Skip to content

Commit 60291f5

Browse files
committed
Merge commit '850217686e211f9515d60f31e31bc4171f544239' into llvmspirv_pulldown
2 parents 40b4ae3 + 8502176 commit 60291f5

File tree

315 files changed

+5021
-2631
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

315 files changed

+5021
-2631
lines changed

clang-tools-extra/clangd/HeuristicResolver.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,4 +266,4 @@ std::vector<const NamedDecl *> HeuristicResolver::resolveDependentMember(
266266
}
267267

268268
} // namespace clangd
269-
} // namespace clang
269+
} // namespace clang

clang-tools-extra/docs/clang-tidy/Contributing.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,8 @@ are located in subdirectories of `clang-tidy/
131131
<https://github.com/llvm/llvm-project/tree/main/clang-tools-extra/clang-tidy/>`_
132132
and contain checks targeting a certain aspect of code quality (performance,
133133
readability, etc.), certain coding style or standard (Google, LLVM, CERT, etc.)
134-
or a widely used API (e.g. MPI). Their names are same as user-facing check
135-
groups names described :ref:`above <checks-groups-table>`.
134+
or a widely used API (e.g. MPI). Their names are the same as the user-facing
135+
check group names described :ref:`above <checks-groups-table>`.
136136

137137
After choosing the module and the name for the check, run the
138138
``clang-tidy/add_new_check.py`` script to create the skeleton of the check and
@@ -441,8 +441,8 @@ warnings and errors. The script provides multiple configuration flags.
441441
* To restrict the files examined you can provide one or more regex arguments
442442
that the file names are matched against.
443443
``run-clang-tidy.py clang-tidy/.*Check\.cpp`` will only analyze clang-tidy
444-
checks. It may also be necessary to restrict the header files warnings are
445-
displayed from using the ``-header-filter`` flag. It has the same behavior
444+
checks. It may also be necessary to restrict the header files that warnings
445+
are displayed from using the ``-header-filter`` flag. It has the same behavior
446446
as the corresponding :program:`clang-tidy` flag.
447447

448448
* To apply suggested fixes ``-fix`` can be passed as an argument. This gathers
@@ -475,7 +475,7 @@ It can also store that data as JSON files for further processing. Example output
475475

476476
.. code-block:: console
477477
478-
$ clang-tidy -enable-check-profile -store-check-profile=. -checks=-*,readability-function-size source.cpp
478+
$ clang-tidy -enable-check-profile -store-check-profile=. -checks=-*,readability-function-size source.cpp
479479
$ # Note that there won't be timings table printed to the console.
480480
$ ls /tmp/out/
481481
20180516161318717446360-source.cpp.json

clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,5 +27,5 @@ Examples:
2727

2828

2929
Note: In the second example, the suggested fix could yield a different result,
30-
as the conversion to integer could truncate. In practice, this is very rare,
30+
as the conversion to integer could truncate. In practice, this is very rare,
3131
and you should use ``absl::Trunc`` to perform this operation explicitly instead.

clang-tools-extra/docs/clang-tidy/checks/abseil-no-internal-dependencies.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ abseil-no-internal-dependencies
55

66
Warns if code using Abseil depends on internal details. If something is in a
77
namespace that includes the word "internal", code is not allowed to depend upon
8-
it because its an implementation detail. They cannot friend it, include it,
8+
it because it's an implementation detail. They cannot friend it, include it,
99
you mention it or refer to it in any way. Doing so violates Abseil's
1010
compatibility guidelines and may result in breakage. See
1111
https://abseil.io/about/compatibility for more information.

clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This improves readability and reduces the likelihood of accidentally mixing
1010
``find()`` and ``npos`` from different string-like types.
1111

1212
By default, "string-like types" includes ``::std::basic_string``,
13-
``::std::basic_string_view``, and ``::absl::string_view``. See the
13+
``::std::basic_string_view``, and ``::absl::string_view``. See the
1414
StringLikeClasses option to change this.
1515

1616
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ android-cloexec-open
44
====================
55

66
A common source of security bugs is code that opens a file without using the
7-
``O_CLOEXEC`` flag. Without that flag, an opened sensitive file would remain
7+
``O_CLOEXEC`` flag. Without that flag, an opened sensitive file would remain
88
open across a fork+exec to a lower-privileged SELinux domain, leaking that
99
sensitive data. Open-like functions including ``open()``, ``openat()``, and
1010
``open64()`` should include ``O_CLOEXEC`` in their flags argument.

clang-tools-extra/docs/clang-tidy/checks/android-cloexec-pipe2.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
android-cloexec-pipe2
44
=====================
55

6-
This checks ensures that pipe2() is called with the O_CLOEXEC flag. The check also
6+
This check ensures that pipe2() is called with the O_CLOEXEC flag. The check also
77
adds the O_CLOEXEC flag that marks the file descriptor to be closed in child processes.
88
Without this flag a sensitive file descriptor can be leaked to a child process,
99
potentially into a lower-privileged SELinux domain.

clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ This check finds conversion from integer type like ``int`` to ``std::string`` or
88
``std::to_string`` and ``std::to_wstring``.
99

1010
It doesn't replace conversion from floating points despite the ``to_string``
11-
overloads, because it would change the behaviour.
11+
overloads, because it would change the behavior.
1212

1313

1414
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/bugprone-branch-clone.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,4 @@ Unlike if statements, the check does not detect chains of conditional
8787
operators.
8888

8989
Note: This check also reports situations where branches become identical only
90-
after preprocession.
90+
after preprocessing.

clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ noisiness.
116116
The value is a `;`-separated list of names.
117117
To ignore unnamed parameters, add `""` to the list verbatim (not the
118118
empty string, but the two quotes, potentially escaped!).
119-
**This options is case-sensitive!**
119+
**This option is case-sensitive!**
120120

121121
By default, the following parameter names, and their Uppercase-initial
122122
variants are ignored:
@@ -154,7 +154,7 @@ noisiness.
154154
``a < b``.
155155
* The parameters are further passed to the same function to the same
156156
parameter of that function, of the same overload.
157-
E.g. ``f(a, 1)`` and ``f(b, 2)`` to some ``f(T, int)``.
157+
e.g. ``f(a, 1)`` and ``f(b, 2)`` to some ``f(T, int)``.
158158

159159
.. note::
160160

@@ -202,7 +202,7 @@ an argument list, and C++ template instantiations.
202202
Most of these cases, which are otherwise swappable from a caller's standpoint,
203203
have no way of getting "fixed" at the definition point.
204204
In the case of C++ templates, only primary template definitions and explicit
205-
specialisations are matched and analysed.
205+
specializations are matched and analyzed.
206206

207207
None of the following cases produce a diagnostic:
208208

@@ -241,7 +241,7 @@ not diagnosed.
241241
void exact(typename Vector<T>::element_type A,
242242
typename Vector<T>::element_type B) { /* ... */ }
243243
244-
// Skipped: The two parameters are both 'T' but we can not prove this
244+
// Skipped: The two parameters are both 'T' but we cannot prove this
245245
// without actually instantiating.
246246
template <typename T>
247247
void falseNegative(T A, typename Vector<T>::element_type B) { /* ... */ }

0 commit comments

Comments
 (0)