Skip to content

Commit b7f78fa

Browse files
committed
Fix formatting
1 parent 13a8abb commit b7f78fa

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

clang-tools-extra/docs/clang-tidy/checks/android/cloexec-pipe.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ android-cloexec-pipe
44
====================
55

66
This check detects usage of ``pipe()``. Using ``pipe()`` is not recommended,
7-
``pipe2()`` is the suggested replacement. The check also adds the O_CLOEXEC
7+
``pipe2()`` is the suggested replacement. The check also adds the ``O_CLOEXEC``
88
flag that marks the file descriptor to be closed in child processes.
99
Without this flag a sensitive file descriptor can be leaked to a
1010
child process, potentially into a lower-privileged SELinux domain.

clang-tools-extra/docs/clang-tidy/checks/android/cloexec-pipe2.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
android-cloexec-pipe2
44
=====================
55

6-
This check ensures that pipe2() is called with the O_CLOEXEC flag.
7-
The check also adds the O_CLOEXEC flag that marks the file descriptor
6+
This check ensures that ``pipe2()`` is called with the ``O_CLOEXEC`` flag.
7+
The check also adds the ``O_CLOEXEC`` flag that marks the file descriptor
88
to be closed in child processes.
99
Without this flag a sensitive file descriptor can be leaked to a child process,
1010
potentially into a lower-privileged SELinux domain.

clang-tools-extra/docs/clang-tidy/checks/android/comparison-in-temp-failure-retry.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Example buggy usage looks like:
2222
// Do something with cs.
2323
}
2424
25-
Because TEMP_FAILURE_RETRY will check for whether the result
25+
Because ``TEMP_FAILURE_RETRY`` will check for whether the result
2626
*of the comparison* is ``-1``, and retry if so.
2727

2828
If you encounter this, the fix is simple: lift the comparison out of the

clang-tools-extra/docs/clang-tidy/checks/bugprone/assignment-in-if-condition.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ equality tests.
99

1010
This check finds all assignments within `if` conditions, including ones that
1111
are not flagged by `-Wparentheses` due to an extra set of parentheses, and
12-
including assignments that call an overloaded `operator=()`. The identified
12+
including assignments that call an overloaded ``operator=()``. The identified
1313
assignments violate
1414
`BARR group "Rule 8.2.c" <https://barrgroup.com/embedded-systems/books/embedded-c-coding-standard/statement-rules/if-else-statements>`_.
1515

clang-tools-extra/docs/clang-tidy/checks/bugprone/suspicious-enum-usage.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ bitmask if the three conditions below are true at the same time:
2323
So whenever the non pow-of-2 element is used as a bitmask element we diagnose a
2424
misuse and give a warning.
2525

26-
2. Investigating the right hand side of `+=` and `|=` operator.
27-
3. Check only the enum value side of a `|` and `+` operator if one of them is
28-
not enum val.
29-
4. Check both side of `|` or `+` operator where the enum values are from the
30-
same enum type.
26+
2. Investigating the right hand side of ``+=`` and ``|=`` operator.
27+
3. Check only the enum value side of a ``|`` and ``+`` operator if one of
28+
them is not enum val.
29+
4. Check both side of ``|`` or ``+`` operator where the enum values are from
30+
the same enum type.
3131

3232
Examples:
3333

0 commit comments

Comments
 (0)