r362113 - [Docs] Modernize references to macOS
J. Ryan Stinnett via cfe-commits
cfe-commits at lists.llvm.org
Thu May 30 09:46:23 PDT 2019
Author: jryans
Date: Thu May 30 09:46:22 2019
New Revision: 362113
URL: http://llvm.org/viewvc/llvm-project?rev=362113&view=rev
Log:
[Docs] Modernize references to macOS
Summary:
This updates all places in documentation that refer to "Mac OS X", "OS X", etc.
to instead use the modern name "macOS" when no specific version number is
mentioned.
If a specific version is mentioned, this attempts to use the OS name at the time
of that version:
* Mac OS X for 10.0 - 10.7
* OS X for 10.8 - 10.11
* macOS for 10.12 - present
Reviewers: JDevlieghere
Subscribers: mgorny, christof, arphaman, cfe-commits, lldb-commits, libcxx-commits, llvm-commits
Tags: #clang, #lldb, #libc, #llvm
Differential Revision: https://reviews.llvm.org/D62654
Modified:
cfe/trunk/docs/AddressSanitizer.rst
cfe/trunk/docs/AutomaticReferenceCounting.rst
cfe/trunk/docs/ClangCommandLineReference.rst
cfe/trunk/docs/CommandGuide/clang.rst
cfe/trunk/docs/LeakSanitizer.rst
cfe/trunk/docs/Modules.rst
cfe/trunk/docs/SafeStack.rst
cfe/trunk/docs/UndefinedBehaviorSanitizer.rst
cfe/trunk/docs/UsersManual.rst
cfe/trunk/docs/analyzer/checkers.rst
cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst
Modified: cfe/trunk/docs/AddressSanitizer.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AddressSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/AddressSanitizer.rst (original)
+++ cfe/trunk/docs/AddressSanitizer.rst Thu May 30 09:46:22 2019
@@ -119,7 +119,7 @@ force disabled by setting ``ASAN_OPTIONS
#1 0x7f7ddabcac4d in __libc_start_main ??:0
...
-Note that on OS X you may need to run ``dsymutil`` on your binary to have the
+Note that on macOS you may need to run ``dsymutil`` on your binary to have the
file\:line info in the AddressSanitizer reports.
Additional Checks
@@ -134,14 +134,14 @@ globals defined in another translation u
you should set environment variable
``ASAN_OPTIONS=check_initialization_order=1``.
-Note that this option is not supported on OS X.
+Note that this option is not supported on macOS.
Memory leak detection
---------------------
For more information on leak detector in AddressSanitizer, see
:doc:`LeakSanitizer`. The leak detection is turned on by default on Linux,
-and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on OS X;
+and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on macOS;
however, it is not yet supported on other platforms.
Issue Suppression
@@ -273,7 +273,7 @@ Supported Platforms
AddressSanitizer is supported on:
* Linux i386/x86\_64 (tested on Ubuntu 12.04)
-* OS X 10.7 - 10.11 (i386/x86\_64)
+* macOS 10.7 - 10.11 (i386/x86\_64)
* iOS Simulator
* Android ARM
* NetBSD i386/x86\_64
Modified: cfe/trunk/docs/AutomaticReferenceCounting.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AutomaticReferenceCounting.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/AutomaticReferenceCounting.rst (original)
+++ cfe/trunk/docs/AutomaticReferenceCounting.rst Thu May 30 09:46:22 2019
@@ -268,7 +268,7 @@ ARC's semantics and restrictions.
* There must be reliable conventions for whether and when "ownership" is
passed between caller and callee, for both arguments and return values.
Objective-C methods follow such a convention very reliably, at least for
- system libraries on Mac OS X, and functions always pass objects at +0. The
+ system libraries on macOS, and functions always pass objects at +0. The
C-based APIs for Core Foundation objects, on the other hand, have much more
varied transfer semantics.
Modified: cfe/trunk/docs/ClangCommandLineReference.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/ClangCommandLineReference.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/ClangCommandLineReference.rst (original)
+++ cfe/trunk/docs/ClangCommandLineReference.rst Thu May 30 09:46:22 2019
@@ -2218,7 +2218,7 @@ Generate branches with extended addressa
.. option:: -mmacosx-version-min=<arg>, -mmacos-version-min=<arg>
-Set Mac OS X deployment target
+Set macOS deployment target
.. option:: -mmcu=<arg>
Modified: cfe/trunk/docs/CommandGuide/clang.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/CommandGuide/clang.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/CommandGuide/clang.rst (original)
+++ cfe/trunk/docs/CommandGuide/clang.rst Thu May 30 09:46:22 2019
@@ -316,7 +316,7 @@ number of cross compilers, or may only s
.. option:: -mmacosx-version-min=<version>
- When building for Mac OS X, specify the minimum version supported by your
+ When building for macOS, specify the minimum version supported by your
application.
.. option:: -miphoneos-version-min
Modified: cfe/trunk/docs/LeakSanitizer.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/LeakSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/LeakSanitizer.rst (original)
+++ cfe/trunk/docs/LeakSanitizer.rst Thu May 30 09:46:22 2019
@@ -17,7 +17,7 @@ detection phase.
Usage
=====
-LeakSanitizer is supported on x86\_64 Linux and OS X. In order to use it,
+LeakSanitizer is supported on x86\_64 Linux and macOS. In order to use it,
simply build your program with :doc:`AddressSanitizer`:
.. code-block:: console
Modified: cfe/trunk/docs/Modules.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/Modules.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/Modules.rst (original)
+++ cfe/trunk/docs/Modules.rst Thu May 30 09:46:22 2019
@@ -360,7 +360,7 @@ The *module-id* should consist of only a
The ``explicit`` qualifier can only be applied to a submodule, i.e., a module that is nested within another module. The contents of explicit submodules are only made available when the submodule itself was explicitly named in an import declaration or was re-exported from an imported module.
-The ``framework`` qualifier specifies that this module corresponds to a Darwin-style framework. A Darwin-style framework (used primarily on Mac OS X and iOS) is contained entirely in directory ``Name.framework``, where ``Name`` is the name of the framework (and, therefore, the name of the module). That directory has the following layout:
+The ``framework`` qualifier specifies that this module corresponds to a Darwin-style framework. A Darwin-style framework (used primarily on macOS and iOS) is contained entirely in directory ``Name.framework``, where ``Name`` is the name of the framework (and, therefore, the name of the module). That directory has the following layout:
.. parsed-literal::
Modified: cfe/trunk/docs/SafeStack.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/SafeStack.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/SafeStack.rst (original)
+++ cfe/trunk/docs/SafeStack.rst Thu May 30 09:46:22 2019
@@ -126,7 +126,7 @@ and link command lines.
Supported Platforms
-------------------
-SafeStack was tested on Linux, NetBSD, FreeBSD and MacOSX.
+SafeStack was tested on Linux, NetBSD, FreeBSD and macOS.
Low-level API
-------------
Modified: cfe/trunk/docs/UndefinedBehaviorSanitizer.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UndefinedBehaviorSanitizer.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/UndefinedBehaviorSanitizer.rst (original)
+++ cfe/trunk/docs/UndefinedBehaviorSanitizer.rst Thu May 30 09:46:22 2019
@@ -295,7 +295,7 @@ UndefinedBehaviorSanitizer is supported
* NetBSD
* FreeBSD
* OpenBSD
-* OS X 10.6 onwards
+* macOS
* Windows
The runtime library is relatively portable and platform independent. If the OS
Modified: cfe/trunk/docs/UsersManual.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UsersManual.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/UsersManual.rst (original)
+++ cfe/trunk/docs/UsersManual.rst Thu May 30 09:46:22 2019
@@ -1006,7 +1006,7 @@ on-disk cache that contains the vital in
some of the work needed to process a corresponding header file. While
details of precompiled headers vary between compilers, precompiled
headers have been shown to be highly effective at speeding up program
-compilation on systems with very large system headers (e.g., Mac OS X).
+compilation on systems with very large system headers (e.g., macOS).
Generating a PCH File
^^^^^^^^^^^^^^^^^^^^^
@@ -2746,7 +2746,7 @@ X86
^^^
The support for X86 (both 32-bit and 64-bit) is considered stable on
-Darwin (Mac OS X), Linux, FreeBSD, and Dragonfly BSD: it has been tested
+Darwin (macOS), Linux, FreeBSD, and Dragonfly BSD: it has been tested
to correctly compile many large C, C++, Objective-C, and Objective-C++
codebases.
@@ -2801,8 +2801,8 @@ backend.
Operating System Features and Limitations
-----------------------------------------
-Darwin (Mac OS X)
-^^^^^^^^^^^^^^^^^
+Darwin (macOS)
+^^^^^^^^^^^^^^
Thread Sanitizer is not supported.
Modified: cfe/trunk/docs/analyzer/checkers.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/analyzer/checkers.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/analyzer/checkers.rst (original)
+++ cfe/trunk/docs/analyzer/checkers.rst Thu May 30 09:46:22 2019
@@ -778,7 +778,7 @@ Check for null pointers being passed as
osx
^^^
-OS X checkers.
+macOS checkers.
osx.API (C)
"""""""""""
Modified: cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst?rev=362113&r1=362112&r2=362113&view=diff
==============================================================================
--- cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst (original)
+++ cfe/trunk/docs/analyzer/developer-docs/DebugChecks.rst Thu May 30 09:46:22 2019
@@ -15,7 +15,7 @@ General Analysis Dumpers
These checkers are used to dump the results of various infrastructural analyses
to stderr. Some checkers also have "view" variants, which will display a graph
-using a 'dot' format viewer (such as Graphviz on OS X) instead.
+using a 'dot' format viewer (such as Graphviz on macOS) instead.
- debug.DumpCallGraph, debug.ViewCallGraph: Show the call graph generated for
the current translation unit. This is used to determine the order in which to
More information about the cfe-commits
mailing list