llvm-project/clang-tools-extra/clang-tidy/tool
Yan Wang 36206206cd [clang-tidy][Part1] Add a new module Android and three new checks.
Summary:
A common source of security bugs is code that opens a file descriptors without using the O_CLOEXEC flag.  (Without that flag, an opened sensitive file would remain open across a fork+exec to a lower-privileged SELinux domain, leaking that sensitive data.).

Add a new Android module and one checks in clang-tidy.
-- open(), openat(), and open64() should include O_CLOEXEC in their flags argument. [android-file-open-flag]

Links to part2 and part3:
https://reviews.llvm.org/D33745
https://reviews.llvm.org/D33747


Reviewers: chh, alexfh, aaron.ballman, hokein

Reviewed By: alexfh, hokein

Subscribers: jbcoe, joerg, malcolm.parsons, Eugene.Zelenko, srhines, mgorny, xazax.hun, cfe-commits, krytarowski

Tags: #clang-tools-extra

Differential Revision: https://reviews.llvm.org/D33304

llvm-svn: 306165
2017-06-23 21:37:29 +00:00
..
CMakeLists.txt [clang-tidy][Part1] Add a new module Android and three new checks. 2017-06-23 21:37:29 +00:00
ClangTidyMain.cpp [clang-tidy][Part1] Add a new module Android and three new checks. 2017-06-23 21:37:29 +00:00
clang-tidy-diff.py [clang-tidy] Add -path option to clang-tidy-diff.py 2017-02-17 19:31:43 +00:00
run-clang-tidy.py [clang-tidy] D33930: Do not pick up by default the LLVM style if passing -format. 2017-06-09 22:23:03 +00:00