|
|
|||
File indexing completed on 2026-05-10 08:36:19
0001 //===--- SuspiciousReallocUsageCheck.h - clang-tidy -------------*- C++ -*-===// 0002 // 0003 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 0004 // See https://llvm.org/LICENSE.txt for license information. 0005 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 0006 // 0007 //===----------------------------------------------------------------------===// 0008 0009 #ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSREALLOCUSAGECHECK_H 0010 #define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSREALLOCUSAGECHECK_H 0011 0012 #include "../ClangTidyCheck.h" 0013 0014 namespace clang::tidy::bugprone { 0015 0016 /// Finds usages of ``realloc`` where the return value is assigned to the same 0017 /// variable as passed to the first argument. 0018 /// 0019 /// For the user-facing documentation see: 0020 /// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-realloc-usage.html 0021 class SuspiciousReallocUsageCheck : public ClangTidyCheck { 0022 public: 0023 SuspiciousReallocUsageCheck(StringRef Name, ClangTidyContext *Context) 0024 : ClangTidyCheck(Name, Context) {} 0025 0026 void registerMatchers(ast_matchers::MatchFinder *Finder) override; 0027 void check(const ast_matchers::MatchFinder::MatchResult &Result) override; 0028 }; 0029 0030 } // namespace clang::tidy::bugprone 0031 0032 #endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSREALLOCUSAGECHECK_H
| [ Source navigation ] | [ Diff markup ] | [ Identifier search ] | [ general search ] |
|
This page was automatically generated by the 2.3.7 LXR engine. The LXR team |
|