blob: 73d66b980a5e187e5d51429d3993901f53fb1dea [file] [log] [blame]
Daniel Jasperd07c8402013-07-29 08:19:241//===--- tools/extra/clang-tidy/ClangTidy.cpp - Clang tidy tool -----------===//
2//
Chandler Carruth2946cd72019-01-19 08:50:563// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
Daniel Jasperd07c8402013-07-29 08:19:246//
7//===----------------------------------------------------------------------===//
8///
9/// \file This file implements a clang-tidy tool.
10///
11/// This tool uses the Clang Tooling infrastructure, see
12/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
13/// for details on setting it up with LLVM source tree.
14///
15//===----------------------------------------------------------------------===//
16
17#include "ClangTidy.h"
Nathan James860aefd2020-06-29 15:05:5118#include "ClangTidyCheck.h"
Daniel Jasperd07c8402013-07-29 08:19:2419#include "ClangTidyDiagnosticConsumer.h"
20#include "ClangTidyModuleRegistry.h"
Roman Lebedev12152512018-05-08 13:14:2121#include "ClangTidyProfiling.h"
Alexander Kornienkobbc89dc2019-03-22 13:42:4822#include "ExpandModularHeadersPPCallbacks.h"
Nico Weber33c9dbb2020-09-03 23:37:2923#include "clang-tidy-config.h"
Daniel Jasperd07c8402013-07-29 08:19:2424#include "clang/AST/ASTConsumer.h"
Daniel Jasperd07c8402013-07-29 08:19:2425#include "clang/ASTMatchers/ASTMatchFinder.h"
Alexander Kornienko98d33912016-10-17 17:25:0226#include "clang/Format/Format.h"
Daniel Jasperd07c8402013-07-29 08:19:2427#include "clang/Frontend/ASTConsumers.h"
28#include "clang/Frontend/CompilerInstance.h"
Alexander Kornienko38d81b42014-03-27 10:24:1129#include "clang/Frontend/FrontendDiagnostic.h"
Alexander Kornienko175fefb2014-01-03 09:31:5730#include "clang/Frontend/MultiplexConsumer.h"
Daniel Jasperd07c8402013-07-29 08:19:2431#include "clang/Frontend/TextDiagnosticPrinter.h"
Chandler Carruth85e6e872014-01-07 20:05:0132#include "clang/Lex/PPCallbacks.h"
33#include "clang/Lex/Preprocessor.h"
Jan Korousc5d14b52019-10-14 20:15:0134#include "clang/Lex/PreprocessorOptions.h"
Daniel Jasperd07c8402013-07-29 08:19:2435#include "clang/Rewrite/Frontend/FixItRewriter.h"
36#include "clang/Rewrite/Frontend/FrontendActions.h"
Haojian Wuf2879d82019-04-17 12:53:5937#include "clang/Tooling/Core/Diagnostic.h"
Alexander Kornienko563de792017-01-03 14:36:1338#include "clang/Tooling/DiagnosticsYaml.h"
Daniel Jasperd07c8402013-07-29 08:19:2439#include "clang/Tooling/Refactoring.h"
Benjamin Kramerfb98b742014-09-04 10:31:2340#include "clang/Tooling/ReplacementsYaml.h"
Chandler Carruth85e6e872014-01-07 20:05:0141#include "clang/Tooling/Tooling.h"
Alexander Kornienko54461eb2014-02-06 14:50:1042#include "llvm/Support/Process.h"
Alexander Kornienkofb9e92b2013-12-19 19:57:0543#include <algorithm>
Alexander Kornienko38d81b42014-03-27 10:24:1144#include <utility>
Daniel Jasperd07c8402013-07-29 08:19:2445
Nico Weber33c9dbb2020-09-03 23:37:2946#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
Artem Dergachevf0bb45f2019-09-11 20:54:2747#include "clang/Analysis/PathDiagnostic.h"
48#include "clang/StaticAnalyzer/Frontend/AnalysisConsumer.h"
Nico Weber33c9dbb2020-09-03 23:37:2949#endif // CLANG_TIDY_ENABLE_STATIC_ANALYZER
Artem Dergachevf0bb45f2019-09-11 20:54:2750
Daniel Jasperd07c8402013-07-29 08:19:2451using namespace clang::ast_matchers;
52using namespace clang::driver;
53using namespace clang::tooling;
54using namespace llvm;
55
John Brawn4d79ec72016-08-05 11:01:0856LLVM_INSTANTIATE_REGISTRY(clang::tidy::ClangTidyModuleRegistry)
NAKAMURA Takumi71b982b2014-07-03 14:12:4757
Daniel Jasperd07c8402013-07-29 08:19:2458namespace clang {
59namespace tidy {
Alexander Kornienko175fefb2014-01-03 09:31:5760
Daniel Jasperd07c8402013-07-29 08:19:2461namespace {
Nico Weber33c9dbb2020-09-03 23:37:2962#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
Alexander Kornienko54461eb2014-02-06 14:50:1063static const char *AnalyzerCheckNamePrefix = "clang-analyzer-";
Manuel Klimek814f9bd2013-11-14 15:49:4464
Alexander Kornienko54461eb2014-02-06 14:50:1065class AnalyzerDiagnosticConsumer : public ento::PathDiagnosticConsumer {
66public:
67 AnalyzerDiagnosticConsumer(ClangTidyContext &Context) : Context(Context) {}
68
Alexander Kornienkocb9272f2014-02-27 13:14:5169 void FlushDiagnosticsImpl(std::vector<const ento::PathDiagnostic *> &Diags,
Alexander Kornienkoab2d3ce2021-01-28 23:49:5370 FilesMade *FilesMade) override {
Alexander Kornienkodf1e3cb2014-03-06 10:17:4671 for (const ento::PathDiagnostic *PD : Diags) {
Alexander Kornienkod1afc702014-02-12 09:52:0772 SmallString<64> CheckName(AnalyzerCheckNamePrefix);
Tim Shen75e963e2019-09-12 21:18:4473 CheckName += PD->getCheckerName();
Alexander Kornienko95cd50f2014-03-06 13:24:2874 Context.diag(CheckName, PD->getLocation().asLocation(),
75 PD->getShortDescription())
76 << PD->path.back()->getRanges();
Alexander Kornienko54461eb2014-02-06 14:50:1077
Alexander Kornienkodf1e3cb2014-03-06 10:17:4678 for (const auto &DiagPiece :
79 PD->path.flatten(/*ShouldFlattenMacros=*/true)) {
Alexander Kornienko95cd50f2014-03-06 13:24:2880 Context.diag(CheckName, DiagPiece->getLocation().asLocation(),
81 DiagPiece->getString(), DiagnosticIDs::Note)
82 << DiagPiece->getRanges();
Alexander Kornienko54461eb2014-02-06 14:50:1083 }
84 }
85 }
86
Craig Toppera3dbe842014-03-02 10:20:1187 StringRef getName() const override { return "ClangTidyDiags"; }
88 bool supportsLogicalOpControlFlow() const override { return true; }
89 bool supportsCrossFileDiagnostics() const override { return true; }
Alexander Kornienko54461eb2014-02-06 14:50:1090
91private:
92 ClangTidyContext &Context;
Alexander Kornienko54461eb2014-02-06 14:50:1093};
Nico Weber33c9dbb2020-09-03 23:37:2994#endif // CLANG_TIDY_ENABLE_STATIC_ANALYZER
Alexander Kornienko54461eb2014-02-06 14:50:1095
Alexander Kornienko38d81b42014-03-27 10:24:1196class ErrorReporter {
97public:
Nathan Jamesabbe9e22021-03-01 22:07:0998 ErrorReporter(ClangTidyContext &Context, FixBehaviour ApplyFixes,
Jonas Devliegherefc514902018-10-10 13:27:2599 llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem> BaseFS)
Nathan James64badec2020-12-17 14:09:08100 : Files(FileSystemOptions(), std::move(BaseFS)),
101 DiagOpts(new DiagnosticOptions()),
Alexander Kornienko38d81b42014-03-27 10:24:11102 DiagPrinter(new TextDiagnosticPrinter(llvm::outs(), &*DiagOpts)),
103 Diags(IntrusiveRefCntPtr<DiagnosticIDs>(new DiagnosticIDs), &*DiagOpts,
104 DiagPrinter),
Alexander Kornienko25613202017-04-06 13:41:29105 SourceMgr(Diags, Files), Context(Context), ApplyFixes(ApplyFixes),
106 TotalFixes(0), AppliedFixes(0), WarningsAsErrors(0) {
hyd-devd9b8aad2020-06-18 15:12:36107 DiagOpts->ShowColors = Context.getOptions().UseColor.getValueOr(
108 llvm::sys::Process::StandardOutHasColors());
Alexander Kornienko38d81b42014-03-27 10:24:11109 DiagPrinter->BeginSourceFile(LangOpts);
David Sandersd915d402020-10-31 14:36:42110 if (DiagOpts->ShowColors && !llvm::sys::Process::StandardOutIsDisplayed()) {
111 llvm::sys::Process::UseANSIEscapeCodes(true);
112 }
Alexander Kornienko38d81b42014-03-27 10:24:11113 }
114
Etienne Bergeron4eaeace2016-04-06 14:07:51115 SourceManager &getSourceManager() { return SourceMgr; }
Haojian Wuf7692a22016-02-26 09:19:33116
Alexander Kornienko742790c2014-07-02 15:05:04117 void reportDiagnostic(const ClangTidyError &Error) {
Alexander Kornienko563de792017-01-03 14:36:13118 const tooling::DiagnosticMessage &Message = Error.Message;
Alexander Kornienko38d81b42014-03-27 10:24:11119 SourceLocation Loc = getLocation(Message.FilePath, Message.FileOffset);
120 // Contains a pair for each attempted fix: location and whether the fix was
121 // applied successfully.
122 SmallVector<std::pair<SourceLocation, bool>, 4> FixLocations;
123 {
Alexander Kornienko742790c2014-07-02 15:05:04124 auto Level = static_cast<DiagnosticsEngine::Level>(Error.DiagLevel);
Alexander Kornienko563de792017-01-03 14:36:13125 std::string Name = Error.DiagnosticName;
Danielaf4f2eb2020-06-19 19:40:03126 if (!Error.EnabledDiagnosticAliases.empty())
127 Name += "," + llvm::join(Error.EnabledDiagnosticAliases, ",");
Jonathan Roelofsd60388a2016-01-13 17:36:41128 if (Error.IsWarningAsError) {
129 Name += ",-warnings-as-errors";
130 Level = DiagnosticsEngine::Error;
131 WarningsAsErrors++;
132 }
Alexander Kornienko58fe57a2015-11-16 13:06:15133 auto Diag = Diags.Report(Loc, Diags.getCustomDiagID(Level, "%0 [%1]"))
Jonathan Roelofsd60388a2016-01-13 17:36:41134 << Message.Message << Name;
Whisperity3b677b82021-03-15 16:06:03135 for (const FileByteRange &FBR : Error.Message.Ranges)
136 Diag << getRange(FBR);
Haojian Wuf2879d82019-04-17 12:53:59137 // FIXME: explore options to support interactive fix selection.
Nathan Jamesabbe9e22021-03-01 22:07:09138 const llvm::StringMap<Replacements> *ChosenFix;
139 if (ApplyFixes != FB_NoFix &&
140 (ChosenFix = getFixIt(Error, ApplyFixes == FB_FixNotes))) {
Haojian Wuf2879d82019-04-17 12:53:59141 for (const auto &FileAndReplacements : *ChosenFix) {
142 for (const auto &Repl : FileAndReplacements.second) {
143 ++TotalFixes;
144 bool CanBeApplied = false;
Haojian Wu8bbbd312019-04-18 14:18:14145 if (!Repl.isApplicable())
146 continue;
147 SourceLocation FixLoc;
148 SmallString<128> FixAbsoluteFilePath = Repl.getFilePath();
149 Files.makeAbsolutePath(FixAbsoluteFilePath);
150 tooling::Replacement R(FixAbsoluteFilePath, Repl.getOffset(),
151 Repl.getLength(), Repl.getReplacementText());
152 Replacements &Replacements = FileReplacements[R.getFilePath()];
153 llvm::Error Err = Replacements.add(R);
154 if (Err) {
155 // FIXME: Implement better conflict handling.
156 llvm::errs() << "Trying to resolve conflict: "
157 << llvm::toString(std::move(Err)) << "\n";
158 unsigned NewOffset =
159 Replacements.getShiftedCodePosition(R.getOffset());
160 unsigned NewLength = Replacements.getShiftedCodePosition(
161 R.getOffset() + R.getLength()) -
162 NewOffset;
163 if (NewLength == R.getLength()) {
164 R = Replacement(R.getFilePath(), NewOffset, NewLength,
165 R.getReplacementText());
166 Replacements = Replacements.merge(tooling::Replacements(R));
Alexander Kornienko98d33912016-10-17 17:25:02167 CanBeApplied = true;
168 ++AppliedFixes;
Haojian Wu8bbbd312019-04-18 14:18:14169 } else {
170 llvm::errs()
171 << "Can't resolve conflict, skipping the replacement.\n";
Alexander Kornienko98d33912016-10-17 17:25:02172 }
Haojian Wu8bbbd312019-04-18 14:18:14173 } else {
174 CanBeApplied = true;
175 ++AppliedFixes;
Alexander Kornienko98d33912016-10-17 17:25:02176 }
Haojian Wu8bbbd312019-04-18 14:18:14177 FixLoc = getLocation(FixAbsoluteFilePath, Repl.getOffset());
178 FixLocations.push_back(std::make_pair(FixLoc, CanBeApplied));
Eric Liu7e544522016-08-09 07:54:49179 }
Alexander Kornienko38d81b42014-03-27 10:24:11180 }
181 }
Haojian Wuf2879d82019-04-17 12:53:59182 reportFix(Diag, Error.Message.Fix);
Alexander Kornienko38d81b42014-03-27 10:24:11183 }
184 for (auto Fix : FixLocations) {
185 Diags.Report(Fix.first, Fix.second ? diag::note_fixit_applied
186 : diag::note_fixit_failed);
187 }
Alexander Kornienko563de792017-01-03 14:36:13188 for (const auto &Note : Error.Notes)
Alexander Kornienko742790c2014-07-02 15:05:04189 reportNote(Note);
Alexander Kornienko38d81b42014-03-27 10:24:11190 }
191
Alexander Kornienkoab2d3ce2021-01-28 23:49:53192 void finish() {
Nathan Jamesabbe9e22021-03-01 22:07:09193 if (TotalFixes > 0) {
Alexander Kornienko98d33912016-10-17 17:25:02194 Rewriter Rewrite(SourceMgr, LangOpts);
195 for (const auto &FileAndReplacements : FileReplacements) {
196 StringRef File = FileAndReplacements.first();
197 llvm::ErrorOr<std::unique_ptr<MemoryBuffer>> Buffer =
198 SourceMgr.getFileManager().getBufferForFile(File);
199 if (!Buffer) {
200 llvm::errs() << "Can't get buffer for file " << File << ": "
201 << Buffer.getError().message() << "\n";
202 // FIXME: Maybe don't apply fixes for other files as well.
203 continue;
204 }
205 StringRef Code = Buffer.get()->getBuffer();
Alexander Kornienko25613202017-04-06 13:41:29206 auto Style = format::getStyle(
207 *Context.getOptionsForFile(File).FormatStyle, File, "none");
Antonio Maiorano0d7d9c22017-01-17 00:13:32208 if (!Style) {
209 llvm::errs() << llvm::toString(Style.takeError()) << "\n";
210 continue;
211 }
Alexander Kornienko17a4b232017-03-03 11:16:34212 llvm::Expected<tooling::Replacements> Replacements =
Alexander Kornienko98d33912016-10-17 17:25:02213 format::cleanupAroundReplacements(Code, FileAndReplacements.second,
Antonio Maiorano0d7d9c22017-01-17 00:13:32214 *Style);
Alexander Kornienko17a4b232017-03-03 11:16:34215 if (!Replacements) {
216 llvm::errs() << llvm::toString(Replacements.takeError()) << "\n";
Alexander Kornienko98d33912016-10-17 17:25:02217 continue;
218 }
Alexander Kornienko17a4b232017-03-03 11:16:34219 if (llvm::Expected<tooling::Replacements> FormattedReplacements =
220 format::formatReplacements(Code, *Replacements, *Style)) {
221 Replacements = std::move(FormattedReplacements);
222 if (!Replacements)
223 llvm_unreachable("!Replacements");
224 } else {
225 llvm::errs() << llvm::toString(FormattedReplacements.takeError())
226 << ". Skipping formatting.\n";
227 }
228 if (!tooling::applyAllReplacements(Replacements.get(), Rewrite)) {
Alexander Kornienko98d33912016-10-17 17:25:02229 llvm::errs() << "Can't apply replacements for file " << File << "\n";
230 }
231 }
232 if (Rewrite.overwriteChangedFiles()) {
233 llvm::errs() << "clang-tidy failed to apply suggested fixes.\n";
234 } else {
235 llvm::errs() << "clang-tidy applied " << AppliedFixes << " of "
236 << TotalFixes << " suggested fixes.\n";
237 }
Alexander Kornienko38d81b42014-03-27 10:24:11238 }
239 }
240
Jonathan Roelofsd60388a2016-01-13 17:36:41241 unsigned getWarningsAsErrorsCount() const { return WarningsAsErrors; }
242
Alexander Kornienko38d81b42014-03-27 10:24:11243private:
244 SourceLocation getLocation(StringRef FilePath, unsigned Offset) {
245 if (FilePath.empty())
246 return SourceLocation();
247
Harlan Haskinsa02f8572019-08-01 21:32:01248 auto File = SourceMgr.getFileManager().getFile(FilePath);
249 if (!File)
250 return SourceLocation();
251
252 FileID ID = SourceMgr.getOrCreateFileID(*File, SrcMgr::C_User);
Alexander Kornienko38d81b42014-03-27 10:24:11253 return SourceMgr.getLocForStartOfFile(ID).getLocWithOffset(Offset);
254 }
255
Haojian Wuf2879d82019-04-17 12:53:59256 void reportFix(const DiagnosticBuilder &Diag,
257 const llvm::StringMap<Replacements> &Fix) {
258 for (const auto &FileAndReplacements : Fix) {
259 for (const auto &Repl : FileAndReplacements.second) {
260 if (!Repl.isApplicable())
261 continue;
Whisperity3b677b82021-03-15 16:06:03262 FileByteRange FBR;
263 FBR.FilePath = Repl.getFilePath().str();
264 FBR.FileOffset = Repl.getOffset();
265 FBR.Length = Repl.getLength();
266
267 Diag << FixItHint::CreateReplacement(getRange(FBR),
268 Repl.getReplacementText());
Haojian Wuf2879d82019-04-17 12:53:59269 }
270 }
271 }
272
Alexander Kornienko563de792017-01-03 14:36:13273 void reportNote(const tooling::DiagnosticMessage &Message) {
Alexander Kornienko742790c2014-07-02 15:05:04274 SourceLocation Loc = getLocation(Message.FilePath, Message.FileOffset);
Haojian Wuf2879d82019-04-17 12:53:59275 auto Diag =
276 Diags.Report(Loc, Diags.getCustomDiagID(DiagnosticsEngine::Note, "%0"))
Alexander Kornienko742790c2014-07-02 15:05:04277 << Message.Message;
Whisperity3b677b82021-03-15 16:06:03278 for (const FileByteRange &FBR : Message.Ranges)
279 Diag << getRange(FBR);
Haojian Wuf2879d82019-04-17 12:53:59280 reportFix(Diag, Message.Fix);
Alexander Kornienko742790c2014-07-02 15:05:04281 }
282
Whisperity3b677b82021-03-15 16:06:03283 CharSourceRange getRange(const FileByteRange &Range) {
284 SmallString<128> AbsoluteFilePath{Range.FilePath};
285 Files.makeAbsolutePath(AbsoluteFilePath);
286 SourceLocation BeginLoc = getLocation(AbsoluteFilePath, Range.FileOffset);
287 SourceLocation EndLoc = BeginLoc.getLocWithOffset(Range.Length);
288 // Retrieve the source range for applicable highlights and fixes. Macro
289 // definition on the command line have locations in a virtual buffer and
290 // don't have valid file paths and are therefore not applicable.
291 return CharSourceRange::getCharRange(BeginLoc, EndLoc);
292 }
293
Alexander Kornienko38d81b42014-03-27 10:24:11294 FileManager Files;
295 LangOptions LangOpts; // FIXME: use langopts from each original file
296 IntrusiveRefCntPtr<DiagnosticOptions> DiagOpts;
297 DiagnosticConsumer *DiagPrinter;
298 DiagnosticsEngine Diags;
299 SourceManager SourceMgr;
Alexander Kornienko98d33912016-10-17 17:25:02300 llvm::StringMap<Replacements> FileReplacements;
Alexander Kornienko25613202017-04-06 13:41:29301 ClangTidyContext &Context;
Nathan Jamesabbe9e22021-03-01 22:07:09302 FixBehaviour ApplyFixes;
NAKAMURA Takumi4dd18132014-03-27 14:53:37303 unsigned TotalFixes;
304 unsigned AppliedFixes;
Jonathan Roelofsd60388a2016-01-13 17:36:41305 unsigned WarningsAsErrors;
Alexander Kornienko38d81b42014-03-27 10:24:11306};
307
Alexander Kornienkoa4695222014-06-05 13:31:45308class ClangTidyASTConsumer : public MultiplexConsumer {
309public:
David Blaikie680c4c82014-08-10 19:56:59310 ClangTidyASTConsumer(std::vector<std::unique_ptr<ASTConsumer>> Consumers,
Roman Lebedev12152512018-05-08 13:14:21311 std::unique_ptr<ClangTidyProfiling> Profiling,
Alexander Kornienkoa4695222014-06-05 13:31:45312 std::unique_ptr<ast_matchers::MatchFinder> Finder,
313 std::vector<std::unique_ptr<ClangTidyCheck>> Checks)
Roman Lebedev12152512018-05-08 13:14:21314 : MultiplexConsumer(std::move(Consumers)),
315 Profiling(std::move(Profiling)), Finder(std::move(Finder)),
Alexander Kornienkoa4695222014-06-05 13:31:45316 Checks(std::move(Checks)) {}
317
318private:
Roman Lebedev12152512018-05-08 13:14:21319 // Destructor order matters! Profiling must be destructed last.
320 // Or at least after Finder.
321 std::unique_ptr<ClangTidyProfiling> Profiling;
Alexander Kornienkoa4695222014-06-05 13:31:45322 std::unique_ptr<ast_matchers::MatchFinder> Finder;
323 std::vector<std::unique_ptr<ClangTidyCheck>> Checks;
324};
325
Alexander Kornienko175fefb2014-01-03 09:31:57326} // namespace
Alexander Kornienkofb9e92b2013-12-19 19:57:05327
Alexander Kornienko175fefb2014-01-03 09:31:57328ClangTidyASTConsumerFactory::ClangTidyASTConsumerFactory(
Alexander Kornienkobbc89dc2019-03-22 13:42:48329 ClangTidyContext &Context,
330 IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> OverlayFS)
Nathan James64badec2020-12-17 14:09:08331 : Context(Context), OverlayFS(std::move(OverlayFS)),
Alexander Kornienkobbc89dc2019-03-22 13:42:48332 CheckFactories(new ClangTidyCheckFactories) {
Alexander Kornienkoaa0e92e2019-11-22 11:22:40333 for (ClangTidyModuleRegistry::entry E : ClangTidyModuleRegistry::entries()) {
334 std::unique_ptr<ClangTidyModule> Module = E.instantiate();
Alexander Kornienko175fefb2014-01-03 09:31:57335 Module->addCheckFactories(*CheckFactories);
336 }
Alexander Kornienko175fefb2014-01-03 09:31:57337}
Alexander Kornienkofb9e92b2013-12-19 19:57:05338
Nico Weber33c9dbb2020-09-03 23:37:29339#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
Nathan James64badec2020-12-17 14:09:08340static void
341setStaticAnalyzerCheckerOpts(const ClangTidyOptions &Opts,
342 clang::AnalyzerOptions &AnalyzerOptions) {
Gabor Horvath34383212015-03-11 17:25:22343 StringRef AnalyzerPrefix(AnalyzerCheckNamePrefix);
344 for (const auto &Opt : Opts.CheckOptions) {
Nathan James45a720a2020-07-30 09:31:12345 StringRef OptName(Opt.getKey());
346 if (!OptName.consume_front(AnalyzerPrefix))
Gabor Horvath34383212015-03-11 17:25:22347 continue;
Dmitry Polukhincb1ee342020-04-01 09:08:53348 // Analyzer options are always local options so we can ignore priority.
Nathan James64badec2020-12-17 14:09:08349 AnalyzerOptions.Config[OptName] = Opt.getValue().Value;
Gabor Horvath34383212015-03-11 17:25:22350 }
351}
352
Alexander Kornienko179e89f2016-11-08 07:43:42353typedef std::vector<std::pair<std::string, bool>> CheckersList;
354
Csaba Dabisa079a422019-08-16 01:53:14355static CheckersList getAnalyzerCheckersAndPackages(ClangTidyContext &Context,
356 bool IncludeExperimental) {
Alexander Kornienko179e89f2016-11-08 07:43:42357 CheckersList List;
358
359 const auto &RegisteredCheckers =
Alexander Kornienko85a92c32018-05-17 14:04:27360 AnalyzerOptions::getRegisteredCheckers(IncludeExperimental);
Alexander Kornienko179e89f2016-11-08 07:43:42361 bool AnalyzerChecksEnabled = false;
362 for (StringRef CheckName : RegisteredCheckers) {
363 std::string ClangTidyCheckName((AnalyzerCheckNamePrefix + CheckName).str());
Alexander Kornienko21375182017-05-17 14:39:47364 AnalyzerChecksEnabled |= Context.isCheckEnabled(ClangTidyCheckName);
Alexander Kornienko179e89f2016-11-08 07:43:42365 }
366
367 if (!AnalyzerChecksEnabled)
368 return List;
369
370 // List all static analyzer checkers that our filter enables.
371 //
372 // Always add all core checkers if any other static analyzer check is enabled.
373 // This is currently necessary, as other path sensitive checks rely on the
374 // core checkers.
375 for (StringRef CheckName : RegisteredCheckers) {
376 std::string ClangTidyCheckName((AnalyzerCheckNamePrefix + CheckName).str());
377
Alexander Kornienko21375182017-05-17 14:39:47378 if (CheckName.startswith("core") ||
379 Context.isCheckEnabled(ClangTidyCheckName)) {
Mikael Holmén2103e082020-01-29 09:32:04380 List.emplace_back(std::string(CheckName), true);
Alexander Kornienko21375182017-05-17 14:39:47381 }
Alexander Kornienko179e89f2016-11-08 07:43:42382 }
383 return List;
384}
Nico Weber33c9dbb2020-09-03 23:37:29385#endif // CLANG_TIDY_ENABLE_STATIC_ANALYZER
Alexander Kornienko179e89f2016-11-08 07:43:42386
David Blaikie680c4c82014-08-10 19:56:59387std::unique_ptr<clang::ASTConsumer>
388ClangTidyASTConsumerFactory::CreateASTConsumer(
Alexander Kornienko175fefb2014-01-03 09:31:57389 clang::CompilerInstance &Compiler, StringRef File) {
390 // FIXME: Move this to a separate method, so that CreateASTConsumer doesn't
391 // modify Compiler.
Alexander Kornienkobbc89dc2019-03-22 13:42:48392 SourceManager *SM = &Compiler.getSourceManager();
393 Context.setSourceManager(SM);
Alexander Kornienkoa4695222014-06-05 13:31:45394 Context.setCurrentFile(File);
Alexander Kornienkoad216882014-07-14 14:10:03395 Context.setASTContext(&Compiler.getASTContext());
Alexander Kornienkoa4695222014-06-05 13:31:45396
Haojian Wuf7692a22016-02-26 09:19:33397 auto WorkingDir = Compiler.getSourceManager()
398 .getFileManager()
399 .getVirtualFileSystem()
Duncan P. N. Exon Smithdb8a7422019-03-26 22:32:06400 .getCurrentWorkingDirectory();
Haojian Wuf7692a22016-02-26 09:19:33401 if (WorkingDir)
402 Context.setCurrentBuildDirectory(WorkingDir.get());
403
Dmitri Gribenkobb7a9dc2019-09-26 13:55:01404 std::vector<std::unique_ptr<ClangTidyCheck>> Checks =
405 CheckFactories->createChecks(&Context);
Alexander Kornienkoa4695222014-06-05 13:31:45406
Nathan James3bca8612021-03-05 15:35:24407 llvm::erase_if(Checks, [&](std::unique_ptr<ClangTidyCheck> &Check) {
408 return !Check->isLanguageVersionSupported(Context.getLangOpts());
409 });
410
Samuel Benzaquenaedd9942014-10-23 17:23:20411 ast_matchers::MatchFinder::MatchFinderOptions FinderOptions;
Roman Lebedev12152512018-05-08 13:14:21412
413 std::unique_ptr<ClangTidyProfiling> Profiling;
414 if (Context.getEnableProfiling()) {
Jonas Devlieghere1c705d92019-08-14 23:52:23415 Profiling = std::make_unique<ClangTidyProfiling>(
Roman Lebedeva87f1d02018-06-06 15:07:51416 Context.getProfileStorageParams());
Roman Lebedev12152512018-05-08 13:14:21417 FinderOptions.CheckProfiling.emplace(Profiling->Records);
418 }
Samuel Benzaquenaedd9942014-10-23 17:23:20419
Alexander Kornienkoa4695222014-06-05 13:31:45420 std::unique_ptr<ast_matchers::MatchFinder> Finder(
Samuel Benzaquenaedd9942014-10-23 17:23:20421 new ast_matchers::MatchFinder(std::move(FinderOptions)));
422
Alexander Kornienkobbc89dc2019-03-22 13:42:48423 Preprocessor *PP = &Compiler.getPreprocessor();
424 Preprocessor *ModuleExpanderPP = PP;
425
426 if (Context.getLangOpts().Modules && OverlayFS != nullptr) {
Jonas Devlieghere1c705d92019-08-14 23:52:23427 auto ModuleExpander = std::make_unique<ExpandModularHeadersPPCallbacks>(
Alexander Kornienkobbc89dc2019-03-22 13:42:48428 &Compiler, OverlayFS);
429 ModuleExpanderPP = ModuleExpander->getPreprocessor();
430 PP->addPPCallbacks(std::move(ModuleExpander));
431 }
432
Alexander Kornienkoa4695222014-06-05 13:31:45433 for (auto &Check : Checks) {
Alexander Kornienkoa4695222014-06-05 13:31:45434 Check->registerMatchers(&*Finder);
Alexander Kornienkobbc89dc2019-03-22 13:42:48435 Check->registerPPCallbacks(*SM, PP, ModuleExpanderPP);
Alexander Kornienkoa4695222014-06-05 13:31:45436 }
Alexander Kornienko175fefb2014-01-03 09:31:57437
David Blaikie680c4c82014-08-10 19:56:59438 std::vector<std::unique_ptr<ASTConsumer>> Consumers;
Alexander Kornienkoa4695222014-06-05 13:31:45439 if (!Checks.empty())
440 Consumers.push_back(Finder->newASTConsumer());
Alexander Kornienko298b3822014-02-13 16:10:47441
Nico Weber33c9dbb2020-09-03 23:37:29442#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
Alex McCarthyfec08c72014-04-30 14:09:24443 AnalyzerOptionsRef AnalyzerOptions = Compiler.getAnalyzerOpts();
Csaba Dabisa079a422019-08-16 01:53:14444 AnalyzerOptions->CheckersAndPackages = getAnalyzerCheckersAndPackages(
445 Context, Context.canEnableAnalyzerAlphaCheckers());
446 if (!AnalyzerOptions->CheckersAndPackages.empty()) {
Nathan James64badec2020-12-17 14:09:08447 setStaticAnalyzerCheckerOpts(Context.getOptions(), *AnalyzerOptions);
Alex McCarthyfec08c72014-04-30 14:09:24448 AnalyzerOptions->AnalysisStoreOpt = RegionStoreModel;
449 AnalyzerOptions->AnalysisDiagOpt = PD_NONE;
450 AnalyzerOptions->AnalyzeNestedBlocks = true;
451 AnalyzerOptions->eagerlyAssumeBinOpBifurcation = true;
David Blaikie680c4c82014-08-10 19:56:59452 std::unique_ptr<ento::AnalysisASTConsumer> AnalysisConsumer =
Ted Kremenek4d1692f2014-08-27 15:14:47453 ento::CreateAnalysisConsumer(Compiler);
Alexander Kornienko298b3822014-02-13 16:10:47454 AnalysisConsumer->AddDiagnosticConsumer(
455 new AnalyzerDiagnosticConsumer(Context));
David Blaikie680c4c82014-08-10 19:56:59456 Consumers.push_back(std::move(AnalysisConsumer));
Alexander Kornienko298b3822014-02-13 16:10:47457 }
Nico Weber33c9dbb2020-09-03 23:37:29458#endif // CLANG_TIDY_ENABLE_STATIC_ANALYZER
Jonas Devlieghere1c705d92019-08-14 23:52:23459 return std::make_unique<ClangTidyASTConsumer>(
Roman Lebedev12152512018-05-08 13:14:21460 std::move(Consumers), std::move(Profiling), std::move(Finder),
461 std::move(Checks));
Alexander Kornienko175fefb2014-01-03 09:31:57462}
463
Alexander Kornienko6e0cbc82014-09-12 08:53:36464std::vector<std::string> ClangTidyASTConsumerFactory::getCheckNames() {
Alexander Kornienko175fefb2014-01-03 09:31:57465 std::vector<std::string> CheckNames;
Alexander Kornienkodf1e3cb2014-03-06 10:17:46466 for (const auto &CheckFactory : *CheckFactories) {
Nathan Jamesc23ae3f2020-07-30 21:57:32467 if (Context.isCheckEnabled(CheckFactory.getKey()))
468 CheckNames.emplace_back(CheckFactory.getKey());
Alexander Kornienko175fefb2014-01-03 09:31:57469 }
470
Nico Weber33c9dbb2020-09-03 23:37:29471#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
Csaba Dabisa079a422019-08-16 01:53:14472 for (const auto &AnalyzerCheck : getAnalyzerCheckersAndPackages(
Alexander Kornienko85a92c32018-05-17 14:04:27473 Context, Context.canEnableAnalyzerAlphaCheckers()))
Alexander Kornienkodf1e3cb2014-03-06 10:17:46474 CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first);
Nico Weber33c9dbb2020-09-03 23:37:29475#endif // CLANG_TIDY_ENABLE_STATIC_ANALYZER
Alexander Kornienko175fefb2014-01-03 09:31:57476
Benjamin Kramer4065e922020-03-28 18:19:55477 llvm::sort(CheckNames);
Alexander Kornienko175fefb2014-01-03 09:31:57478 return CheckNames;
479}
480
Alexander Kornienko6e0cbc82014-09-12 08:53:36481ClangTidyOptions::OptionMap ClangTidyASTConsumerFactory::getCheckOptions() {
482 ClangTidyOptions::OptionMap Options;
Dmitri Gribenkobb7a9dc2019-09-26 13:55:01483 std::vector<std::unique_ptr<ClangTidyCheck>> Checks =
484 CheckFactories->createChecks(&Context);
Alexander Kornienko6e0cbc82014-09-12 08:53:36485 for (const auto &Check : Checks)
486 Check->storeOptions(Options);
487 return Options;
488}
489
Alexander Kornienko85a92c32018-05-17 14:04:27490std::vector<std::string>
491getCheckNames(const ClangTidyOptions &Options,
492 bool AllowEnablingAnalyzerAlphaCheckers) {
Alexander Kornienkoa4695222014-06-05 13:31:45493 clang::tidy::ClangTidyContext Context(
Jonas Devlieghere1c705d92019-08-14 23:52:23494 std::make_unique<DefaultOptionsProvider>(ClangTidyGlobalOptions(),
Alexander Kornienko85a92c32018-05-17 14:04:27495 Options),
496 AllowEnablingAnalyzerAlphaCheckers);
Alexander Kornienkoa4695222014-06-05 13:31:45497 ClangTidyASTConsumerFactory Factory(Context);
Alexander Kornienko6e0cbc82014-09-12 08:53:36498 return Factory.getCheckNames();
499}
500
Alexander Kornienko85a92c32018-05-17 14:04:27501ClangTidyOptions::OptionMap
502getCheckOptions(const ClangTidyOptions &Options,
503 bool AllowEnablingAnalyzerAlphaCheckers) {
Alexander Kornienko6e0cbc82014-09-12 08:53:36504 clang::tidy::ClangTidyContext Context(
Jonas Devlieghere1c705d92019-08-14 23:52:23505 std::make_unique<DefaultOptionsProvider>(ClangTidyGlobalOptions(),
Alexander Kornienko85a92c32018-05-17 14:04:27506 Options),
507 AllowEnablingAnalyzerAlphaCheckers);
Alexander Kornienko6e0cbc82014-09-12 08:53:36508 ClangTidyASTConsumerFactory Factory(Context);
509 return Factory.getCheckOptions();
Alexander Kornienkofb9e92b2013-12-19 19:57:05510}
511
Sam McCallcb50e232018-11-02 10:01:59512std::vector<ClangTidyError>
513runClangTidy(clang::tidy::ClangTidyContext &Context,
514 const CompilationDatabase &Compilations,
515 ArrayRef<std::string> InputFiles,
Alexander Kornienkobbc89dc2019-03-22 13:42:48516 llvm::IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> BaseFS,
Nathan Jamesabbe9e22021-03-01 22:07:09517 bool ApplyAnyFix, bool EnableCheckProfile,
518 llvm::StringRef StoreCheckProfile) {
Ilya Biryukova67b3662018-01-23 12:31:06519 ClangTool Tool(Compilations, InputFiles,
520 std::make_shared<PCHContainerOperations>(), BaseFS);
Etienne Bergeron4eaeace2016-04-06 14:07:51521
522 // Add extra arguments passed by the clang-tidy command-line.
523 ArgumentsAdjuster PerFileExtraArgumentsInserter =
524 [&Context](const CommandLineArguments &Args, StringRef Filename) {
525 ClangTidyOptions Opts = Context.getOptionsForFile(Filename);
Alexander Kornienko42fd75e2016-08-23 14:13:31526 CommandLineArguments AdjustedArgs = Args;
527 if (Opts.ExtraArgsBefore) {
528 auto I = AdjustedArgs.begin();
529 if (I != AdjustedArgs.end() && !StringRef(*I).startswith("-"))
530 ++I; // Skip compiler binary name, if it is there.
531 AdjustedArgs.insert(I, Opts.ExtraArgsBefore->begin(),
532 Opts.ExtraArgsBefore->end());
533 }
Etienne Bergeron4eaeace2016-04-06 14:07:51534 if (Opts.ExtraArgs)
535 AdjustedArgs.insert(AdjustedArgs.end(), Opts.ExtraArgs->begin(),
536 Opts.ExtraArgs->end());
537 return AdjustedArgs;
538 };
539
Alexander Kornienko64956b52015-11-09 16:28:11540 Tool.appendArgumentsAdjuster(PerFileExtraArgumentsInserter);
Kadir Cetinkayafd299802019-01-21 10:10:18541 Tool.appendArgumentsAdjuster(getStripPluginsAdjuster());
Roman Lebedev12152512018-05-08 13:14:21542 Context.setEnableProfiling(EnableCheckProfile);
Roman Lebedeva87f1d02018-06-06 15:07:51543 Context.setProfileStoragePrefix(StoreCheckProfile);
Samuel Benzaquenaedd9942014-10-23 17:23:20544
Nathan Jamesabbe9e22021-03-01 22:07:09545 ClangTidyDiagnosticConsumer DiagConsumer(Context, nullptr, true, ApplyAnyFix);
Sam McCall3c1f4902018-11-08 17:42:16546 DiagnosticsEngine DE(new DiagnosticIDs(), new DiagnosticOptions(),
547 &DiagConsumer, /*ShouldOwnClient=*/false);
548 Context.setDiagnosticsEngine(&DE);
Manuel Klimek814f9bd2013-11-14 15:49:44549 Tool.setDiagnosticConsumer(&DiagConsumer);
Alexander Kornienko175fefb2014-01-03 09:31:57550
551 class ActionFactory : public FrontendActionFactory {
552 public:
Alexander Kornienkobbc89dc2019-03-22 13:42:48553 ActionFactory(ClangTidyContext &Context,
554 IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> BaseFS)
Nathan James64badec2020-12-17 14:09:08555 : ConsumerFactory(Context, std::move(BaseFS)) {}
Dmitri Gribenko90745212019-08-29 16:38:36556 std::unique_ptr<FrontendAction> create() override {
557 return std::make_unique<Action>(&ConsumerFactory);
558 }
Alexander Kornienko175fefb2014-01-03 09:31:57559
Zinovy Nisbeca7682018-05-03 18:26:39560 bool runInvocation(std::shared_ptr<CompilerInvocation> Invocation,
561 FileManager *Files,
562 std::shared_ptr<PCHContainerOperations> PCHContainerOps,
563 DiagnosticConsumer *DiagConsumer) override {
Jan Korousc5d14b52019-10-14 20:15:01564 // Explicitly ask to define __clang_analyzer__ macro.
565 Invocation->getPreprocessorOpts().SetUpStaticAnalyzer = true;
Zinovy Nisbeca7682018-05-03 18:26:39566 return FrontendActionFactory::runInvocation(
567 Invocation, Files, PCHContainerOps, DiagConsumer);
568 }
569
Alexander Kornienko175fefb2014-01-03 09:31:57570 private:
571 class Action : public ASTFrontendAction {
572 public:
573 Action(ClangTidyASTConsumerFactory *Factory) : Factory(Factory) {}
David Blaikie680c4c82014-08-10 19:56:59574 std::unique_ptr<ASTConsumer> CreateASTConsumer(CompilerInstance &Compiler,
575 StringRef File) override {
Alexander Kornienko175fefb2014-01-03 09:31:57576 return Factory->CreateASTConsumer(Compiler, File);
577 }
578
579 private:
580 ClangTidyASTConsumerFactory *Factory;
581 };
582
Benjamin Kramer6e914242014-07-24 10:23:33583 ClangTidyASTConsumerFactory ConsumerFactory;
Alexander Kornienko175fefb2014-01-03 09:31:57584 };
585
Nathan James64badec2020-12-17 14:09:08586 ActionFactory Factory(Context, std::move(BaseFS));
Benjamin Kramer6e914242014-07-24 10:23:33587 Tool.run(&Factory);
Sam McCallcb50e232018-11-02 10:01:59588 return DiagConsumer.take();
Manuel Klimek814f9bd2013-11-14 15:49:44589}
590
Sam McCallcb50e232018-11-02 10:01:59591void handleErrors(llvm::ArrayRef<ClangTidyError> Errors,
Nathan Jamesabbe9e22021-03-01 22:07:09592 ClangTidyContext &Context, FixBehaviour Fix,
Ilya Biryukova67b3662018-01-23 12:31:06593 unsigned &WarningsAsErrorsCount,
Jonas Devliegherefc514902018-10-10 13:27:25594 llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem> BaseFS) {
Nathan James64badec2020-12-17 14:09:08595 ErrorReporter Reporter(Context, Fix, std::move(BaseFS));
Jonas Devliegherefc514902018-10-10 13:27:25596 llvm::vfs::FileSystem &FileSystem =
Duncan P. N. Exon Smithdb8a7422019-03-26 22:32:06597 Reporter.getSourceManager().getFileManager().getVirtualFileSystem();
Haojian Wuf7692a22016-02-26 09:19:33598 auto InitialWorkingDir = FileSystem.getCurrentWorkingDirectory();
599 if (!InitialWorkingDir)
600 llvm::report_fatal_error("Cannot get current working path.");
601
Sam McCallcb50e232018-11-02 10:01:59602 for (const ClangTidyError &Error : Errors) {
Haojian Wuf7692a22016-02-26 09:19:33603 if (!Error.BuildDirectory.empty()) {
604 // By default, the working directory of file system is the current
605 // clang-tidy running directory.
606 //
607 // Change the directory to the one used during the analysis.
608 FileSystem.setCurrentWorkingDirectory(Error.BuildDirectory);
609 }
Alexander Kornienko742790c2014-07-02 15:05:04610 Reporter.reportDiagnostic(Error);
Haojian Wuf7692a22016-02-26 09:19:33611 // Return to the initial directory to correctly resolve next Error.
612 FileSystem.setCurrentWorkingDirectory(InitialWorkingDir.get());
613 }
Alexander Kornienkoab2d3ce2021-01-28 23:49:53614 Reporter.finish();
Jonathan Roelofsd60388a2016-01-13 17:36:41615 WarningsAsErrorsCount += Reporter.getWarningsAsErrorsCount();
Daniel Jasperd07c8402013-07-29 08:19:24616}
617
Alexander Kornienko563de792017-01-03 14:36:13618void exportReplacements(const llvm::StringRef MainFilePath,
619 const std::vector<ClangTidyError> &Errors,
Benjamin Kramerfb98b742014-09-04 10:31:23620 raw_ostream &OS) {
Alexander Kornienko563de792017-01-03 14:36:13621 TranslationUnitDiagnostics TUD;
Benjamin Krameradcd0262020-01-28 19:23:46622 TUD.MainSourceFile = std::string(MainFilePath);
Alexander Kornienko563de792017-01-03 14:36:13623 for (const auto &Error : Errors) {
624 tooling::Diagnostic Diag = Error;
625 TUD.Diagnostics.insert(TUD.Diagnostics.end(), Diag);
Eric Liu7e544522016-08-09 07:54:49626 }
Benjamin Kramerfb98b742014-09-04 10:31:23627
628 yaml::Output YAML(OS);
Alexander Kornienko563de792017-01-03 14:36:13629 YAML << TUD;
Benjamin Kramerfb98b742014-09-04 10:31:23630}
631
Daniel Jasperd07c8402013-07-29 08:19:24632} // namespace tidy
633} // namespace clang