Skip to content

Commit 5de69e1

Browse files
salman-javed-nzkazutakahirata
authored andcommitted
[clang-tidy] Tidy up spelling, grammar, and inconsistencies in documentation (NFC)
Differential Revision: https://reviews.llvm.org/D112356
1 parent 7088da4 commit 5de69e1

File tree

55 files changed

+84
-83
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+84
-83
lines changed

clang-tools-extra/docs/clang-tidy/Contributing.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,8 @@ are located in subdirectories of `clang-tidy/
131131
<https://github.com/llvm/llvm-project/tree/main/clang-tools-extra/clang-tidy/>`_
132132
and contain checks targeting a certain aspect of code quality (performance,
133133
readability, etc.), certain coding style or standard (Google, LLVM, CERT, etc.)
134-
or a widely used API (e.g. MPI). Their names are same as user-facing check
135-
groups names described :ref:`above <checks-groups-table>`.
134+
or a widely used API (e.g. MPI). Their names are the same as the user-facing
135+
check group names described :ref:`above <checks-groups-table>`.
136136

137137
After choosing the module and the name for the check, run the
138138
``clang-tidy/add_new_check.py`` script to create the skeleton of the check and
@@ -441,8 +441,8 @@ warnings and errors. The script provides multiple configuration flags.
441441
* To restrict the files examined you can provide one or more regex arguments
442442
that the file names are matched against.
443443
``run-clang-tidy.py clang-tidy/.*Check\.cpp`` will only analyze clang-tidy
444-
checks. It may also be necessary to restrict the header files warnings are
445-
displayed from using the ``-header-filter`` flag. It has the same behavior
444+
checks. It may also be necessary to restrict the header files that warnings
445+
are displayed from using the ``-header-filter`` flag. It has the same behavior
446446
as the corresponding :program:`clang-tidy` flag.
447447

448448
* To apply suggested fixes ``-fix`` can be passed as an argument. This gathers
@@ -475,7 +475,7 @@ It can also store that data as JSON files for further processing. Example output
475475

476476
.. code-block:: console
477477
478-
$ clang-tidy -enable-check-profile -store-check-profile=. -checks=-*,readability-function-size source.cpp
478+
$ clang-tidy -enable-check-profile -store-check-profile=. -checks=-*,readability-function-size source.cpp
479479
$ # Note that there won't be timings table printed to the console.
480480
$ ls /tmp/out/
481481
20180516161318717446360-source.cpp.json

clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,5 +27,5 @@ Examples:
2727

2828

2929
Note: In the second example, the suggested fix could yield a different result,
30-
as the conversion to integer could truncate. In practice, this is very rare,
30+
as the conversion to integer could truncate. In practice, this is very rare,
3131
and you should use ``absl::Trunc`` to perform this operation explicitly instead.

clang-tools-extra/docs/clang-tidy/checks/abseil-no-internal-dependencies.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ abseil-no-internal-dependencies
55

66
Warns if code using Abseil depends on internal details. If something is in a
77
namespace that includes the word "internal", code is not allowed to depend upon
8-
it because its an implementation detail. They cannot friend it, include it,
8+
it because it's an implementation detail. They cannot friend it, include it,
99
you mention it or refer to it in any way. Doing so violates Abseil's
1010
compatibility guidelines and may result in breakage. See
1111
https://abseil.io/about/compatibility for more information.

clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This improves readability and reduces the likelihood of accidentally mixing
1010
``find()`` and ``npos`` from different string-like types.
1111

1212
By default, "string-like types" includes ``::std::basic_string``,
13-
``::std::basic_string_view``, and ``::absl::string_view``. See the
13+
``::std::basic_string_view``, and ``::absl::string_view``. See the
1414
StringLikeClasses option to change this.
1515

1616
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ android-cloexec-open
44
====================
55

66
A common source of security bugs is code that opens a file without using the
7-
``O_CLOEXEC`` flag. Without that flag, an opened sensitive file would remain
7+
``O_CLOEXEC`` flag. Without that flag, an opened sensitive file would remain
88
open across a fork+exec to a lower-privileged SELinux domain, leaking that
99
sensitive data. Open-like functions including ``open()``, ``openat()``, and
1010
``open64()`` should include ``O_CLOEXEC`` in their flags argument.

clang-tools-extra/docs/clang-tidy/checks/android-cloexec-pipe2.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
android-cloexec-pipe2
44
=====================
55

6-
This checks ensures that pipe2() is called with the O_CLOEXEC flag. The check also
6+
This check ensures that pipe2() is called with the O_CLOEXEC flag. The check also
77
adds the O_CLOEXEC flag that marks the file descriptor to be closed in child processes.
88
Without this flag a sensitive file descriptor can be leaked to a child process,
99
potentially into a lower-privileged SELinux domain.

clang-tools-extra/docs/clang-tidy/checks/boost-use-to-string.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ This check finds conversion from integer type like ``int`` to ``std::string`` or
88
``std::to_string`` and ``std::to_wstring``.
99

1010
It doesn't replace conversion from floating points despite the ``to_string``
11-
overloads, because it would change the behaviour.
11+
overloads, because it would change the behavior.
1212

1313

1414
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/bugprone-branch-clone.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,4 @@ Unlike if statements, the check does not detect chains of conditional
8787
operators.
8888

8989
Note: This check also reports situations where branches become identical only
90-
after preprocession.
90+
after preprocessing.

clang-tools-extra/docs/clang-tidy/checks/bugprone-easily-swappable-parameters.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ noisiness.
116116
The value is a `;`-separated list of names.
117117
To ignore unnamed parameters, add `""` to the list verbatim (not the
118118
empty string, but the two quotes, potentially escaped!).
119-
**This options is case-sensitive!**
119+
**This option is case-sensitive!**
120120

121121
By default, the following parameter names, and their Uppercase-initial
122122
variants are ignored:
@@ -154,7 +154,7 @@ noisiness.
154154
``a < b``.
155155
* The parameters are further passed to the same function to the same
156156
parameter of that function, of the same overload.
157-
E.g. ``f(a, 1)`` and ``f(b, 2)`` to some ``f(T, int)``.
157+
e.g. ``f(a, 1)`` and ``f(b, 2)`` to some ``f(T, int)``.
158158

159159
.. note::
160160

@@ -202,7 +202,7 @@ an argument list, and C++ template instantiations.
202202
Most of these cases, which are otherwise swappable from a caller's standpoint,
203203
have no way of getting "fixed" at the definition point.
204204
In the case of C++ templates, only primary template definitions and explicit
205-
specialisations are matched and analysed.
205+
specializations are matched and analyzed.
206206

207207
None of the following cases produce a diagnostic:
208208

@@ -241,7 +241,7 @@ not diagnosed.
241241
void exact(typename Vector<T>::element_type A,
242242
typename Vector<T>::element_type B) { /* ... */ }
243243
244-
// Skipped: The two parameters are both 'T' but we can not prove this
244+
// Skipped: The two parameters are both 'T' but we cannot prove this
245245
// without actually instantiating.
246246
template <typename T>
247247
void falseNegative(T A, typename Vector<T>::element_type B) { /* ... */ }

clang-tools-extra/docs/clang-tidy/checks/bugprone-implicit-widening-of-multiplication-result.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ widened, and suggests (with fix-it) to either silence the code by making
88
widening explicit, or to perform the multiplication in a wider type,
99
to avoid the widening afterwards.
1010

11-
This is mainly useful when operating on a very large buffers.
11+
This is mainly useful when operating on very large buffers.
1212
For example, consider:
1313

1414
.. code-block:: c++
@@ -22,7 +22,7 @@ For example, consider:
2222
}
2323
}
2424
25-
This is fine in general, but iff ``width * height`` overflows,
25+
This is fine in general, but if ``width * height`` overflows,
2626
you end up wrapping back to the beginning of ``base``
2727
instead of processing the entire requested buffer.
2828

clang-tools-extra/docs/clang-tidy/checks/bugprone-macro-parentheses.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ bugprone-macro-parentheses
44
==========================
55

66

7-
Finds macros that can have unexpected behaviour due to missing parentheses.
7+
Finds macros that can have unexpected behavior due to missing parentheses.
88

99
Macros are expanded by the preprocessor as-is. As a result, there can be
10-
unexpected behaviour; operators may be evaluated in unexpected order and
10+
unexpected behavior; operators may be evaluated in unexpected order and
1111
unary operators may become binary operators, etc.
1212

1313
When the replacement list has an expression, it is recommended to surround

clang-tools-extra/docs/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ instead of the result and the value is used as an argument to a memory
99
allocation function (``malloc()``, ``calloc()``, ``realloc()``, ``alloca()``) or
1010
the ``new[]`` operator in `C++`. The check detects error cases even if one of
1111
these functions (except the ``new[]`` operator) is called by a constant function
12-
pointer. Cases where ``1`` is added both to the parameter and the result of the
12+
pointer. Cases where ``1`` is added both to the parameter and the result of the
1313
``strlen()``-like function are ignored, as are cases where the whole addition is
1414
surrounded by extra parentheses.
1515

clang-tools-extra/docs/clang-tidy/checks/bugprone-not-null-terminated-result.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ bugprone-not-null-terminated-result
66
Finds function calls where it is possible to cause a not null-terminated result.
77
Usually the proper length of a string is ``strlen(src) + 1`` or equal length of
88
this expression, because the null terminator needs an extra space. Without the
9-
null terminator it can result in undefined behaviour when the string is read.
9+
null terminator it can result in undefined behavior when the string is read.
1010

1111
The following and their respective ``wchar_t`` based functions are checked:
1212

@@ -61,7 +61,7 @@ Rewrite based on the destination array
6161
obtain the capacity of the destination array then the new function could be
6262
the safe version (ending with ``cpy_s``).
6363

64-
- If the new function is could be safe version and C++ files are analysed and
64+
- If the new function is could be safe version and C++ files are analyzed and
6565
the destination array is plain ``char``/``wchar_t`` without ``un/signed`` then
6666
the length of the destination array can be omitted.
6767

clang-tools-extra/docs/clang-tidy/checks/bugprone-sizeof-expression.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,5 +185,5 @@ Options
185185
.. option:: WarnOnSizeOfCompareToConstant
186186

187187
When `true`, the check will warn on an expression like
188-
``sizeof(epxr) <= k`` for a suspicious constant `k` while `k` is `0` or
188+
``sizeof(expr) <= k`` for a suspicious constant `k` while `k` is `0` or
189189
greater than `0x8000`. Default is `true`.

clang-tools-extra/docs/clang-tidy/checks/bugprone-suspicious-string-compare.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Checks for calls with implicit comparator and proposed to explicitly add it.
1414
if (!strcmp(...)) // Won't warn
1515
if (strcmp(...) != 0) // Won't warn
1616

17-
Checks that compare function results (i,e, ``strcmp``) are compared to valid
17+
Checks that compare function results (i.e., ``strcmp``) are compared to valid
1818
constant. The resulting value is
1919

2020
.. code::

clang-tools-extra/docs/clang-tidy/checks/bugprone-too-small-loop-variable.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In a real use case size means a container's size which depends on the user input
2525
for (short i = 0; i < items.size(); ++i) {}
2626
}
2727

28-
This algorithm works for small amount of objects, but will lead to freeze for a
28+
This algorithm works for a small amount of objects, but will lead to freeze for
2929
a larger user input.
3030

3131
.. option:: MagnitudeBitsUpperLimit

clang-tools-extra/docs/clang-tidy/checks/bugprone-unhandled-exception-at-new.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,5 +21,5 @@ is allowed to propagate out of the function (exception handler is checked for
2121
types ``std::bad_alloc``, ``std::exception``, and catch-all handler).
2222
The check assumes that any user-defined ``operator new`` is either
2323
``noexcept`` or may throw an exception of type ``std::bad_alloc`` (or derived
24-
from it). Other exception types or exceptions occurring in the objects's
24+
from it). Other exception types or exceptions occurring in the object's
2525
constructor are not taken into account.

clang-tools-extra/docs/clang-tidy/checks/bugprone-virtual-near-miss.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
bugprone-virtual-near-miss
44
==========================
55

6-
Warn if a function is a near miss (ie. the name is very similar and the function
6+
Warn if a function is a near miss (i.e. the name is very similar and the function
77
signature is the same) to a virtual function from a base class.
88

99
Example:

clang-tools-extra/docs/clang-tidy/checks/cert-dcl21-cpp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,4 +21,4 @@ This check corresponds to the CERT C++ Coding Standard recommendation
2121
DCL21-CPP. Overloaded postfix increment and decrement operators should return a
2222
const object. However, all of the CERT recommendations have been removed from
2323
public view, and so their justification for the behavior of this check requires
24-
an account on their wiki to view.
24+
an account on their wiki to view.

clang-tools-extra/docs/clang-tidy/checks/cert-err09-cpp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ for more information.
1212
This check corresponds to the CERT C++ Coding Standard recommendation
1313
ERR09-CPP. Throw anonymous temporaries. However, all of the CERT recommendations
1414
have been removed from public view, and so their justification for the behavior
15-
of this check requires an account on their wiki to view.
15+
of this check requires an account on their wiki to view.

clang-tools-extra/docs/clang-tidy/checks/cert-oop11-cpp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ This check corresponds to the CERT C++ Coding Standard recommendation
1313
OOP11-CPP. Do not copy-initialize members or base classes from a move
1414
constructor. However, all of the CERT recommendations have been removed from
1515
public view, and so their justification for the behavior of this check requires
16-
an account on their wiki to view.
16+
an account on their wiki to view.

clang-tools-extra/docs/clang-tidy/checks/concurrency-mt-unsafe.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Note that using some thread-unsafe functions may be still valid in
1212
concurrent programming if only a single thread is used (e.g. setenv(3)),
1313
however, some functions may track a state in global variables which
1414
would be clobbered by subsequent (non-parallel, but concurrent) calls to
15-
a related function. E.g. the following code suffers from unprotected
15+
a related function. e.g. the following code suffers from unprotected
1616
accesses to a global state:
1717

1818
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-init-variables.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ cppcoreguidelines-init-variables
44
================================
55

66
Checks whether there are local variables that are declared without an initial
7-
value. These may lead to unexpected behaviour if there is a code path that reads
7+
value. These may lead to unexpected behavior if there is a code path that reads
88
the variable before assigning to it.
99

1010
Only integers, booleans, floats, doubles and pointers are checked. The fix

clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ the range [-2^31, 2^31-1].
8484

8585
You may have encountered messages like "narrowing conversion from 'unsigned int'
8686
to signed type 'int' is implementation-defined".
87-
The C/C++ standard does not mandate twos complement for signed integers, and so
87+
The C/C++ standard does not mandate two's complement for signed integers, and so
8888
the compiler is free to define what the semantics are for converting an unsigned
89-
integer to signed integer. Clang's implementation uses the twos complement
89+
integer to signed integer. Clang's implementation uses the two's complement
9090
format.

clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-special-member-functions.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Options
5151
.. option:: AllowMissingMoveFunctionsWhenCopyIsDeleted
5252

5353
When set to `true` (default is `false`), this check doesn't flag classes which define deleted copy
54-
operations but don't define move operations. This flags is related to Google C++ Style Guide
54+
operations but don't define move operations. This flag is related to Google C++ Style Guide
5555
https://google.github.io/styleguide/cppguide.html#Copyable_Movable_Types. With this option enabled, the
5656
following class won't be flagged:
5757

clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ cppcoreguidelines-virtual-class-destructor
55

66
Finds virtual classes whose destructor is neither public and virtual
77
nor protected and non-virtual. A virtual class's destructor should be specified
8-
in one of these ways to prevent undefined behaviour.
8+
in one of these ways to prevent undefined behavior.
99

1010
This check implements
1111
`C.35 <http://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines#Rc-dtor-virtual>`_

clang-tools-extra/docs/clang-tidy/checks/hicpp-multiway-paths-covered.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Degenerated ``switch`` statements without any labels are caught as well.
6868
int i = 42;
6969
switch(i) {
7070
case 1: // do something here
71-
default: // do somethe else here
71+
default: // do something else here
7272
}
7373

7474
// Should rather be the following:

clang-tools-extra/docs/clang-tidy/checks/hicpp-signed-bitwise.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ hicpp-signed-bitwise
44
====================
55

66
Finds uses of bitwise operations on signed integer types, which may lead to
7-
undefined or implementation defined behaviour.
7+
undefined or implementation defined behavior.
88

99
The according rule is defined in the `High Integrity C++ Standard, Section 5.6.1 <http://www.codingstandard.com/section/5-6-shift-operators/>`_.
1010

clang-tools-extra/docs/clang-tidy/checks/misc-static-assert.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ misc-static-assert
55

66
`cert-dcl03-c` redirects here as an alias for this check.
77

8-
Replaces ``assert()`` with ``static_assert()`` if the condition is evaluatable
8+
Replaces ``assert()`` with ``static_assert()`` if the condition is evaluable
99
at compile time.
1010

1111
The condition of ``static_assert()`` is evaluated at compile time which is

clang-tools-extra/docs/clang-tidy/checks/misc-throw-by-value-catch-by-reference.rst

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,16 @@ the CERT C++ Coding Standard rule `ERR61-CPP. Catch exceptions by lvalue referen
1414

1515
Exceptions:
1616
* Throwing string literals will not be flagged despite being a pointer. They
17-
are not susceptible to slicing and the usage of string literals is idomatic.
17+
are not susceptible to slicing and the usage of string literals is
18+
idiomatic.
1819
* Catching character pointers (``char``, ``wchar_t``, unicode character types)
1920
will not be flagged to allow catching sting literals.
2021
* Moved named values will not be flagged as not throwing an anonymous
2122
temporary. In this case we can be sure that the user knows that the object
2223
can't be accessed outside catch blocks handling the error.
2324
* Throwing function parameters will not be flagged as not throwing an
2425
anonymous temporary. This allows helper functions for throwing.
25-
* Re-throwing caught exception variables will not be flragged as not throwing
26+
* Re-throwing caught exception variables will not be flagged as not throwing
2627
an anonymous temporary. Although this can usually be done by just writing
2728
``throw;`` it happens often enough in real code.
2829

clang-tools-extra/docs/clang-tidy/checks/modernize-avoid-bind.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ simply ignored. Without ``PermissiveParameterList``, this would be transformed i
7272
return ignore_args(3, 3);
7373
}
7474

75-
which will *not* compile, since the lambda does not contain an ``operator()`` that
75+
which will *not* compile, since the lambda does not contain an ``operator()``
7676
that accepts 2 arguments. With permissive parameter list, it instead generates
7777

7878
.. code-block:: c++

clang-tools-extra/docs/clang-tidy/checks/modernize-avoid-c-arrays.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,5 +56,5 @@ such headers between C code, and C++ code.
5656
}
5757

5858
Similarly, the ``main()`` function is ignored. Its second and third parameters
59-
can be either ``char* argv[]`` or ``char** argv``, but can not be
59+
can be either ``char* argv[]`` or ``char** argv``, but cannot be
6060
``std::array<>``.

clang-tools-extra/docs/clang-tidy/checks/modernize-loop-convert.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ lives.
138138

139139
Specify the function used to reverse an iterator pair, the function should
140140
accept a class with ``rbegin`` and ``rend`` methods and return a
141-
class with ``begin`` and ``end`` methods methods that call the ``rbegin`` and
141+
class with ``begin`` and ``end`` methods that call the ``rbegin`` and
142142
``rend`` methods respectively. Common examples are ``ranges::reverse_view``
143143
and ``llvm::reverse``.
144144
Default value is an empty string.
@@ -165,7 +165,7 @@ Limitations
165165

166166
There are certain situations where the tool may erroneously perform
167167
transformations that remove information and change semantics. Users of the tool
168-
should be aware of the behaviour and limitations of the check outlined by
168+
should be aware of the behavior and limitations of the check outlined by
169169
the cases below.
170170

171171
Comments inside loop headers
@@ -300,7 +300,7 @@ OpenMP
300300
^^^^^^
301301

302302
As range-based for loops are only available since OpenMP 5, this check should
303-
not been used on code with a compatibility requirements of OpenMP prior to
303+
not be used on code with a compatibility requirement of OpenMP prior to
304304
version 5. It is **intentional** that this check does not make any attempts to
305305
exclude incorrect diagnostics on OpenMP for loops prior to OpenMP 5.
306306

clang-tools-extra/docs/clang-tidy/checks/modernize-pass-by-value.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ When delayed template parsing is enabled, constructors part of templated
124124
contexts; templated constructors, constructors in class templates, constructors
125125
of inner classes of template classes, etc., are not transformed. Delayed
126126
template parsing is enabled by default on Windows as a Microsoft extension:
127-
`Clang Compiler Users Manual - Microsoft extensions`_.
127+
`Clang Compiler User's Manual - Microsoft extensions`_.
128128

129129
Delayed template parsing can be enabled using the `-fdelayed-template-parsing`
130130
flag and disabled using `-fno-delayed-template-parsing`.
@@ -144,7 +144,7 @@ Example:
144144
+ C(std::string S) : S(std::move(S)) {}
145145
};
146146

147-
.. _Clang Compiler Users Manual - Microsoft extensions: https://clang.llvm.org/docs/UsersManual.html#microsoft-extensions
147+
.. _Clang Compiler User's Manual - Microsoft extensions: https://clang.llvm.org/docs/UsersManual.html#microsoft-extensions
148148

149149
.. seealso::
150150

0 commit comments

Comments
 (0)