mirror of
https://github.com/capstone-engine/llvm-capstone.git
synced 2024-12-11 17:08:42 +00:00
Fix typos found by http://github.com/lyda/misspell-check
llvm-svn: 157886
This commit is contained in:
parent
bde9176663
commit
474261af7b
@ -1863,7 +1863,7 @@ of these annotations. A program is ill-formed if it annotates the
|
||||
same function with both <tt>cf_audited_transfer</tt>
|
||||
and <tt>cf_unknown_transfer</tt>.</p>
|
||||
|
||||
<p>A pragma is provided to faciliate the mass annotation of interfaces:</p>
|
||||
<p>A pragma is provided to facilitate the mass annotation of interfaces:</p>
|
||||
|
||||
<pre>#pragma arc_cf_code_audited begin
|
||||
...
|
||||
|
@ -34,7 +34,7 @@
|
||||
ThreadSanitizer is a tool that detects data races. <BR>
|
||||
It consists of a compiler instrumentation module and a run-time library. <BR>
|
||||
Typical slowdown introduced by ThreadSanitizer is <b>5x-15x</b> (TODO: these numbers are
|
||||
aproximate so far).
|
||||
approximate so far).
|
||||
|
||||
<h2 id="howtobuild">How to build</h2>
|
||||
Follow the <a href="../get_started.html">clang build instructions</a>. <BR>
|
||||
|
@ -33,7 +33,7 @@ when you have a good reason not to use LibClang.</p>
|
||||
<ul>
|
||||
<li>want to interface with clang from other languages than C++</li>
|
||||
<li>need a stable interface that takes care to be backwards compatible</li>
|
||||
<li>want powerful high-level abstractions, like iterating throught an AST
|
||||
<li>want powerful high-level abstractions, like iterating through an AST
|
||||
with a cursor, and don't want to learn all the nitty gritty details of Clang's
|
||||
AST.</li>
|
||||
</ul>
|
||||
|
@ -3260,7 +3260,7 @@ CINDEX_LINKAGE CXCursor clang_getSpecializedCursorTemplate(CXCursor C);
|
||||
* \param PieceIndex For contiguous names or when passing the flag
|
||||
* CXNameRange_WantSinglePiece, only one piece with index 0 is
|
||||
* available. When the CXNameRange_WantSinglePiece flag is not passed for a
|
||||
* non-contiguous names, this index can be used to retreive the individual
|
||||
* non-contiguous names, this index can be used to retrieve the individual
|
||||
* pieces of the name. See also CXNameRange_WantSinglePiece.
|
||||
*
|
||||
* \returns The piece of the name pointed to by the given cursor. If there is no
|
||||
|
@ -501,7 +501,7 @@ public:
|
||||
/// something like "default" (meaning that the symbol is visible
|
||||
/// outside this shared object) and "hidden" (meaning that it isn't)
|
||||
/// visibilities, but "protected" is really an ELF-specific concept
|
||||
/// with wierd semantics designed around the convenience of dynamic
|
||||
/// with weird semantics designed around the convenience of dynamic
|
||||
/// linker implementations. Which is not to suggest that there's
|
||||
/// consistent target-independent semantics for "default" visibility
|
||||
/// either; the entire thing is pretty badly mangled.
|
||||
|
@ -177,7 +177,7 @@ private:
|
||||
/// \brief Cache of all the ToolChains in use by the driver.
|
||||
///
|
||||
/// This maps from the string representation of a triple to a ToolChain
|
||||
/// created targetting that triple. The driver owns all the ToolChain objects
|
||||
/// created targeting that triple. The driver owns all the ToolChain objects
|
||||
/// stored in it, and will clean them up when torn down.
|
||||
mutable llvm::StringMap<ToolChain *> ToolChains;
|
||||
|
||||
|
@ -59,7 +59,7 @@ public:
|
||||
///
|
||||
/// This is a static helper to handle the line wrapping, colorizing, and
|
||||
/// rendering of a diagnostic message to a particular ostream. It is
|
||||
/// publically visible so that clients which do not have sufficient state to
|
||||
/// publicly visible so that clients which do not have sufficient state to
|
||||
/// build a complete TextDiagnostic object can still get consistent
|
||||
/// formatting of their diagnostic messages.
|
||||
///
|
||||
|
@ -2692,7 +2692,7 @@ public:
|
||||
/// this variable in the innermost block or lambda. Only valid when the
|
||||
/// variable can be captured.
|
||||
///
|
||||
/// \param DeclRefType Will be set to the type of a refernce to the capture
|
||||
/// \param DeclRefType Will be set to the type of a reference to the capture
|
||||
/// from within the current scope. Only valid when the variable can be
|
||||
/// captured.
|
||||
///
|
||||
|
@ -657,7 +657,7 @@ void CXXNameMangler::mangleFloat(const llvm::APFloat &f) {
|
||||
// mistake; see the discussion on cxx-abi-dev beginning on
|
||||
// 2012-01-16.
|
||||
|
||||
// Our requirements here are just barely wierd enough to justify
|
||||
// Our requirements here are just barely weird enough to justify
|
||||
// using a custom algorithm instead of post-processing APInt::toString().
|
||||
|
||||
llvm::APInt valueBits = f.bitcastToAPInt();
|
||||
@ -2992,7 +2992,7 @@ void CXXNameMangler::mangleFunctionParam(const ParmVarDecl *parm) {
|
||||
|
||||
// Top-level qualifiers. We don't have to worry about arrays here,
|
||||
// because parameters declared as arrays should already have been
|
||||
// tranformed to have pointer type. FIXME: apparently these don't
|
||||
// transformed to have pointer type. FIXME: apparently these don't
|
||||
// get mangled if used as an rvalue of a known non-class type?
|
||||
assert(!parm->getType()->isArrayType()
|
||||
&& "parameter's type is still an array type?");
|
||||
|
@ -361,7 +361,7 @@ namespace {
|
||||
|
||||
virtual void Initialize(ASTContext &context);
|
||||
|
||||
// Misc. AST transformation routines. Somtimes they end up calling
|
||||
// Misc. AST transformation routines. Sometimes they end up calling
|
||||
// rewriting routines on the new ASTs.
|
||||
CallExpr *SynthesizeCallToFunctionDecl(FunctionDecl *FD,
|
||||
Expr **args, unsigned nargs,
|
||||
|
@ -349,7 +349,7 @@ namespace {
|
||||
virtual void RewriteIvarOffsetComputation(ObjCIvarDecl *ivar,
|
||||
std::string &Result) = 0;
|
||||
|
||||
// Misc. AST transformation routines. Somtimes they end up calling
|
||||
// Misc. AST transformation routines. Sometimes they end up calling
|
||||
// rewriting routines on the new ASTs.
|
||||
CallExpr *SynthesizeCallToFunctionDecl(FunctionDecl *FD,
|
||||
Expr **args, unsigned nargs,
|
||||
|
@ -4375,7 +4375,7 @@ static void handleDelayedForbiddenType(Sema &S, DelayedDiagnostic &diag,
|
||||
}
|
||||
if (S.getLangOpts().ObjCAutoRefCount)
|
||||
if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(decl)) {
|
||||
// FIXME. we may want to supress diagnostics for all
|
||||
// FIXME: we may want to suppress diagnostics for all
|
||||
// kind of forbidden type messages on unavailable functions.
|
||||
if (FD->hasAttr<UnavailableAttr>() &&
|
||||
diag.getForbiddenTypeDiagnostic() ==
|
||||
|
@ -3366,7 +3366,7 @@ class NamespaceSpecifierSet {
|
||||
getNestedNameSpecifierIdentifiers(CurScopeSpec->getScopeRep(),
|
||||
CurNameSpecifierIdentifiers);
|
||||
// Build the list of identifiers that would be used for an absolute
|
||||
// (from the global context) NestedNameSpecifier refering to the current
|
||||
// (from the global context) NestedNameSpecifier referring to the current
|
||||
// context.
|
||||
for (DeclContextList::reverse_iterator C = CurContextChain.rbegin(),
|
||||
CEnd = CurContextChain.rend();
|
||||
|
@ -2736,7 +2736,7 @@ static void transferARCOwnershipToDeclaratorChunk(TypeProcessingState &state,
|
||||
// TODO: mark whether we did this inference?
|
||||
}
|
||||
|
||||
/// \brief Used for transfering ownership in casts resulting in l-values.
|
||||
/// \brief Used for transferring ownership in casts resulting in l-values.
|
||||
static void transferARCOwnership(TypeProcessingState &state,
|
||||
QualType &declSpecTy,
|
||||
Qualifiers::ObjCLifetime ownership) {
|
||||
|
@ -273,7 +273,7 @@ GenericTaintChecker::TaintPropagationRule::getTaintPropagationRule(
|
||||
|
||||
// Skipping the following functions, since they might be used for cleansing
|
||||
// or smart memory copy:
|
||||
// - memccpy - copying untill hitting a special character.
|
||||
// - memccpy - copying until hitting a special character.
|
||||
|
||||
return TaintPropagationRule();
|
||||
}
|
||||
|
@ -1286,7 +1286,7 @@ bool MallocChecker::doesNotFreeMemory(const CallOrObjCMessage *Call,
|
||||
// White list the 'XXXNoCopy' ObjC functions.
|
||||
if (FName.endswith("NoCopy")) {
|
||||
// Look for the deallocator argument. We know that the memory ownership
|
||||
// is not transfered only if the deallocator argument is
|
||||
// is not transferred only if the deallocator argument is
|
||||
// 'kCFAllocatorNull'.
|
||||
for (unsigned i = 1; i < Call->getNumArgs(); ++i) {
|
||||
const Expr *ArgE = Call->getArg(i)->IgnoreParenCasts();
|
||||
@ -1368,7 +1368,7 @@ bool MallocChecker::doesNotFreeMemory(const CallOrObjCMessage *Call,
|
||||
}
|
||||
|
||||
// If the first selector ends with NoCopy, assume that the ownership is
|
||||
// transfered as well.
|
||||
// transferred as well.
|
||||
// Ex: [NSData dataWithBytesNoCopy:bytes length:10];
|
||||
if (S.getNameForSlot(0).endswith("NoCopy")) {
|
||||
return false;
|
||||
|
Loading…
Reference in New Issue
Block a user