llvmbot wrote:
<!--LLVM PR SUMMARY COMMENT--> @llvm/pr-subscribers-clang-tools-extra @llvm/pr-subscribers-clang-tidy Author: mitchell (zeyi2) <details> <summary>Changes</summary> This is part of the codebase cleanup described in [#<!-- -->167098](https://github.com/llvm/llvm-project/issues/167098) --- Patch is 35.03 KiB, truncated to 20.00 KiB below, full version: https://github.com/llvm/llvm-project/pull/167103.diff 33 Files Affected: - (modified) clang-tools-extra/docs/clang-tidy/checks/boost/use-ranges.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/capturing-this-in-member-variable.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/crtp-constructor-accessibility.rst (+3-3) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.rst (+5-5) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/raw-memory-call-on-non-trivial-type.rst (+3-3) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/return-const-ref-from-parameter.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/signal-handler.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/string-constructor.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-realloc-usage.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/tagged-union-member-count.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/bugprone/unsafe-functions.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.rst (+4-4) - (modified) clang-tools-extra/docs/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.rst (+3-3) - (modified) clang-tools-extra/docs/clang-tidy/checks/llvm/use-ranges.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/misc/include-cleaner.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/misc/override-with-different-visibility.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/min-max-use-initializer-list.rst (+4-4) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/type-traits.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/use-ranges.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/use-scoped-lock.rst (+3-3) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/use-starts-ends-with.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/use-std-format.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/modernize/use-std-print.rst (+3-3) - (modified) clang-tools-extra/docs/clang-tidy/checks/objc/nsdate-formatter.rst (+26-26) - (modified) clang-tools-extra/docs/clang-tidy/checks/portability/template-virtual-member-function.rst (+5-5) - (modified) clang-tools-extra/docs/clang-tidy/checks/readability/ambiguous-smartptr-reset-call.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/readability/math-missing-parentheses.rst (+2-2) - (modified) clang-tools-extra/docs/clang-tidy/checks/readability/redundant-inline-specifier.rst (+1-1) - (modified) clang-tools-extra/docs/clang-tidy/checks/readability/redundant-parentheses.rst (+1-1) ``````````diff diff --git a/clang-tools-extra/docs/clang-tidy/checks/boost/use-ranges.rst b/clang-tools-extra/docs/clang-tidy/checks/boost/use-ranges.rst index 01b0024684919..6cf54347ad613 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/boost/use-ranges.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/boost/use-ranges.rst @@ -146,7 +146,7 @@ If calls are made using reverse iterators on containers, The code will be fixed using the ``boost::adaptors::reverse`` adaptor. .. code-block:: c++ - + auto AreSame = std::equal(Items1.rbegin(), Items1.rend(), std::crbegin(Items2), std::crend(Items2)); @@ -166,7 +166,7 @@ Options is `llvm`. .. option:: IncludeBoostSystem - + If `true` (default value) the boost headers are included as system headers with angle brackets (`#include <boost.hpp>`), otherwise quotes are used (`#include "boost.hpp"`). diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst index 9fa37c0593815..691b6e4db096b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst @@ -8,7 +8,7 @@ Such assignments are bug-prone because they may have been intended as equality t This check finds all assignments within `if` conditions, including ones that are not flagged by `-Wparentheses` due to an extra set of parentheses, and including assignments that call -an overloaded `operator=()`. The identified assignments violate +an overloaded `operator=()`. The identified assignments violate `BARR group "Rule 8.2.c" <https://barrgroup.com/embedded-systems/books/embedded-c-coding-standard/statement-rules/if-else-statements>`_. .. code-block:: c++ diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/capturing-this-in-member-variable.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/capturing-this-in-member-variable.rst index dfc2ca1bbc7dd..1017462b8806b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/capturing-this-in-member-variable.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/capturing-this-in-member-variable.rst @@ -30,7 +30,7 @@ Possible fixes: - marking copy and move constructors and assignment operators deleted. - using class member method instead of class member variable with function object types. - - passing ``this`` pointer as parameter + - passing ``this`` pointer as parameter. Options ------- diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/crtp-constructor-accessibility.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/crtp-constructor-accessibility.rst index f24abfd1b5f5f..53082f44638b6 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/crtp-constructor-accessibility.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/crtp-constructor-accessibility.rst @@ -6,7 +6,7 @@ bugprone-crtp-constructor-accessibility Detects error-prone Curiously Recurring Template Pattern usage, when the CRTP can be constructed outside itself and the derived class. -The CRTP is an idiom, in which a class derives from a template class, where +The CRTP is an idiom, in which a class derives from a template class, where itself is the template argument. It should be ensured that if a class is intended to be a base class in this idiom, it can only be instantiated if the derived class is its template argument. @@ -23,7 +23,7 @@ Example: class Derived : CRTP<Derived> {}; -Below can be seen some common mistakes that will allow the breaking of the +Below can be seen some common mistakes that will allow the breaking of the idiom. If the constructor of a class intended to be used in a CRTP is public, then @@ -62,7 +62,7 @@ Example: class Bad : CRTP<Good> {}; Bad BadInstance; -To ensure that no accidental instantiation happens, the best practice is to +To ensure that no accidental instantiation happens, the best practice is to make the constructor private and declare the derived class as friend. Note that as a tradeoff, this also gives the derived class access to every other private members of the CRTP. However, constructors can still be public or diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.rst index f544abc14ffbf..aff3e1e6b6fb0 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.rst @@ -7,7 +7,7 @@ Finds derived class methods that shadow a (non-virtual) base class method. In order to be considered "shadowing", methods must have the same signature (i.e. the same name, same number of parameters, same parameter types, etc). -Only checks public, non-templated methods. +Only checks public, non-templated methods. The below example is bugprone because consumers of the ``Derived`` class will expect the ``reset`` method to do the work of ``Base::reset()`` in addition to extra @@ -27,4 +27,4 @@ This is also a violation of the Liskov Substitution Principle. struct Derived : public Base { void reset() {/* reset the derived class, but not the base class */}; - }; \ No newline at end of file + }; diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.rst index cc9e7be70f6ea..968340a6e8f98 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.rst @@ -3,8 +3,8 @@ bugprone-incorrect-enable-shared-from-this ========================================== -Detect classes or structs that do not publicly inherit from -``std::enable_shared_from_this``, because unintended behavior will +Detect classes or structs that do not publicly inherit from +``std::enable_shared_from_this``, because unintended behavior will otherwise occur when calling ``shared_from_this``. Consider the following code: @@ -15,7 +15,7 @@ Consider the following code: // private inheritance class BadExample : std::enable_shared_from_this<BadExample> { - + // ``shared_from_this``` unintended behaviour // `libstdc++` implementation returns uninitialized ``weak_ptr`` public: @@ -29,6 +29,6 @@ Consider the following code: b_ex->bar(); } -Using `libstdc++` implementation, ``shared_from_this`` will throw -``std::bad_weak_ptr``. When ``using_not_public()`` is called, this code will +Using `libstdc++` implementation, ``shared_from_this`` will throw +``std::bad_weak_ptr``. When ``using_not_public()`` is called, this code will crash without exception handling. diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.rst index 95509ef3c724d..2641cfe72e18c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.rst @@ -54,7 +54,7 @@ Options Default: `false`. .. code-block:: c++ - + void bar(Base b[], Derived d[]) { b += 1; // warning, as Base declares a virtual destructor d += 1; // warning only if IgnoreVirtualDeclarationsOnly is set to false diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/raw-memory-call-on-non-trivial-type.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/raw-memory-call-on-non-trivial-type.rst index 0ce7f80e8381d..db3844447b3fd 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/raw-memory-call-on-non-trivial-type.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/raw-memory-call-on-non-trivial-type.rst @@ -16,17 +16,17 @@ Options .. option:: MemSetNames - Specify extra functions to flag that act similarly to ``memset``. Specify + Specify extra functions to flag that act similarly to ``memset``. Specify names in a semicolon-delimited list. Default is an empty string. .. option:: MemCpyNames - Specify extra functions to flag that act similarly to ``memcpy``. Specify + Specify extra functions to flag that act similarly to ``memcpy``. Specify names in a semicolon-delimited list. Default is an empty string. .. option:: MemCmpNames - Specify extra functions to flag that act similarly to ``memcmp``. Specify + Specify extra functions to flag that act similarly to ``memcmp``. Specify names in a semicolon-delimited list. Default is an empty string. This check corresponds to the CERT C++ Coding Standard rule diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/return-const-ref-from-parameter.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/return-const-ref-from-parameter.rst index 325a0a2aa9cc2..00759a2ca003b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/return-const-ref-from-parameter.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/return-const-ref-from-parameter.rst @@ -22,7 +22,7 @@ Example S(int); ~S(); }; - + const S &fn(const S &a) { return a; } @@ -35,7 +35,7 @@ This issue can be resolved by declaring an overload of the problematic function where the ``const &`` parameter is instead declared as ``&&``. The developer has to ensure that the implementation of that function does not produce a use-after-free, the exact error that this check is warning against. -Marking such an ``&&`` overload as ``deleted``, will silence the warning as +Marking such an ``&&`` overload as ``deleted``, will silence the warning as well. In the case of different ``const &`` parameters being returned depending on the control flow of the function, an overload where all problematic ``const &`` parameters have been declared as ``&&`` will resolve the issue. diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/signal-handler.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/signal-handler.rst index 658b6555f1a1c..848fb667e1823 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/signal-handler.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/signal-handler.rst @@ -44,7 +44,7 @@ Options Selects which set of functions is considered as asynchronous-safe (and therefore allowed in signal handlers). It can be set to the following values: - + ``minimal`` Selects a minimal set that is defined in the CERT SIG30-C rule. and includes functions ``abort()``, ``_Exit()``, ``quick_exit()`` and diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/string-constructor.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/string-constructor.rst index a0bd1d7c5bc15..ad4ed895bf012 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/string-constructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/string-constructor.rst @@ -36,7 +36,7 @@ Examples: std::string_view("test", 0); Passing an invalid first character position parameter to constructor will -cause ``std::out_of_range`` exception at runtime. +cause ``std::out_of_range`` exception at runtime. Examples: diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-realloc-usage.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-realloc-usage.rst index 67e416b711b64..25a0d8885689b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-realloc-usage.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-realloc-usage.rst @@ -10,7 +10,7 @@ The problem with this construct is that if ``realloc`` fails it returns a null pointer but does not deallocate the original memory. If no other variable is pointing to it, the original memory block is not available any more for the program to use or free. In either case ``p = realloc(p, size);`` indicates bad -coding style and can be replaced by ``q = realloc(p, size);``. +coding style and can be replaced by ``q = realloc(p, size);``. The pointer expression (used at ``realloc``) can be a variable or a field member of a data structure, but can not contain function calls or unresolved types. diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/tagged-union-member-count.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/tagged-union-member-count.rst index 072b5a3eee20f..a3469dc451562 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/tagged-union-member-count.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/tagged-union-member-count.rst @@ -9,7 +9,7 @@ different from the number of data members inside the union. A struct or a class is considered to be a tagged union if it has exactly one union data member and exactly one enum data member and any number of other data members that are neither unions or enums. -Furthermore, the types of the union and the enum members must +Furthermore, the types of the union and the enum members must not come from system header files nor the ``std`` namespace. Example: diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/unsafe-functions.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/unsafe-functions.rst index 317db9c5564e2..6937c5177b6c2 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/unsafe-functions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/unsafe-functions.rst @@ -86,7 +86,7 @@ checked. The format is the following, without newlines: .. code:: bugprone-unsafe-functions.CustomFunctions=" - functionRegex1[, replacement1[, reason1]]; + functionRegex1[, replacement1[, reason1]]; functionRegex2[, replacement2[, reason2]]; ... " @@ -104,7 +104,7 @@ As an example, the configuration `^original$, replacement, is deprecated;` will produce the following diagnostic message. .. code:: c - + original(); // warning: function 'original' is deprecated; 'replacement' should be used instead. ::std::original(); // no-warning original_function(); // no-warning diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.rst index 1ecdcdb1ed4c7..f45bca684d492 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.rst @@ -42,11 +42,11 @@ Options Semicolon-separated list of regular expressions matching class names that overwrites the default exclusion list. The default is: `::std::map;::std::unordered_map;::std::flat_map`. - + .. option:: FixMode - Determines what fixes are suggested. Either `none`, `at` (use - ``a.at(index)`` if a fitting function exists) or `function` (use a + Determines what fixes are suggested. Either `none`, `at` (use + ``a.at(index)`` if a fitting function exists) or `function` (use a function ``f(a, index)``). The default is `none`. .. option:: FixFunction @@ -54,7 +54,7 @@ Options The function to use in the `function` mode. For C++23 and beyond, the passed function must support the empty subscript operator, i.e., the case where ``a[]`` becomes ``f(a)``. :option:`FixFunctionEmptyArgs` can be - used to override the suggested function in that case. The default is `gsl::at`. + used to override the suggested function in that case. The default is `gsl::at`. .. option:: FixFunctionEmptyArgs diff --git a/clang-tools-extra/docs/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.rst b/clang-tools-extra/docs/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.rst index 85579ca676a68..79179ce808302 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.rst @@ -37,7 +37,7 @@ For example non-compliant code: Should become: .. code-block:: c++ - + // Small anonymous namespace for class declaration namespace { @@ -48,7 +48,7 @@ Should become: }; } - + // placed method definition outside of the anonymous namespace bool StringSort::operator<(const char *RHS) const {} @@ -70,4 +70,4 @@ Options .. option:: AllowMemberFunctionsInClass When `true`, only methods defined in anonymous namespace outside of the - corresponding class will be warned. Default value is `true`. \ No newline at end of file + corresponding class will be warned. Default value is `true`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/llvm/use-ranges.rst b/clang-tools-extra/docs/clang-tidy/checks/llvm/use-ranges.rst index fffa2ff342a36..1a0454703822e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/llvm/use-ranges.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/llvm/use-ranges.rst @@ -12,7 +12,7 @@ Example .. code-block:: c++ auto it = std::find(vec.begin(), vec.end(), value); - bool all = std::all_of(vec.begin(), vec.end(), + bool all = std::all_of(vec.begin(), vec.end(), [](int x) { return x > 0; }); Transforms to: diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst b/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst index 93a5762be189a..18ec10be347dc 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst @@ -99,7 +99,7 @@ Options .. option:: AnalyzePointers Enable or disable the analysis of pointers variables, like - ``int *ptr = &i;``. For specific checks, see + ``int *ptr = &i;``. For specific checks, see :option:`WarnPointersAsValues` and :option:`WarnPointersAsPointers`. Default is `true`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc/include-cleaner.rst b/clang-tools-extra/docs/clang-tidy/checks/misc/include-cleaner.rst index 34833a3dd1aea..4364610787058 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc/include-cleaner.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/misc/include-cleaner.rst @@ -10,7 +10,7 @@ Findings correspond to https://clangd.llvm.org/design/include-cleaner. Example: .. code-block:: c++ - + // foo.h class Foo{}; // bar.h diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc/override-with-different-visibility.rst b/clang-tools-extra/docs/clang-tidy/checks/misc/override-with-different-visibility.rst index 310bfe2b01080..24be51b53c9c4 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc/override-with-different-visibility.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/misc/override-with-different-visibility.rst @@ -20,7 +20,7 @@ the ``using`` keyword is not considered as visibility change by this check. private: virtual void f_priv(); }; - + class B: public A { public: void f_priv(); // warning: changed visibility from private to public diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize/min-max-use-initializer-list.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize/min-max-use-initializer-list.rst index d6721a25629b0..157c447ee4d98 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/modernize/min-max-use-initializer-list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize/min-max-use-initializer-list.rst @@ -3,7 +3,7 @@ modernize-min-max-use-initializer-list ====================================== -Replaces nested ``std::min`` and ``std::max`` calls with an initializer list +Replaces nested ``std::min`` and ``std::max`` calls with an initializer list where applicable. For instance, consider the following code: @@ -21,8 +21,8 @@ The check will transform the above code to: Performance Considerations ========================== -While this check simplifies the code and makes it more readable, it may cause -performance degradation for non-t... [truncated] `````````` </details> https://github.com/llvm/llvm-project/pull/167103 _______________________________________________ cfe-commits mailing list [email protected] https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
