilePath(), Fix.getOffset());
|
|
SourceLocation FixEndLoc = FixLoc.getLocWithOffset(Fix.getLength());
|
|
Diag << FixItHint::CreateReplacement(SourceRange(FixLoc, FixEndLoc),
|
|
Fix.getReplacementText());
|
|
++TotalFixes;
|
|
if (ApplyFixes) {
|
|
bool Success = Fix.isApplicable() && Fix.apply(Rewrite);
|
|
if (Success)
|
|
++AppliedFixes;
|
|
FixLocations.push_back(std::make_pair(FixLoc, Success));
|
|
}
|
|
}
|
|
}
|
|
for (auto Fix : FixLocations) {
|
|
Diags.Report(Fix.first, Fix.second ? diag::note_fixit_applied
|
|
: diag::note_fixit_failed);
|
|
}
|
|
for (const ClangTidyMessage &Note : Error.Notes)
|
|
reportNote(Note);
|
|
}
|
|
|
|
void Finish() {
|
|
// FIXME: Run clang-format on changes.
|
|
if (ApplyFixes && TotalFixes > 0) {
|
|
llvm::errs() << "clang-tidy applied " << AppliedFixes << " of "
|
|
<< TotalFixes << " suggested fixes.\n";
|
|
Rewrite.overwriteChangedFiles();
|
|
}
|
|
}
|
|
|
|
private:
|
|
SourceLocation getLocation(StringRef FilePath, unsigned Offset) {
|
|
if (FilePath.empty())
|
|
return SourceLocation();
|
|
|
|
const FileEntry *File = SourceMgr.getFileManager().getFile(FilePath);
|
|
FileID ID = SourceMgr.createFileID(File, SourceLocation(), SrcMgr::C_User);
|
|
return SourceMgr.getLocForStartOfFile(ID).getLocWithOffset(Offset);
|
|
}
|
|
|
|
void reportNote(const ClangTidyMessage &Message) {
|
|
SourceLocation Loc = getLocation(Message.FilePath, Message.FileOffset);
|
|
DiagnosticBuilder Diag =
|
|
Diags.Report(Loc, Diags.getCustomDiagID(DiagnosticsEngine::Note, "%0"))
|
|
<< Message.Message;
|
|
}
|
|
|
|
FileManager Files;
|
|
LangOptions LangOpts; // FIXME: use langopts from each original file
|
|
IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts;
|
|
DiagnosticConsumer *DiagPrinter;
|
|
DiagnosticsEngine Diags;
|
|
SourceManager SourceMgr;
|
|
Rewriter Rewrite;
|
|
bool ApplyFixes;
|
|
unsigned TotalFixes;
|
|
unsigned AppliedFixes;
|
|
};
|
|
|
|
class ClangTidyASTConsumer : public MultiplexConsumer {
|
|
public:
|
|
ClangTidyASTConsumer(const SmallVectorImpl<ASTConsumer *> &Consumers,
|
|
std::unique_ptr<ast_matchers::MatchFinder> Finder,
|
|
std::vector<std::unique_ptr<ClangTidyCheck>> Checks)
|
|
: MultiplexConsumer(Consumers), Finder(std::move(Finder)),
|
|
Checks(std::move(Checks)) {}
|
|
|
|
private:
|
|
std::unique_ptr<ast_matchers::MatchFinder> Finder;
|
|
std::vector<std::unique_ptr<ClangTidyCheck>> Checks;
|
|
};
|
|
|
|
} // namespace
|
|
|
|
ClangTidyASTConsumerFactory::ClangTidyASTConsumerFactory(
|
|
ClangTidyContext &Context)
|
|
: Context(Context), CheckFactories(new ClangTidyCheckFactories) {
|
|
for (ClangTidyModuleRegistry::iterator I = ClangTidyModuleRegistry::begin(),
|
|
E = ClangTidyModuleRegistry::end();
|
|
I != E; ++I) {
|
|
std::unique_ptr<ClangTidyModule> Module(I->instantiate());
|
|
Module->addCheckFactories(*CheckFactories);
|
|
}
|
|
}
|
|
|
|
|
|
clang::ASTConsumer *ClangTidyASTConsumerFactory::CreateASTConsumer(
|
|
clang::CompilerInstance &Compiler, StringRef File) {
|
|
// FIXME: Move this to a separate method, so that CreateASTConsumer doesn't
|
|
// modify Compiler.
|
|
Context.setSourceManager(&Compiler.getSourceManager());
|
|
Context.setCurrentFile(File);
|
|
Context.setASTContext(&Compiler.getASTContext());
|
|
|
|
std::vector<std::unique_ptr<ClangTidyCheck>> Checks;
|
|
ChecksFilter &Filter = Context.getChecksFilter();
|
|
CheckFactories->createChecks(Filter, Checks);
|
|
|
|
std::unique_ptr<ast_matchers::MatchFinder> Finder(
|
|
new ast_matchers::MatchFinder);
|
|
for (auto &Check : Checks) {
|
|
Check->setContext(&Context);
|
|
Check->registerMatchers(&*Finder);
|
|
Check->registerPPCallbacks(Compiler);
|
|
}
|
|
|
|
SmallVector<ASTConsumer *, 2> Consumers;
|
|
if (!Checks.empty())
|
|
Consumers.push_back(Finder->newASTConsumer());
|
|
|
|
AnalyzerOptionsRef AnalyzerOptions = Compiler.getAnalyzerOpts();
|
|
// FIXME: Remove this option once clang's cfg-temporary-dtors option defaults
|
|
// to true.
|
|
AnalyzerOptions->Config["cfg-temporary-dtors"] =
|
|
Context.getOptions().AnalyzeTemporaryDtors ? "true" : "false";
|
|
|
|
AnalyzerOptions->CheckersControlList = getCheckersControlList(Filter);
|
|
if (!AnalyzerOptions->CheckersControlList.empty()) {
|
|
AnalyzerOptions->AnalysisStoreOpt = RegionStoreModel;
|
|
AnalyzerOptions->AnalysisDiagOpt = PD_NONE;
|
|
AnalyzerOptions->AnalyzeNestedBlocks = true;
|
|
AnalyzerOptions->eagerlyAssumeBinOpBifurcation = true;
|
|
ento::AnalysisASTConsumer *AnalysisConsumer = ento::CreateAnalysisConsumer(
|
|
Compiler.getPreprocessor(), Compiler.getFrontendOpts().OutputFile,
|
|
AnalyzerOptions, Compiler.getFrontendOpts().Plugins);
|
|
AnalysisConsumer->AddDiagnosticConsumer(
|
|
new AnalyzerDiagnosticConsumer(Context));
|
|
Consumers.push_back(AnalysisConsumer);
|
|
}
|
|
return new ClangTidyASTConsumer(Consumers, std::move(Finder),
|
|
std::move(Checks));
|
|
}
|
|
|
|
std::vector<std::string>
|
|
ClangTidyASTConsumerFactory::getCheckNames(ChecksFilter &Filter) {
|
|
std::vector<std::string> CheckNames;
|
|
for (const auto &CheckFactory : *CheckFactories) {
|
|
if (Filter.isCheckEnabled(CheckFactory.first))
|
|
CheckNames.push_back(CheckFactory.first);
|
|
}
|
|
|
|
for (const auto &AnalyzerCheck : getCheckersControlList(Filter))
|
|
CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first);
|
|
|
|
std::sort(CheckNames.begin(), CheckNames.end());
|
|
return CheckNames;
|
|
}
|
|
|
|
ClangTidyASTConsumerFactory::CheckersList
|
|
ClangTidyASTConsumerFactory::getCheckersControlList(ChecksFilter &Filter) {
|
|
CheckersList List;
|
|
|
|
bool AnalyzerChecksEnabled = false;
|
|
for (StringRef CheckName : StaticAnalyzerChecks) {
|
|
std::string Checker((AnalyzerCheckNamePrefix + CheckName).str());
|
|
AnalyzerChecksEnabled =
|
|
AnalyzerChecksEnabled ||
|
|
(!CheckName.startswith("debug") && Filter.isCheckEnabled(Checker));
|
|
}
|
|
|
|
if (AnalyzerChecksEnabled) {
|
|
// Run our regex against all possible static analyzer checkers. Note that
|
|
// debug checkers print values / run programs to visualize the CFG and are
|
|
// thus not applicable to clang-tidy in general.
|
|
//
|
|
// Always add all core checkers if any other static analyzer checks are
|
|
// enabled. This is currently necessary, as other path sensitive checks
|
|
// rely on the core checkers.
|
|
for (StringRef CheckName : StaticAnalyzerChecks) {
|
|
std::string Checker((AnalyzerCheckNamePrefix + CheckName).str());
|
|
|
|
if (CheckName.startswith("core") ||
|
|
(!CheckName.startswith("debug") && Filter.isCheckEnabled(Checker)))
|
|
List.push_back(std::make_pair(CheckName, true));
|
|
}
|
|
}
|
|
return List;
|
|
}
|
|
|
|
DiagnosticBuilder ClangTidyCheck::diag(SourceLocation Loc, StringRef Message,
|
|
DiagnosticIDs::Level Level) {
|
|
return Context->diag(CheckName, Loc, Message, Level);
|
|
}
|
|
|
|
void ClangTidyCheck::run(const ast_matchers::MatchFinder::MatchResult &Result) {
|
|
Context->setSourceManager(Result.SourceManager);
|
|
check(Result);
|
|
}
|
|
|
|
void ClangTidyCheck::setName(StringRef Name) {
|
|
assert(CheckName.empty());
|
|
CheckName = Name.str();
|
|
}
|
|
|
|
std::vector<std::string> getCheckNames(const ClangTidyOptions &Options) {
|
|
clang::tidy::ClangTidyContext Context(
|
|
new DefaultOptionsProvider(ClangTidyGlobalOptions(), Options));
|
|
ClangTidyASTConsumerFactory Factory(Context);
|
|
return Factory.getCheckNames(Context.getChecksFilter());
|
|
}
|
|
|
|
ClangTidyStats runClangTidy(ClangTidyOptionsProvider *OptionsProvider,
|
|
const tooling::CompilationDatabase &Compilations,
|
|
ArrayRef<std::string> InputFiles,
|
|
std::vector<ClangTidyError> *Errors) {
|
|
ClangTool Tool(Compilations, InputFiles);
|
|
clang::tidy::ClangTidyContext Context(OptionsProvider);
|
|
ClangTidyDiagnosticConsumer DiagConsumer(Context);
|
|
|
|
Tool.setDiagnosticConsumer(&DiagConsumer);
|
|
|
|
class ActionFactory : public FrontendActionFactory {
|
|
public:
|
|
ActionFactory(ClangTidyContext &Context) : ConsumerFactory(Context) {}
|
|
FrontendAction *create() override { return new Action(&ConsumerFactory); }
|
|
|
|
private:
|
|
class Action : public ASTFrontendAction {
|
|
public:
|
|
Action(ClangTidyASTConsumerFactory *Factory) : Factory(Factory) {}
|
|
ASTConsumer *CreateASTConsumer(CompilerInstance &Compiler,
|
|
StringRef File) override {
|
|
return Factory->CreateASTConsumer(Compiler, File);
|
|
}
|
|
|
|
private:
|
|
ClangTidyASTConsumerFactory *Factory;
|
|
};
|
|
|
|
ClangTidyASTConsumerFactory ConsumerFactory;
|
|
};
|
|
|
|
ActionFactory Factory(Context);
|
|
Tool.run(&Factory);
|
|
*Errors = Context.getErrors();
|
|
return Context.getStats();
|
|
}
|
|
|
|
void handleErrors(const std::vector<ClangTidyError> &Errors, bool Fix) {
|
|
ErrorReporter Reporter(Fix);
|
|
for (const ClangTidyError &Error : Errors)
|
|
Reporter.reportDiagnostic(Error);
|
|
Reporter.Finish();
|
|
}
|
|
|
|
} // namespace tidy
|
|
} // namespace clang
|