-
Notifications
You must be signed in to change notification settings - Fork 15.3k
[clang-tidy][docs][NFC] Enforce 80 characters limit (2/N) #167632
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Member
|
@llvm/pr-subscribers-clang-tidy @llvm/pr-subscribers-clang-tools-extra Author: mitchell (zeyi2) ChangesFix documentation in This is part of the codebase cleanup described in #167098 Patch is 44.61 KiB, truncated to 20.00 KiB below, full version: https://github.com/llvm/llvm-project/pull/167632.diff 49 Files Affected:
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst
index 2a1d5173dd756..95f70d8d4f514 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst
@@ -6,5 +6,6 @@ cert-con36-c
============
The `cert-con36-c` check is an alias, please see
-:doc:`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions>`
+:doc:`bugprone-spuriously-wake-up-functions
+<../bugprone/spuriously-wake-up-functions>`
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst
index 3b4039d7d4ec0..c8cc8bd613a87 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst
@@ -6,5 +6,6 @@ cert-con54-cpp
==============
The `cert-con54-cpp` check is an alias, please see
-:doc:`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions>`
+:doc:`bugprone-spuriously-wake-up-functions
+<../bugprone/spuriously-wake-up-functions>`
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/ctr56-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/ctr56-cpp.rst
index e42acbe552359..78afc2f7ab8d5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/ctr56-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/ctr56-cpp.rst
@@ -7,4 +7,4 @@ cert-ctr56-cpp
The `cert-ctr56-cpp` check is an alias, please see
:doc:`bugprone-pointer-arithmetic-on-polymorphic-object
-<../bugprone/pointer-arithmetic-on-polymorphic-object>` for more information.
\ No newline at end of file
+<../bugprone/pointer-arithmetic-on-polymorphic-object>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst
index 7a5b63db1782c..977a0a58eac0d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst
@@ -6,4 +6,5 @@ cert-dcl16-c
============
The `cert-dcl16-c` check is an alias, please see
-:doc:`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix>` for more information.
+:doc:`readability-uppercase-literal-suffix
+<../readability/uppercase-literal-suffix>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl50-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl50-cpp.rst
index 719e03d6918d1..67701e572d394 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl50-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl50-cpp.rst
@@ -6,7 +6,8 @@ cert-dcl50-cpp
==============
The `cert-dcl50-cpp` check is an alias, please see
-`modernize-avoid-variadic-functions <../modernize/avoid-variadic-functions.html>`_
+`modernize-avoid-variadic-functions
+<../modernize/avoid-variadic-functions.html>`_
for more information.
This check corresponds to the CERT C++ Coding Standard rule
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl58-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl58-cpp.rst
index 1b8c2c4f97dde..42ea56907a1ef 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl58-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl58-cpp.rst
@@ -4,7 +4,8 @@ cert-dcl58-cpp
==============
The `cert-dcl58-cpp` is an aliaes, please see
-`bugprone-std-namespace-modification <../bugprone/std-namespace-modification.html>`_
+`bugprone-std-namespace-modification
+<../bugprone/std-namespace-modification.html>`_
for more information.
This check corresponds to the CERT C++ Coding Standard rule
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst
index 9aeed141d655d..027d2eca09195 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst
@@ -6,4 +6,5 @@ cert-dcl59-cpp
==============
The `cert-dcl59-cpp` check is an alias, please see
-:doc:`google-build-namespaces <../google/build-namespaces>` for more information.
+:doc:`google-build-namespaces <../google/build-namespaces>`
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst
index 1a9c0f9d7cbed..65d3a60f53d71 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst
@@ -6,10 +6,12 @@ cert-err09-cpp
==============
The `cert-err09-cpp` check is an alias, please see
-:doc:`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference>`
+:doc:`misc-throw-by-value-catch-by-reference
+<../misc/throw-by-value-catch-by-reference>`
for more information.
This check corresponds to the CERT C++ Coding Standard recommendation
-ERR09-CPP. Throw anonymous temporaries. However, all of the CERT recommendations
-have been removed from public view, and so their justification for the behavior
-of this check requires an account on their wiki to view.
+ERR09-CPP. Throw anonymous temporaries. However, all of the CERT
+recommendations have been removed from public view, and so their
+justification for the behavior of this check requires an account on
+their wiki to view.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst
index 9bcc5f9c3823c..75da669c0a2b3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst
@@ -186,8 +186,8 @@ functions are checked:
* wscanf()
* wscanf_s()
-This check is an alias of check :doc:`bugprone-unused-return-value <../bugprone/unused-return-value>`
-with a fixed set of functions.
+This check is an alias of check :doc:`bugprone-unused-return-value
+<../bugprone/unused-return-value>` with a fixed set of functions.
Suppressing issues by casting to ``void`` is enabled by default and can be
disabled by setting `AllowCastToVoid` option to `false`.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err34-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err34-c.rst
index dc3f6329dfb67..068da4b0936f3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err34-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err34-c.rst
@@ -6,5 +6,6 @@ cert-err34-c
============
The cert-err34-c check is an alias, please see
-`bugprone-unchecked-string-to-number-conversion <../bugprone/unchecked-string-to-number-conversion.html>`_
+`bugprone-unchecked-string-to-number-conversion
+<../bugprone/unchecked-string-to-number-conversion.html>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err58-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err58-cpp.rst
index 4db0727864cef..839b77bc60126 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err58-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err58-cpp.rst
@@ -6,7 +6,8 @@ cert-err58-cpp
==============
The `cert-err58-cpp` check is an alias, please see
-`bugprone-throwing-static-initialization <../bugprone/throwing-static-initialization.html>`_
+`bugprone-throwing-static-initialization
+<../bugprone/throwing-static-initialization.html>`_
for more information.
This check corresponds to the CERT C++ Coding Standard rule
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err60-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err60-cpp.rst
index 9fcb840fc06f8..a1d6866afd853 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err60-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err60-cpp.rst
@@ -3,8 +3,8 @@
cert-err60-cpp
==============
-This check flags all throw expressions where the exception object is not nothrow
-copy constructible.
+This check flags all throw expressions where the exception object is not
+nothrow copy constructible.
This check corresponds to the CERT C++ Coding Standard rule
`ERR60-CPP. Exception objects must be nothrow copy constructible
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst
index 96007952c0e2a..2cf78132d11ee 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst
@@ -6,5 +6,6 @@ cert-err61-cpp
==============
The `cert-err61-cpp` check is an alias, please see
-:doc:`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference>`
+:doc:`misc-throw-by-value-catch-by-reference
+<../misc/throw-by-value-catch-by-reference>`
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst
index 03a3679dba4e2..69f9c7a34d2f9 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst
@@ -5,4 +5,5 @@ cert-exp42-c
============
The `cert-exp42-c` check is an alias, please see
-:doc:`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison>` for more information.
+:doc:`bugprone-suspicious-memory-comparison
+<../bugprone/suspicious-memory-comparison>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst
index 05277ef99c911..01c354416cced 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst
@@ -5,4 +5,5 @@ cert-flp37-c
============
The `cert-flp37-c` check is an alias, please see
-:doc:`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison>` for more information.
+:doc:`bugprone-suspicious-memory-comparison
+<../bugprone/suspicious-memory-comparison>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/mem57-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/mem57-cpp.rst
index b359d85ad0cdc..1e2145ec6581c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/mem57-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/mem57-cpp.rst
@@ -4,7 +4,8 @@ cert-mem57-cpp
==============
The `cert-mem57-cpp` is an aliaes, please see
-`bugprone-default-operator-new-on-overaligned-type <../bugprone/default-operator-new-on-overaligned-type.html>`_
+`bugprone-default-operator-new-on-overaligned-type
+<../bugprone/default-operator-new-on-overaligned-type.html>`_
for more information.
This check corresponds to the CERT C++ Coding Standard rule
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc50-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc50-cpp.rst
index debf01cf2d332..3f4b2a8cde680 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc50-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc50-cpp.rst
@@ -3,9 +3,9 @@
cert-msc50-cpp
==============
-Pseudorandom number generators use mathematical algorithms to produce a sequence
-of numbers with good statistical properties, but the numbers produced are not
-genuinely random. The ``std::rand()`` function takes a seed (number), runs a
-mathematical operation on it and returns the result. By manipulating the seed
-the result can be predictable. This check warns for the usage of
-``std::rand()``.
+Pseudorandom number generators use mathematical algorithms to produce a
+sequence of numbers with good statistical properties, but the numbers
+produced are not genuinely random. The ``std::rand()`` function takes a
+seed (number), runs a mathematical operation on it and returns the result.
+By manipulating the seed the result can be predictable. This check warns
+for the usage of ``std::rand()``.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc51-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc51-cpp.rst
index 99e550aef0e7a..688a48a8b0fb8 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc51-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc51-cpp.rst
@@ -4,10 +4,11 @@ cert-msc51-cpp
==============
This check flags all pseudo-random number engines, engine adaptor
-instantiations and ``srand()`` when initialized or seeded with default argument,
-constant expression or any user-configurable type. Pseudo-random number
-engines seeded with a predictable value may cause vulnerabilities e.g. in
-security protocols.
+instantiations and ``srand()`` when initialized or seeded with default
+argument, constant expression or any user-configurable type.
+Pseudo-random number engines seeded with a predictable value may cause
+vulnerabilities e.g. in security protocols.
+
This is a CERT security rule, see
`MSC51-CPP. Ensure your random number generator is properly seeded
<https://wiki.sei.cmu.edu/confluence/display/cplusplus/MSC51-CPP.+Ensure+your+random+number+generator+is+properly+seeded>`_ and
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst
index e7c957488507f..1e8b7bb5e7cb9 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst
@@ -6,5 +6,6 @@ cert-oop54-cpp
==============
The `cert-oop54-cpp` check is an alias, please see
-:doc:`bugprone-unhandled-self-assignment <../bugprone/unhandled-self-assignment>`
+:doc:`bugprone-unhandled-self-assignment
+<../bugprone/unhandled-self-assignment>`
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/oop57-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/oop57-cpp.rst
index 414f788bf2500..2f3d4f8803409 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/oop57-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/oop57-cpp.rst
@@ -6,7 +6,8 @@ cert-oop57-cpp
==============
The `cert-oop57-cpp` check is an alias, please see
-`bugprone-raw-memory-call-on-non-trivial-type <../bugprone/raw-memory-call-on-non-trivial-type.html>`_
+`bugprone-raw-memory-call-on-non-trivial-type
+<../bugprone/raw-memory-call-on-non-trivial-type.html>`_
for more information.
This check corresponds to the CERT C++ Coding Standard rule
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/oop58-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/oop58-cpp.rst
index e435490f0711a..2efa68f22b503 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/oop58-cpp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/oop58-cpp.rst
@@ -6,5 +6,6 @@ cert-oop58-cpp
==============
The `cert-oop58-cpp` check is an alias, please see
-:doc:`bugprone-copy-constructor-mutates-argument <../bugprone/copy-constructor-mutates-argument>`
-for more information.
\ No newline at end of file
+:doc:`bugprone-copy-constructor-mutates-argument
+<../bugprone/copy-constructor-mutates-argument>`
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst
index 2fd6c5c4b99a2..c5141b9a8a1c4 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst
@@ -6,4 +6,5 @@ cert-pos44-c
============
The `cert-pos44-c` check is an alias, please see
-:doc:`bugprone-bad-signal-to-kill-thread <../bugprone/bad-signal-to-kill-thread>` for more information.
+:doc:`bugprone-bad-signal-to-kill-thread
+<../bugprone/bad-signal-to-kill-thread>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst
index 9b62a3ab9a366..ad5570ab04282 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst
@@ -6,4 +6,5 @@ cert-pos47-c
============
The `cert-pos47-c` check is an alias, please see
-:doc:`concurrency-thread-canceltype-asynchronous <../concurrency/thread-canceltype-asynchronous>` for more information.
+:doc:`concurrency-thread-canceltype-asynchronous
+<../concurrency/thread-canceltype-asynchronous>` for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
index b3ba78597a5ba..bb1f5d7e2bdfd 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
@@ -5,12 +5,13 @@
clang-analyzer-security.SetgidSetuidOrder
=========================================
-The checker checks for sequences of ``setuid(getuid())`` and ``setgid(getgid())``
-calls (in this order). If such a sequence is found and there is no other
-privilege-changing function call (``seteuid``, ``setreuid``, ``setresuid`` and
-the GID versions of these) in between, a warning is generated. The checker finds
-only exactly ``setuid(getuid())`` calls (and the GID versions), not for example
-if the result of ``getuid()`` is stored in a variable.
+The checker checks for sequences of ``setuid(getuid())`` and
+``setgid(getgid())`` calls (in this order). If such a sequence is found and
+there is no other privilege-changing function call (``seteuid``, ``setreuid``,
+``setresuid`` and the GID versions of these) in between, a warning is
+generated. The checker finds only exactly ``setuid(getuid())`` calls (and the
+GID versions), not for example if the result of ``getuid()`` is stored in
+a variable.
The `clang-analyzer-security.SetgidSetuidOrder` check is an alias, please see
`Clang Static Analyzer Available Checkers
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
index 4405f721a66dd..d1fc332ed2463 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
@@ -5,5 +5,6 @@ clang-analyzer-security.insecureAPI.decodeValueOfObjCType
Warn on uses of the '-decodeValueOfObjCType:at:' method.
-The clang-analyzer-security.insecureAPI.decodeValueOfObjCType check is an alias of
-Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType.
+The clang-analyzer-security.insecureAPI.decodeValueOfObjCType
+check is an alias of Clang Static Analyzer
+security.insecureAPI.decodeValueOfObjCType.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
index 17906732c86f7..0415dab9927db 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
@@ -5,8 +5,8 @@
clang-analyzer-unix.StdCLibraryFunctions
========================================
-Check for invalid arguments of C standard library functions, and apply relations
-between arguments and return value.
+Check for invalid arguments of C standard library functions, and apply
+relations between arguments and return value.
The `clang-analyzer-unix.StdCLibraryFunctions` check is an alias, please see
`Clang Static Analyzer Available Checkers
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-capturing-lambda-coroutines.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-capturing-lambda-coroutines.rst
index 74ec5045a6bbf..14e5806625b5b 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-capturing-lambda-coroutines.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-capturing-lambda-coroutines.rst
@@ -17,9 +17,9 @@ This issue can occur even with refcounted smart pointers and copyable types.
When a lambda expression creates a coroutine, it results in a closure object
with storage, which is often on the stack and will eventually go o...
[truncated]
|
vbvictor
reviewed
Nov 12, 2025
clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst
Outdated
Show resolved
Hide resolved
clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst
Outdated
Show resolved
Hide resolved
...s-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst
Outdated
Show resolved
Hide resolved
...s-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
Outdated
Show resolved
Hide resolved
...s-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
Outdated
Show resolved
Hide resolved
...s-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
Outdated
Show resolved
Hide resolved
EugeneZelenko
approved these changes
Nov 15, 2025
vbvictor
approved these changes
Nov 16, 2025
aadeshps-mcw
pushed a commit
to aadeshps-mcw/llvm-project
that referenced
this pull request
Nov 26, 2025
Fix documentation in `cert`, `clang-analyzer`, `concurrency`, `cppcoreguidelines`, `darwin`, `fuchsia` and `google`. This is part of the codebase cleanup described in [llvm#167098](llvm#167098)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fix documentation in
cert,clang-analyzer,concurrency,cppcoreguidelines,darwin,fuchsiaandgoogle.This is part of the codebase cleanup described in #167098