Skip to content

Commit a3b5b4b

Browse files
[clang] Proofread *.rst (llvm#166897)
This patch is limited to single-word replacements to fix spelling and/or grammar to ease the review process. Punctuation and markdown fixes are specifically excluded.
1 parent f55b393 commit a3b5b4b

21 files changed

+26
-26
lines changed

clang/Maintainers.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ ARM EABI
242242
Compiler-Wide Topics
243243
--------------------
244244
The following people are responsible for functionality that does not fit into
245-
a single part of the compiler, but instead span multiple components within the
245+
a single part of the compiler, but instead spans multiple components within the
246246
compiler.
247247

248248
Attributes

clang/docs/AddressSanitizer.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ eliminating this check (``-fsanitize-address-use-after-return=never``).
159159

160160
To summarize: ``-fsanitize-address-use-after-return=<mode>``
161161
* ``never``: Completely disables detection of UAR errors (reduces code size).
162-
* ``runtime``: Adds the code for detection, but it can be disable via the
162+
* ``runtime``: Adds the code for detection, but it can be disabled via the
163163
runtime environment (``ASAN_OPTIONS=detect_stack_use_after_return=0``).
164164
* ``always``: Enables detection of UAR errors in all cases. (reduces code
165165
size, but not as much as ``never``).
@@ -239,7 +239,7 @@ from adding redzones around it and detecting out of bounds accesses.
239239

240240
AddressSanitizer also supports
241241
``__attribute__((disable_sanitizer_instrumentation))``. This attribute
242-
works similar to ``__attribute__((no_sanitize("address")))``, but it also
242+
works similarly to ``__attribute__((no_sanitize("address")))``, but it also
243243
prevents instrumentation performed by other sanitizers.
244244

245245
Suppressing Errors in Recompiled Code (Ignorelist)
@@ -305,7 +305,7 @@ Limitations
305305
===========
306306

307307
* AddressSanitizer uses more real memory than a native run. Exact overhead
308-
depends on the allocations sizes. The smaller the allocations you make the
308+
depends on the allocation sizes. The smaller the allocations you make the
309309
bigger the overhead is.
310310
* AddressSanitizer uses more stack memory. We have seen up to 3x increase.
311311
* On 64-bit platforms AddressSanitizer maps (but not reserves) 16+ Terabytes of

clang/docs/BlockLanguageSpec.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ copy. The net effect is that instance variables can be mutated.
279279

280280
The :block-term:`Block_copy` operator retains all objects held in
281281
variables of automatic storage referenced within the Block expression
282-
(or form strong references if running under garbage collection).
282+
(or forms strong references if running under garbage collection).
283283
Object variables of ``__block`` storage type are assumed to hold
284284
normal pointers with no provision for retain and release messages.
285285

clang/docs/BoundsSafety.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ adopt, offering these properties that make it widely adoptable in practice:
5858
* It has a relatively low adoption cost.
5959

6060
This document discusses the key designs of ``-fbounds-safety``. The document is
61-
subject to be actively updated with a more detailed specification.
61+
subject to active updates with a more detailed specification.
6262

6363
Programming Model
6464
=================
@@ -574,7 +574,7 @@ When ``sizeof()`` takes a type name, the compiler doesn't apply an implicit
574574
bounds annotation on the named pointer types. This means if a bounds annotation
575575
is not specified, the evaluated pointer type is treated identically to a plain C
576576
pointer type. Therefore, ``sizeof(int*)`` remains the same with or without
577-
``-fbounds-safety``. That said, programmers can explicitly add attribute to the
577+
``-fbounds-safety``. That said, programmers can explicitly add attributes to the
578578
types, e.g., ``sizeof(int *__bidi_indexable)``, in which case the sizeof
579579
evaluates to the size of type ``int *__bidi_indexable`` (the value equivalent to
580580
``3 * sizeof(int*)``).

clang/docs/BoundsSafetyImplPlans.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ verify its bounds safety. The implementation relies on LLVM optimizations to
154154
remove redundant run-time checks. Using this optimization strategy, if the
155155
original source code already has bounds checks, the fewer additional checks
156156
``-fbounds-safety`` will introduce. The LLVM ``ConstraintElimination`` pass is
157-
design to remove provable redundant checks (please check Florian Hahn’s
157+
designed to remove provable redundant checks (please check Florian Hahn’s
158158
presentation in 2021 LLVM Dev Meeting and the implementation to learn more). In
159159
the following example, ``-fbounds-safety`` implicitly adds the redundant bounds
160160
checks that the optimizer can remove:

clang/docs/ClangLinkerWrapper.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ only for the linker wrapper will be forwarded to the wrapped linker job.
2727

2828
.. code-block:: console
2929
30-
USAGE: clang-linker-wrapper [options] -- <options to passed to the linker>
30+
USAGE: clang-linker-wrapper [options] -- <options to pass to the linker>
3131
3232
OPTIONS:
3333
--cuda-path=<dir> Set the system CUDA path

clang/docs/ClangNVLinkWrapper.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Clang nvlink Wrapper
1010
Introduction
1111
============
1212

13-
This tools works as a wrapper around the NVIDIA ``nvlink`` linker. The purpose
13+
This tool works as a wrapper around the NVIDIA ``nvlink`` linker. The purpose
1414
of this wrapper is to provide an interface similar to the ``ld.lld`` linker
1515
while still relying on NVIDIA's proprietary linker to produce the final output.
1616

@@ -37,7 +37,7 @@ only for the linker wrapper will be forwarded to ``nvlink``.
3737
--arch <value> Specify the 'sm_' name of the target architecture.
3838
--cuda-path=<dir> Set the system CUDA path
3939
--dry-run Print generated commands without running.
40-
--feature <value> Specify the '+ptx' freature to use for LTO.
40+
--feature <value> Specify the '+ptx' feature to use for LTO.
4141
-g Specify that this was a debug compile.
4242
-help-hidden Display all available options
4343
-help Display available options (--help-hidden for more)

clang/docs/ClangPlugins.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ passed to the plugin can.
150150
-fplugin-arg-call_super_plugin-help \
151151
test.cpp
152152
153-
If your plugin name contains dashes, either rename the plugin or used the
153+
If your plugin name contains dashes, either rename the plugin or use the
154154
cc1 command line options listed below.
155155

156156

clang/docs/ClangTools.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ in a fast, command line interface. It can also accept flags to re-display the
6666
diagnostics in different formats with different flags, suitable for use driving
6767
an IDE or editor. Furthermore, it can be used in fixit-mode to directly apply
6868
fixit-hints offered by clang. See :doc:`HowToSetupToolingForLLVM` for
69-
instructions on how to setup and used `clang-check`.
69+
instructions on how to setup and use `clang-check`.
7070

7171
``clang-format``
7272
----------------

clang/docs/ConstantInterpreter.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ pointer goes out of scope, dead blocks are also deallocated.
140140
The lifetime of blocks is managed through 3 methods stored in the
141141
descriptor of the block:
142142

143-
* **CtorFn**: initializes the metadata which is store in the block,
143+
* **CtorFn**: initializes the metadata which is stored in the block,
144144
alongside actual data. Invokes the default constructors of objects
145145
which are not trivial (``Pointer``, ``RealFP``, etc.)
146146

0 commit comments

Comments
 (0)