diff options
author | Hiroshi Inoue <inouehrs@jp.ibm.com> | 2018-01-22 07:44:38 +0000 |
---|---|---|
committer | Hiroshi Inoue <inouehrs@jp.ibm.com> | 2018-01-22 07:44:38 +0000 |
commit | ee91cd8cc8f7556097251e80046562a42e140483 (patch) | |
tree | a148c9a626fc38b1f78989f28da151ff3f709927 | |
parent | 23a20415d5f95650e2e51200580ca97f2df1061c (diff) | |
download | clang-ee91cd8cc8f7556097251e80046562a42e140483.tar.gz |
[NFC] fix trivial typos in comments
"the the" -> "the"
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@323078 91177308-0d34-0410-b5e6-96231b3b80d8
-rw-r--r-- | lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp | 2 | ||||
-rw-r--r-- | lib/StaticAnalyzer/Checkers/GTestChecker.cpp | 2 | ||||
-rw-r--r-- | test/Analysis/copypaste/macro-complexity.cpp | 2 | ||||
-rw-r--r-- | test/Analysis/malloc-custom.c | 2 | ||||
-rwxr-xr-x | utils/analyzer/SATestAdd.py | 4 | ||||
-rw-r--r-- | www/cxx_status.html | 2 |
6 files changed, 7 insertions, 7 deletions
diff --git a/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp b/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp index 2818c9d9fd..b67ba7e9f4 100644 --- a/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp +++ b/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp @@ -645,7 +645,7 @@ ObjCDeallocChecker::findPropertyOnDeallocatingInstance( bool ObjCDeallocChecker::diagnoseExtraRelease(SymbolRef ReleasedValue, const ObjCMethodCall &M, CheckerContext &C) const { - // Try to get the region from which the the released value was loaded. + // Try to get the region from which the released value was loaded. // Note that, unlike diagnosing for missing releases, here we don't track // values that must not be released in the state. This is because even if // these values escape, it is still an error under the rules of MRR to diff --git a/lib/StaticAnalyzer/Checkers/GTestChecker.cpp b/lib/StaticAnalyzer/Checkers/GTestChecker.cpp index f0be41b293..3ef95e673b 100644 --- a/lib/StaticAnalyzer/Checkers/GTestChecker.cpp +++ b/lib/StaticAnalyzer/Checkers/GTestChecker.cpp @@ -161,7 +161,7 @@ void GTestChecker::modelAssertionResultCopyConstructor( const CXXConstructorCall *Call, CheckerContext &C) const { assert(Call->getNumArgs() == 1); - // The first parameter of the the copy constructor must be the other + // The first parameter of the copy constructor must be the other // instance to initialize this instances fields from. SVal OtherVal = Call->getArgSVal(0); SVal ThisVal = Call->getCXXThisVal(); diff --git a/test/Analysis/copypaste/macro-complexity.cpp b/test/Analysis/copypaste/macro-complexity.cpp index 70d3f0c748..db90236d0a 100644 --- a/test/Analysis/copypaste/macro-complexity.cpp +++ b/test/Analysis/copypaste/macro-complexity.cpp @@ -1,7 +1,7 @@ // RUN: %clang_analyze_cc1 -std=c++11 -analyzer-checker=alpha.clone.CloneChecker -analyzer-config alpha.clone.CloneChecker:MinimumCloneComplexity=10 -verify %s // Tests that the complexity value of a macro expansion is about the same as -// the complexity value of a normal function call and the the macro body doesn't +// the complexity value of a normal function call and the macro body doesn't // influence the complexity. See the CloneSignature class in CloneDetection.h // for more information about complexity values of clones. diff --git a/test/Analysis/malloc-custom.c b/test/Analysis/malloc-custom.c index f33b150de6..053d0ee31c 100644 --- a/test/Analysis/malloc-custom.c +++ b/test/Analysis/malloc-custom.c @@ -1,6 +1,6 @@ // RUN: %clang_analyze_cc1 -analyzer-checker=core,unix.Malloc -Wno-incompatible-library-redeclaration -verify %s -// Various tests to make the the analyzer is robust against custom +// Various tests to make the analyzer is robust against custom // redeclarations of memory routines. // // You wouldn't expect to see much of this in normal code, but, for example, diff --git a/utils/analyzer/SATestAdd.py b/utils/analyzer/SATestAdd.py index 4c3e35cdcb..041b24409f 100755 --- a/utils/analyzer/SATestAdd.py +++ b/utils/analyzer/SATestAdd.py @@ -32,11 +32,11 @@ the Repository Directory. (e.g., to adapt to newer version of clang) that should be applied to CachedSource before analysis. To construct this patch, - run the the download script to download + run the download script to download the project to CachedSource, copy the CachedSource to another directory (for example, PatchedSource) and make any - needed modifications to the the copied + needed modifications to the copied source. Then run: diff -ur CachedSource PatchedSource \ diff --git a/www/cxx_status.html b/www/cxx_status.html index 265e226362..ed9a339c17 100644 --- a/www/cxx_status.html +++ b/www/cxx_status.html @@ -766,7 +766,7 @@ left to right in the callee. As a result, function parameters in calls to functions using expression syntax are no longer guaranteed to be destroyed in reverse construction order in that ABI. </span><br> -<span id="p0522">(12): Despite being the the resolution to a Defect Report, this +<span id="p0522">(12): Despite being the resolution to a Defect Report, this feature is disabled by default in all language versions, and can be enabled explicitly with the flag <tt>-frelaxed-template-template-args</tt> in Clang 4 onwards. |