Author: jryans Date: Thu May 30 09:46:22 2019 New Revision: 362113 URL: http://llvm.org/viewvc/llvm-project?rev=362113&view=rev Log: [Docs] Modernize references to macOS
Summary: This updates all places in documentation that refer to "Mac OS X", "OS X", etc. to instead use the modern name "macOS" when no specific version number is mentioned. If a specific version is mentioned, this attempts to use the OS name at the time of that version: * Mac OS X for 10.0 - 10.7 * OS X for 10.8 - 10.11 * macOS for 10.12 - present Reviewers: JDevlieghere Subscribers: mgorny, christof, arphaman, cfe-commits, lldb-commits, libcxx-commits, llvm-commits Tags: #clang, #lldb, #libc, #llvm Differential Revision: https://reviews.llvm.org/D62654 Modified: cfe/trunk/docs/AddressSanitizer.rst cfe/trunk/docs/AutomaticReferenceCounting.rst cfe/trunk/docs/ClangCommandLineReference.rst cfe/trunk/docs/CommandGuide/clang.rst cfe/trunk/docs/LeakSanitizer.rst cfe/trunk/docs/Modules.rst cfe/trunk/docs/SafeStack.rst cfe/trunk/docs/UndefinedBehaviorSanitizer.rst cfe/trunk/docs/UsersManual.rst cfe/trunk/docs/analyzer/checkers.rst cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst Modified: cfe/trunk/docs/AddressSanitizer.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AddressSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/AddressSanitizer.rst (original) +++ cfe/trunk/docs/AddressSanitizer.rst Thu May 30 09:46:22 2019 @@ -119,7 +119,7 @@ force disabled by setting ``ASAN_OPTIONS #1 0x7f7ddabcac4d in __libc_start_main ??:0 ... -Note that on OS X you may need to run ``dsymutil`` on your binary to have the +Note that on macOS you may need to run ``dsymutil`` on your binary to have the file\:line info in the AddressSanitizer reports. Additional Checks @@ -134,14 +134,14 @@ globals defined in another translation u you should set environment variable ``ASAN_OPTIONS=check_initialization_order=1``. -Note that this option is not supported on OS X. +Note that this option is not supported on macOS. Memory leak detection --------------------- For more information on leak detector in AddressSanitizer, see :doc:`LeakSanitizer`. The leak detection is turned on by default on Linux, -and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on OS X; +and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on macOS; however, it is not yet supported on other platforms. Issue Suppression @@ -273,7 +273,7 @@ Supported Platforms AddressSanitizer is supported on: * Linux i386/x86\_64 (tested on Ubuntu 12.04) -* OS X 10.7 - 10.11 (i386/x86\_64) +* macOS 10.7 - 10.11 (i386/x86\_64) * iOS Simulator * Android ARM * NetBSD i386/x86\_64 Modified: cfe/trunk/docs/AutomaticReferenceCounting.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AutomaticReferenceCounting.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/AutomaticReferenceCounting.rst (original) +++ cfe/trunk/docs/AutomaticReferenceCounting.rst Thu May 30 09:46:22 2019 @@ -268,7 +268,7 @@ ARC's semantics and restrictions. * There must be reliable conventions for whether and when "ownership" is passed between caller and callee, for both arguments and return values. Objective-C methods follow such a convention very reliably, at least for - system libraries on Mac OS X, and functions always pass objects at +0. The + system libraries on macOS, and functions always pass objects at +0. The C-based APIs for Core Foundation objects, on the other hand, have much more varied transfer semantics. Modified: cfe/trunk/docs/ClangCommandLineReference.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ClangCommandLineReference.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/ClangCommandLineReference.rst (original) +++ cfe/trunk/docs/ClangCommandLineReference.rst Thu May 30 09:46:22 2019 @@ -2218,7 +2218,7 @@ Generate branches with extended addressa .. option:: -mmacosx-version-min=<arg>, -mmacos-version-min=<arg> -Set Mac OS X deployment target +Set macOS deployment target .. option:: -mmcu=<arg> Modified: cfe/trunk/docs/CommandGuide/clang.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/CommandGuide/clang.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/CommandGuide/clang.rst (original) +++ cfe/trunk/docs/CommandGuide/clang.rst Thu May 30 09:46:22 2019 @@ -316,7 +316,7 @@ number of cross compilers, or may only s .. option:: -mmacosx-version-min=<version> - When building for Mac OS X, specify the minimum version supported by your + When building for macOS, specify the minimum version supported by your application. .. option:: -miphoneos-version-min Modified: cfe/trunk/docs/LeakSanitizer.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/LeakSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/LeakSanitizer.rst (original) +++ cfe/trunk/docs/LeakSanitizer.rst Thu May 30 09:46:22 2019 @@ -17,7 +17,7 @@ detection phase. Usage ===== -LeakSanitizer is supported on x86\_64 Linux and OS X. In order to use it, +LeakSanitizer is supported on x86\_64 Linux and macOS. In order to use it, simply build your program with :doc:`AddressSanitizer`: .. code-block:: console Modified: cfe/trunk/docs/Modules.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/Modules.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/Modules.rst (original) +++ cfe/trunk/docs/Modules.rst Thu May 30 09:46:22 2019 @@ -360,7 +360,7 @@ The *module-id* should consist of only a The ``explicit`` qualifier can only be applied to a submodule, i.e., a module that is nested within another module. The contents of explicit submodules are only made available when the submodule itself was explicitly named in an import declaration or was re-exported from an imported module. -The ``framework`` qualifier specifies that this module corresponds to a Darwin-style framework. A Darwin-style framework (used primarily on Mac OS X and iOS) is contained entirely in directory ``Name.framework``, where ``Name`` is the name of the framework (and, therefore, the name of the module). That directory has the following layout: +The ``framework`` qualifier specifies that this module corresponds to a Darwin-style framework. A Darwin-style framework (used primarily on macOS and iOS) is contained entirely in directory ``Name.framework``, where ``Name`` is the name of the framework (and, therefore, the name of the module). That directory has the following layout: .. parsed-literal:: Modified: cfe/trunk/docs/SafeStack.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/SafeStack.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/SafeStack.rst (original) +++ cfe/trunk/docs/SafeStack.rst Thu May 30 09:46:22 2019 @@ -126,7 +126,7 @@ and link command lines. Supported Platforms ------------------- -SafeStack was tested on Linux, NetBSD, FreeBSD and MacOSX. +SafeStack was tested on Linux, NetBSD, FreeBSD and macOS. Low-level API ------------- Modified: cfe/trunk/docs/UndefinedBehaviorSanitizer.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UndefinedBehaviorSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/UndefinedBehaviorSanitizer.rst (original) +++ cfe/trunk/docs/UndefinedBehaviorSanitizer.rst Thu May 30 09:46:22 2019 @@ -295,7 +295,7 @@ UndefinedBehaviorSanitizer is supported * NetBSD * FreeBSD * OpenBSD -* OS X 10.6 onwards +* macOS * Windows The runtime library is relatively portable and platform independent. If the OS Modified: cfe/trunk/docs/UsersManual.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UsersManual.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/UsersManual.rst (original) +++ cfe/trunk/docs/UsersManual.rst Thu May 30 09:46:22 2019 @@ -1006,7 +1006,7 @@ on-disk cache that contains the vital in some of the work needed to process a corresponding header file. While details of precompiled headers vary between compilers, precompiled headers have been shown to be highly effective at speeding up program -compilation on systems with very large system headers (e.g., Mac OS X). +compilation on systems with very large system headers (e.g., macOS). Generating a PCH File ^^^^^^^^^^^^^^^^^^^^^ @@ -2746,7 +2746,7 @@ X86 ^^^ The support for X86 (both 32-bit and 64-bit) is considered stable on -Darwin (Mac OS X), Linux, FreeBSD, and Dragonfly BSD: it has been tested +Darwin (macOS), Linux, FreeBSD, and Dragonfly BSD: it has been tested to correctly compile many large C, C++, Objective-C, and Objective-C++ codebases. @@ -2801,8 +2801,8 @@ backend. Operating System Features and Limitations ----------------------------------------- -Darwin (Mac OS X) -^^^^^^^^^^^^^^^^^ +Darwin (macOS) +^^^^^^^^^^^^^^ Thread Sanitizer is not supported. Modified: cfe/trunk/docs/analyzer/checkers.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/analyzer/checkers.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/analyzer/checkers.rst (original) +++ cfe/trunk/docs/analyzer/checkers.rst Thu May 30 09:46:22 2019 @@ -778,7 +778,7 @@ Check for null pointers being passed as osx ^^^ -OS X checkers. +macOS checkers. osx.API (C) """"""""""" Modified: cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst?rev=362113&r1=362112&r2=362113&view=diff ============================================================================== --- cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst (original) +++ cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst Thu May 30 09:46:22 2019 @@ -15,7 +15,7 @@ General Analysis Dumpers These checkers are used to dump the results of various infrastructural analyses to stderr. Some checkers also have "view" variants, which will display a graph -using a 'dot' format viewer (such as Graphviz on OS X) instead. +using a 'dot' format viewer (such as Graphviz on macOS) instead. - debug.DumpCallGraph, debug.ViewCallGraph: Show the call graph generated for the current translation unit. This is used to determine the order in which to _______________________________________________ cfe-commits mailing list cfe-commits@lists.llvm.org https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits