[www-releases] r356539 - Check in the 8.0.0 release

Hans Wennborg via llvm-commits llvm-commits at lists.llvm.org
Wed Mar 20 02:13:34 PDT 2019


Added: www-releases/trunk/8.0.0/tools/clang/docs/searchindex.js
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/docs/searchindex.js?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/docs/searchindex.js (added)
+++ www-releases/trunk/8.0.0/tools/clang/docs/searchindex.js Wed Mar 20 02:13:27 2019
@@ -0,0 +1 @@
+Search.setIndex({docnames:["AddressSanitizer","AttributeReference","AutomaticReferenceCounting","Block-ABI-Apple","BlockLanguageSpec","ClangCheck","ClangCommandLineReference","ClangFormat","ClangFormatStyleOptions","ClangPlugins","ClangTools","CommandGuide/clang","CommandGuide/diagtool","CommandGuide/index","ControlFlowIntegrity","ControlFlowIntegrityDesign","CrossCompilation","DataFlowSanitizer","DataFlowSanitizerDesign","DiagnosticsReference","DriverInternals","ExternalClangExamples","FAQ","HardwareAssistedAddressSanitizerDesign","HowToSetupToolingForLLVM","InternalsManual","IntroductionToTheClangAST","ItaniumMangleAbiTags","JSONCompilationDatabase","LTOVisibility","LanguageExtensions","LeakSanitizer","LibASTMatchers","LibASTMatchersTutorial","LibFormat","LibTooling","MSVCCompatibility","MemorySanitizer","Modules","ObjectiveCLiterals","OpenMPSupport","PCHInternals","RAVFrontendAction","RefactoringEngine","ReleaseNotes","SafeStack","SanitizerCoverage","SanitizerSpecialCaseList","SanitizerStats","ShadowCallStack","SourceBasedCodeCoverage","ThinLTO","ThreadSafetyAnalysis","ThreadSanitizer","Toolchain","Tooling","UndefinedBehaviorSanitizer","UsersManual","index"],envversion:52,filenames:["AddressSanitizer.rst","AttributeReference.rst","AutomaticReferenceCounting.rst","Block-ABI-Apple.rst","BlockLanguageSpec.rst","ClangCheck.rst","ClangCommandLineReference.rst","ClangFormat.rst","ClangFormatStyleOptions.rst","ClangPlugins.rst","ClangTools.rst","CommandGuide/clang.rst","CommandGuide/diagtool.rst","CommandGuide/index.rst","ControlFlowIntegrity.rst","ControlFlowIntegrityDesign.rst","CrossCompilation.rst","DataFlowSanitizer.rst","DataFlowSanitizerDesign.rst","DiagnosticsReference.rst","DriverInternals.rst","ExternalClangExamples.rst","FAQ.rst","HardwareAssistedAddressSanitizerDesign.rst","HowToSetupToolingForLLVM.rst","InternalsManual.rst","IntroductionToTheClangAST.rst","ItaniumMangleAbiTags.rst","JSONCompilationDatabase.rst","LTOVisibility.rst","LanguageExtensions.rst","LeakSanitizer.rst","LibASTMatchers.rst","LibASTMatchersTutorial.rst","LibFormat.rst","LibTooling.rst","MSVCCompatibility.rst","MemorySanitizer.rst","Modules.rst","ObjectiveCLiterals.rst","OpenMPSupport.rst","PCHInternals.rst","RAVFrontendAction.rst","RefactoringEngine.rst","ReleaseNotes.rst","SafeStack.rst","SanitizerCoverage.rst","SanitizerSpecialCaseList.rst","SanitizerStats.rst","ShadowCallStack.rst","SourceBasedCodeCoverage.rst","ThinLTO.rst","ThreadSafetyAnalysis.rst","ThreadSanitizer.rst","Toolchain.rst","Tooling.rst","UndefinedBehaviorSanitizer.rst","UsersManual.rst","index.rst"],objects:{"":{"-###":[11,0,1,"cmdoption"],"--help":[11,0,1,"cmdoption-help"],"-D<macroname>":[11,0,1,"cmdoption-d-macroname"],"-E":[11,0,1,"cmdoption-e"],"-F<directory>":[11,0,1,"cmdoption-f-directory"],"-I<directory>":[11,0,1,"cmdoption-i-directory"],"-MV":[57,0,1,"cmdoption-mv"],"-O":[11,0,1,"cmdoption-o0"],"-O0":[11,0,1,"cmdoption-o0"],"-O1":[11,0,1,"cmdoption-o0"],"-O2":[11,0,1,"cmdoption-o0"],"-O3":[11,0,1,"cmdoption-o0"],"-O4":[11,0,1,"cmdoption-o0"],"-ObjC":[11,0,1,"cmdoption-objc"],"-ObjC++":[11,0,1,"cmdoption-objc"],"-Ofast":[11,0,1,"cmdoption-o0"],"-Og":[11,0,1,"cmdoption-o0"],"-Os":[11,0,1,"cmdoption-o0"],"-Oz":[11,0,1,"cmdoption-o0"],"-Qunused-arguments":[11,0,1,"cmdoption-qunused-arguments"],"-S":[11,0,1,"cmdoption-s"],"-U<macroname>":[11,0,1,"cmdoption-u-macroname"],"-Wa,<args>":[11,0,1,"cmdoption-wa-args"],"-Wambiguous-member-template":[57,0,1,"cmdoption-wambiguous-member-template"],"-Wbind-to-temporary-copy":[57,0,1,"cmdoption-wbind-to-temporary-copy"],"-Wdocumentation":[57,0,1,"cmdoption-wdocumentation"],"-Werror":[57,0,1,"cmdoption-werror"],"-Weverything":[57,0,1,"cmdoption-weverything"],"-Wextra-tokens":[57,0,1,"cmdoption-wextra-tokens"],"-Wfoo":[57,0,1,"cmdoption-wfoo"],"-Wl,<args>":[11,0,1,"cmdoption-wl-args"],"-Wno-documentation-unknown-command":[57,0,1,"cmdoption-wno-documentation-unknown-command"],"-Wno-error":[57,0,1,"cmdoption-wno-error"],"-Wno-foo":[57,0,1,"cmdoption-wno-foo"],"-Wp,<args>":[11,0,1,"cmdoption-wp-args"],"-Wsystem-headers":[57,0,1,"cmdoption-wsystem-headers"],"-Xanalyzer":[11,0,1,"cmdoption-xanalyzer"],"-Xassembler":[11,0,1,"cmdoption-xassembler"],"-Xlinker":[11,0,1,"cmdoption-xlinker"],"-Xpreprocessor":[11,0,1,"cmdoption-xpreprocessor"],"-ansi":[11,0,1,"cmdoption-ansi"],"-arch":[11,0,1,"cmdoption-arch"],"-c":[11,0,1,"cmdoption-c"],"-cl-ext":[57,0,1,"cmdoption-cl-ext"],"-emit-llvm":[11,0,1,"cmdoption-flto"],"-f[no-]strict-float-cast-overflow":[57,0,1,"cmdoption-f-no-strict-float-cast-overflow"],"-faddrsig":[57,0,1,"cmdoption-faddrsig"],"-fblocks":[11,0,1,"cmdoption-fblocks"],"-fborland-extensions":[11,0,1,"cmdoption-fborland-extensions"],"-fbracket-depth":[57,0,1,"cmdoption-fbracket-depth"],"-fcaret-diagnostics":[11,0,1,"cmdoption-fshow-column"],"-fcomment-block-commands":[57,0,1,"cmdoption-fcomment-block-commands"],"-fcommon":[11,0,1,"cmdoption-fcommon"],"-fconstexpr-depth":[57,0,1,"cmdoption-fconstexpr-depth"],"-fconstexpr-steps":[57,0,1,"cmdoption-fconstexpr-steps"],"-fdebug-macro":[57,0,1,"cmdoption-fdebug-macro"],"-fdenormal-fp-math":[57,0,1,"cmdoption-fdenormal-fp-math"],"-fdiagnostics-fixit-info":[11,0,1,"cmdoption-fshow-column"],"-fdiagnostics-format":[57,0,1,"cmdoption-fdiagnostics-format"],"-fdiagnostics-parseable-fixits":[57,0,1,"cmdoption-fdiagnostics-parseable-fixits"],"-fdiagnostics-print-source-range-info":[11,0,1,"cmdoption-fshow-column"],"-fdiagnostics-show-category":[57,0,1,"cmdoption-fdiagnostics-show-category"],"-fdiagnostics-show-option":[11,0,1,"cmdoption-fshow-column"],"-fdiagnostics-show-template-tree":[57,0,1,"cmdoption-fdiagnostics-show-template-tree"],"-fdiscard-value-names":[57,0,1,"cmdoption-fdiscard-value-names"],"-femulated-tls":[57,0,1,"cmdoption-femulated-tls"],"-ferror-limit":[57,0,1,"cmdoption-ferror-limit"],"-fexceptions":[11,0,1,"cmdoption-fexceptions"],"-ffake-address-space-map":[57,0,1,"cmdoption-ffake-address-space-map"],"-ffast-math":[57,0,1,"cmdoption-ffast-math"],"-fforce-emit-vtables":[57,0,1,"cmdoption-fforce-emit-vtables"],"-ffreestanding":[11,0,1,"cmdoption-ffreestanding"],"-finclude-default-header":[57,0,1,"cmdoption-finclude-default-header"],"-flax-vector-conversions":[11,0,1,"cmdoption-flax-vector-conversions"],"-flto":[11,0,1,"cmdoption-flto"],"-fmath-errno":[11,0,1,"cmdoption-fmath-errno"],"-fmessage-length":[11,0,1,"cmdoption-fshow-column"],"-fms-extensions":[11,0,1,"cmdoption-fms-extensions"],"-fmsc-version":[11,0,1,"cmdoption-fmsc-version"],"-fno-addrsig":[57,0,1,"cmdoption-faddrsig"],"-fno-assume-sane-operator-new":[57,0,1,"cmdoption-fno-assume-sane-operator-new"],"-fno-builtin":[11,0,1,"cmdoption-fno-builtin"],"-fno-common":[11,0,1,"cmdoption-fcommon"],"-fno-crash-diagnostics":[57,0,1,"cmdoption-fno-crash-diagnostics"],"-fno-debug-macro":[57,0,1,"cmdoption-fno-debug-macro"],"-fno-discard-value-names":[57,0,1,"cmdoption-fno-discard-value-names"],"-fno-elide-type":[57,0,1,"cmdoption-fno-elide-type"],"-fno-objc-nonfragile-abi":[11,0,1,"cmdoption-fobjc-nonfragile-abi"],"-fno-sanitize-blacklist":[57,0,1,"cmdoption-fno-sanitize-blacklist"],"-fno-standalone-debug":[57,0,1,"cmdoption-fno-standalone-debug"],"-fobjc-abi-version":[11,0,1,"cmdoption-fobjc-abi-version"],"-fobjc-nonfragile-abi":[11,0,1,"cmdoption-fobjc-nonfragile-abi"],"-fobjc-nonfragile-abi-version":[11,0,1,"cmdoption-fobjc-nonfragile-abi-version"],"-fopenmp-use-tls":[57,0,1,"cmdoption-fopenmp-use-tls"],"-foperator-arrow-depth":[57,0,1,"cmdoption-foperator-arrow-depth"],"-fparse-all-comments":[57,0,1,"cmdoption-fparse-all-comments"],"-fpascal-strings":[11,0,1,"cmdoption-fpascal-strings"],"-fprint-source-range-info":[11,0,1,"cmdoption-fshow-column"],"-fprofile-exclude-files":[57,0,1,"cmdoption-fprofile-exclude-files"],"-fprofile-filter-files":[57,0,1,"cmdoption-fprofile-filter-files"],"-fprofile-generate[":[57,0,1,"cmdoption-fprofile-generate"],"-fprofile-remapping-file":[57,0,1,"cmdoption-fprofile-remapping-file"],"-fprofile-use[":[57,0,1,"cmdoption-fprofile-use"],"-fsanitize-blacklist":[57,0,1,"cmdoption-fsanitize-blacklist"],"-fsanitize-cfi-cross-dso":[57,0,1,"cmdoption-fsanitize-cfi-cross-dso"],"-fsanitize-cfi-icall-generalize-pointers":[57,0,1,"cmdoption-fsanitize-cfi-icall-generalize-pointers"],"-fsanitize-undefined-trap-on-error":[57,0,1,"cmdoption-fsanitize-undefined-trap-on-error"],"-fshow-column":[11,0,1,"cmdoption-fshow-column"],"-fshow-source-location":[11,0,1,"cmdoption-fshow-column"],"-fstandalone-debug":[57,0,1,"cmdoption-fstandalone-debug"],"-fstrict-vtable-pointers":[57,0,1,"cmdoption-fstrict-vtable-pointers"],"-fsyntax-only":[11,0,1,"cmdoption-fsyntax-only"],"-ftemplate-backtrace-limit":[57,0,1,"cmdoption-ftemplate-backtrace-limit"],"-ftemplate-depth":[57,0,1,"cmdoption-ftemplate-depth"],"-ftime-report":[11,0,1,"cmdoption-ftime-report"],"-ftls-model":[57,0,1,"cmdoption-ftls-model"],"-ftrap-function":[57,0,1,"cmdoption-ftrap-function"],"-ftrapv":[11,0,1,"cmdoption-ftrapv"],"-fvisibility":[11,0,1,"cmdoption-fvisibility"],"-fwhole-program-vtables":[57,0,1,"cmdoption-fwhole-program-vtables"],"-fwritable-strings":[11,0,1,"cmdoption-fwritable-strings"],"-g":[57,0,1,"cmdoption-g"],"-g0":[57,0,1,"cmdoption-g0"],"-gen-reproducer":[57,0,1,"cmdoption-gen-reproducer"],"-ggdb":[57,0,1,"cmdoption-ggdb"],"-gline-tables-only":[57,0,1,"cmdoption-gline-tables-only"],"-glldb":[57,0,1,"cmdoption-ggdb"],"-gmodules":[11,0,1,"cmdoption-g"],"-gsce":[57,0,1,"cmdoption-ggdb"],"-include":[11,0,1,"cmdoption-include"],"-integrated-as":[11,0,1,"cmdoption-integrated-as"],"-m[no-]crc":[57,0,1,"cmdoption-m-no-crc"],"-march":[11,0,1,"cmdoption-march"],"-mcompact-branches":[57,0,1,"cmdoption-mcompact-branches"],"-mgeneral-regs-only":[57,0,1,"cmdoption-mgeneral-regs-only"],"-mhwdiv":[57,0,1,"cmdoption-mhwdiv"],"-miphoneos-version-min":[11,0,1,"cmdoption-miphoneos-version-min"],"-mmacosx-version-min":[11,0,1,"cmdoption-mmacosx-version-min"],"-no-integrated-as":[11,0,1,"cmdoption-integrated-as"],"-nobuiltininc":[11,0,1,"cmdoption-nobuiltininc"],"-nostdinc":[11,0,1,"cmdoption-nostdinc"],"-nostdlibinc":[11,0,1,"cmdoption-nostdlibinc"],"-o":[11,0,1,"cmdoption-o"],"-pedantic":[57,0,1,"cmdoption-pedantic"],"-pedantic-errors":[57,0,1,"cmdoption-pedantic-errors"],"-print-file-name":[11,0,1,"cmdoption-print-file-name"],"-print-libgcc-file-name":[11,0,1,"cmdoption-print-libgcc-file-name"],"-print-prog-name":[11,0,1,"cmdoption-print-prog-name"],"-print-search-dirs":[11,0,1,"cmdoption-print-search-dirs"],"-rtlib":[11,0,1,"cmdoption-rtlib"],"-save-stats":[11,0,1,"cmdoption-save-stats"],"-save-temps":[11,0,1,"cmdoption-save-temps"],"-std":[11,0,1,"cmdoption-std"],"-stdlib":[11,0,1,"cmdoption-stdlib"],"-time":[11,0,1,"cmdoption-time"],"-trigraphs":[11,0,1,"cmdoption-trigraphs"],"-v":[11,0,1,"cmdoption-v"],"-w":[57,0,1,"cmdoption-w"],"-x":[11,0,1,"cmdoption-x"],"C_INCLUDE_PATH,OBJC_INCLUDE_PATH,CPLUS_INCLUDE_PATH,OBJCPLUS_INCLUDE_PATH":[11,1,1,"-"],"TMPDIR,TEMP,TMP":[11,1,1,"-"],CPATH:[11,1,1,"-"],MACOSX_DEPLOYMENT_TARGET:[11,1,1,"-"],no:[11,0,1,"cmdoption-arg-no"]},"clang.-Wa,<arg>,<arg2>..":{"":[6,0,1,"cmdoption-clang-wa-arg-arg2"]},"clang.-Wl,<arg>,<arg2>..":{"":[6,0,1,"cmdoption-clang-wl-arg-arg2"]},"clang.-Wp,<arg>,<arg2>..":{"":[6,0,1,"cmdoption-clang-wp-arg-arg2"]},"clang.-mno-sse4":{"1":[6,0,1,"cmdoption-clang-msse4-1"]},"clang.-msse4":{"1":[6,0,1,"cmdoption-clang-msse4-1"]},"clang1.-mno-sse4":{"2":[6,0,1,"cmdoption-clang1-msse4-2"]},"clang1.-msse4":{"2":[6,0,1,"cmdoption-clang1-msse4-2"]},clang1:{"-ObjC++":[6,0,1,"cmdoption-clang1-objc"],"-Xopenmp-target":[6,0,1,"cmdoption-clang1-xopenmp-target"],"-Z":[6,0,1,"cmdoption-clang1-z"],"-arch_errors_fatal":[6,0,1,"cmdoption-clang1-arch-errors-fatal"],"-bundle_loader":[6,0,1,"cmdoption-clang1-bundle-loader"],"-d<arg>":[6,0,1,"cmdoption-clang1-d-arg"],"-dylinker_install_name<arg>":[6,0,1,"cmdoption-clang1-dylinker-install-name-arg"],"-falign-functions":[6,0,1,"cmdoption-clang1-falign-functions"],"-faligned-allocation":[6,0,1,"cmdoption-clang1-faligned-allocation"],"-faligned-new":[6,0,1,"cmdoption-clang1-faligned-allocation"],"-fauto-profile":[6,0,1,"cmdoption-clang1-fprofile-sample-use"],"-fdiagnostics-color":[6,0,1,"cmdoption-clang1-fdiagnostics-color"],"-flto":[6,0,1,"cmdoption-clang1-flto"],"-fno-aligned-allocation":[6,0,1,"cmdoption-clang1-faligned-allocation"],"-fno-sanitize-recover":[6,0,1,"cmdoption-clang1-fsanitize-recover"],"-fopenmp":[6,0,1,"cmdoption-clang1-fopenmp"],"-force_flat_namespace":[6,0,1,"cmdoption-clang1-force-flat-namespace"],"-fpack-struct":[6,0,1,"cmdoption-clang1-fpack-struct"],"-fprofile-generate":[6,0,1,"cmdoption-clang1-fprofile-generate"],"-fprofile-instr-generate":[6,0,1,"cmdoption-clang1-fprofile-instr-generate"],"-fprofile-instr-use":[6,0,1,"cmdoption-clang1-fprofile-instr-use"],"-fprofile-sample-use":[6,0,1,"cmdoption-clang1-fprofile-sample-use"],"-fprofile-use":[6,0,1,"cmdoption-clang1-fprofile-use"],"-frewrite-map-file":[6,0,1,"cmdoption-clang1-frewrite-map-file"],"-fsanitize-memory-track-origins":[6,0,1,"cmdoption-clang1-fsanitize-memory-track-origins"],"-fsanitize-recover":[6,0,1,"cmdoption-clang1-fsanitize-recover"],"-ftrapv-handler":[6,0,1,"cmdoption-clang1-ftrapv-handler"],"-fxray-instruction-threshold":[6,0,1,"cmdoption-clang1-fxray-instruction-threshold"],"-gsplit-dwarf":[6,0,1,"cmdoption-clang1-gsplit-dwarf"],"-gz":[6,0,1,"cmdoption-clang1-gz"],"-lazy_library":[6,0,1,"cmdoption-clang1-lazy-library"],"-mhvx":[6,0,1,"cmdoption-clang1-mhvx"],"-mrecip":[6,0,1,"cmdoption-clang1-mrecip"],"-msse4":[6,0,1,"cmdoption-clang1-msse4-2"],"-multiply_defined_unused":[6,0,1,"cmdoption-clang1-multiply-defined-unused"],"-nostdinc++":[6,0,1,"cmdoption-clang1-nostdinc"],"-nostdlib++":[6,0,1,"cmdoption-clang1-nostdlib"],"-prebind_all_twolevel_modules":[6,0,1,"cmdoption-clang1-prebind-all-twolevel-modules"],"-seg_addr_table_filename":[6,0,1,"cmdoption-clang1-seg-addr-table-filename"],"-segs_read_only_addr":[6,0,1,"cmdoption-clang1-segs-read-only-addr"],"-sub_umbrella<arg>":[6,0,1,"cmdoption-clang1-sub-umbrella-arg"],"-twolevel_namespace_hints":[6,0,1,"cmdoption-clang1-twolevel-namespace-hints"],"-weak_library":[6,0,1,"cmdoption-clang1-weak-library"]},clang2:{"-arch_only":[6,0,1,"cmdoption-clang2-arch-only"],"-force_load":[6,0,1,"cmdoption-clang2-force-load"],"-segs_read_write_addr":[6,0,1,"cmdoption-clang2-segs-read-write-addr"],"-weak_reference_mismatches":[6,0,1,"cmdoption-clang2-weak-reference-mismatches"]},clang:{"--CLASSPATH":[6,0,1,"cmdoption-clang-fclasspath"],"--analyze":[6,0,1,"cmdoption-clang-analyze"],"--analyze-auto":[6,0,1,"cmdoption-clang-analyze-auto"],"--analyzer-no-default-checks":[6,0,1,"cmdoption-clang-analyzer-no-default-checks"],"--analyzer-output<arg>":[6,0,1,"cmdoption-clang-analyzer-output-arg"],"--ansi":[6,0,1,"cmdoption-clang-ansi"],"--assemble":[6,0,1,"cmdoption-clang-s"],"--assert":[6,0,1,"cmdoption-clang-assert"],"--autocomplete":[6,0,1,"cmdoption-clang-autocomplete"],"--bootclasspath":[6,0,1,"cmdoption-clang-fbootclasspath"],"--classpath":[6,0,1,"cmdoption-clang-fclasspath"],"--comments":[6,0,1,"cmdoption-clang-comments"],"--comments-in-macros":[6,0,1,"cmdoption-clang-cc"],"--compile":[6,0,1,"cmdoption-clang-c"],"--config":[6,0,1,"cmdoption-clang-config"],"--constant-cfstrings":[6,0,1,"cmdoption-clang-constant-cfstrings"],"--coverage":[6,0,1,"cmdoption-clang-coverage"],"--cuda-compile-host-device":[6,0,1,"cmdoption-clang-cuda-compile-host-device"],"--cuda-device-only":[6,0,1,"cmdoption-clang-cuda-device-only"],"--cuda-gpu-arch":[6,0,1,"cmdoption-clang-cuda-gpu-arch"],"--cuda-host-only":[6,0,1,"cmdoption-clang-cuda-host-only"],"--cuda-include-ptx":[6,0,1,"cmdoption-clang-cuda-include-ptx"],"--cuda-noopt-device-debug":[6,0,1,"cmdoption-clang-cuda-noopt-device-debug"],"--cuda-path":[6,0,1,"cmdoption-clang-cuda-path"],"--cuda-path-ignore-env":[6,0,1,"cmdoption-clang-cuda-path-ignore-env"],"--debug":[6,0,1,"cmdoption-clang-g"],"--define-macro":[6,0,1,"cmdoption-clang-d-macro"],"--dependencies":[6,0,1,"cmdoption-clang-m"],"--dyld-prefix":[6,0,1,"cmdoption-clang-dyld-prefix"],"--encoding":[6,0,1,"cmdoption-clang-fencoding"],"--entry":[6,0,1,"cmdoption-clang-e-arg"],"--extdirs":[6,0,1,"cmdoption-clang-fextdirs"],"--extra-warnings":[6,0,1,"cmdoption-clang-w-warning"],"--for-linker":[6,0,1,"cmdoption-clang-xlinker"],"--force-link":[6,0,1,"cmdoption-clang-u-arg"],"--gcc-toolchain":[6,0,1,"cmdoption-clang-gcc-toolchain"],"--help":[6,0,1,"cmdoption-clang-help"],"--help-hidden":[6,0,1,"cmdoption-clang-help-hidden"],"--hip-device-lib":[6,0,1,"cmdoption-clang-hip-device-lib"],"--hip-device-lib-path":[6,0,1,"cmdoption-clang-hip-device-lib-path"],"--hip-link":[6,0,1,"cmdoption-clang-hip-link"],"--imacros":[6,0,1,"cmdoption-clang-imacros-file"],"--imacros<file>":[6,0,1,"cmdoption-clang-imacros-file"],"--include":[6,0,1,"cmdoption-clang-include-file"],"--include<file>":[6,0,1,"cmdoption-clang-include-file"],"--include-barrier":[6,0,1,"cmdoption-clang-i"],"--include-directory":[6,0,1,"cmdoption-clang-i-dir"],"--include-directory-after":[6,0,1,"cmdoption-clang-idirafter-arg"],"--include-prefix":[6,0,1,"cmdoption-clang-iprefix-dir"],"--include-with-prefix":[6,0,1,"cmdoption-clang-iwithprefix-dir"],"--include-with-prefix-after":[6,0,1,"cmdoption-clang-iwithprefix-dir"],"--include-with-prefix-before":[6,0,1,"cmdoption-clang-iwithprefixbefore-dir"],"--language":[6,0,1,"cmdoption-clang-x-language"],"--libomptarget-nvptx-path":[6,0,1,"cmdoption-clang-libomptarget-nvptx-path"],"--library-directory":[6,0,1,"cmdoption-clang-l-dir"],"--mhwdiv":[6,0,1,"cmdoption-clang-mhwdiv"],"--migrate":[6,0,1,"cmdoption-clang-migrate"],"--no-cuda-gpu-arch":[6,0,1,"cmdoption-clang-cuda-gpu-arch"],"--no-cuda-include-ptx":[6,0,1,"cmdoption-clang-cuda-include-ptx"],"--no-cuda-noopt-device-debug":[6,0,1,"cmdoption-clang-cuda-noopt-device-debug"],"--no-cuda-version-check":[6,0,1,"cmdoption-clang-no-cuda-version-check"],"--no-integrated-cpp":[6,0,1,"cmdoption-clang-no-integrated-cpp"],"--no-line-commands":[6,0,1,"cmdoption-clang-no-line-commands"],"--no-pedantic":[6,0,1,"cmdoption-clang-pedantic"],"--no-standard-includes":[6,0,1,"cmdoption-clang-nostdinc"],"--no-standard-libraries":[6,0,1,"cmdoption-clang-nostdlib"],"--no-system-header-prefix":[6,0,1,"cmdoption-clang-system-header-prefix"],"--no-undefined":[6,0,1,"cmdoption-clang-undefined-arg"],"--no-warnings":[6,0,1,"cmdoption-clang-w"],"--optimize":[6,0,1,"cmdoption-clang-o-arg"],"--output":[6,0,1,"cmdoption-clang-o-file"],"--output-class-directory":[6,0,1,"cmdoption-clang-foutput-class-dir"],"--param":[6,0,1,"cmdoption-clang-param"],"--pedantic":[6,0,1,"cmdoption-clang-pedantic"],"--pedantic-errors":[6,0,1,"cmdoption-clang-pedantic-errors"],"--pipe":[6,0,1,"cmdoption-clang-pipe"],"--precompile":[6,0,1,"cmdoption-clang-precompile"],"--prefix":[6,0,1,"cmdoption-clang-b-dir"],"--preprocess":[6,0,1,"cmdoption-clang-e"],"--print-diagnostic-categories":[6,0,1,"cmdoption-clang-print-diagnostic-categories"],"--print-effective-triple":[6,0,1,"cmdoption-clang-print-effective-triple"],"--print-file-name":[6,0,1,"cmdoption-clang-print-file-name"],"--print-libgcc-file-name":[6,0,1,"cmdoption-clang-print-libgcc-file-name"],"--print-missing-file-dependencies":[6,0,1,"cmdoption-clang-mg"],"--print-multi-directory":[6,0,1,"cmdoption-clang-print-multi-directory"],"--print-multi-lib":[6,0,1,"cmdoption-clang-print-multi-lib"],"--print-prog-name":[6,0,1,"cmdoption-clang-print-prog-name"],"--print-resource-dir":[6,0,1,"cmdoption-clang-print-resource-dir"],"--print-search-dirs":[6,0,1,"cmdoption-clang-print-search-dirs"],"--print-target-triple":[6,0,1,"cmdoption-clang-print-target-triple"],"--profile":[6,0,1,"cmdoption-clang-p"],"--profile-blocks":[6,0,1,"cmdoption-clang-a-arg"],"--ptxas-path":[6,0,1,"cmdoption-clang-ptxas-path"],"--relocatable-pch":[6,0,1,"cmdoption-clang-relocatable-pch"],"--resource":[6,0,1,"cmdoption-clang-fcompile-resource"],"--rtlib":[6,0,1,"cmdoption-clang-rtlib"],"--save-stats":[6,0,1,"cmdoption-clang-save-stats"],"--save-temps":[6,0,1,"cmdoption-clang-save-temps"],"--serialize-diagnostics":[6,0,1,"cmdoption-clang-serialize-diagnostics"],"--shared":[6,0,1,"cmdoption-clang-shared"],"--signed-char":[6,0,1,"cmdoption-clang-fsigned-char"],"--specs":[6,0,1,"cmdoption-clang-specs"],"--static":[6,0,1,"cmdoption-clang-static"],"--std":[6,0,1,"cmdoption-clang-std"],"--stdlib":[6,0,1,"cmdoption-clang-stdlib"],"--sysroot":[6,0,1,"cmdoption-clang-sysroot"],"--system-header-prefix":[6,0,1,"cmdoption-clang-system-header-prefix"],"--target":[6,0,1,"cmdoption-clang-target"],"--target-help":[6,0,1,"cmdoption-clang-target-help"],"--trace-includes":[6,0,1,"cmdoption-clang-h"],"--traditional":[6,0,1,"cmdoption-clang-traditional"],"--traditional-cpp":[6,0,1,"cmdoption-clang-traditional-cpp"],"--trigraphs":[6,0,1,"cmdoption-clang-ftrigraphs"],"--undefine-macro":[6,0,1,"cmdoption-clang-u-macro"],"--unsigned-char":[6,0,1,"cmdoption-clang-funsigned-char"],"--user-dependencies":[6,0,1,"cmdoption-clang-mm"],"--verbose":[6,0,1,"cmdoption-clang-v"],"--verify-debug-info":[6,0,1,"cmdoption-clang-verify-debug-info"],"--version":[6,0,1,"cmdoption-clang-version"],"--warn-":[6,0,1,"cmdoption-clang-w-warning"],"--warn-<arg>":[6,0,1,"cmdoption-clang-w-warning"],"--write-dependencies":[6,0,1,"cmdoption-clang-md"],"--write-user-dependencies":[6,0,1,"cmdoption-clang-mmd"],"-A<arg>":[6,0,1,"cmdoption-clang-assert"],"-A-<arg>":[6,0,1,"id2"],"-B<dir>":[6,0,1,"cmdoption-clang-b-dir"],"-C":[6,0,1,"cmdoption-clang-comments"],"-CC":[6,0,1,"cmdoption-clang-cc"],"-D<macro>":[6,0,1,"cmdoption-clang-d-macro"],"-E":[6,0,1,"cmdoption-clang-e"],"-EB":[6,0,1,"cmdoption-clang-mbig-endian"],"-EL":[6,0,1,"cmdoption-clang-mlittle-endian"],"-F<arg>":[6,0,1,"cmdoption-clang-f-arg"],"-G":[6,0,1,"cmdoption-clang-g-size"],"-G<size>":[6,0,1,"cmdoption-clang-g-size"],"-H":[6,0,1,"cmdoption-clang-h"],"-I<dir>":[6,0,1,"cmdoption-clang-i-dir"],"-I-":[6,0,1,"cmdoption-clang-i"],"-J<arg>":[6,0,1,"cmdoption-clang-j-arg"],"-L<dir>":[6,0,1,"cmdoption-clang-l-dir"],"-M":[6,0,1,"cmdoption-clang-m"],"-MD":[6,0,1,"cmdoption-clang-md"],"-MF<file>":[6,0,1,"cmdoption-clang-mf-file"],"-MG":[6,0,1,"cmdoption-clang-mg"],"-MJ<arg>":[6,0,1,"cmdoption-clang-mj-arg"],"-MM":[6,0,1,"cmdoption-clang-mm"],"-MMD":[6,0,1,"cmdoption-clang-mmd"],"-MP":[6,0,1,"cmdoption-clang-mp"],"-MQ<arg>":[6,0,1,"cmdoption-clang-mq-arg"],"-MT<arg>":[6,0,1,"cmdoption-clang-mt-arg"],"-MV":[6,0,1,"cmdoption-clang-mv"],"-Mach":[6,0,1,"cmdoption-clang-mach"],"-O":[6,0,1,"cmdoption-clang-o-arg"],"-O<arg>":[6,0,1,"cmdoption-clang-o-arg"],"-ObjC":[6,0,1,"cmdoption-clang-objc"],"-Ofast<arg>":[6,0,1,"cmdoption-clang-ofast-arg"],"-P":[6,0,1,"cmdoption-clang-no-line-commands"],"-Qn":[6,0,1,"cmdoption-clang-qn"],"-Qunused-arguments":[6,0,1,"cmdoption-clang-qunused-arguments"],"-Qy":[6,0,1,"cmdoption-clang-qy"],"-R<remark>":[6,0,1,"cmdoption-clang-r-remark"],"-Rpass":[6,0,1,"cmdoption-clang-rpass"],"-Rpass-analysis":[6,0,1,"cmdoption-clang-rpass-analysis"],"-Rpass-missed":[6,0,1,"cmdoption-clang-rpass-missed"],"-S":[6,0,1,"cmdoption-clang-s"],"-T<script>":[6,0,1,"cmdoption-clang-t-script"],"-Tbss<addr>":[6,0,1,"cmdoption-clang-tbss-addr"],"-Tdata<addr>":[6,0,1,"cmdoption-clang-tdata-addr"],"-Ttext<addr>":[6,0,1,"cmdoption-clang-ttext-addr"],"-U<macro>":[6,0,1,"cmdoption-clang-u-macro"],"-W<warning>":[6,0,1,"cmdoption-clang-w-warning"],"-Wdeprecated":[6,0,1,"cmdoption-clang-wdeprecated"],"-Wframe-larger-than":[6,0,1,"cmdoption-clang-wframe-larger-than"],"-Wlarge-by-value-copy":[6,0,1,"cmdoption-clang-wlarge-by-value-copy"],"-Wno-deprecated":[6,0,1,"cmdoption-clang-wdeprecated"],"-Wno-nonportable-cfstrings<arg>":[6,0,1,"cmdoption-clang-wnonportable-cfstrings-arg"],"-Wnonportable-cfstrings<arg>":[6,0,1,"cmdoption-clang-wnonportable-cfstrings-arg"],"-X":[6,0,1,"cmdoption-clang-x"],"-Xanalyzer":[6,0,1,"cmdoption-clang-xanalyzer"],"-Xarch_<arg1>":[6,0,1,"cmdoption-clang-xarch-arg1"],"-Xassembler":[6,0,1,"cmdoption-clang-xassembler"],"-Xclang":[6,0,1,"cmdoption-clang-xclang"],"-Xcuda-fatbinary":[6,0,1,"cmdoption-clang-xcuda-fatbinary"],"-Xcuda-ptxas":[6,0,1,"cmdoption-clang-xcuda-ptxas"],"-Xlinker":[6,0,1,"cmdoption-clang-xlinker"],"-Xopenmp-target":[6,0,1,"cmdoption-clang-xopenmp-target"],"-Xpreprocessor":[6,0,1,"cmdoption-clang-xpreprocessor"],"-Z<arg>":[6,0,1,"cmdoption-clang-z-arg"],"-a<arg>":[6,0,1,"cmdoption-clang-a-arg"],"-all_load":[6,0,1,"cmdoption-clang-all-load"],"-allowable_client":[6,0,1,"cmdoption-clang-allowable-client"],"-ansi":[6,0,1,"cmdoption-clang-ansi"],"-arch":[6,0,1,"cmdoption-clang-arch"],"-arcmt-migrate-emit-errors":[6,0,1,"cmdoption-clang-arcmt-migrate-emit-errors"],"-arcmt-migrate-report-output":[6,0,1,"cmdoption-clang-arcmt-migrate-report-output"],"-bind_at_load":[6,0,1,"cmdoption-clang-bind-at-load"],"-bundle":[6,0,1,"cmdoption-clang-bundle"],"-c":[6,0,1,"cmdoption-clang-c"],"-cfguard":[6,0,1,"cmdoption-clang-cfguard"],"-cl-denorms-are-zero":[6,0,1,"cmdoption-clang-cl-denorms-are-zero"],"-cl-fast-relaxed-math":[6,0,1,"cmdoption-clang-cl-fast-relaxed-math"],"-cl-finite-math-only":[6,0,1,"cmdoption-clang-cl-finite-math-only"],"-cl-fp32-correctly-rounded-divide-sqrt":[6,0,1,"cmdoption-clang-cl-fp32-correctly-rounded-divide-sqrt"],"-cl-kernel-arg-info":[6,0,1,"cmdoption-clang-cl-kernel-arg-info"],"-cl-mad-enable":[6,0,1,"cmdoption-clang-cl-mad-enable"],"-cl-no-signed-zeros":[6,0,1,"cmdoption-clang-cl-no-signed-zeros"],"-cl-opt-disable":[6,0,1,"cmdoption-clang-cl-opt-disable"],"-cl-single-precision-constant":[6,0,1,"cmdoption-clang-cl-single-precision-constant"],"-cl-std":[6,0,1,"cmdoption-clang-cl-std"],"-cl-strict-aliasing":[6,0,1,"cmdoption-clang-cl-strict-aliasing"],"-cl-uniform-work-group-size":[6,0,1,"cmdoption-clang-cl-uniform-work-group-size"],"-cl-unsafe-math-optimizations":[6,0,1,"cmdoption-clang-cl-unsafe-math-optimizations"],"-client_name<arg>":[6,0,1,"cmdoption-clang-client-name-arg"],"-compatibility_version<arg>":[6,0,1,"cmdoption-clang-compatibility-version-arg"],"-coverage":[6,0,1,"cmdoption-clang-coverage"],"-cpp":[6,0,1,"cmdoption-clang-cpp"],"-current_version<arg>":[6,0,1,"cmdoption-clang-current-version-arg"],"-cxx-isystem<directory>":[6,0,1,"cmdoption-clang-cxx-isystem-directory"],"-d":[6,0,1,"cmdoption-clang-d"],"-dA":[6,0,1,"cmdoption-clang-da"],"-dD":[6,0,1,"cmdoption-clang-dd"],"-dI":[6,0,1,"cmdoption-clang-di"],"-dM":[6,0,1,"cmdoption-clang-dm"],"-dead_strip":[6,0,1,"cmdoption-clang-dead-strip"],"-dependency-dot":[6,0,1,"cmdoption-clang-dependency-dot"],"-dependency-file":[6,0,1,"cmdoption-clang-dependency-file"],"-dumpmachine":[6,0,1,"cmdoption-clang-dumpmachine"],"-dumpversion":[6,0,1,"cmdoption-clang-dumpversion"],"-dylib_file":[6,0,1,"cmdoption-clang-dylib-file"],"-dylinker":[6,0,1,"cmdoption-clang-dylinker"],"-dynamic":[6,0,1,"cmdoption-clang-dynamic"],"-dynamiclib":[6,0,1,"cmdoption-clang-dynamiclib"],"-e<arg>":[6,0,1,"cmdoption-clang-e-arg"],"-emit-ast":[6,0,1,"cmdoption-clang-emit-ast"],"-emit-llvm":[6,0,1,"cmdoption-clang-emit-llvm"],"-enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang<arg>":[6,0,1,"cmdoption-clang-enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang-arg"],"-exported_symbols_list":[6,0,1,"cmdoption-clang-exported-symbols-list"],"-fPIC":[6,0,1,"cmdoption-clang-fpic"],"-fPIE":[6,0,1,"cmdoption-clang-fpie"],"-faccess-control":[6,0,1,"cmdoption-clang-faccess-control"],"-faddrsig":[6,0,1,"cmdoption-clang-faddrsig"],"-faggressive-function-elimination":[6,0,1,"cmdoption-clang-faggressive-function-elimination"],"-falign-commons":[6,0,1,"cmdoption-clang-falign-commons"],"-falign-functions":[6,0,1,"cmdoption-clang-falign-functions"],"-faligned-new":[6,0,1,"cmdoption-clang-faligned-new"],"-fall-intrinsics":[6,0,1,"cmdoption-clang-fall-intrinsics"],"-fallow-editor-placeholders":[6,0,1,"cmdoption-clang-fallow-editor-placeholders"],"-fallow-unsupported":[6,0,1,"cmdoption-clang-fallow-unsupported"],"-faltivec":[6,0,1,"cmdoption-clang-faltivec"],"-fansi-escape-codes":[6,0,1,"cmdoption-clang-fansi-escape-codes"],"-fapple-kext":[6,0,1,"cmdoption-clang-fapple-kext"],"-fapple-pragma-pack":[6,0,1,"cmdoption-clang-fapple-pragma-pack"],"-fapplication-extension":[6,0,1,"cmdoption-clang-fapplication-extension"],"-fasm":[6,0,1,"cmdoption-clang-fasm"],"-fasm-blocks":[6,0,1,"cmdoption-clang-fasm-blocks"],"-fassociative-math":[6,0,1,"cmdoption-clang-fassociative-math"],"-fassume-sane-operator-new":[6,0,1,"cmdoption-clang-fassume-sane-operator-new"],"-fast":[6,0,1,"cmdoption-clang-fast"],"-fastcp":[6,0,1,"cmdoption-clang-fastcp"],"-fastf":[6,0,1,"cmdoption-clang-fastf"],"-fasynchronous-unwind-tables":[6,0,1,"cmdoption-clang-fasynchronous-unwind-tables"],"-fauto-profile":[6,0,1,"cmdoption-clang-fprofile-sample-use"],"-fauto-profile-accurate":[6,0,1,"cmdoption-clang-fprofile-sample-accurate"],"-fautolink":[6,0,1,"cmdoption-clang-fautolink"],"-fautomatic":[6,0,1,"cmdoption-clang-fautomatic"],"-fbackslash":[6,0,1,"cmdoption-clang-fbackslash"],"-fbacktrace":[6,0,1,"cmdoption-clang-fbacktrace"],"-fblas-matmul-limit":[6,0,1,"cmdoption-clang-fblas-matmul-limit"],"-fblocks":[6,0,1,"cmdoption-clang-fblocks"],"-fbootclasspath":[6,0,1,"cmdoption-clang-fbootclasspath"],"-fborland-extensions":[6,0,1,"cmdoption-clang-fborland-extensions"],"-fbounds-check":[6,0,1,"cmdoption-clang-fbounds-check"],"-fbracket-depth":[6,0,1,"cmdoption-clang-fbracket-depth"],"-fbuild-session-file":[6,0,1,"cmdoption-clang-fbuild-session-file"],"-fbuild-session-timestamp":[6,0,1,"cmdoption-clang-fbuild-session-timestamp"],"-fbuiltin":[6,0,1,"cmdoption-clang-fbuiltin"],"-fbuiltin-module-map":[6,0,1,"cmdoption-clang-fbuiltin-module-map"],"-fc++-static-destructors":[6,0,1,"cmdoption-clang-fc-static-destructors"],"-fcall-saved-x10":[6,0,1,"cmdoption-clang-fcall-saved-x10"],"-fcall-saved-x11":[6,0,1,"cmdoption-clang-fcall-saved-x11"],"-fcall-saved-x12":[6,0,1,"cmdoption-clang-fcall-saved-x12"],"-fcall-saved-x13":[6,0,1,"cmdoption-clang-fcall-saved-x13"],"-fcall-saved-x14":[6,0,1,"cmdoption-clang-fcall-saved-x14"],"-fcall-saved-x15":[6,0,1,"cmdoption-clang-fcall-saved-x15"],"-fcall-saved-x18":[6,0,1,"cmdoption-clang-fcall-saved-x18"],"-fcall-saved-x8":[6,0,1,"cmdoption-clang-fcall-saved-x8"],"-fcall-saved-x9":[6,0,1,"cmdoption-clang-fcall-saved-x9"],"-fcaret-diagnostics":[6,0,1,"cmdoption-clang-fcaret-diagnostics"],"-fcf-protection":[6,0,1,"cmdoption-clang-fcf-protection"],"-fcf-runtime-abi":[6,0,1,"cmdoption-clang-fcf-runtime-abi"],"-fchar8_t":[6,0,1,"cmdoption-clang-fchar8-t"],"-fcheck":[6,0,1,"cmdoption-clang-fcheck"],"-fcheck-array-temporaries":[6,0,1,"cmdoption-clang-fcheck-array-temporaries"],"-fclang-abi-compat":[6,0,1,"cmdoption-clang-fclang-abi-compat"],"-fclasspath":[6,0,1,"cmdoption-clang-fclasspath"],"-fcoarray":[6,0,1,"cmdoption-clang-fcoarray"],"-fcolor-diagnostics":[6,0,1,"cmdoption-clang-fcolor-diagnostics"],"-fcomment-block-commands":[6,0,1,"cmdoption-clang-fcomment-block-commands"],"-fcommon":[6,0,1,"cmdoption-clang-fcommon"],"-fcompile-resource":[6,0,1,"cmdoption-clang-fcompile-resource"],"-fcomplete-member-pointers":[6,0,1,"cmdoption-clang-fcomplete-member-pointers"],"-fconstant-cfstrings":[6,0,1,"cmdoption-clang-fconstant-cfstrings"],"-fconstant-string-class":[6,0,1,"cmdoption-clang-fconstant-string-class"],"-fconstexpr-backtrace-limit":[6,0,1,"cmdoption-clang-fconstexpr-backtrace-limit"],"-fconstexpr-depth":[6,0,1,"cmdoption-clang-fconstexpr-depth"],"-fconstexpr-steps":[6,0,1,"cmdoption-clang-fconstexpr-steps"],"-fconvert":[6,0,1,"cmdoption-clang-fconvert"],"-fcoroutines-ts":[6,0,1,"cmdoption-clang-fcoroutines-ts"],"-fcoverage-mapping":[6,0,1,"cmdoption-clang-fcoverage-mapping"],"-fcrash-diagnostics-dir":[6,0,1,"cmdoption-clang-fcrash-diagnostics-dir"],"-fcray-pointer":[6,0,1,"cmdoption-clang-fcray-pointer"],"-fcreate-profile":[6,0,1,"cmdoption-clang-fcreate-profile"],"-fcuda-approx-transcendentals":[6,0,1,"cmdoption-clang-fcuda-approx-transcendentals"],"-fcuda-flush-denormals-to-zero":[6,0,1,"cmdoption-clang-fcuda-flush-denormals-to-zero"],"-fcuda-rdc":[6,0,1,"cmdoption-clang-fgpu-rdc"],"-fcuda-short-ptr":[6,0,1,"cmdoption-clang-fcuda-short-ptr"],"-fcxx-exceptions":[6,0,1,"cmdoption-clang-fcxx-exceptions"],"-fcxx-modules":[6,0,1,"cmdoption-clang-fcxx-modules"],"-fd-lines-as-code":[6,0,1,"cmdoption-clang-fd-lines-as-code"],"-fd-lines-as-comments":[6,0,1,"cmdoption-clang-fd-lines-as-comments"],"-fdata-sections":[6,0,1,"cmdoption-clang-fdata-sections"],"-fdebug-info-for-profiling":[6,0,1,"cmdoption-clang-fdebug-info-for-profiling"],"-fdebug-macro":[6,0,1,"cmdoption-clang-fdebug-macro"],"-fdebug-pass-arguments":[6,0,1,"cmdoption-clang-fdebug-pass-arguments"],"-fdebug-pass-structure":[6,0,1,"cmdoption-clang-fdebug-pass-structure"],"-fdebug-prefix-map":[6,0,1,"cmdoption-clang-fdebug-prefix-map"],"-fdebug-ranges-base-address":[6,0,1,"cmdoption-clang-fdebug-ranges-base-address"],"-fdebug-types-section":[6,0,1,"cmdoption-clang-fdebug-types-section"],"-fdeclspec":[6,0,1,"cmdoption-clang-fdeclspec"],"-fdefault-double-8":[6,0,1,"cmdoption-clang-fdefault-double-8"],"-fdefault-integer-8":[6,0,1,"cmdoption-clang-fdefault-integer-8"],"-fdefault-real-8":[6,0,1,"cmdoption-clang-fdefault-real-8"],"-fdelayed-template-parsing":[6,0,1,"cmdoption-clang-fdelayed-template-parsing"],"-fdelete-null-pointer-checks":[6,0,1,"cmdoption-clang-fdelete-null-pointer-checks"],"-fdenormal-fp-math":[6,0,1,"cmdoption-clang-fdenormal-fp-math"],"-fdepfile-entry":[6,0,1,"cmdoption-clang-fdepfile-entry"],"-fdiagnostics-absolute-paths":[6,0,1,"cmdoption-clang-fdiagnostics-absolute-paths"],"-fdiagnostics-color":[6,0,1,"cmdoption-clang-fdiagnostics-color"],"-fdiagnostics-fixit-info":[6,0,1,"cmdoption-clang-fdiagnostics-fixit-info"],"-fdiagnostics-format":[6,0,1,"cmdoption-clang-fdiagnostics-format"],"-fdiagnostics-hotness-threshold":[6,0,1,"cmdoption-clang-fdiagnostics-hotness-threshold"],"-fdiagnostics-parseable-fixits":[6,0,1,"cmdoption-clang-fdiagnostics-parseable-fixits"],"-fdiagnostics-print-source-range-info":[6,0,1,"cmdoption-clang-fdiagnostics-print-source-range-info"],"-fdiagnostics-show-category":[6,0,1,"cmdoption-clang-fdiagnostics-show-category"],"-fdiagnostics-show-hotness":[6,0,1,"cmdoption-clang-fdiagnostics-show-hotness"],"-fdiagnostics-show-note-include-stack":[6,0,1,"cmdoption-clang-fdiagnostics-show-note-include-stack"],"-fdiagnostics-show-option":[6,0,1,"cmdoption-clang-fdiagnostics-show-option"],"-fdiagnostics-show-template-tree":[6,0,1,"cmdoption-clang-fdiagnostics-show-template-tree"],"-fdigraphs":[6,0,1,"cmdoption-clang-fdigraphs"],"-fdiscard-value-names":[6,0,1,"cmdoption-clang-fdiscard-value-names"],"-fdollar-ok":[6,0,1,"cmdoption-clang-fdollar-ok"],"-fdollars-in-identifiers":[6,0,1,"cmdoption-clang-fdollars-in-identifiers"],"-fdouble-square-bracket-attributes":[6,0,1,"cmdoption-clang-fdouble-square-bracket-attributes"],"-fdump-fortran-optimized":[6,0,1,"cmdoption-clang-fdump-fortran-optimized"],"-fdump-fortran-original":[6,0,1,"cmdoption-clang-fdump-fortran-original"],"-fdump-parse-tree":[6,0,1,"cmdoption-clang-fdump-parse-tree"],"-fdwarf-directory-asm":[6,0,1,"cmdoption-clang-fdwarf-directory-asm"],"-fdwarf-exceptions":[6,0,1,"cmdoption-clang-fdwarf-exceptions"],"-felide-constructors":[6,0,1,"cmdoption-clang-felide-constructors"],"-feliminate-unused-debug-symbols":[6,0,1,"cmdoption-clang-feliminate-unused-debug-symbols"],"-fembed-bitcode":[6,0,1,"cmdoption-clang-fembed-bitcode"],"-fembed-bitcode-marker":[6,0,1,"cmdoption-clang-fembed-bitcode"],"-femit-all-decls":[6,0,1,"cmdoption-clang-femit-all-decls"],"-femulated-tls":[6,0,1,"cmdoption-clang-femulated-tls"],"-fencoding":[6,0,1,"cmdoption-clang-fencoding"],"-ferror-limit":[6,0,1,"cmdoption-clang-ferror-limit"],"-fescaping-block-tail-calls":[6,0,1,"cmdoption-clang-fescaping-block-tail-calls"],"-fexceptions":[6,0,1,"cmdoption-clang-fexceptions"],"-fexec-charset":[6,0,1,"cmdoption-clang-fexec-charset"],"-fexperimental-isel":[6,0,1,"cmdoption-clang-fexperimental-isel"],"-fexperimental-new-pass-manager":[6,0,1,"cmdoption-clang-fexperimental-new-pass-manager"],"-fextdirs":[6,0,1,"cmdoption-clang-fextdirs"],"-fexternal-blas":[6,0,1,"cmdoption-clang-fexternal-blas"],"-ff2c":[6,0,1,"cmdoption-clang-ff2c"],"-ffast-math":[6,0,1,"cmdoption-clang-ffast-math"],"-ffine-grained-bitfield-accesses":[6,0,1,"cmdoption-clang-ffine-grained-bitfield-accesses"],"-ffinite-math-only":[6,0,1,"cmdoption-clang-ffinite-math-only"],"-ffixed-form":[6,0,1,"cmdoption-clang-ffixed-form"],"-ffixed-line-length-<arg>":[6,0,1,"cmdoption-clang-ffixed-line-length-arg"],"-ffixed-point":[6,0,1,"cmdoption-clang-ffixed-point"],"-ffixed-r19":[6,0,1,"cmdoption-clang-ffixed-r19"],"-ffixed-r9":[6,0,1,"cmdoption-clang-ffixed-r9"],"-ffixed-x1":[6,0,1,"cmdoption-clang-ffixed-x1"],"-ffixed-x18":[6,0,1,"cmdoption-clang-ffixed-x18"],"-ffixed-x2":[6,0,1,"cmdoption-clang-ffixed-x2"],"-ffixed-x20":[6,0,1,"cmdoption-clang-ffixed-x20"],"-ffixed-x3":[6,0,1,"cmdoption-clang-ffixed-x3"],"-ffixed-x4":[6,0,1,"cmdoption-clang-ffixed-x4"],"-ffixed-x5":[6,0,1,"cmdoption-clang-ffixed-x5"],"-ffixed-x6":[6,0,1,"cmdoption-clang-ffixed-x6"],"-ffixed-x7":[6,0,1,"cmdoption-clang-ffixed-x7"],"-ffor-scope":[6,0,1,"cmdoption-clang-ffor-scope"],"-fforce-emit-vtables":[6,0,1,"cmdoption-clang-fforce-emit-vtables"],"-fforce-enable-int128":[6,0,1,"cmdoption-clang-fforce-enable-int128"],"-ffp-contract":[6,0,1,"cmdoption-clang-ffp-contract"],"-ffpe-trap":[6,0,1,"cmdoption-clang-ffpe-trap"],"-ffree-form":[6,0,1,"cmdoption-clang-ffree-form"],"-ffree-line-length-<arg>":[6,0,1,"cmdoption-clang-ffree-line-length-arg"],"-ffreestanding":[6,0,1,"cmdoption-clang-ffreestanding"],"-ffrontend-optimize":[6,0,1,"cmdoption-clang-ffrontend-optimize"],"-ffunction-sections":[6,0,1,"cmdoption-clang-ffunction-sections"],"-fgnu-inline-asm":[6,0,1,"cmdoption-clang-fgnu-inline-asm"],"-fgnu-keywords":[6,0,1,"cmdoption-clang-fgnu-keywords"],"-fgnu-runtime":[6,0,1,"cmdoption-clang-fgnu-runtime"],"-fgnu89-inline":[6,0,1,"cmdoption-clang-fgnu89-inline"],"-fgpu-rdc":[6,0,1,"cmdoption-clang-fgpu-rdc"],"-fheinous-gnu-extensions":[6,0,1,"cmdoption-clang-fheinous-gnu-extensions"],"-fhonor-infinites":[6,0,1,"cmdoption-clang-fhonor-infinities"],"-fhonor-infinities":[6,0,1,"cmdoption-clang-fhonor-infinities"],"-fhonor-nans":[6,0,1,"cmdoption-clang-fhonor-nans"],"-fhosted":[6,0,1,"cmdoption-clang-fhosted"],"-fident":[6,0,1,"cmdoption-clang-qy"],"-filelist":[6,0,1,"cmdoption-clang-filelist"],"-fimplicit-module-maps":[6,0,1,"cmdoption-clang-fimplicit-module-maps"],"-fimplicit-modules":[6,0,1,"cmdoption-clang-fimplicit-modules"],"-fimplicit-none":[6,0,1,"cmdoption-clang-fimplicit-none"],"-findirect-virtual-calls":[6,0,1,"cmdoption-clang-fapple-kext"],"-finit-character":[6,0,1,"cmdoption-clang-finit-character"],"-finit-integer":[6,0,1,"cmdoption-clang-finit-integer"],"-finit-local-zero":[6,0,1,"cmdoption-clang-finit-local-zero"],"-finit-logical":[6,0,1,"cmdoption-clang-finit-logical"],"-finit-real":[6,0,1,"cmdoption-clang-finit-real"],"-finline-functions":[6,0,1,"cmdoption-clang-finline-functions"],"-finline-hint-functions":[6,0,1,"cmdoption-clang-finline-hint-functions"],"-finput-charset":[6,0,1,"cmdoption-clang-finput-charset"],"-finstrument-function-entry-bare":[6,0,1,"cmdoption-clang-finstrument-function-entry-bare"],"-finstrument-functions":[6,0,1,"cmdoption-clang-finstrument-functions"],"-finstrument-functions-after-inlining":[6,0,1,"cmdoption-clang-finstrument-functions-after-inlining"],"-finteger-4-integer-8":[6,0,1,"cmdoption-clang-finteger-4-integer-8"],"-fintegrated-as":[6,0,1,"cmdoption-clang-fintegrated-as"],"-fintrinsic-modules-path":[6,0,1,"cmdoption-clang-fintrinsic-modules-path"],"-fjump-tables":[6,0,1,"cmdoption-clang-fjump-tables"],"-fkeep-static-consts":[6,0,1,"cmdoption-clang-fkeep-static-consts"],"-flat_namespace":[6,0,1,"cmdoption-clang-flat-namespace"],"-flax-vector-conversions":[6,0,1,"cmdoption-clang-flax-vector-conversions"],"-flimited-precision":[6,0,1,"cmdoption-clang-flimited-precision"],"-flto":[6,0,1,"cmdoption-clang-flto"],"-flto-jobs":[6,0,1,"cmdoption-clang-flto-jobs"],"-fmacro-backtrace-limit":[6,0,1,"cmdoption-clang-fmacro-backtrace-limit"],"-fmath-errno":[6,0,1,"cmdoption-clang-fmath-errno"],"-fmax-array-constructor":[6,0,1,"cmdoption-clang-fmax-array-constructor"],"-fmax-errors":[6,0,1,"cmdoption-clang-fmax-errors"],"-fmax-identifier-length":[6,0,1,"cmdoption-clang-fmax-identifier-length"],"-fmax-stack-var-size":[6,0,1,"cmdoption-clang-fmax-stack-var-size"],"-fmax-subrecord-length":[6,0,1,"cmdoption-clang-fmax-subrecord-length"],"-fmax-type-align":[6,0,1,"cmdoption-clang-fmax-type-align"],"-fmerge-all-constants":[6,0,1,"cmdoption-clang-fmerge-all-constants"],"-fmessage-length":[6,0,1,"cmdoption-clang-fmessage-length"],"-fmodule-file":[6,0,1,"cmdoption-clang-fmodule-file"],"-fmodule-file-deps":[6,0,1,"cmdoption-clang-fmodule-file-deps"],"-fmodule-implementation-of":[6,0,1,"cmdoption-clang-fmodule-name"],"-fmodule-map-file":[6,0,1,"cmdoption-clang-fmodule-map-file"],"-fmodule-maps":[6,0,1,"cmdoption-clang-fimplicit-module-maps"],"-fmodule-name":[6,0,1,"cmdoption-clang-fmodule-name"],"-fmodule-private":[6,0,1,"cmdoption-clang-fmodule-private"],"-fmodules":[6,0,1,"cmdoption-clang-fmodules"],"-fmodules-cache-path":[6,0,1,"cmdoption-clang-fmodules-cache-path"],"-fmodules-decluse":[6,0,1,"cmdoption-clang-fmodules-decluse"],"-fmodules-disable-diagnostic-validation":[6,0,1,"cmdoption-clang-fmodules-disable-diagnostic-validation"],"-fmodules-ignore-macro":[6,0,1,"cmdoption-clang-fmodules-ignore-macro"],"-fmodules-prune-after":[6,0,1,"cmdoption-clang-fmodules-prune-after"],"-fmodules-prune-interval":[6,0,1,"cmdoption-clang-fmodules-prune-interval"],"-fmodules-search-all":[6,0,1,"cmdoption-clang-fmodules-search-all"],"-fmodules-strict-decluse":[6,0,1,"cmdoption-clang-fmodules-strict-decluse"],"-fmodules-ts":[6,0,1,"cmdoption-clang-fmodules-ts"],"-fmodules-user-build-path":[6,0,1,"cmdoption-clang-fmodules-user-build-path"],"-fmodules-validate-once-per-build-session":[6,0,1,"cmdoption-clang-fmodules-validate-once-per-build-session"],"-fmodules-validate-system-headers":[6,0,1,"cmdoption-clang-fmodules-validate-system-headers"],"-fms-compatibility":[6,0,1,"cmdoption-clang-fms-compatibility"],"-fms-compatibility-version":[6,0,1,"cmdoption-clang-fms-compatibility-version"],"-fms-extensions":[6,0,1,"cmdoption-clang-fms-extensions"],"-fms-memptr-rep":[6,0,1,"cmdoption-clang-fms-memptr-rep"],"-fms-volatile<arg>":[6,0,1,"cmdoption-clang-fms-volatile-arg"],"-fmsc-version":[6,0,1,"cmdoption-clang-fmsc-version"],"-fmudflap":[6,0,1,"cmdoption-clang-fmudflap"],"-fmudflapth":[6,0,1,"cmdoption-clang-fmudflapth"],"-fnested-functions":[6,0,1,"cmdoption-clang-fnested-functions"],"-fnew-alignment":[6,0,1,"cmdoption-clang-fnew-alignment"],"-fnext-runtime":[6,0,1,"cmdoption-clang-fnext-runtime"],"-fno-PIC":[6,0,1,"cmdoption-clang-fpic"],"-fno-PIE":[6,0,1,"cmdoption-clang-fpie"],"-fno-access-control":[6,0,1,"cmdoption-clang-faccess-control"],"-fno-addrsig":[6,0,1,"cmdoption-clang-faddrsig"],"-fno-aggressive-function-elimination":[6,0,1,"cmdoption-clang-faggressive-function-elimination"],"-fno-align-commons":[6,0,1,"cmdoption-clang-falign-commons"],"-fno-align-functions":[6,0,1,"cmdoption-clang-falign-functions"],"-fno-all-intrinsics":[6,0,1,"cmdoption-clang-fall-intrinsics"],"-fno-allow-editor-placeholders":[6,0,1,"cmdoption-clang-fallow-editor-placeholders"],"-fno-altivec":[6,0,1,"cmdoption-clang-faltivec"],"-fno-apple-pragma-pack":[6,0,1,"cmdoption-clang-fapple-pragma-pack"],"-fno-application-extension":[6,0,1,"cmdoption-clang-fapplication-extension"],"-fno-asm":[6,0,1,"cmdoption-clang-fasm"],"-fno-asm-blocks":[6,0,1,"cmdoption-clang-fasm-blocks"],"-fno-associative-math":[6,0,1,"cmdoption-clang-fassociative-math"],"-fno-assume-sane-operator-new":[6,0,1,"cmdoption-clang-fassume-sane-operator-new"],"-fno-asynchronous-unwind-tables":[6,0,1,"cmdoption-clang-fasynchronous-unwind-tables"],"-fno-autolink":[6,0,1,"cmdoption-clang-fautolink"],"-fno-automatic":[6,0,1,"cmdoption-clang-fautomatic"],"-fno-backslash":[6,0,1,"cmdoption-clang-fbackslash"],"-fno-backtrace":[6,0,1,"cmdoption-clang-fbacktrace"],"-fno-blocks":[6,0,1,"cmdoption-clang-fblocks"],"-fno-borland-extensions":[6,0,1,"cmdoption-clang-fborland-extensions"],"-fno-bounds-check":[6,0,1,"cmdoption-clang-fbounds-check"],"-fno-builtin":[6,0,1,"cmdoption-clang-fbuiltin"],"-fno-builtin-<arg>":[6,0,1,"cmdoption-clang-fno-builtin-arg"],"-fno-c++-static-destructors":[6,0,1,"cmdoption-clang-fc-static-destructors"],"-fno-caret-diagnostics":[6,0,1,"cmdoption-clang-fcaret-diagnostics"],"-fno-char8_t":[6,0,1,"cmdoption-clang-fchar8-t"],"-fno-check-array-temporaries":[6,0,1,"cmdoption-clang-fcheck-array-temporaries"],"-fno-color-diagnostics":[6,0,1,"cmdoption-clang-fcolor-diagnostics"],"-fno-common":[6,0,1,"cmdoption-clang-fcommon"],"-fno-complete-member-pointers":[6,0,1,"cmdoption-clang-fcomplete-member-pointers"],"-fno-constant-cfstrings":[6,0,1,"cmdoption-clang-fconstant-cfstrings"],"-fno-coroutines-ts":[6,0,1,"cmdoption-clang-fcoroutines-ts"],"-fno-coverage-mapping":[6,0,1,"cmdoption-clang-fcoverage-mapping"],"-fno-crash-diagnostics":[6,0,1,"cmdoption-clang-fno-crash-diagnostics"],"-fno-cray-pointer":[6,0,1,"cmdoption-clang-fcray-pointer"],"-fno-cuda-approx-transcendentals":[6,0,1,"cmdoption-clang-fcuda-approx-transcendentals"],"-fno-cuda-flush-denormals-to-zero":[6,0,1,"cmdoption-clang-fcuda-flush-denormals-to-zero"],"-fno-cuda-short-ptr":[6,0,1,"cmdoption-clang-fcuda-short-ptr"],"-fno-cxx-exceptions":[6,0,1,"cmdoption-clang-fcxx-exceptions"],"-fno-cxx-modules":[6,0,1,"cmdoption-clang-fcxx-modules"],"-fno-d-lines-as-code":[6,0,1,"cmdoption-clang-fd-lines-as-code"],"-fno-d-lines-as-comments":[6,0,1,"cmdoption-clang-fd-lines-as-comments"],"-fno-data-sections":[6,0,1,"cmdoption-clang-fdata-sections"],"-fno-debug-info-for-profiling":[6,0,1,"cmdoption-clang-fdebug-info-for-profiling"],"-fno-debug-macro":[6,0,1,"cmdoption-clang-fdebug-macro"],"-fno-debug-ranges-base-address":[6,0,1,"cmdoption-clang-fdebug-ranges-base-address"],"-fno-debug-types-section":[6,0,1,"cmdoption-clang-fdebug-types-section"],"-fno-declspec":[6,0,1,"cmdoption-clang-fdeclspec"],"-fno-default-double-8":[6,0,1,"cmdoption-clang-fdefault-double-8"],"-fno-default-integer-8":[6,0,1,"cmdoption-clang-fdefault-integer-8"],"-fno-default-real-8":[6,0,1,"cmdoption-clang-fdefault-real-8"],"-fno-delayed-template-parsing":[6,0,1,"cmdoption-clang-fdelayed-template-parsing"],"-fno-delete-null-pointer-checks":[6,0,1,"cmdoption-clang-fdelete-null-pointer-checks"],"-fno-diagnostics-color":[6,0,1,"cmdoption-clang-fdiagnostics-color"],"-fno-diagnostics-fixit-info":[6,0,1,"cmdoption-clang-fdiagnostics-fixit-info"],"-fno-diagnostics-show-hotness":[6,0,1,"cmdoption-clang-fdiagnostics-show-hotness"],"-fno-diagnostics-show-note-include-stack":[6,0,1,"cmdoption-clang-fdiagnostics-show-note-include-stack"],"-fno-diagnostics-show-option":[6,0,1,"cmdoption-clang-fdiagnostics-show-option"],"-fno-digraphs":[6,0,1,"cmdoption-clang-fdigraphs"],"-fno-discard-value-names":[6,0,1,"cmdoption-clang-fdiscard-value-names"],"-fno-dollar-ok":[6,0,1,"cmdoption-clang-fdollar-ok"],"-fno-dollars-in-identifiers":[6,0,1,"cmdoption-clang-fdollars-in-identifiers"],"-fno-double-square-bracket-attributes":[6,0,1,"cmdoption-clang-fdouble-square-bracket-attributes"],"-fno-dump-fortran-optimized":[6,0,1,"cmdoption-clang-fdump-fortran-optimized"],"-fno-dump-fortran-original":[6,0,1,"cmdoption-clang-fdump-fortran-original"],"-fno-dump-parse-tree":[6,0,1,"cmdoption-clang-fdump-parse-tree"],"-fno-dwarf-directory-asm":[6,0,1,"cmdoption-clang-fdwarf-directory-asm"],"-fno-elide-constructors":[6,0,1,"cmdoption-clang-felide-constructors"],"-fno-elide-type":[6,0,1,"cmdoption-clang-fno-elide-type"],"-fno-eliminate-unused-debug-symbols":[6,0,1,"cmdoption-clang-feliminate-unused-debug-symbols"],"-fno-emulated-tls":[6,0,1,"cmdoption-clang-femulated-tls"],"-fno-escaping-block-tail-calls":[6,0,1,"cmdoption-clang-fescaping-block-tail-calls"],"-fno-exceptions":[6,0,1,"cmdoption-clang-fexceptions"],"-fno-experimental-isel":[6,0,1,"cmdoption-clang-fexperimental-isel"],"-fno-experimental-new-pass-manager":[6,0,1,"cmdoption-clang-fexperimental-new-pass-manager"],"-fno-external-blas":[6,0,1,"cmdoption-clang-fexternal-blas"],"-fno-f2c":[6,0,1,"cmdoption-clang-ff2c"],"-fno-fast-math":[6,0,1,"cmdoption-clang-ffast-math"],"-fno-fine-grained-bitfield-accesses":[6,0,1,"cmdoption-clang-ffine-grained-bitfield-accesses"],"-fno-finite-math-only":[6,0,1,"cmdoption-clang-ffinite-math-only"],"-fno-fixed-form":[6,0,1,"cmdoption-clang-ffixed-form"],"-fno-fixed-point":[6,0,1,"cmdoption-clang-ffixed-point"],"-fno-for-scope":[6,0,1,"cmdoption-clang-ffor-scope"],"-fno-force-emit-vtables":[6,0,1,"cmdoption-clang-fforce-emit-vtables"],"-fno-force-enable-int128":[6,0,1,"cmdoption-clang-fforce-enable-int128"],"-fno-free-form":[6,0,1,"cmdoption-clang-ffree-form"],"-fno-frontend-optimize":[6,0,1,"cmdoption-clang-ffrontend-optimize"],"-fno-function-sections":[6,0,1,"cmdoption-clang-ffunction-sections"],"-fno-gnu-inline-asm":[6,0,1,"cmdoption-clang-fgnu-inline-asm"],"-fno-gnu-keywords":[6,0,1,"cmdoption-clang-fgnu-keywords"],"-fno-gnu89-inline":[6,0,1,"cmdoption-clang-fgnu89-inline"],"-fno-gpu-rdc":[6,0,1,"cmdoption-clang-fgpu-rdc"],"-fno-honor-infinities":[6,0,1,"cmdoption-clang-fhonor-infinities"],"-fno-honor-nans":[6,0,1,"cmdoption-clang-fhonor-nans"],"-fno-ident":[6,0,1,"cmdoption-clang-qn"],"-fno-implicit-module-maps":[6,0,1,"cmdoption-clang-fimplicit-module-maps"],"-fno-implicit-modules":[6,0,1,"cmdoption-clang-fimplicit-modules"],"-fno-implicit-none":[6,0,1,"cmdoption-clang-fimplicit-none"],"-fno-init-local-zero":[6,0,1,"cmdoption-clang-finit-local-zero"],"-fno-inline-functions":[6,0,1,"cmdoption-clang-finline-functions"],"-fno-integer-4-integer-8":[6,0,1,"cmdoption-clang-finteger-4-integer-8"],"-fno-integrated-as":[6,0,1,"cmdoption-clang-fintegrated-as"],"-fno-intrinsic-modules-path":[6,0,1,"cmdoption-clang-fintrinsic-modules-path"],"-fno-jump-tables":[6,0,1,"cmdoption-clang-fjump-tables"],"-fno-lax-vector-conversions":[6,0,1,"cmdoption-clang-flax-vector-conversions"],"-fno-limit-debug-info":[6,0,1,"cmdoption-clang-fstandalone-debug"],"-fno-lto":[6,0,1,"cmdoption-clang-flto"],"-fno-math-errno":[6,0,1,"cmdoption-clang-fmath-errno"],"-fno-max-identifier-length":[6,0,1,"cmdoption-clang-fmax-identifier-length"],"-fno-max-type-align":[6,0,1,"cmdoption-clang-fno-max-type-align"],"-fno-merge-all-constants":[6,0,1,"cmdoption-clang-fmerge-all-constants"],"-fno-module-file-deps":[6,0,1,"cmdoption-clang-fmodule-file-deps"],"-fno-module-private":[6,0,1,"cmdoption-clang-fmodule-private"],"-fno-modules":[6,0,1,"cmdoption-clang-fmodules"],"-fno-modules-decluse":[6,0,1,"cmdoption-clang-fmodules-decluse"],"-fno-modules-search-all":[6,0,1,"cmdoption-clang-fmodules-search-all"],"-fno-modules-validate-system-headers":[6,0,1,"cmdoption-clang-fmodules-validate-system-headers"],"-fno-ms-compatibility":[6,0,1,"cmdoption-clang-fms-compatibility"],"-fno-ms-extensions":[6,0,1,"cmdoption-clang-fms-extensions"],"-fno-objc-arc":[6,0,1,"cmdoption-clang-fobjc-arc"],"-fno-objc-arc-exceptions":[6,0,1,"cmdoption-clang-fobjc-arc-exceptions"],"-fno-objc-convert-messages-to-runtime-calls":[6,0,1,"cmdoption-clang-fobjc-convert-messages-to-runtime-calls"],"-fno-objc-exceptions":[6,0,1,"cmdoption-clang-fobjc-exceptions"],"-fno-objc-infer-related-result-type":[6,0,1,"cmdoption-clang-fobjc-infer-related-result-type"],"-fno-objc-legacy-dispatch":[6,0,1,"cmdoption-clang-fobjc-legacy-dispatch"],"-fno-objc-nonfragile-abi":[6,0,1,"cmdoption-clang-fobjc-nonfragile-abi"],"-fno-objc-weak":[6,0,1,"cmdoption-clang-fobjc-weak"],"-fno-omit-frame-pointer":[6,0,1,"cmdoption-clang-fomit-frame-pointer"],"-fno-openmp":[6,0,1,"cmdoption-clang-fopenmp"],"-fno-openmp-simd":[6,0,1,"cmdoption-clang-fopenmp-simd"],"-fno-operator-names":[6,0,1,"cmdoption-clang-fno-operator-names"],"-fno-optimize-sibling-calls":[6,0,1,"cmdoption-clang-foptimize-sibling-calls"],"-fno-pack-derived":[6,0,1,"cmdoption-clang-fpack-derived"],"-fno-pack-struct":[6,0,1,"cmdoption-clang-fpack-struct"],"-fno-pascal-strings":[6,0,1,"cmdoption-clang-fpascal-strings"],"-fno-pic":[6,0,1,"cmdoption-clang-fno-pic"],"-fno-pie":[6,0,1,"cmdoption-clang-fno-pie"],"-fno-plt":[6,0,1,"cmdoption-clang-fplt"],"-fno-preserve-as-comments":[6,0,1,"cmdoption-clang-fpreserve-as-comments"],"-fno-profile-arcs":[6,0,1,"cmdoption-clang-fprofile-arcs"],"-fno-profile-generate":[6,0,1,"cmdoption-clang-fprofile-generate"],"-fno-profile-instr-generate":[6,0,1,"cmdoption-clang-fprofile-instr-generate"],"-fno-profile-instr-use":[6,0,1,"cmdoption-clang-fprofile-instr-use"],"-fno-profile-sample-accurate":[6,0,1,"cmdoption-clang-fprofile-sample-accurate"],"-fno-profile-sample-use":[6,0,1,"cmdoption-clang-fprofile-sample-use"],"-fno-protect-parens":[6,0,1,"cmdoption-clang-fprotect-parens"],"-fno-range-check":[6,0,1,"cmdoption-clang-frange-check"],"-fno-real-4-real-10":[6,0,1,"cmdoption-clang-freal-4-real-10"],"-fno-real-4-real-16":[6,0,1,"cmdoption-clang-freal-4-real-16"],"-fno-real-4-real-8":[6,0,1,"cmdoption-clang-freal-4-real-8"],"-fno-real-8-real-10":[6,0,1,"cmdoption-clang-freal-8-real-10"],"-fno-real-8-real-16":[6,0,1,"cmdoption-clang-freal-8-real-16"],"-fno-real-8-real-4":[6,0,1,"cmdoption-clang-freal-8-real-4"],"-fno-realloc-lhs":[6,0,1,"cmdoption-clang-frealloc-lhs"],"-fno-reciprocal-math":[6,0,1,"cmdoption-clang-freciprocal-math"],"-fno-record-command-line":[6,0,1,"cmdoption-clang-frecord-command-line"],"-fno-recursive":[6,0,1,"cmdoption-clang-frecursive"],"-fno-register-global-dtors-with-atexit":[6,0,1,"cmdoption-clang-fregister-global-dtors-with-atexit"],"-fno-relaxed-template-template-args":[6,0,1,"cmdoption-clang-frelaxed-template-template-args"],"-fno-repack-arrays":[6,0,1,"cmdoption-clang-frepack-arrays"],"-fno-reroll-loops":[6,0,1,"cmdoption-clang-freroll-loops"],"-fno-rewrite-imports":[6,0,1,"cmdoption-clang-frewrite-imports"],"-fno-rewrite-includes":[6,0,1,"cmdoption-clang-frewrite-includes"],"-fno-ropi":[6,0,1,"cmdoption-clang-fropi"],"-fno-rtlib-add-rpath":[6,0,1,"cmdoption-clang-frtlib-add-rpath"],"-fno-rtti":[6,0,1,"cmdoption-clang-frtti"],"-fno-rtti-data":[6,0,1,"cmdoption-clang-fno-rtti-data"],"-fno-rwpi":[6,0,1,"cmdoption-clang-frwpi"],"-fno-sanitize":[6,0,1,"cmdoption-clang-fsanitize"],"-fno-sanitize-address-poison-custom-array-cookie":[6,0,1,"cmdoption-clang-fsanitize-address-poison-custom-array-cookie"],"-fno-sanitize-address-use-after-scope":[6,0,1,"cmdoption-clang-fsanitize-address-use-after-scope"],"-fno-sanitize-address-use-odr-indicator":[6,0,1,"cmdoption-clang-fsanitize-address-use-odr-indicator"],"-fno-sanitize-blacklist":[6,0,1,"cmdoption-clang-fno-sanitize-blacklist"],"-fno-sanitize-cfi-cross-dso":[6,0,1,"cmdoption-clang-fsanitize-cfi-cross-dso"],"-fno-sanitize-coverage":[6,0,1,"cmdoption-clang-fsanitize-coverage"],"-fno-sanitize-memory-track-origins":[6,0,1,"cmdoption-clang-fsanitize-memory-track-origins"],"-fno-sanitize-memory-use-after-dtor":[6,0,1,"cmdoption-clang-fsanitize-memory-use-after-dtor"],"-fno-sanitize-minimal-runtime":[6,0,1,"cmdoption-clang-fsanitize-minimal-runtime"],"-fno-sanitize-recover":[6,0,1,"cmdoption-clang-fsanitize-recover"],"-fno-sanitize-stats":[6,0,1,"cmdoption-clang-fsanitize-stats"],"-fno-sanitize-thread-atomics":[6,0,1,"cmdoption-clang-fsanitize-thread-atomics"],"-fno-sanitize-thread-func-entry-exit":[6,0,1,"cmdoption-clang-fsanitize-thread-func-entry-exit"],"-fno-sanitize-thread-memory-access":[6,0,1,"cmdoption-clang-fsanitize-thread-memory-access"],"-fno-sanitize-trap":[6,0,1,"cmdoption-clang-fsanitize-trap"],"-fno-sanitize-undefined-trap-on-error":[6,0,1,"cmdoption-clang-fsanitize-undefined-trap-on-error"],"-fno-save-optimization-record":[6,0,1,"cmdoption-clang-fsave-optimization-record"],"-fno-second-underscore":[6,0,1,"cmdoption-clang-fsecond-underscore"],"-fno-short-enums":[6,0,1,"cmdoption-clang-fshort-enums"],"-fno-short-wchar":[6,0,1,"cmdoption-clang-fshort-wchar"],"-fno-show-column":[6,0,1,"cmdoption-clang-fshow-column"],"-fno-show-source-location":[6,0,1,"cmdoption-clang-fshow-source-location"],"-fno-sign-zero":[6,0,1,"cmdoption-clang-fsign-zero"],"-fno-signaling-math":[6,0,1,"cmdoption-clang-fsignaling-math"],"-fno-signed-char":[6,0,1,"cmdoption-clang-fsigned-char"],"-fno-signed-zeros":[6,0,1,"cmdoption-clang-fsigned-zeros"],"-fno-sized-deallocation":[6,0,1,"cmdoption-clang-fsized-deallocation"],"-fno-slp-vectorize":[6,0,1,"cmdoption-clang-fslp-vectorize"],"-fno-spell-checking":[6,0,1,"cmdoption-clang-fspell-checking"],"-fno-split-dwarf-inlining":[6,0,1,"cmdoption-clang-fsplit-dwarf-inlining"],"-fno-split-lto-unit":[6,0,1,"cmdoption-clang-fsplit-lto-unit"],"-fno-stack-arrays":[6,0,1,"cmdoption-clang-fstack-arrays"],"-fno-stack-protector":[6,0,1,"cmdoption-clang-fstack-protector"],"-fno-stack-size-section":[6,0,1,"cmdoption-clang-fstack-size-section"],"-fno-standalone-debug":[6,0,1,"cmdoption-clang-fstandalone-debug"],"-fno-strict-aliasing":[6,0,1,"cmdoption-clang-fstrict-aliasing"],"-fno-strict-enums":[6,0,1,"cmdoption-clang-fstrict-enums"],"-fno-strict-float-cast-overflow":[6,0,1,"cmdoption-clang-fstrict-float-cast-overflow"],"-fno-strict-modules-decluse":[6,0,1,"cmdoption-clang-fno-strict-modules-decluse"],"-fno-strict-overflow":[6,0,1,"cmdoption-clang-fstrict-overflow"],"-fno-strict-return":[6,0,1,"cmdoption-clang-fstrict-return"],"-fno-strict-vtable-pointers":[6,0,1,"cmdoption-clang-fstrict-vtable-pointers"],"-fno-struct-path-tbaa":[6,0,1,"cmdoption-clang-fstruct-path-tbaa"],"-fno-threadsafe-statics":[6,0,1,"cmdoption-clang-fthreadsafe-statics"],"-fno-trapping-math":[6,0,1,"cmdoption-clang-ftrapping-math"],"-fno-trigraphs":[6,0,1,"cmdoption-clang-ftrigraphs"],"-fno-underscoring":[6,0,1,"cmdoption-clang-funderscoring"],"-fno-unique-section-names":[6,0,1,"cmdoption-clang-funique-section-names"],"-fno-unit-at-a-time":[6,0,1,"cmdoption-clang-funit-at-a-time"],"-fno-unroll-loops":[6,0,1,"cmdoption-clang-funroll-loops"],"-fno-unsafe-math-optimizations":[6,0,1,"cmdoption-clang-funsafe-math-optimizations"],"-fno-unsigned-char":[6,0,1,"cmdoption-clang-funsigned-char"],"-fno-unwind-tables":[6,0,1,"cmdoption-clang-funwind-tables"],"-fno-use-cxa-atexit":[6,0,1,"cmdoption-clang-fuse-cxa-atexit"],"-fno-use-init-array":[6,0,1,"cmdoption-clang-fuse-init-array"],"-fno-use-line-directives":[6,0,1,"cmdoption-clang-fuse-line-directives"],"-fno-vectorize":[6,0,1,"cmdoption-clang-fvectorize"],"-fno-verbose-asm":[6,0,1,"cmdoption-clang-fverbose-asm"],"-fno-whole-file":[6,0,1,"cmdoption-clang-fwhole-file"],"-fno-whole-program-vtables":[6,0,1,"cmdoption-clang-fwhole-program-vtables"],"-fno-working-directory":[6,0,1,"cmdoption-clang-fno-working-directory"],"-fno-wrapv":[6,0,1,"cmdoption-clang-fwrapv"],"-fno-xray-always-emit-customevents":[6,0,1,"cmdoption-clang-fxray-always-emit-customevents"],"-fno-xray-always-emit-typedevents":[6,0,1,"cmdoption-clang-fxray-always-emit-typedevents"],"-fno-xray-instrument":[6,0,1,"cmdoption-clang-fxray-instrument"],"-fno-zero-initialized-in-bss":[6,0,1,"cmdoption-clang-fzero-initialized-in-bss"],"-fno-zvector":[6,0,1,"cmdoption-clang-fzvector"],"-fnoxray-link-deps":[6,0,1,"cmdoption-clang-fnoxray-link-deps"],"-fobjc-abi-version":[6,0,1,"cmdoption-clang-fobjc-abi-version"],"-fobjc-arc":[6,0,1,"cmdoption-clang-fobjc-arc"],"-fobjc-arc-exceptions":[6,0,1,"cmdoption-clang-fobjc-arc-exceptions"],"-fobjc-convert-messages-to-runtime-calls":[6,0,1,"cmdoption-clang-fobjc-convert-messages-to-runtime-calls"],"-fobjc-exceptions":[6,0,1,"cmdoption-clang-fobjc-exceptions"],"-fobjc-infer-related-result-type":[6,0,1,"cmdoption-clang-fobjc-infer-related-result-type"],"-fobjc-legacy-dispatch":[6,0,1,"cmdoption-clang-fobjc-legacy-dispatch"],"-fobjc-link-runtime":[6,0,1,"cmdoption-clang-fobjc-link-runtime"],"-fobjc-nonfragile-abi":[6,0,1,"cmdoption-clang-fobjc-nonfragile-abi"],"-fobjc-nonfragile-abi-version":[6,0,1,"cmdoption-clang-fobjc-nonfragile-abi-version"],"-fobjc-runtime":[6,0,1,"cmdoption-clang-fobjc-runtime"],"-fobjc-sender-dependent-dispatch":[6,0,1,"cmdoption-clang-fobjc-sender-dependent-dispatch"],"-fobjc-weak":[6,0,1,"cmdoption-clang-fobjc-weak"],"-fomit-frame-pointer":[6,0,1,"cmdoption-clang-fomit-frame-pointer"],"-fopenmp":[6,0,1,"cmdoption-clang-fopenmp"],"-fopenmp-simd":[6,0,1,"cmdoption-clang-fopenmp-simd"],"-fopenmp-targets":[6,0,1,"cmdoption-clang-fopenmp-targets"],"-fopenmp-version":[6,0,1,"cmdoption-clang-fopenmp-version"],"-foperator-arrow-depth":[6,0,1,"cmdoption-clang-foperator-arrow-depth"],"-foptimization-record-file":[6,0,1,"cmdoption-clang-foptimization-record-file"],"-foptimize-sibling-calls":[6,0,1,"cmdoption-clang-foptimize-sibling-calls"],"-force_cpusubtype_ALL":[6,0,1,"cmdoption-clang-force-cpusubtype-all"],"-foutput-class-dir":[6,0,1,"cmdoption-clang-foutput-class-dir"],"-fpack-derived":[6,0,1,"cmdoption-clang-fpack-derived"],"-fpack-struct":[6,0,1,"cmdoption-clang-fpack-struct"],"-fparse-all-comments":[6,0,1,"cmdoption-clang-fparse-all-comments"],"-fpascal-strings":[6,0,1,"cmdoption-clang-fpascal-strings"],"-fpcc-struct-return":[6,0,1,"cmdoption-clang-fpcc-struct-return"],"-fpch-preprocess":[6,0,1,"cmdoption-clang-fpch-preprocess"],"-fpic":[6,0,1,"cmdoption-clang-fno-pic"],"-fpie":[6,0,1,"cmdoption-clang-fno-pie"],"-fplt":[6,0,1,"cmdoption-clang-fplt"],"-fplugin":[6,0,1,"cmdoption-clang-fplugin"],"-fprebuilt-module-path":[6,0,1,"cmdoption-clang-fprebuilt-module-path"],"-fpreserve-as-comments":[6,0,1,"cmdoption-clang-fpreserve-as-comments"],"-fprofile-arcs":[6,0,1,"cmdoption-clang-fprofile-arcs"],"-fprofile-dir":[6,0,1,"cmdoption-clang-fprofile-dir"],"-fprofile-exclude-files":[6,0,1,"cmdoption-clang-fprofile-exclude-files"],"-fprofile-filter-files":[6,0,1,"cmdoption-clang-fprofile-filter-files"],"-fprofile-generate":[6,0,1,"cmdoption-clang-fprofile-generate"],"-fprofile-instr-generate":[6,0,1,"cmdoption-clang-fprofile-instr-generate"],"-fprofile-instr-use":[6,0,1,"cmdoption-clang-fprofile-instr-use"],"-fprofile-remapping-file":[6,0,1,"cmdoption-clang-fprofile-remapping-file"],"-fprofile-sample-accurate":[6,0,1,"cmdoption-clang-fprofile-sample-accurate"],"-fprofile-sample-use":[6,0,1,"cmdoption-clang-fprofile-sample-use"],"-fprofile-use":[6,0,1,"cmdoption-clang-fprofile-instr-use"],"-fprotect-parens":[6,0,1,"cmdoption-clang-fprotect-parens"],"-framework":[6,0,1,"cmdoption-clang-framework"],"-frange-check":[6,0,1,"cmdoption-clang-frange-check"],"-freal-4-real-10":[6,0,1,"cmdoption-clang-freal-4-real-10"],"-freal-4-real-16":[6,0,1,"cmdoption-clang-freal-4-real-16"],"-freal-4-real-8":[6,0,1,"cmdoption-clang-freal-4-real-8"],"-freal-8-real-10":[6,0,1,"cmdoption-clang-freal-8-real-10"],"-freal-8-real-16":[6,0,1,"cmdoption-clang-freal-8-real-16"],"-freal-8-real-4":[6,0,1,"cmdoption-clang-freal-8-real-4"],"-frealloc-lhs":[6,0,1,"cmdoption-clang-frealloc-lhs"],"-freciprocal-math":[6,0,1,"cmdoption-clang-freciprocal-math"],"-frecord-command-line":[6,0,1,"cmdoption-clang-frecord-command-line"],"-frecord-gcc-switches":[6,0,1,"cmdoption-clang-frecord-command-line"],"-frecord-marker":[6,0,1,"cmdoption-clang-frecord-marker"],"-frecursive":[6,0,1,"cmdoption-clang-frecursive"],"-freg-struct-return":[6,0,1,"cmdoption-clang-freg-struct-return"],"-fregister-global-dtors-with-atexit":[6,0,1,"cmdoption-clang-fregister-global-dtors-with-atexit"],"-frelaxed-template-template-args":[6,0,1,"cmdoption-clang-frelaxed-template-template-args"],"-frepack-arrays":[6,0,1,"cmdoption-clang-frepack-arrays"],"-freroll-loops":[6,0,1,"cmdoption-clang-freroll-loops"],"-fretain-comments-from-system-headers":[6,0,1,"cmdoption-clang-fretain-comments-from-system-headers"],"-frewrite-imports":[6,0,1,"cmdoption-clang-frewrite-imports"],"-frewrite-includes":[6,0,1,"cmdoption-clang-frewrite-includes"],"-frewrite-map-file":[6,0,1,"cmdoption-clang-frewrite-map-file"],"-fropi":[6,0,1,"cmdoption-clang-fropi"],"-frtlib-add-rpath":[6,0,1,"cmdoption-clang-frtlib-add-rpath"],"-frtti":[6,0,1,"cmdoption-clang-frtti"],"-frwpi":[6,0,1,"cmdoption-clang-frwpi"],"-fsanitize":[6,0,1,"cmdoption-clang-fsanitize"],"-fsanitize-address-field-padding":[6,0,1,"cmdoption-clang-fsanitize-address-field-padding"],"-fsanitize-address-globals-dead-stripping":[6,0,1,"cmdoption-clang-fsanitize-address-globals-dead-stripping"],"-fsanitize-address-poison-custom-array-cookie":[6,0,1,"cmdoption-clang-fsanitize-address-poison-custom-array-cookie"],"-fsanitize-address-use-after-scope":[6,0,1,"cmdoption-clang-fsanitize-address-use-after-scope"],"-fsanitize-address-use-odr-indicator":[6,0,1,"cmdoption-clang-fsanitize-address-use-odr-indicator"],"-fsanitize-blacklist":[6,0,1,"cmdoption-clang-fsanitize-blacklist"],"-fsanitize-cfi-cross-dso":[6,0,1,"cmdoption-clang-fsanitize-cfi-cross-dso"],"-fsanitize-cfi-icall-generalize-pointers":[6,0,1,"cmdoption-clang-fsanitize-cfi-icall-generalize-pointers"],"-fsanitize-coverage":[6,0,1,"cmdoption-clang-fsanitize-coverage"],"-fsanitize-hwaddress-abi":[6,0,1,"cmdoption-clang-fsanitize-hwaddress-abi"],"-fsanitize-link-c++-runtime":[6,0,1,"cmdoption-clang-fsanitize-link-c-runtime"],"-fsanitize-memory-track-origins":[6,0,1,"cmdoption-clang-fsanitize-memory-track-origins"],"-fsanitize-memory-use-after-dtor":[6,0,1,"cmdoption-clang-fsanitize-memory-use-after-dtor"],"-fsanitize-minimal-runtime":[6,0,1,"cmdoption-clang-fsanitize-minimal-runtime"],"-fsanitize-recover":[6,0,1,"cmdoption-clang-fsanitize-recover"],"-fsanitize-stats":[6,0,1,"cmdoption-clang-fsanitize-stats"],"-fsanitize-thread-atomics":[6,0,1,"cmdoption-clang-fsanitize-thread-atomics"],"-fsanitize-thread-func-entry-exit":[6,0,1,"cmdoption-clang-fsanitize-thread-func-entry-exit"],"-fsanitize-thread-memory-access":[6,0,1,"cmdoption-clang-fsanitize-thread-memory-access"],"-fsanitize-trap":[6,0,1,"cmdoption-clang-fsanitize-trap"],"-fsanitize-undefined-strip-path-components":[6,0,1,"cmdoption-clang-fsanitize-undefined-strip-path-components"],"-fsanitize-undefined-trap-on-error":[6,0,1,"cmdoption-clang-fsanitize-undefined-trap-on-error"],"-fsave-optimization-record":[6,0,1,"cmdoption-clang-fsave-optimization-record"],"-fsecond-underscore":[6,0,1,"cmdoption-clang-fsecond-underscore"],"-fseh-exceptions":[6,0,1,"cmdoption-clang-fseh-exceptions"],"-fshort-enums":[6,0,1,"cmdoption-clang-fshort-enums"],"-fshort-wchar":[6,0,1,"cmdoption-clang-fshort-wchar"],"-fshow-column":[6,0,1,"cmdoption-clang-fshow-column"],"-fshow-overloads":[6,0,1,"cmdoption-clang-fshow-overloads"],"-fshow-source-location":[6,0,1,"cmdoption-clang-fshow-source-location"],"-fsign-zero":[6,0,1,"cmdoption-clang-fsign-zero"],"-fsignaling-math":[6,0,1,"cmdoption-clang-fsignaling-math"],"-fsigned-bitfields":[6,0,1,"cmdoption-clang-fsigned-bitfields"],"-fsigned-char":[6,0,1,"cmdoption-clang-fsigned-char"],"-fsigned-zeros":[6,0,1,"cmdoption-clang-fsigned-zeros"],"-fsized-deallocation":[6,0,1,"cmdoption-clang-fsized-deallocation"],"-fsjlj-exceptions":[6,0,1,"cmdoption-clang-fsjlj-exceptions"],"-fslp-vectorize":[6,0,1,"cmdoption-clang-fslp-vectorize"],"-fspell-checking":[6,0,1,"cmdoption-clang-fspell-checking"],"-fspell-checking-limit":[6,0,1,"cmdoption-clang-fspell-checking-limit"],"-fsplit-dwarf-inlining":[6,0,1,"cmdoption-clang-fsplit-dwarf-inlining"],"-fsplit-lto-unit":[6,0,1,"cmdoption-clang-fsplit-lto-unit"],"-fsplit-stack":[6,0,1,"cmdoption-clang-fsplit-stack"],"-fstack-arrays":[6,0,1,"cmdoption-clang-fstack-arrays"],"-fstack-protector":[6,0,1,"cmdoption-clang-fstack-protector"],"-fstack-protector-all":[6,0,1,"cmdoption-clang-fstack-protector-all"],"-fstack-protector-strong":[6,0,1,"cmdoption-clang-fstack-protector-strong"],"-fstack-size-section":[6,0,1,"cmdoption-clang-fstack-size-section"],"-fstandalone-debug":[6,0,1,"cmdoption-clang-fstandalone-debug"],"-fstrict-aliasing":[6,0,1,"cmdoption-clang-fstrict-aliasing"],"-fstrict-enums":[6,0,1,"cmdoption-clang-fstrict-enums"],"-fstrict-float-cast-overflow":[6,0,1,"cmdoption-clang-fstrict-float-cast-overflow"],"-fstrict-overflow":[6,0,1,"cmdoption-clang-fstrict-overflow"],"-fstrict-return":[6,0,1,"cmdoption-clang-fstrict-return"],"-fstrict-vtable-pointers":[6,0,1,"cmdoption-clang-fstrict-vtable-pointers"],"-fstruct-path-tbaa":[6,0,1,"cmdoption-clang-fstruct-path-tbaa"],"-fsyntax-only":[6,0,1,"cmdoption-clang-fsyntax-only"],"-ftabstop":[6,0,1,"cmdoption-clang-ftabstop"],"-ftemplate-backtrace-limit":[6,0,1,"cmdoption-clang-ftemplate-backtrace-limit"],"-ftemplate-depth":[6,0,1,"cmdoption-clang-ftemplate-depth"],"-ftemplate-depth-<arg>":[6,0,1,"cmdoption-clang-ftemplate-depth-arg"],"-fterminated-vtables":[6,0,1,"cmdoption-clang-fapple-kext"],"-ftest-coverage":[6,0,1,"cmdoption-clang-ftest-coverage"],"-fthinlto-index":[6,0,1,"cmdoption-clang-fthinlto-index"],"-fthreadsafe-statics":[6,0,1,"cmdoption-clang-fthreadsafe-statics"],"-ftime-report":[6,0,1,"cmdoption-clang-ftime-report"],"-ftls-model":[6,0,1,"cmdoption-clang-ftls-model"],"-ftrap-function":[6,0,1,"cmdoption-clang-ftrap-function"],"-ftrapping-math":[6,0,1,"cmdoption-clang-ftrapping-math"],"-ftrapv":[6,0,1,"cmdoption-clang-ftrapv"],"-ftrapv-handler":[6,0,1,"cmdoption-clang-ftrapv-handler"],"-ftree-slp-vectorize":[6,0,1,"cmdoption-clang-fslp-vectorize"],"-ftree-vectorize":[6,0,1,"cmdoption-clang-fvectorize"],"-ftrigraphs":[6,0,1,"cmdoption-clang-ftrigraphs"],"-ftrivial-auto-var-init":[6,0,1,"cmdoption-clang-ftrivial-auto-var-init"],"-funderscoring":[6,0,1,"cmdoption-clang-funderscoring"],"-funique-section-names":[6,0,1,"cmdoption-clang-funique-section-names"],"-funit-at-a-time":[6,0,1,"cmdoption-clang-funit-at-a-time"],"-funroll-loops":[6,0,1,"cmdoption-clang-funroll-loops"],"-funsafe-math-optimizations":[6,0,1,"cmdoption-clang-funsafe-math-optimizations"],"-funsigned-bitfields":[6,0,1,"cmdoption-clang-funsigned-bitfields"],"-funsigned-char":[6,0,1,"cmdoption-clang-funsigned-char"],"-funwind-tables":[6,0,1,"cmdoption-clang-funwind-tables"],"-fuse-cxa-atexit":[6,0,1,"cmdoption-clang-fuse-cxa-atexit"],"-fuse-init-array":[6,0,1,"cmdoption-clang-fuse-init-array"],"-fuse-ld":[6,0,1,"cmdoption-clang-fuse-ld"],"-fuse-line-directives":[6,0,1,"cmdoption-clang-fuse-line-directives"],"-fveclib":[6,0,1,"cmdoption-clang-fveclib"],"-fvectorize":[6,0,1,"cmdoption-clang-fvectorize"],"-fverbose-asm":[6,0,1,"cmdoption-clang-fverbose-asm"],"-fvisibility":[6,0,1,"cmdoption-clang-fvisibility"],"-fvisibility-global-new-delete-hidden":[6,0,1,"cmdoption-clang-fvisibility-global-new-delete-hidden"],"-fvisibility-inlines-hidden":[6,0,1,"cmdoption-clang-fvisibility-inlines-hidden"],"-fvisibility-ms-compat":[6,0,1,"cmdoption-clang-fvisibility-ms-compat"],"-fwhole-file":[6,0,1,"cmdoption-clang-fwhole-file"],"-fwhole-program-vtables":[6,0,1,"cmdoption-clang-fwhole-program-vtables"],"-fwrapv":[6,0,1,"cmdoption-clang-fwrapv"],"-fwritable-strings":[6,0,1,"cmdoption-clang-fwritable-strings"],"-fxray-always-emit-customevents":[6,0,1,"cmdoption-clang-fxray-always-emit-customevents"],"-fxray-always-emit-typedevents":[6,0,1,"cmdoption-clang-fxray-always-emit-typedevents"],"-fxray-always-instrument":[6,0,1,"cmdoption-clang-fxray-always-instrument"],"-fxray-attr-list":[6,0,1,"cmdoption-clang-fxray-attr-list"],"-fxray-instruction-threshold<arg>":[6,0,1,"cmdoption-clang-fxray-instruction-threshold-arg"],"-fxray-instrument":[6,0,1,"cmdoption-clang-fxray-instrument"],"-fxray-instrumentation-bundle":[6,0,1,"cmdoption-clang-fxray-instrumentation-bundle"],"-fxray-link-deps":[6,0,1,"cmdoption-clang-fxray-link-deps"],"-fxray-modes":[6,0,1,"cmdoption-clang-fxray-modes"],"-fxray-never-instrument":[6,0,1,"cmdoption-clang-fxray-never-instrument"],"-fzero-initialized-in-bss":[6,0,1,"cmdoption-clang-fzero-initialized-in-bss"],"-fzvector":[6,0,1,"cmdoption-clang-fzvector"],"-g":[6,0,1,"cmdoption-clang-g"],"-g0":[6,0,1,"cmdoption-clang-g0"],"-g1":[6,0,1,"cmdoption-clang-gline-tables-only"],"-g2":[6,0,1,"cmdoption-clang-g2"],"-g3":[6,0,1,"cmdoption-clang-g3"],"-gcc-toolchain":[6,0,1,"cmdoption-clang-gcc-toolchain"],"-gcodeview":[6,0,1,"cmdoption-clang-gcodeview"],"-gcodeview-ghash":[6,0,1,"cmdoption-clang-gcodeview-ghash"],"-gcolumn-info":[6,0,1,"cmdoption-clang-gcolumn-info"],"-gdwarf":[6,0,1,"cmdoption-clang-gdwarf-4"],"-gdwarf-2":[6,0,1,"cmdoption-clang-gdwarf-2"],"-gdwarf-3":[6,0,1,"cmdoption-clang-gdwarf-3"],"-gdwarf-4":[6,0,1,"cmdoption-clang-gdwarf-4"],"-gdwarf-5":[6,0,1,"cmdoption-clang-gdwarf-5"],"-gdwarf-aranges":[6,0,1,"cmdoption-clang-gdwarf-aranges"],"-gembed-source":[6,0,1,"cmdoption-clang-gembed-source"],"-gfull":[6,0,1,"cmdoption-clang-gfull"],"-ggdb":[6,0,1,"cmdoption-clang-ggdb"],"-ggdb0":[6,0,1,"cmdoption-clang-ggdb0"],"-ggdb1":[6,0,1,"cmdoption-clang-ggdb1"],"-ggdb2":[6,0,1,"cmdoption-clang-ggdb2"],"-ggdb3":[6,0,1,"cmdoption-clang-ggdb3"],"-ggnu-pubnames":[6,0,1,"cmdoption-clang-ggnu-pubnames"],"-gline-directives-only":[6,0,1,"cmdoption-clang-gline-directives-only"],"-gline-tables-only":[6,0,1,"cmdoption-clang-gline-tables-only"],"-glldb":[6,0,1,"cmdoption-clang-glldb"],"-gmlt":[6,0,1,"cmdoption-clang-gline-tables-only"],"-gmodules":[6,0,1,"cmdoption-clang-gmodules"],"-gno-codeview-ghash":[6,0,1,"cmdoption-clang-gcodeview-ghash"],"-gno-column-info":[6,0,1,"cmdoption-clang-gcolumn-info"],"-gno-embed-source":[6,0,1,"cmdoption-clang-gembed-source"],"-gno-gnu-pubnames":[6,0,1,"cmdoption-clang-ggnu-pubnames"],"-gno-pubnames":[6,0,1,"cmdoption-clang-gpubnames"],"-gno-record-command-line":[6,0,1,"cmdoption-clang-grecord-command-line"],"-gno-strict-dwarf":[6,0,1,"cmdoption-clang-gstrict-dwarf"],"-gpubnames":[6,0,1,"cmdoption-clang-gpubnames"],"-grecord-command-line":[6,0,1,"cmdoption-clang-grecord-command-line"],"-grecord-gcc-switches":[6,0,1,"cmdoption-clang-grecord-command-line"],"-gsce":[6,0,1,"cmdoption-clang-gsce"],"-gsplit-dwarf":[6,0,1,"cmdoption-clang-gsplit-dwarf"],"-gstrict-dwarf":[6,0,1,"cmdoption-clang-gstrict-dwarf"],"-gused":[6,0,1,"cmdoption-clang-gused"],"-gz":[6,0,1,"cmdoption-clang-gz"],"-headerpad_max_install_names<arg>":[6,0,1,"cmdoption-clang-headerpad-max-install-names-arg"],"-help":[6,0,1,"cmdoption-clang-help"],"-idirafter<arg>":[6,0,1,"cmdoption-clang-idirafter-arg"],"-iframework<arg>":[6,0,1,"cmdoption-clang-iframework-arg"],"-iframeworkwithsysroot<directory>":[6,0,1,"cmdoption-clang-iframeworkwithsysroot-directory"],"-imacros<file>":[6,0,1,"cmdoption-clang-imacros-file"],"-image_base":[6,0,1,"cmdoption-clang-image-base"],"-imultilib":[6,0,1,"cmdoption-clang-imultilib"],"-include<file>":[6,0,1,"cmdoption-clang-include-file"],"-include-pch":[6,0,1,"cmdoption-clang-include-pch"],"-index-header-map":[6,0,1,"cmdoption-clang-index-header-map"],"-init":[6,0,1,"cmdoption-clang-init"],"-install_name":[6,0,1,"cmdoption-clang-install-name"],"-integrated-as":[6,0,1,"cmdoption-clang-fintegrated-as"],"-iprefix<dir>":[6,0,1,"cmdoption-clang-iprefix-dir"],"-iquote<directory>":[6,0,1,"cmdoption-clang-iquote-directory"],"-isysroot<dir>":[6,0,1,"cmdoption-clang-isysroot-dir"],"-isystem<directory>":[6,0,1,"cmdoption-clang-isystem-directory"],"-isystem-after<directory>":[6,0,1,"cmdoption-clang-isystem-after-directory"],"-ivfsoverlay<arg>":[6,0,1,"cmdoption-clang-ivfsoverlay-arg"],"-iwithprefix<dir>":[6,0,1,"cmdoption-clang-iwithprefix-dir"],"-iwithprefixbefore<dir>":[6,0,1,"cmdoption-clang-iwithprefixbefore-dir"],"-iwithsysroot<directory>":[6,0,1,"cmdoption-clang-iwithsysroot-directory"],"-keep_private_externs":[6,0,1,"cmdoption-clang-keep-private-externs"],"-l<arg>":[6,0,1,"cmdoption-clang-l-arg"],"-lazy_framework":[6,0,1,"cmdoption-clang-lazy-framework"],"-m16":[6,0,1,"cmdoption-clang-m16"],"-m32":[6,0,1,"cmdoption-clang-m32"],"-m3dnow":[6,0,1,"cmdoption-clang-m3dnow"],"-m3dnowa":[6,0,1,"cmdoption-clang-m3dnowa"],"-m64":[6,0,1,"cmdoption-clang-m64"],"-m80387":[6,0,1,"cmdoption-clang-mx87"],"-mabi":[6,0,1,"cmdoption-clang-mabi"],"-mabicalls":[6,0,1,"cmdoption-clang-mabicalls"],"-mabs":[6,0,1,"cmdoption-clang-mabs"],"-madx":[6,0,1,"cmdoption-clang-madx"],"-maes":[6,0,1,"cmdoption-clang-maes"],"-malign-double":[6,0,1,"cmdoption-clang-malign-double"],"-maltivec":[6,0,1,"cmdoption-clang-maltivec"],"-mappletvos-version-min":[6,0,1,"cmdoption-clang-mtvos-version-min"],"-mappletvsimulator-version-min":[6,0,1,"cmdoption-clang-mtvos-simulator-version-min"],"-march":[6,0,1,"cmdoption-clang-march"],"-masm":[6,0,1,"cmdoption-clang-masm"],"-mavx":[6,0,1,"cmdoption-clang-mavx"],"-mavx2":[6,0,1,"cmdoption-clang-mavx2"],"-mavx512bitalg":[6,0,1,"cmdoption-clang-mavx512bitalg"],"-mavx512bw":[6,0,1,"cmdoption-clang-mavx512bw"],"-mavx512cd":[6,0,1,"cmdoption-clang-mavx512cd"],"-mavx512dq":[6,0,1,"cmdoption-clang-mavx512dq"],"-mavx512er":[6,0,1,"cmdoption-clang-mavx512er"],"-mavx512f":[6,0,1,"cmdoption-clang-mavx512f"],"-mavx512ifma":[6,0,1,"cmdoption-clang-mavx512ifma"],"-mavx512pf":[6,0,1,"cmdoption-clang-mavx512pf"],"-mavx512vbmi":[6,0,1,"cmdoption-clang-mavx512vbmi"],"-mavx512vbmi2":[6,0,1,"cmdoption-clang-mavx512vbmi2"],"-mavx512vl":[6,0,1,"cmdoption-clang-mavx512vl"],"-mavx512vnni":[6,0,1,"cmdoption-clang-mavx512vnni"],"-mavx512vpopcntdq":[6,0,1,"cmdoption-clang-mavx512vpopcntdq"],"-mbackchain":[6,0,1,"cmdoption-clang-mbackchain"],"-mbig-endian":[6,0,1,"cmdoption-clang-mbig-endian"],"-mbmi":[6,0,1,"cmdoption-clang-mbmi"],"-mbmi2":[6,0,1,"cmdoption-clang-mbmi2"],"-mbranch-protection":[6,0,1,"cmdoption-clang-mbranch-protection"],"-mcheck-zero-division":[6,0,1,"cmdoption-clang-mcheck-zero-division"],"-mcldemote":[6,0,1,"cmdoption-clang-mcldemote"],"-mclflushopt":[6,0,1,"cmdoption-clang-mclflushopt"],"-mclwb":[6,0,1,"cmdoption-clang-mclwb"],"-mclzero":[6,0,1,"cmdoption-clang-mclzero"],"-mcmodel":[6,0,1,"cmdoption-clang-mcmodel"],"-mcmpb":[6,0,1,"cmdoption-clang-mcmpb"],"-mcode-object-v3":[6,0,1,"cmdoption-clang-mcode-object-v3"],"-mcompact-branches":[6,0,1,"cmdoption-clang-mcompact-branches"],"-mconsole<arg>":[6,0,1,"cmdoption-clang-mconsole-arg"],"-mcpu":[6,0,1,"cmdoption-clang-mcpu"],"-mcrbits":[6,0,1,"cmdoption-clang-mcrbits"],"-mcrc":[6,0,1,"cmdoption-clang-mcrc"],"-mcrypto":[6,0,1,"cmdoption-clang-mcrypto"],"-mcx16":[6,0,1,"cmdoption-clang-mcx16"],"-mdefault-build-attributes<arg>":[6,0,1,"cmdoption-clang-mdefault-build-attributes-arg"],"-mdirect-move":[6,0,1,"cmdoption-clang-mdirect-move"],"-mdll<arg>":[6,0,1,"cmdoption-clang-mdll-arg"],"-mdouble-float":[6,0,1,"cmdoption-clang-mdouble-float"],"-mdsp":[6,0,1,"cmdoption-clang-mdsp"],"-mdspr2":[6,0,1,"cmdoption-clang-mdspr2"],"-mdynamic-no-pic<arg>":[6,0,1,"cmdoption-clang-mdynamic-no-pic-arg"],"-meabi":[6,0,1,"cmdoption-clang-meabi"],"-membedded-data":[6,0,1,"cmdoption-clang-membedded-data"],"-mexception-handling":[6,0,1,"cmdoption-clang-mexception-handling"],"-mexecute-only":[6,0,1,"cmdoption-clang-mexecute-only"],"-mextern-sdata":[6,0,1,"cmdoption-clang-mextern-sdata"],"-mf16c":[6,0,1,"cmdoption-clang-mf16c"],"-mfentry":[6,0,1,"cmdoption-clang-mfentry"],"-mfix-cortex-a53-835769":[6,0,1,"cmdoption-clang-mfix-cortex-a53-835769"],"-mfloat-abi":[6,0,1,"cmdoption-clang-mfloat-abi"],"-mfloat128":[6,0,1,"cmdoption-clang-mfloat128"],"-mfma":[6,0,1,"cmdoption-clang-mfma"],"-mfma4":[6,0,1,"cmdoption-clang-mfma4"],"-mfp32":[6,0,1,"cmdoption-clang-mfp32"],"-mfp64":[6,0,1,"cmdoption-clang-mfp64"],"-mfpmath":[6,0,1,"cmdoption-clang-mfpmath"],"-mfprnd":[6,0,1,"cmdoption-clang-mfprnd"],"-mfpu":[6,0,1,"cmdoption-clang-mfpu"],"-mfsgsbase":[6,0,1,"cmdoption-clang-mfsgsbase"],"-mfxsr":[6,0,1,"cmdoption-clang-mfxsr"],"-mgeneral-regs-only":[6,0,1,"cmdoption-clang-mgeneral-regs-only"],"-mgfni":[6,0,1,"cmdoption-clang-mgfni"],"-mginv":[6,0,1,"cmdoption-clang-mginv"],"-mglobal-merge":[6,0,1,"cmdoption-clang-mglobal-merge"],"-mgpopt":[6,0,1,"cmdoption-clang-mgpopt"],"-mhard-float":[6,0,1,"cmdoption-clang-mhard-float"],"-mhtm":[6,0,1,"cmdoption-clang-mhtm"],"-mhvx":[6,0,1,"cmdoption-clang-mhvx"],"-mhvx-length":[6,0,1,"cmdoption-clang-mhvx-length"],"-mhwdiv":[6,0,1,"cmdoption-clang-mhwdiv"],"-mhwmult":[6,0,1,"cmdoption-clang-mhwmult"],"-miamcu":[6,0,1,"cmdoption-clang-miamcu"],"-mieee-rnd-near":[6,0,1,"cmdoption-clang-mieee-rnd-near"],"-mimplicit-float":[6,0,1,"cmdoption-clang-mimplicit-float"],"-mimplicit-it":[6,0,1,"cmdoption-clang-mimplicit-it"],"-mincremental-linker-compatible":[6,0,1,"cmdoption-clang-mincremental-linker-compatible"],"-mindirect-jump":[6,0,1,"cmdoption-clang-mindirect-jump"],"-minvariant-function-descriptors":[6,0,1,"cmdoption-clang-minvariant-function-descriptors"],"-minvpcid":[6,0,1,"cmdoption-clang-minvpcid"],"-mios-simulator-version-min":[6,0,1,"cmdoption-clang-mios-simulator-version-min"],"-mios-version-min":[6,0,1,"cmdoption-clang-miphoneos-version-min"],"-miphoneos-version-min":[6,0,1,"cmdoption-clang-miphoneos-version-min"],"-miphonesimulator-version-min":[6,0,1,"cmdoption-clang-mios-simulator-version-min"],"-mips16":[6,0,1,"cmdoption-clang-mips16"],"-misel":[6,0,1,"cmdoption-clang-misel"],"-mkernel":[6,0,1,"cmdoption-clang-mkernel"],"-mldc1-sdc1":[6,0,1,"cmdoption-clang-mldc1-sdc1"],"-mlinker-version":[6,0,1,"cmdoption-clang-mlinker-version"],"-mlittle-endian":[6,0,1,"cmdoption-clang-mlittle-endian"],"-mllvm":[6,0,1,"cmdoption-clang-mllvm"],"-mlocal-sdata":[6,0,1,"cmdoption-clang-mlocal-sdata"],"-mlong-calls":[6,0,1,"cmdoption-clang-mlong-calls"],"-mlongcall":[6,0,1,"cmdoption-clang-mlongcall"],"-mlwp":[6,0,1,"cmdoption-clang-mlwp"],"-mlzcnt":[6,0,1,"cmdoption-clang-mlzcnt"],"-mmacos-version-min":[6,0,1,"cmdoption-clang-mmacosx-version-min"],"-mmacosx-version-min":[6,0,1,"cmdoption-clang-mmacosx-version-min"],"-mmadd4":[6,0,1,"cmdoption-clang-mmadd4"],"-mmcu":[6,0,1,"cmdoption-clang-mmcu"],"-mmemops":[6,0,1,"cmdoption-clang-mmemops"],"-mmfcrf":[6,0,1,"cmdoption-clang-mmfocrf"],"-mmfocrf":[6,0,1,"cmdoption-clang-mmfocrf"],"-mmicromips":[6,0,1,"cmdoption-clang-mmicromips"],"-mmmx":[6,0,1,"cmdoption-clang-mmmx"],"-mmovbe":[6,0,1,"cmdoption-clang-mmovbe"],"-mmovdir64b":[6,0,1,"cmdoption-clang-mmovdir64b"],"-mmovdiri":[6,0,1,"cmdoption-clang-mmovdiri"],"-mmpx":[6,0,1,"cmdoption-clang-mmpx"],"-mms-bitfields":[6,0,1,"cmdoption-clang-mms-bitfields"],"-mmsa":[6,0,1,"cmdoption-clang-mmsa"],"-mmt":[6,0,1,"cmdoption-clang-mmt"],"-mmwaitx":[6,0,1,"cmdoption-clang-mmwaitx"],"-mnan":[6,0,1,"cmdoption-clang-mnan"],"-mno-3dnow":[6,0,1,"cmdoption-clang-m3dnow"],"-mno-3dnowa":[6,0,1,"cmdoption-clang-m3dnowa"],"-mno-abicalls":[6,0,1,"cmdoption-clang-mabicalls"],"-mno-adx":[6,0,1,"cmdoption-clang-madx"],"-mno-aes":[6,0,1,"cmdoption-clang-maes"],"-mno-altivec":[6,0,1,"cmdoption-clang-maltivec"],"-mno-avx":[6,0,1,"cmdoption-clang-mavx"],"-mno-avx2":[6,0,1,"cmdoption-clang-mavx2"],"-mno-avx512bitalg":[6,0,1,"cmdoption-clang-mavx512bitalg"],"-mno-avx512bw":[6,0,1,"cmdoption-clang-mavx512bw"],"-mno-avx512cd":[6,0,1,"cmdoption-clang-mavx512cd"],"-mno-avx512dq":[6,0,1,"cmdoption-clang-mavx512dq"],"-mno-avx512er":[6,0,1,"cmdoption-clang-mavx512er"],"-mno-avx512f":[6,0,1,"cmdoption-clang-mavx512f"],"-mno-avx512ifma":[6,0,1,"cmdoption-clang-mavx512ifma"],"-mno-avx512pf":[6,0,1,"cmdoption-clang-mavx512pf"],"-mno-avx512vbmi":[6,0,1,"cmdoption-clang-mavx512vbmi"],"-mno-avx512vbmi2":[6,0,1,"cmdoption-clang-mavx512vbmi2"],"-mno-avx512vl":[6,0,1,"cmdoption-clang-mavx512vl"],"-mno-avx512vnni":[6,0,1,"cmdoption-clang-mavx512vnni"],"-mno-avx512vpopcntdq":[6,0,1,"cmdoption-clang-mavx512vpopcntdq"],"-mno-backchain":[6,0,1,"cmdoption-clang-mbackchain"],"-mno-bmi":[6,0,1,"cmdoption-clang-mbmi"],"-mno-bmi2":[6,0,1,"cmdoption-clang-mbmi2"],"-mno-check-zero-division":[6,0,1,"cmdoption-clang-mcheck-zero-division"],"-mno-cldemote":[6,0,1,"cmdoption-clang-mcldemote"],"-mno-clflushopt":[6,0,1,"cmdoption-clang-mclflushopt"],"-mno-clwb":[6,0,1,"cmdoption-clang-mclwb"],"-mno-clzero":[6,0,1,"cmdoption-clang-mclzero"],"-mno-cmpb":[6,0,1,"cmdoption-clang-mcmpb"],"-mno-code-object-v3":[6,0,1,"cmdoption-clang-mcode-object-v3"],"-mno-crbits":[6,0,1,"cmdoption-clang-mcrbits"],"-mno-crc":[6,0,1,"cmdoption-clang-mcrc"],"-mno-crypto":[6,0,1,"cmdoption-clang-mcrypto"],"-mno-cx16":[6,0,1,"cmdoption-clang-mcx16"],"-mno-default-build-attributes<arg>":[6,0,1,"cmdoption-clang-mdefault-build-attributes-arg"],"-mno-direct-move":[6,0,1,"cmdoption-clang-mdirect-move"],"-mno-dsp":[6,0,1,"cmdoption-clang-mdsp"],"-mno-dspr2":[6,0,1,"cmdoption-clang-mdspr2"],"-mno-embedded-data":[6,0,1,"cmdoption-clang-membedded-data"],"-mno-exception-handling":[6,0,1,"cmdoption-clang-mexception-handling"],"-mno-execute-only":[6,0,1,"cmdoption-clang-mexecute-only"],"-mno-extern-sdata":[6,0,1,"cmdoption-clang-mextern-sdata"],"-mno-f16c":[6,0,1,"cmdoption-clang-mf16c"],"-mno-fix-cortex-a53-835769":[6,0,1,"cmdoption-clang-mfix-cortex-a53-835769"],"-mno-float128":[6,0,1,"cmdoption-clang-mfloat128"],"-mno-fma":[6,0,1,"cmdoption-clang-mfma"],"-mno-fma4":[6,0,1,"cmdoption-clang-mfma4"],"-mno-fprnd":[6,0,1,"cmdoption-clang-mfprnd"],"-mno-fsgsbase":[6,0,1,"cmdoption-clang-mfsgsbase"],"-mno-fxsr":[6,0,1,"cmdoption-clang-mfxsr"],"-mno-gfni":[6,0,1,"cmdoption-clang-mgfni"],"-mno-ginv":[6,0,1,"cmdoption-clang-mginv"],"-mno-global-merge":[6,0,1,"cmdoption-clang-mglobal-merge"],"-mno-gpopt":[6,0,1,"cmdoption-clang-mgpopt"],"-mno-htm":[6,0,1,"cmdoption-clang-mhtm"],"-mno-hvx":[6,0,1,"cmdoption-clang-mhvx"],"-mno-iamcu":[6,0,1,"cmdoption-clang-miamcu"],"-mno-implicit-float":[6,0,1,"cmdoption-clang-mimplicit-float"],"-mno-incremental-linker-compatible":[6,0,1,"cmdoption-clang-mincremental-linker-compatible"],"-mno-invariant-function-descriptors":[6,0,1,"cmdoption-clang-minvariant-function-descriptors"],"-mno-invpcid":[6,0,1,"cmdoption-clang-minvpcid"],"-mno-isel":[6,0,1,"cmdoption-clang-misel"],"-mno-ldc1-sdc1":[6,0,1,"cmdoption-clang-mldc1-sdc1"],"-mno-local-sdata":[6,0,1,"cmdoption-clang-mlocal-sdata"],"-mno-long-calls":[6,0,1,"cmdoption-clang-mlong-calls"],"-mno-longcall":[6,0,1,"cmdoption-clang-mlongcall"],"-mno-lwp":[6,0,1,"cmdoption-clang-mlwp"],"-mno-lzcnt":[6,0,1,"cmdoption-clang-mlzcnt"],"-mno-madd4":[6,0,1,"cmdoption-clang-mmadd4"],"-mno-memops":[6,0,1,"cmdoption-clang-mmemops"],"-mno-mfocrf":[6,0,1,"cmdoption-clang-mmfocrf"],"-mno-micromips":[6,0,1,"cmdoption-clang-mmicromips"],"-mno-mips16":[6,0,1,"cmdoption-clang-mno-mips16"],"-mno-mmx":[6,0,1,"cmdoption-clang-mmmx"],"-mno-movbe":[6,0,1,"cmdoption-clang-mmovbe"],"-mno-movdir64b":[6,0,1,"cmdoption-clang-mmovdir64b"],"-mno-movdiri":[6,0,1,"cmdoption-clang-mmovdiri"],"-mno-movt":[6,0,1,"cmdoption-clang-mno-movt"],"-mno-mpx":[6,0,1,"cmdoption-clang-mmpx"],"-mno-ms-bitfields":[6,0,1,"cmdoption-clang-mms-bitfields"],"-mno-msa":[6,0,1,"cmdoption-clang-mmsa"],"-mno-mt":[6,0,1,"cmdoption-clang-mmt"],"-mno-mwaitx":[6,0,1,"cmdoption-clang-mmwaitx"],"-mno-neg-immediates":[6,0,1,"cmdoption-clang-mno-neg-immediates"],"-mno-nontrapping-fptoint":[6,0,1,"cmdoption-clang-mnontrapping-fptoint"],"-mno-nvj":[6,0,1,"cmdoption-clang-mnvj"],"-mno-nvs":[6,0,1,"cmdoption-clang-mnvs"],"-mno-omit-leaf-frame-pointer":[6,0,1,"cmdoption-clang-momit-leaf-frame-pointer"],"-mno-outline":[6,0,1,"cmdoption-clang-moutline"],"-mno-packets":[6,0,1,"cmdoption-clang-mpackets"],"-mno-pclmul":[6,0,1,"cmdoption-clang-mpclmul"],"-mno-pconfig":[6,0,1,"cmdoption-clang-mpconfig"],"-mno-pie-copy-relocations":[6,0,1,"cmdoption-clang-mpie-copy-relocations"],"-mno-pku":[6,0,1,"cmdoption-clang-mpku"],"-mno-popcnt":[6,0,1,"cmdoption-clang-mpopcnt"],"-mno-popcntd":[6,0,1,"cmdoption-clang-mpopcntd"],"-mno-power8-vector":[6,0,1,"cmdoption-clang-mpower8-vector"],"-mno-power9-vector":[6,0,1,"cmdoption-clang-mpower9-vector"],"-mno-prefetchwt1":[6,0,1,"cmdoption-clang-mprefetchwt1"],"-mno-prfchw":[6,0,1,"cmdoption-clang-mprfchw"],"-mno-ptwrite":[6,0,1,"cmdoption-clang-mptwrite"],"-mno-qpx":[6,0,1,"cmdoption-clang-mqpx"],"-mno-rdpid":[6,0,1,"cmdoption-clang-mrdpid"],"-mno-rdrnd":[6,0,1,"cmdoption-clang-mrdrnd"],"-mno-rdseed":[6,0,1,"cmdoption-clang-mrdseed"],"-mno-red-zone":[6,0,1,"cmdoption-clang-mred-zone"],"-mno-relax":[6,0,1,"cmdoption-clang-mrelax"],"-mno-relax-all":[6,0,1,"cmdoption-clang-mrelax-all"],"-mno-restrict-it":[6,0,1,"cmdoption-clang-mrestrict-it"],"-mno-retpoline":[6,0,1,"cmdoption-clang-mretpoline"],"-mno-retpoline-external-thunk":[6,0,1,"cmdoption-clang-mretpoline-external-thunk"],"-mno-rtd":[6,0,1,"cmdoption-clang-mrtd"],"-mno-rtm":[6,0,1,"cmdoption-clang-mrtm"],"-mno-sahf":[6,0,1,"cmdoption-clang-msahf"],"-mno-sgx":[6,0,1,"cmdoption-clang-msgx"],"-mno-sha":[6,0,1,"cmdoption-clang-msha"],"-mno-shstk":[6,0,1,"cmdoption-clang-mshstk"],"-mno-sign-ext":[6,0,1,"cmdoption-clang-msign-ext"],"-mno-simd128":[6,0,1,"cmdoption-clang-msimd128"],"-mno-soft-float":[6,0,1,"cmdoption-clang-msoft-float"],"-mno-speculative-load-hardening":[6,0,1,"cmdoption-clang-mspeculative-load-hardening"],"-mno-sram-ecc":[6,0,1,"cmdoption-clang-msram-ecc"],"-mno-sse":[6,0,1,"cmdoption-clang-msse"],"-mno-sse2":[6,0,1,"cmdoption-clang-msse2"],"-mno-sse3":[6,0,1,"cmdoption-clang-msse3"],"-mno-sse4a":[6,0,1,"cmdoption-clang-msse4a"],"-mno-ssse3":[6,0,1,"cmdoption-clang-mssse3"],"-mno-stack-arg-probe":[6,0,1,"cmdoption-clang-mstack-arg-probe"],"-mno-stackrealign":[6,0,1,"cmdoption-clang-mstackrealign"],"-mno-tbm":[6,0,1,"cmdoption-clang-mtbm"],"-mno-thumb":[6,0,1,"cmdoption-clang-mthumb"],"-mno-tls-direct-seg-refs":[6,0,1,"cmdoption-clang-mtls-direct-seg-refs"],"-mno-unaligned-access":[6,0,1,"cmdoption-clang-munaligned-access"],"-mno-unimplemented-simd128":[6,0,1,"cmdoption-clang-munimplemented-simd128"],"-mno-vaes":[6,0,1,"cmdoption-clang-mvaes"],"-mno-virt":[6,0,1,"cmdoption-clang-mvirt"],"-mno-vpclmulqdq":[6,0,1,"cmdoption-clang-mvpclmulqdq"],"-mno-vsx":[6,0,1,"cmdoption-clang-mvsx"],"-mno-vx":[6,0,1,"cmdoption-clang-mvx"],"-mno-waitpkg":[6,0,1,"cmdoption-clang-mwaitpkg"],"-mno-warn-nonportable-cfstrings":[6,0,1,"cmdoption-clang-mwarn-nonportable-cfstrings"],"-mno-wbnoinvd":[6,0,1,"cmdoption-clang-mwbnoinvd"],"-mno-x87":[6,0,1,"cmdoption-clang-mx87"],"-mno-xgot":[6,0,1,"cmdoption-clang-mxgot"],"-mno-xnack":[6,0,1,"cmdoption-clang-mxnack"],"-mno-xop":[6,0,1,"cmdoption-clang-mxop"],"-mno-xsave":[6,0,1,"cmdoption-clang-mxsave"],"-mno-xsavec":[6,0,1,"cmdoption-clang-mxsavec"],"-mno-xsaveopt":[6,0,1,"cmdoption-clang-mxsaveopt"],"-mno-xsaves":[6,0,1,"cmdoption-clang-mxsaves"],"-mnocrc":[6,0,1,"cmdoption-clang-mnocrc"],"-mnontrapping-fptoint":[6,0,1,"cmdoption-clang-mnontrapping-fptoint"],"-mnvj":[6,0,1,"cmdoption-clang-mnvj"],"-mnvs":[6,0,1,"cmdoption-clang-mnvs"],"-module-dependency-dir":[6,0,1,"cmdoption-clang-module-dependency-dir"],"-module-file-info":[6,0,1,"cmdoption-clang-module-file-info"],"-momit-leaf-frame-pointer":[6,0,1,"cmdoption-clang-momit-leaf-frame-pointer"],"-moslib":[6,0,1,"cmdoption-clang-moslib"],"-moutline":[6,0,1,"cmdoption-clang-moutline"],"-mpackets":[6,0,1,"cmdoption-clang-mpackets"],"-mpascal-strings":[6,0,1,"cmdoption-clang-fpascal-strings"],"-mpclmul":[6,0,1,"cmdoption-clang-mpclmul"],"-mpconfig":[6,0,1,"cmdoption-clang-mpconfig"],"-mpie-copy-relocations":[6,0,1,"cmdoption-clang-mpie-copy-relocations"],"-mpku":[6,0,1,"cmdoption-clang-mpku"],"-mpopcnt":[6,0,1,"cmdoption-clang-mpopcnt"],"-mpopcntd":[6,0,1,"cmdoption-clang-mpopcntd"],"-mpower8-vector":[6,0,1,"cmdoption-clang-mpower8-vector"],"-mpower9-vector":[6,0,1,"cmdoption-clang-mpower9-vector"],"-mprefer-vector-width":[6,0,1,"cmdoption-clang-mprefer-vector-width"],"-mprefetchwt1":[6,0,1,"cmdoption-clang-mprefetchwt1"],"-mprfchw":[6,0,1,"cmdoption-clang-mprfchw"],"-mptwrite":[6,0,1,"cmdoption-clang-mptwrite"],"-mpure-code":[6,0,1,"cmdoption-clang-mexecute-only"],"-mqdsp6-compat":[6,0,1,"cmdoption-clang-mqdsp6-compat"],"-mqpx":[6,0,1,"cmdoption-clang-mqpx"],"-mrdpid":[6,0,1,"cmdoption-clang-mrdpid"],"-mrdrnd":[6,0,1,"cmdoption-clang-mrdrnd"],"-mrdseed":[6,0,1,"cmdoption-clang-mrdseed"],"-mrecip":[6,0,1,"cmdoption-clang-mrecip"],"-mred-zone":[6,0,1,"cmdoption-clang-mred-zone"],"-mregparm":[6,0,1,"cmdoption-clang-mregparm"],"-mrelax":[6,0,1,"cmdoption-clang-mrelax"],"-mrelax-all":[6,0,1,"cmdoption-clang-mrelax-all"],"-mrestrict-it":[6,0,1,"cmdoption-clang-mrestrict-it"],"-mretpoline":[6,0,1,"cmdoption-clang-mretpoline"],"-mretpoline-external-thunk":[6,0,1,"cmdoption-clang-mretpoline-external-thunk"],"-mrtd":[6,0,1,"cmdoption-clang-mrtd"],"-mrtm":[6,0,1,"cmdoption-clang-mrtm"],"-msahf":[6,0,1,"cmdoption-clang-msahf"],"-msecure-plt":[6,0,1,"cmdoption-clang-msecure-plt"],"-msgx":[6,0,1,"cmdoption-clang-msgx"],"-msha":[6,0,1,"cmdoption-clang-msha"],"-mshstk":[6,0,1,"cmdoption-clang-mshstk"],"-msign-ext":[6,0,1,"cmdoption-clang-msign-ext"],"-msign-return-address":[6,0,1,"cmdoption-clang-msign-return-address"],"-msimd128":[6,0,1,"cmdoption-clang-msimd128"],"-msingle-float":[6,0,1,"cmdoption-clang-msingle-float"],"-msmall-data-threshold":[6,0,1,"cmdoption-clang-g-size"],"-msoft-float":[6,0,1,"cmdoption-clang-msoft-float"],"-mspeculative-load-hardening":[6,0,1,"cmdoption-clang-mspeculative-load-hardening"],"-msram-ecc":[6,0,1,"cmdoption-clang-msram-ecc"],"-msse":[6,0,1,"cmdoption-clang-msse"],"-msse2":[6,0,1,"cmdoption-clang-msse2"],"-msse3":[6,0,1,"cmdoption-clang-msse3"],"-msse4a":[6,0,1,"cmdoption-clang-msse4a"],"-mssse3":[6,0,1,"cmdoption-clang-mssse3"],"-mstack-alignment":[6,0,1,"cmdoption-clang-mstack-alignment"],"-mstack-arg-probe":[6,0,1,"cmdoption-clang-mstack-arg-probe"],"-mstack-probe-size":[6,0,1,"cmdoption-clang-mstack-probe-size"],"-mstackrealign":[6,0,1,"cmdoption-clang-mstackrealign"],"-mtbm":[6,0,1,"cmdoption-clang-mtbm"],"-mthread-model":[6,0,1,"cmdoption-clang-mthread-model"],"-mthreads<arg>":[6,0,1,"cmdoption-clang-mthreads-arg"],"-mthumb":[6,0,1,"cmdoption-clang-mthumb"],"-mtls-direct-seg-refs":[6,0,1,"cmdoption-clang-mtls-direct-seg-refs"],"-mtp":[6,0,1,"cmdoption-clang-mtp"],"-mtune":[6,0,1,"cmdoption-clang-mtune"],"-mtvos-simulator-version-min":[6,0,1,"cmdoption-clang-mtvos-simulator-version-min"],"-mtvos-version-min":[6,0,1,"cmdoption-clang-mtvos-version-min"],"-multi_module":[6,0,1,"cmdoption-clang-multi-module"],"-multiply_defined":[6,0,1,"cmdoption-clang-multiply-defined"],"-munaligned-access":[6,0,1,"cmdoption-clang-munaligned-access"],"-municode<arg>":[6,0,1,"cmdoption-clang-municode-arg"],"-munimplemented-simd128":[6,0,1,"cmdoption-clang-munimplemented-simd128"],"-mv5":[6,0,1,"cmdoption-clang-mcpu"],"-mv55":[6,0,1,"cmdoption-clang-mcpu"],"-mv60":[6,0,1,"cmdoption-clang-mcpu"],"-mv62":[6,0,1,"cmdoption-clang-mcpu"],"-mv65":[6,0,1,"cmdoption-clang-mcpu"],"-mv66":[6,0,1,"cmdoption-clang-mcpu"],"-mvaes":[6,0,1,"cmdoption-clang-mvaes"],"-mvirt":[6,0,1,"cmdoption-clang-mvirt"],"-mvpclmulqdq":[6,0,1,"cmdoption-clang-mvpclmulqdq"],"-mvsx":[6,0,1,"cmdoption-clang-mvsx"],"-mvx":[6,0,1,"cmdoption-clang-mvx"],"-mwaitpkg":[6,0,1,"cmdoption-clang-mwaitpkg"],"-mwarn-nonportable-cfstrings":[6,0,1,"cmdoption-clang-mwarn-nonportable-cfstrings"],"-mwatchos-simulator-version-min":[6,0,1,"cmdoption-clang-mwatchos-simulator-version-min"],"-mwatchos-version-min":[6,0,1,"cmdoption-clang-mwatchos-version-min"],"-mwatchsimulator-version-min":[6,0,1,"cmdoption-clang-mwatchos-simulator-version-min"],"-mwbnoinvd":[6,0,1,"cmdoption-clang-mwbnoinvd"],"-mwindows<arg>":[6,0,1,"cmdoption-clang-mwindows-arg"],"-mx32":[6,0,1,"cmdoption-clang-mx32"],"-mx87":[6,0,1,"cmdoption-clang-mx87"],"-mxgot":[6,0,1,"cmdoption-clang-mxgot"],"-mxnack":[6,0,1,"cmdoption-clang-mxnack"],"-mxop":[6,0,1,"cmdoption-clang-mxop"],"-mxsave":[6,0,1,"cmdoption-clang-mxsave"],"-mxsavec":[6,0,1,"cmdoption-clang-mxsavec"],"-mxsaveopt":[6,0,1,"cmdoption-clang-mxsaveopt"],"-mxsaves":[6,0,1,"cmdoption-clang-mxsaves"],"-mzvector":[6,0,1,"cmdoption-clang-fzvector"],"-no-integrated-cpp":[6,0,1,"cmdoption-clang-no-integrated-cpp"],"-no-pedantic":[6,0,1,"cmdoption-clang-pedantic"],"-no-pie":[6,0,1,"cmdoption-clang-nopie"],"-no-pthread":[6,0,1,"cmdoption-clang-pthread"],"-no_dead_strip_inits_and_terms":[6,0,1,"cmdoption-clang-no-dead-strip-inits-and-terms"],"-nobuiltininc":[6,0,1,"cmdoption-clang-nobuiltininc"],"-nocpp":[6,0,1,"cmdoption-clang-nocpp"],"-nocudainc":[6,0,1,"cmdoption-clang-nocudainc"],"-nocudalib":[6,0,1,"cmdoption-clang-nocudalib"],"-nodefaultlibs":[6,0,1,"cmdoption-clang-nodefaultlibs"],"-nofixprebinding":[6,0,1,"cmdoption-clang-nofixprebinding"],"-nolibc":[6,0,1,"cmdoption-clang-nolibc"],"-nomultidefs":[6,0,1,"cmdoption-clang-nomultidefs"],"-nopie":[6,0,1,"cmdoption-clang-nopie"],"-noprebind":[6,0,1,"cmdoption-clang-noprebind"],"-noseglinkedit":[6,0,1,"cmdoption-clang-noseglinkedit"],"-nostartfiles":[6,0,1,"cmdoption-clang-nostartfiles"],"-nostdinc":[6,0,1,"cmdoption-clang-nostdinc"],"-nostdlib":[6,0,1,"cmdoption-clang-nostdlib"],"-nostdlibinc":[6,0,1,"cmdoption-clang-nostdlibinc"],"-o<file>":[6,0,1,"cmdoption-clang-o-file"],"-objcmt-atomic-property":[6,0,1,"cmdoption-clang-objcmt-atomic-property"],"-objcmt-migrate-all":[6,0,1,"cmdoption-clang-objcmt-migrate-all"],"-objcmt-migrate-annotation":[6,0,1,"cmdoption-clang-objcmt-migrate-annotation"],"-objcmt-migrate-designated-init":[6,0,1,"cmdoption-clang-objcmt-migrate-designated-init"],"-objcmt-migrate-instancetype":[6,0,1,"cmdoption-clang-objcmt-migrate-instancetype"],"-objcmt-migrate-literals":[6,0,1,"cmdoption-clang-objcmt-migrate-literals"],"-objcmt-migrate-ns-macros":[6,0,1,"cmdoption-clang-objcmt-migrate-ns-macros"],"-objcmt-migrate-property":[6,0,1,"cmdoption-clang-objcmt-migrate-property"],"-objcmt-migrate-property-dot-syntax":[6,0,1,"cmdoption-clang-objcmt-migrate-property-dot-syntax"],"-objcmt-migrate-protocol-conformance":[6,0,1,"cmdoption-clang-objcmt-migrate-protocol-conformance"],"-objcmt-migrate-readonly-property":[6,0,1,"cmdoption-clang-objcmt-migrate-readonly-property"],"-objcmt-migrate-readwrite-property":[6,0,1,"cmdoption-clang-objcmt-migrate-readwrite-property"],"-objcmt-migrate-subscripting":[6,0,1,"cmdoption-clang-objcmt-migrate-subscripting"],"-objcmt-ns-nonatomic-iosonly":[6,0,1,"cmdoption-clang-objcmt-ns-nonatomic-iosonly"],"-objcmt-returns-innerpointer-property":[6,0,1,"cmdoption-clang-objcmt-returns-innerpointer-property"],"-objcmt-white-list-dir-path":[6,0,1,"cmdoption-clang-objcmt-whitelist-dir-path"],"-objcmt-whitelist-dir-path":[6,0,1,"cmdoption-clang-objcmt-whitelist-dir-path"],"-object":[6,0,1,"cmdoption-clang-object"],"-p":[6,0,1,"cmdoption-clang-p"],"-pagezero_size<arg>":[6,0,1,"cmdoption-clang-pagezero-size-arg"],"-pedantic":[6,0,1,"cmdoption-clang-pedantic"],"-pedantic-errors":[6,0,1,"cmdoption-clang-pedantic-errors"],"-pg":[6,0,1,"cmdoption-clang-pg"],"-pie":[6,0,1,"cmdoption-clang-pie"],"-pipe":[6,0,1,"cmdoption-clang-pipe"],"-prebind":[6,0,1,"cmdoption-clang-prebind"],"-preload":[6,0,1,"cmdoption-clang-preload"],"-print-effective-triple":[6,0,1,"cmdoption-clang-print-effective-triple"],"-print-file-name":[6,0,1,"cmdoption-clang-print-file-name"],"-print-ivar-layout":[6,0,1,"cmdoption-clang-print-ivar-layout"],"-print-libgcc-file-name":[6,0,1,"cmdoption-clang-print-libgcc-file-name"],"-print-multi-directory":[6,0,1,"cmdoption-clang-print-multi-directory"],"-print-multi-lib":[6,0,1,"cmdoption-clang-print-multi-lib"],"-print-prog-name":[6,0,1,"cmdoption-clang-print-prog-name"],"-print-resource-dir":[6,0,1,"cmdoption-clang-print-resource-dir"],"-print-search-dirs":[6,0,1,"cmdoption-clang-print-search-dirs"],"-print-target-triple":[6,0,1,"cmdoption-clang-print-target-triple"],"-private_bundle":[6,0,1,"cmdoption-clang-private-bundle"],"-pthread":[6,0,1,"cmdoption-clang-pthread"],"-pthreads":[6,0,1,"cmdoption-clang-pthreads"],"-r":[6,0,1,"cmdoption-clang-r"],"-rdynamic":[6,0,1,"cmdoption-clang-rdynamic"],"-read_only_relocs":[6,0,1,"cmdoption-clang-read-only-relocs"],"-relocatable-pch":[6,0,1,"cmdoption-clang-relocatable-pch"],"-remap":[6,0,1,"cmdoption-clang-remap"],"-rewrite-legacy-objc":[6,0,1,"cmdoption-clang-rewrite-legacy-objc"],"-rewrite-objc":[6,0,1,"cmdoption-clang-rewrite-objc"],"-rpath":[6,0,1,"cmdoption-clang-rpath"],"-rtlib":[6,0,1,"cmdoption-clang-rtlib"],"-s":[6,0,1,"id3"],"-save-stats":[6,0,1,"cmdoption-clang-save-stats"],"-save-temps":[6,0,1,"cmdoption-clang-save-temps"],"-sectalign":[6,0,1,"cmdoption-clang-sectalign"],"-sectcreate":[6,0,1,"cmdoption-clang-sectcreate"],"-sectobjectsymbols":[6,0,1,"cmdoption-clang-sectobjectsymbols"],"-sectorder":[6,0,1,"cmdoption-clang-sectorder"],"-seg1addr<arg>":[6,0,1,"cmdoption-clang-seg1addr-arg"],"-seg_addr_table":[6,0,1,"cmdoption-clang-seg-addr-table"],"-segaddr":[6,0,1,"cmdoption-clang-segaddr"],"-segcreate":[6,0,1,"cmdoption-clang-segcreate"],"-seglinkedit":[6,0,1,"cmdoption-clang-seglinkedit"],"-segprot":[6,0,1,"cmdoption-clang-segprot"],"-segs_read_<arg>":[6,0,1,"cmdoption-clang-segs-read-arg"],"-serialize-diagnostics":[6,0,1,"cmdoption-clang-serialize-diagnostics"],"-shared":[6,0,1,"cmdoption-clang-shared"],"-shared-libasan":[6,0,1,"cmdoption-clang-shared-libsan"],"-shared-libgcc":[6,0,1,"cmdoption-clang-shared-libgcc"],"-shared-libsan":[6,0,1,"cmdoption-clang-shared-libsan"],"-single_module":[6,0,1,"cmdoption-clang-single-module"],"-specs":[6,0,1,"cmdoption-clang-specs"],"-static":[6,0,1,"cmdoption-clang-static"],"-static-libgcc":[6,0,1,"cmdoption-clang-static-libgcc"],"-static-libgfortran":[6,0,1,"cmdoption-clang-static-libgfortran"],"-static-libsan":[6,0,1,"cmdoption-clang-static-libsan"],"-static-libstdc++":[6,0,1,"cmdoption-clang-static-libstdc"],"-std":[6,0,1,"cmdoption-clang-std"],"-std-default":[6,0,1,"cmdoption-clang-std-default"],"-stdlib":[6,0,1,"cmdoption-clang-stdlib"],"-sub_library<arg>":[6,0,1,"cmdoption-clang-sub-library-arg"],"-t":[6,0,1,"cmdoption-clang-t"],"-target":[6,0,1,"cmdoption-clang-target"],"-time":[6,0,1,"cmdoption-clang-time"],"-traditional":[6,0,1,"cmdoption-clang-traditional"],"-traditional-cpp":[6,0,1,"cmdoption-clang-traditional-cpp"],"-trigraphs":[6,0,1,"cmdoption-clang-ftrigraphs"],"-twolevel_namespace":[6,0,1,"cmdoption-clang-twolevel-namespace"],"-u<arg>":[6,0,1,"cmdoption-clang-u-arg"],"-umbrella":[6,0,1,"cmdoption-clang-umbrella"],"-undef":[6,0,1,"cmdoption-clang-undef"],"-undefined<arg>":[6,0,1,"cmdoption-clang-undefined-arg"],"-unexported_symbols_list":[6,0,1,"cmdoption-clang-unexported-symbols-list"],"-v":[6,0,1,"cmdoption-clang-v"],"-verify-pch":[6,0,1,"cmdoption-clang-verify-pch"],"-w":[6,0,1,"cmdoption-clang-w"],"-weak-l<arg>":[6,0,1,"cmdoption-clang-weak-l-arg"],"-weak_framework":[6,0,1,"cmdoption-clang-weak-framework"],"-whatsloaded":[6,0,1,"cmdoption-clang-whatsloaded"],"-whyload":[6,0,1,"cmdoption-clang-whyload"],"-working-directory":[6,0,1,"cmdoption-clang-working-directory-arg"],"-working-directory<arg>":[6,0,1,"cmdoption-clang-working-directory-arg"],"-x<language>":[6,0,1,"cmdoption-clang-x-language"],"-y<arg>":[6,0,1,"cmdoption-clang-y-arg"],"-z":[6,0,1,"cmdoption-clang-z"]}},objnames:{"0":["std","cmdoption","program option"],"1":["std","envvar","environment variable"]},objtypes:{"0":"std:cmdoption","1":"std:envvar"},terms:{"0b00110100":30,"0b01101101":30,"0b10000110":30,"0b10010":30,"0b10110110":30,"0b11010000":30,"0f4fc3":15,"0x000000000000":18,"0x00000000a360":53,"0x00000000a3a4":53,"0x00000000a3b4":53,"0x00000000c790":53,"0x000000010000":18,"0x000000425a50":14,"0x1":49,"0x10":15,"0x13a4":15,"0x170fa80":33,"0x173af50":33,"0x173afa8":33,"0x173afc8":33,"0x173afe0":33,"0x173b008":33,"0x173b030":33,"0x173b048":33,"0x173b060":33,"0x173b088":33,"0x173b0b0":33,"0x173b240":33,"0x17f":15,"0x1e14":15,"0x20":39,"0x200000000000":18,"0x200200000000":18,"0x28d0":15,"0x2a":15,"0x3":15,"0x3b":15,"0x3d":15,"0x40":39,"0x40000000009":15,"0x403c43":0,"0x403c53":0,"0x403c8c":0,"0x404544":0,"0x404704":0,"0x44d96d0":24,"0x44d97c8":24,"0x44da290":24,"0x4af01b":31,"0x4da26a":31,"0x4ecd20":46,"0x4ecd5b":46,"0x4ecd9":46,"0x4ecdc7":46,"0x5aea0d0":26,"0x5aeaa90":26,"0x5aeab50":26,"0x5aeac10":26,"0x5aeac68":26,"0x5aeac90":26,"0x5aeacb0":26,"0x5aeacc8":26,"0x5aeacf0":26,"0x5aead10":26,"0x5aead28":26,"0x5aead50":26,"0x5aead68":26,"0x5aead88":26,"0x60":39,"0x6f70bc0":15,"0x700000008000":18,"0x71bcd0":46,"0x71bcd4":46,"0x71bcd8":46,"0x71bcdc":46,"0x71bce0":46,"0x7f":39,"0x7f076fd9cec4":31,"0x7f45938b676c":37,"0x7f45944b418a":37,"0x7f789249b76c":37,"0x7f78938b5c25":37,"0x7f7893901cbd":37,"0x7f7893912e06":37,"0x7f7893912ecd":37,"0x7f7893912f0b":37,"0x7f7ddab8c080":0,"0x7f7ddab8c084":0,"0x7f7ddab8c210":0,"0x7f7ddabcac4d":0,"0x7fb42c3":15,"0x7fcf47b21bc0":53,"0x7ff3a3029ed0":5,"0x7ff3a302a410":5,"0x7ff3a302a470":5,"0x7ff3a302a830":5,"0x7ff3a302a8d0":5,"0x7ff3a302a980":5,"0x7ff3a302a9d8":5,"0x7ff3a302a9f8":5,"0x7ff3a302aa10":5,"0x7fff87fb82c8":0,"0x7fff87fb82d0":0,"0x7fffffff":56,"0x8":49,"0x800000000000":18,"0x86":15,"0x9":15,"0x902":23,"0x98":15,"0x9b":15,"0xb5":15,"0xc0bfffffffffff32":46,"0xc0bfffffffffff64":46,"0xffff":15,"0xffffffu":57,"10x":53,"11a6":15,"11a9":15,"11b0":15,"11b3":15,"11b6":15,"11ba":15,"11be":15,"11c0":15,"11c7":15,"11ca":15,"11ce":15,"11d0":15,"11d3":15,"11f5":15,"141592654f":39,"14f16":30,"15x":53,"199901l":57,"1gb":51,"1mb":53,"1st":[1,25,57],"201112l":57,"201710l":57,"23l":39,"256mb":[1,15],"32bit":57,"3dnow":6,"3dnowa":6,"3rd":[1,11,25,57],"3std":57,"42l":39,"42ll":39,"42u":39,"4th":25,"8bit":6,"9a2":15,"9a5":15,"9ac":15,"9af":15,"9b1":15,"9b4":15,"9d6":15,"\u00falfar":14,"\u03c9":57,"\u215b":57,"\u215c":57,"\u215d":57,"\u215e":57,"abstract":[4,11,20,25,28,29,33,38,41,43,52,55],"boolean":[1,19,30,39,52],"break":[1,2,4,8,15,16,35,36,38,42,44,55,57],"byte":[0,1,6,7,15,18,19,23,25,31,46,51,56,57],"case":[0,1,2,3,4,7,8,10,14,16,17,20,24,25,29,30,32,33,35,36,37,38,39,40,41,42,43,44,45,46,48,49,51,52,53,54,56,57,58],"catch":[0,2,4,8,11,18,19,20,23,33,36,44,56],"char":[0,1,3,4,6,14,15,18,25,30,33,35,37,39,42,44,46,50,56,57],"class":[0,1,2,3,4,6,8,9,11,14,17,18,20,21,26,27,29,32,33,35,36,38,39,41,42,43,44,52,57],"const":[1,2,4,6,9,14,17,18,21,25,30,33,34,35,39,41,43,46,52,57],"default":[0,1,2,3,4,6,7,8,9,11,14,16,17,25,26,29,32,33,35,36,37,38,40,44,50,51,52,53,54,56,57],"enum":[1,3,6,8,25,27,30,43,56],"export":[1,8,9,15,19,35,57],"final":[0,1,2,15,16,17,20,25,30,31,33,36,37,38,43,45,50,51,52,57],"float":[1,4,6,8,16,25,39,41,50,52,56,57],"function":[0,2,4,6,7,8,9,10,11,17,18,20,23,24,25,26,29,33,36,37,38,39,40,41,43,44,45,46,47,48,49,50,51,52,53,54,56,57],"g\u00f6khan":15,"goto":[4,44],"import":[1,2,4,5,6,8,10,11,16,20,25,26,30,33,41,51,57],"int":[0,1,2,3,4,5,6,8,10,14,17,18,22,23,25,26,27,30,31,33,35,37,39,42,44,46,47,48,49,50,52,53,56,57],"k\u0131c\u0131":15,"long":[0,1,2,3,4,6,8,14,15,18,20,30,37,38,39,44,50,54,57],"new":[0,1,2,3,4,6,8,15,18,20,21,23,24,25,29,30,33,35,36,37,38,39,40,41,42,43,46,51,52,55,56,57],"null":[1,2,3,6,15,24,25,30,33,39,41,44,53,56],"public":[1,8,9,10,25,29,33,38,41,42,43,52],"return":[0,1,3,4,6,8,9,10,14,17,18,23,24,25,26,27,29,31,32,33,34,35,37,39,42,43,44,45,46,49,50,52,53,56,57],"short":[6,8,18,25,30,39,49,55],"static":[0,1,2,3,4,8,9,10,11,14,15,18,21,25,29,33,35,36,37,40,45,46,52,53,54,56],"super":[1,2],"switch":[1,3,6,8,11,15,25,30,43,44,46,57],"throw":[1,2,19,36,45],"true":[0,1,2,3,4,8,9,16,19,25,30,33,39,42,44,52,56,57],"try":[0,1,2,4,8,10,11,15,19,20,24,25,30,32,33,36,37,38,49,50,52,57],"typeof":[3,57],"var":[1,2,6,8,26,30,33,44,57],"void":[0,1,3,4,5,6,8,9,14,15,17,18,25,27,29,30,31,33,36,39,41,42,44,46,47,48,50,52,53,57],"while":[1,2,5,8,11,14,19,25,28,30,33,36,38,39,41,44,45,47,50,51,52,54,56,57],AND:3,ASE:6,Added:44,Adding:[49,57],And:[33,57],Are:38,BUT:3,But:[15,16,44,46,57],Doing:[1,25,57],EXE:57,FOR:3,For:[0,1,2,3,4,5,8,9,10,11,14,15,16,17,18,20,23,25,26,27,28,30,32,33,35,36,37,38,39,40,41,42,43,44,47,50,51,52,54,56,57,58],Has:6,IDE:[1,10,20,25,41,43],IDEs:[43,57],IDs:[41,57],Its:[17,30,38,41,57],LHS:33,NOT:[3,27,30],Not:[1,2,11,25,30,57],OSes:54,One:[0,2,8,20,25,29,37,38,44,45,52,53],PCS:16,Such:[2,3,4,14,15,18,30,38,46,52],THE:3,TLS:[1,6,11,18,57],TUs:1,That:[1,10,16,25,30,38,56,57],The:[0,1,2,3,5,6,7,8,9,10,11,13,14,15,16,17,18,19,21,22,23,24,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,51,53,54,56],Then:[8,15,25,41,43,51],There:[1,2,3,7,8,9,14,15,16,18,21,25,26,27,28,30,32,33,35,36,38,41,43,44,49,50,52,54,56,57],These:[1,2,4,6,8,10,11,13,14,15,18,25,29,30,34,36,38,39,41,43,44,46,50,52,56,57],Tying:2,USE:3,Use:[0,1,2,6,7,8,9,14,19,24,25,30,35,45,46,49,51,52,53,55,56,57],Used:11,Useful:1,Using:[1,2,23,25,30,35,39,56],WITH:3,Will:[8,10],With:[2,7,8,10,11,14,15,17,28,32,33,37,38,41,45,46,51,57],YES:[39,54],Yes:[1,8],__1:57,__aligned_v16si:57,__alignof:[19,44],__alignof__:44,__always_inline__:30,__asm__:[1,57],__atomic_:[30,54],__atomic_acq_rel:30,__atomic_acquir:30,__atomic_consum:30,__atomic_fetch_max:30,__atomic_fetch_min:30,__atomic_relax:30,__atomic_releas:30,__atomic_seq_cst:30,__attribut:[2,44],__attribute__:[1,2,19,25,27,29,30,39,44,46,48,52,57],__auto_typ:19,__autoreleas:19,__base_file__:30,__block:2,__block_copy_10:3,__block_copy_4:3,__block_copy_5:3,__block_copy_foo:3,__block_descriptor_10:3,__block_descriptor_1:3,__block_descriptor_2:3,__block_descriptor_4:3,__block_descriptor_5:3,__block_dispose_10:3,__block_dispose_4:3,__block_dispose_5:3,__block_dispose_foo:3,__block_invoke_10:3,__block_invoke_1:3,__block_invoke_2:3,__block_invoke_4:3,__block_invoke_5:3,__block_literal_10:3,__block_literal_1:3,__block_literal_2:3,__block_literal_3:3,__block_literal_4:3,__block_literal_5:3,__bridg:2,__bridge_retain:2,__bridge_transf:2,__builin_suspend:30,__builtin_:[30,54],__builtin_ab:25,__builtin_add_overflow:30,__builtin_addc:30,__builtin_addcb:30,__builtin_addcl:30,__builtin_alloca_with_align:19,__builtin_appli:57,__builtin_arm_clrex:30,__builtin_arm_ldaex:30,__builtin_arm_ldrex:30,__builtin_arm_stlex:30,__builtin_arm_strex:30,__builtin_assume_align:[30,44],__builtin_avail:[19,30],__builtin_bitreverse16:30,__builtin_bitreverse32:30,__builtin_bitreverse64:30,__builtin_bitreverse8:30,__builtin_canonicalizef:30,__builtin_char_memchr:30,__builtin_choose_expr:[25,30],__builtin_classify_typ:25,__builtin_constant_p:[25,30],__builtin_coro_alloc:30,__builtin_coro_begin:30,__builtin_coro_destroi:30,__builtin_coro_don:30,__builtin_coro_end:30,__builtin_coro_fram:30,__builtin_coro_fre:30,__builtin_coro_id:30,__builtin_coro_param:30,__builtin_coro_promis:30,__builtin_coro_resum:30,__builtin_coro_s:30,__builtin_coro_suspend:30,__builtin_frame_address:45,__builtin_inf:25,__builtin_memchr:30,__builtin_mul_overflow:30,__builtin_nan:30,__builtin_nontemporal_load:30,__builtin_nontemporal_stor:30,__builtin_object_s:[1,56],__builtin_omp_required_simd_align:19,__builtin_return_address:46,__builtin_rotateleft16:30,__builtin_rotateleft32:[30,44],__builtin_rotateleft64:30,__builtin_rotateleft8:30,__builtin_rotateright16:30,__builtin_rotateright32:30,__builtin_rotateright64:30,__builtin_rotateright8:30,__builtin_rotateright:30,__builtin_sadd_overflow:30,__builtin_saddl_overflow:30,__builtin_saddll_overflow:30,__builtin_smul_overflow:30,__builtin_smull_overflow:30,__builtin_smulll_overflow:30,__builtin_ssub_overflow:30,__builtin_ssubl_overflow:30,__builtin_ssubll_overflow:30,__builtin_strlen:25,__builtin_sub_overflow:30,__builtin_subc:30,__builtin_subcb:30,__builtin_subcl:30,__builtin_trap:[30,57],__builtin_types_compatible_p:30,__builtin_uadd_overflow:30,__builtin_uaddl_overflow:30,__builtin_uaddll_overflow:30,__builtin_umul_overflow:30,__builtin_umull_overflow:30,__builtin_umulll_overflow:30,__builtin_usub_overflow:30,__builtin_usubl_overflow:30,__builtin_usubll_overflow:30,__builtin_va_arg_pack:57,__builtin_va_arg_pack_len:57,__builtin_va_list:5,__c11_:30,__c11_atomic_compare_exchange_strong:30,__c11_atomic_compare_exchange_weak:30,__c11_atomic_exchang:30,__c11_atomic_fetch_add:30,__c11_atomic_fetch_and:30,__c11_atomic_fetch_or:30,__c11_atomic_fetch_sub:30,__c11_atomic_fetch_xor:30,__c11_atomic_init:30,__c11_atomic_is_lock_fre:30,__c11_atomic_load:30,__c11_atomic_signal_f:30,__c11_atomic_stor:30,__c11_atomic_thread_f:30,__cdecl:57,__cfi_check:15,__cfi_slowpath:15,__cfi_slowpath_diag:15,__clang__:[19,30,52,56],__clang_major__:30,__clang_minor__:30,__clang_patchlevel__:30,__clang_version__:30,__clangast:41,__const__:30,__constant:1,__counter__:30,__cplusplu:39,__cpp_:30,__cpp_digit_separ:30,__cxa_atexit:6,__cxx11:[27,57],__cxx_rvalue_references__:30,__date__:19,__declspec:[6,19,25,29,30,36,57],__deprec:6,__dfsan_arg_tl:18,__dfsan_retval_tl:18,__dfsan_union:18,__dfsw_f:17,__dfsw_memcpi:[17,18],__dllexport__:30,__dmb:30,__dsb:30,__emutls_get_address:57,__except:36,__extension__:25,__fast_math__:57,__fast_relaxed_math__:6,__fastcal:[1,57],__final:[19,36],__format__:1,__fp16:30,__gener:1,__global:1,__gnu__:30,__gnu_inline__:57,__gnuc_gnu_inline__:1,__gnuc_stdc_inline__:1,__has_attribut:[1,2,39],__has_extens:1,__has_featur:[2,39],__has_nothrow_assign:30,__has_nothrow_constructor:30,__has_nothrow_copi:30,__has_trivial_assign:30,__has_trivial_constructor:30,__has_trivial_copi:30,__has_trivial_destructor:30,__has_virtual_destructor:30,__has_warn:19,__hwasan_shadow:23,__if_exist:19,__if_not_exist:19,__imag__:30,__include_level__:30,__include_macro:19,__int128:5,__int128_t:5,__interceptor_malloc:31,__is_abstract:30,__is_aggreg:30,__is_assign:30,__is_base_of:30,__is_class:30,__is_construct:30,__is_convertible_to:30,__is_destruct:30,__is_empti:30,__is_enum:30,__is_fin:30,__is_interface_class:30,__is_liter:30,__is_nothrow_assign:30,__is_nothrow_construct:30,__is_nothrow_destruct:30,__is_pod:30,__is_polymorph:30,__is_trivially_assign:30,__is_trivially_construct:30,__is_union:30,__isb:30,__libc_start_main:[0,31,37],__line__:57,__llvm_profile_initialize_fil:50,__llvm_profile_runtim:50,__llvm_profile_set_filenam:50,__llvm_profile_write_fil:50,__local:1,__msan_chain_origin:37,__need_size_t:38,__need_wchar_t:38,__objc_no:39,__objc_y:39,__opencl_:30,__opencl_atomic_:30,__opencl_memory_scope_all_svm_devic:30,__opencl_memory_scope_devic:30,__opencl_memory_scope_sub_group:30,__opencl_memory_scope_work_group:30,__opencl_memory_scope_work_item:30,__printf__:1,__privat:1,__private_extern__:19,__real__:30,__reference_binds_to_temporari:30,__regcal:[1,57],__restrict__:19,__sanitizer_cov_8bit_counters_init:46,__sanitizer_cov_pcs_init:46,__sanitizer_cov_trace_cmp1:46,__sanitizer_cov_trace_cmp2:46,__sanitizer_cov_trace_cmp4:46,__sanitizer_cov_trace_cmp8:46,__sanitizer_cov_trace_const_cmp1:46,__sanitizer_cov_trace_const_cmp2:46,__sanitizer_cov_trace_const_cmp4:46,__sanitizer_cov_trace_const_cmp8:46,__sanitizer_cov_trace_div4:46,__sanitizer_cov_trace_div8:46,__sanitizer_cov_trace_gep:46,__sanitizer_cov_trace_pc:46,__sanitizer_cov_trace_pc_:46,__sanitizer_cov_trace_pc_guard:46,__sanitizer_cov_trace_pc_guard_init:46,__sanitizer_cov_trace_pc_indirect:46,__sanitizer_cov_trace_switch:46,__sanitizer_symbolize_pc:46,__scanf__:1,__single_inherit:1,__size_type__:38,__stdc__:41,__stdc_version__:57,__stdcall:[1,57],__strict_ansi__:57,__strong:[1,2,19],__sync_:30,__sync_bool_compare_and_swap:30,__sync_fetch_and_add:30,__sync_lock_test_and_set:30,__thiscal:1,__thread:[1,19],__time__:19,__timestamp__:30,__try:36,__typeof:2,__typeof__:57,__uint128_t:5,__underlying_typ:30,__underscor:38,__unsafe_unretain:[2,19,30],__unspecified_inherit:1,__v16si:57,__va_args__:[19,52,57],__va_list_tag:5,__va_opt__:19,__vector:19,__vector_size__:30,__vectorcal:[1,57],__visibility__:1,__wchar_t:30,__weak:[1,2,4,19,30],__x:30,__xray_customev:6,__xray_typedev:6,_aligna:30,_alignof:[30,44],_atom:30,_attribute_:30,_block:3,_block_byref_assign_copi:3,_block_byref_blockstoragefoo:3,_block_byref_dispose_help:3,_block_byref_foo:3,_block_byref_i:3,_block_byref_keep_help:3,_block_byref_obj:3,_block_byref_obj_dispos:3,_block_byref_obj_keep:3,_block_byref_releas:3,_block_byref_voidblock:3,_block_copy_assign:3,_block_destroi:3,_block_liter:3,_block_object_assign:3,_block_object_dispos:3,_bool:[24,33],_clang:[7,8,19,30],_complex:[25,57],_decimal32:57,_end:8,_explicit:30,_fastcal:1,_float16:30,_foo:[25,30],_fract:57,_imaginari:30,_ivar:2,_msc_full_ver:57,_msc_ver:[6,11,57],_nonnul:[19,56],_noreturn:19,_nsconcreteglobalblock:3,_nsconcretestackblock:3,_null_unspecifi:19,_nullabl:19,_overflow:54,_perform:2,_pragma:[25,30,57],_rect:39,_returns_not_retain:30,_returns_retain:30,_rotl:44,_size:39,_size_t:38,_some_struct:1,_static_assert:19,_stdcall:1,_test:8,_thiscal:1,_unwind_:54,_value_:[1,30],_vectorcal:1,_z1fd:1,_z1fi:1,_z1gp1a:48,_z32bari:57,_z3foob1bv:27,_z3foov:57,_z4funcb4testv:27,_z5tgsind:1,_z5tgsine:1,_z5tgsinf:1,_z8myfoobarv:47,a15:16,a53:6,a_test:8,aaa:8,aaaa:8,aaaaaaaa:8,aaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa:8,aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa:8,aapc:1,aarch32:6,aarch64:[1,23,40,49,57],abadi:14,abbrevi:41,abc:57,abi:[1,2,3,6,11,14,15,19,29,41,49,56,57,58],abi_tag:[19,27],abical:6,abil:[1,2,15,25,29,41,57],abl:[0,1,2,15,16,20,24,25,30,33,36,37,41,50,52,54,56,57],abnorm:2,abort:[0,1,11,14,15,19,25,30,57],about:[0,1,6,8,10,11,15,16,17,20,21,24,25,26,30,32,33,36,41,42,43,44,45,52,53,54,55,56,57],abov:[1,2,3,8,11,14,15,18,25,29,30,37,38,39,41,42,43,52,54,56,57],abs:1,absenc:[1,6,25,38,57],absent:[2,38],absl:57,absolut:[2,6,28,30,38,47,57],abus:20,ac_struct:44,academia:56,accept:[1,2,6,10,18,19,20,25,30,32,36,43,57],access:[0,1,2,4,6,8,10,15,16,17,18,20,25,26,32,33,38,40,44,45,49,51,52,56,57],accessmodifieroffset:8,accessor:[2,20,25,39],accid:25,accident:[2,38],accommod:[4,20],accompani:57,accord:[1,2,4,6,8,10,17,25,28,30,38,39,41,57],accordingli:[8,25,39],account:[1,2,8,41,44,50],accumul:57,accur:[1,2,6,25,53],accuraci:[23,25,30,57],achiev:[25,37,43,47,51],acknowledg:19,acl:30,acquir:[1,2,19,57],acquire_cap:52,acquire_shared_cap:52,acquired_befor:19,acronym:21,across:[1,2,14,16,18,25,30,38,39,43,44,45,54,57],act:[1,2,4,8,25,41,52,53],action:[3,9,19,20,25,30,35,42,46,54,55],actionfactori:24,actiontyp:9,activ:[4,10,25,30,36,38,40,51,52,53,55],actonbinop:25,actoncxx:25,actoncxxglobalscopespecifi:25,actoncxxnestednamespecifi:25,actonxxx:25,actual:[1,2,3,4,11,15,18,20,25,26,28,30,38,41,45,52,57],actuallli:1,acycl:41,ada:54,adapt:[20,45],add:[0,1,2,3,6,7,8,9,10,11,16,19,20,21,22,23,24,30,31,33,37,38,39,41,43,44,49,50,51,53,54,56,57],add_clang_execut:[33,42],add_subdirectori:33,addaftermainact:9,addanim:39,added:[1,2,6,8,10,11,15,19,21,25,30,33,35,36,38,43,44,50,51,52,54,57],adding:[0,1,2,4,7,8,19,25,30,33,43,44,52,57],addit:[1,2,3,4,6,9,11,15,16,17,18,19,21,25,33,37,38,40,41,43,46,48,51,52,54,55,57],addition:[0,1,2,3,25,30,38,50,56,57],additionalmemb:25,addmatch:33,addobject:39,addq:49,addr2lin:[53,57],addr:[6,15,18,30],address:[2,3,6,14,15,18,23,25,30,31,33,36,37,38,39,44,45,46,47,49,53,56,57],address_sanit:30,address_spac:30,addressof:30,addresssanit:[1,6,30,31,46,47,57,58],addresssanitizerleaksanit:31,addrsig:[6,57],adequ:[1,2],adher:[1,21],adi:23,adjac:15,adjust:[1,2,25,33,45],admittedli:2,adopt:[20,38,39],adrp:23,advanc:[1,30,33,35,50],advantag:[1,18,24,25,30,39,57],advis:52,adx:6,aes:6,affect:[1,2,8,11,14,19,30,38,41,43,44,51,57],aforement:43,afraid:10,afresh:2,after:[0,1,2,3,4,6,8,9,15,16,20,23,24,25,27,28,30,33,35,36,38,39,40,41,43,45,49,50,51,52,54,56,57],afterclass:8,aftercolon:8,aftercontrolstat:8,afterenum:8,afterexternblock:8,afterfunct:8,afterhash:8,afternamespac:8,afterobjcdeclar:8,afterstruct:8,afterunion:8,afterward:[33,35],again:[0,2,3,8,33,36,44,46,56,57],against:[1,2,6,8,14,15,16,19,25,29,33,36,38,39,45,46,49,54,56,57],aggreg:[1,2,19,25],aggress:[6,11,51,57],agnost:[2,52],agre:[1,2],ahead:[1,16,25],aid:38,aim:[1,21,24,25,30,33,44,54,55,57],aka:[19,30],akin:[2,25],alarm:0,alexdenisov:21,alexfh:24,algebra:[33,57],algorithm:[1,2,15,26,41],alia:[2,19,45,56,57],alias:[2,6,30,52,57],aliase:19,align:[1,2,6,8,23,44,54,56,57],align_valu:44,aligna:[19,30,44],alignafteropenbracket:8,alignconsecutiveassign:8,alignconsecutivedeclar:8,aligned_char:44,aligned_double_ptr:1,alignescapednewlin:8,alignof:[30,44,57],alignoperand:8,aligntrailingcom:8,alignupto:15,aliv:19,all:[0,1,2,3,4,6,7,8,10,11,13,14,16,18,20,23,24,25,26,27,28,29,30,32,33,34,35,36,37,38,39,40,41,43,44,45,46,47,50,51,52,53,54,55,56],all_load:6,alldefinit:8,allevi:1,allman:8,alloc:[0,2,4,6,14,15,18,19,20,21,25,30,31,37,39,41,45,49,57],alloc_align:44,alloca:[6,18,23],allocat:57,allof:32,allow:[0,1,2,3,4,6,8,10,11,14,15,18,19,20,21,23,25,26,29,30,32,33,35,36,38,41,42,43,44,47,50,51,52,55,57],allowable_cli:6,allowallparametersofdeclarationonnextlin:8,allowshortblocksonasinglelin:8,allowshortcaselabelsonasinglelin:8,allowshortfunctionsonasinglelin:8,allowshortifstatementsonasinglelin:8,allowshortloopsonasinglelin:8,almost:[1,2,16,25,31,38],alnum:8,alon:[10,25,31,45],along:[1,10,11,20,24,25,30,33,36,38,41,57],alongsid:[38,50,57],alpha:7,alphabet:8,alreadi:[1,2,8,10,16,19,21,23,30,33,35,38,39,41,42,45,49,51,56],also:[0,1,2,3,4,6,8,9,10,14,15,16,17,19,20,21,23,24,25,26,27,28,29,30,33,34,35,36,37,38,39,41,43,44,46,48,49,50,51,52,53,56,57],alt:57,alter:[2,17,20,25,47,57],altern:[1,2,6,7,15,22,23,30,35,38,45,49,50,52,54,57],alternatingli:15,although:[1,2,4,10,20,39,41,43,52,56,57],altivec:[6,30,38],alwai:[1,2,3,6,8,14,15,16,19,20,21,25,26,30,32,38,39,40,44,45,52,57],always_inlin:[1,30],alwaysbreak:8,alwaysbreakafterdefinitionreturntyp:8,alwaysbreakafterreturntyp:8,alwaysbreakbeforemultilinestr:8,alwaysbreaktemplatedeclar:8,ambigu:[1,25,41],amd1:57,amd:57,amdgcn:57,amdgpu:1,amdhsa:57,amen:30,amend:[11,57],among:[2,25,38],amort:45,amount:[1,2,15,20,30,38,41,51,52,56],ampamp:25,analog:2,analys:[10,18,25],analysi:[1,2,6,11,17,18,21,25,36,39,40,41,44,45,51,53,57,58],analyz:[1,2,8,11,19,25,30,43,54],ancestor:26,ancestorsharedwithview:1,anchor:57,andersbakken:21,android:[0,16,38,56],androideabi:16,angl:[8,19,25],ani:[0,1,2,3,4,6,7,8,11,15,16,18,19,20,23,24,25,27,28,29,30,32,33,36,37,38,39,41,43,44,45,46,49,50,51,52,53,55,57],anim:39,animationwithkeypath:39,annoi:2,annot:[2,6,8,19,30,52,56,57],annot_cxxscop:25,annot_template_id:25,annot_typenam:25,annotationendloc:25,annotationvalu:25,annotmeth:1,anonym:[0,2,24,25],anoth:[0,1,2,7,8,14,15,16,17,18,19,20,25,27,30,33,38,41,43,44,45,52,54,57],ansi:[6,11,57],answer:[2,33,38],anti:38,anyth:[19,25,38,43,45,52,53,57],anytim:57,anywai:[2,41],anywher:[1,2,4,18,20,25,50],apart:[15,41],api:[1,2,10,14,17,21,25,30,38,43,44,52,55,57],api_avail:[1,30],app:[6,36],appar:[1,2],appear:[1,2,3,4,6,14,15,19,24,25,30,36,38,39,57],append:[15,17,19,39,50],appertain:[1,25,30],appl:[1,2,3,4,6,16,20,30,39,41,57],applescript:7,appli:[1,2,7,8,10,11,14,15,17,19,23,25,27,29,30,33,35,38,39,43,44,45,46,47,48,49,51,56,57],applic:[1,2,6,7,11,14,15,17,18,19,21,23,25,30,36,38,40,49,51,57,58],apply_to:30,approach:[0,15,18,20,21,23,41,57],appropri:[1,3,10,11,18,19,20,22,25,30,38,39,41,43,44,52,54,57],approx:6,approxim:[6,33,38,52],apropo:3,apvalu:25,aquir:30,arang:6,arbitrari:[1,2,4,8,18,25,32,33,39,41,45,49,57],arc:[1,6,19,30,38],arc_cf_code_audit:2,arch:[1,6,11,16,20,54,57],arch_errors_fat:6,arch_onli:6,architectur:[1,6,11,14,16,19,20,28,30,38,41,49,51,53],arcmt:6,area:[1,41,57],aren:[2,8,16,19,25,30,33,44],aresameexpr:33,aresamevari:33,arg1:[1,6,25,46],arg2:[1,6,25,46],arg3:6,arg:[1,6,8,9,11,12,18,20,25,27,39,56,57],arg_idx:1,arg_kind:1,argc:[0,1,33,35,37,39,42,46,56],arglist:20,argtyp:30,arguabl:57,argument1:8,argument2:8,argument:[1,3,4,7,8,9,11,13,14,15,17,24,27,28,35,36,39,43,44,46,48,51,52,54,57,58],argv:[0,1,33,35,37,39,42,46,56],aris:[2,3],arithmet:[1,2,18,39,56],ariti:45,arm64:[23,44],arm7tdmi:16,arm:[0,16,25],arminterruptattr:25,armv5:57,armv6:57,armv7:57,armv7a:16,armv7l:[16,57],armv8:[6,30,57],around:[0,1,2,4,5,8,10,14,16,21,25,30,38,44,46,54,57],arr:8,arrai:[0,1,2,6,8,10,15,25,28,33,44,45,46,49,56,57],arrang:15,arrayoftenblocksreturningvoidwithintargu:4,arraywithobject:39,arrow:[6,57],artifact:[50,55],arxiv:23,asan:[0,23,31],asan_malloc_linux:31,asan_opt:[0,31,46],asan_symbol:0,asan_symbolizer_path:0,ascii:[25,57],ascrib:2,asid:25,ask:[1,36,38,44,58],aslr:[37,45],asm:[1,6,30,38,57],aspect:[1,25,38],assembl:[6,11,15,16,17,20,30,37,44,49,57,58],assert:[1,6,17,30,38,52,57],assert_exclusive_lock:52,assert_shared_lock:52,assertheld:52,assertreaderheld:52,assign:[1,2,3,4,7,8,18,20,39,41,44,56,57],assist:[2,3,20,30,36,38,57,58],associ:[1,2,3,6,18,19,20,25,30,33,38,39,41,42,48,52,57],assum:[1,2,4,6,7,8,15,16,17,19,25,30,32,36,38,39,43,45,50,52,57],assume_align:[44,56],assume_noreturn_begin:30,assume_noreturn_end:30,assume_safeti:19,assume_unavailable_begin:30,assume_unavailable_end:30,assumenoreturn:30,assumpt:[1,2,11,18,25,45,57],ast:[5,6,9,11,19,22,24,35,38,42,43,50,54,55,57,58],ast_match:33,astconsum:24,astcontext:[25,26,33,41],astdump:24,astdumpfilt:24,astfrontendact:58,astlist:24,astmatch:33,astmatchersmacro:32,astmatchfind:33,astnod:25,astprint:24,astread:41,astreaderstmt:25,astwriterstmt:25,asynchron:[6,36],atexit:6,atindexedsubscript:39,atl:[19,36],atom:[1,2,6,52,53,57],atomicchang:43,attach:[1,8,18,19,25,33,52,57],attack:[1,14,45,49,56],attempt:[1,2,3,4,6,8,11,20,25,30,36,38,40,41,52,54,56,57],attr:[6,38],attr_mpi_pwt:1,attrdoc:25,attribut:[0,2,3,4,6,11,14,27,29,32,37,39,40,45,52,53,56,58],attribute_deprecated_with_messag:30,attribute_ext_vector_typ:30,attribute_unavailable_with_messag:30,attributerefer:25,audit:18,augment:[16,38,51],author:[2,3,37],auto:[1,3,4,6,8,10,25,38,44,57],autocleanup:52,autocmd:7,autocomplet:6,autoconf:30,autofdo:57,autolink:[6,38],autom:[2,25,30,55],automat:[1,3,4,6,8,9,10,18,19,20,21,24,25,34,35,38,40,41,43,44,45,54,55,57],autonom:46,autoreleas:[2,30],autoreleasepool:8,autosens:57,autosynthes:19,autowrit:24,avail:[2,3,6,7,11,13,16,20,21,23,25,26,28,35,38,40,41,42,43,44,45,49,51,53,54,57],avaudioqualityhigh:39,avaudioqualitylow:39,avaudioqualitymax:39,avaudioqualitymedium:39,avaudioqualitymin:39,avaudiorecord:39,avencoderaudioqualitykei:39,averag:45,aview:1,avoid:[1,2,6,11,19,20,25,29,30,37,38,39,40,44,49,51,53,54,57],avx2:6,avx512bitalg:6,avx512bw:6,avx512cd:6,avx512dq:6,avx512er:6,avx512f:6,avx512ifma:6,avx512pf:6,avx512vbmi2:6,avx512vbmi:6,avx512vl:6,avx512vnni:6,avx512vpopcntdq:6,avx:[1,6,38,57],awai:[1,2,8,19,45,46],awar:[1,2,8,16,25],awkward:2,axw:21,back:[1,2,3,14,19,25,30,38,51,56,57],backbon:32,backchain:6,backend:[1,6,30,54,57],background:33,backslash:[6,8,19,57],backtrac:[6,11,57],backtrack:25,backward:[1,3,6,8,30,38,41,50,55,57],bad:[0,2,25,38,47,57],bad_:47,bad_arrai:0,bad_fil:[0,14],bad_foo:47,bad_head:14,bad_init_glob:0,bad_rect:39,bad_sourc:47,badasanfunc:47,badcal:14,badcfical:47,badclassnam:0,badfunct:47,badinitclasssubstr:0,badli:2,badstructnam:0,balanc:[2,30,52],balanceddelimitertrack:25,baltic:25,ban:2,banal:21,bank:1,bankaccount:52,bar2:8,bar:[1,2,8,25,30,32,47,49,50,52,57],bararg:2,bare:[6,16,27],barrier:[1,3,6,18,19,38],bas_align:8,bas_alwaysbreak:8,bas_dontalign:8,base1:8,base2:8,base:[1,2,3,4,6,7,8,9,10,11,14,15,17,18,21,23,25,26,28,29,33,34,35,36,38,39,40,41,44,45,51,52,54,56,58],basedonstyl:[7,8],basenam:48,basetag:23,basi:[1,25,30,38,44,57],basic:[1,2,5,9,10,14,15,16,26,32,34,35,38,40,43,45,46,56],basic_str:[1,25,27],bat:57,baz:[1,2,25,30,52,57],bazarg:2,bazptr:1,bbbb:8,bbbbbbbbbbbbbbb:8,bbbbbbbbbbbbbbbbbbbbb:8,bcanalyz:41,bcis_aftercolon:8,bcis_beforecolon:8,bcis_beforecomma:8,bcpl:2,bear:[28,30],beauti:57,becaus:[1,2,3,6,10,11,14,15,17,19,20,22,23,25,30,33,38,39,41,45,49,50,52,54,57],becom:[0,1,2,4,8,15,17,18,19,25,30],been:[1,2,3,6,8,14,15,18,19,20,25,30,33,36,38,39,41,45,49,50,51,52,53,57],befor:[1,2,6,8,11,14,15,18,23,25,27,30,33,36,37,38,41,43,45,46,49,50,52,56,57],beforecatch:8,beforecolon:8,beforecomma:8,beforeels:8,befriend:19,begin:[1,2,3,4,8,10,15,19,25,30,41,46,57],begun:[2,56],behav:[1,2,19,25,38,57],behavior:[1,2,6,8,14,17,18,19,25,36,38,39,41,47,50,56,57],behaviour:[1,6,16,40,44,56,57],behind:[1,15,20,25,41,52],being:[0,1,2,3,4,6,8,14,15,17,18,19,20,23,25,28,29,30,38,39,41,42,44,45,51,52,54,56,57],believ:[15,25],belong:[1,2,8,17,19,38,57],below:[1,2,8,14,15,20,25,30,32,38,39,41,43,45,46,52,54,56,57],benchmark:[6,14,45],benefici:[30,57],benefit:[2,15,25,38,52,57],besid:33,best:[1,2,6,8,11,15,16,18,25,28,30,33,57],beta:[52,53],better:[1,16,20,21,23,25,30,36,38,46,51,56,57],between:[1,2,3,6,8,11,14,15,16,19,25,29,30,33,38,40,41,43,44,49,50,51,52,54,56],beyond:[2,4,25],bfd:50,bif:52,big:19,bigger:[0,7],bils_aftercolon:8,bils_beforecolon:8,bils_beforecomma:8,bin:[0,5,8,16,24,28,33,35,42,51,57],binari:[0,1,2,6,8,11,14,15,16,20,22,24,25,33,35,37,38,39,41,45,46,50,54,56,57],binary16:30,binaryoper:[26,33,41],binaryoperatorstyl:8,bind:[1,4,7,20,28,30,33,39,55,57],bind_at_load:6,bindabl:32,bindarchact:20,binpackargu:8,binpackparamet:8,binpackstyl:8,binutil:[1,16,50],bit0:46,bit:[0,1,2,3,6,18,19,20,23,25,30,38,40,41,46,53,54,56,57],bitcast:25,bitcod:[6,11,41,51,54,57],bitfield:[6,25,44],bitmap:6,bitmask:19,bitpattern:30,bitset:15,bitstream:[25,41],bitwidth:30,bitwis:[18,19,25,30,44],bla:6,black:15,blacklist:[6,19,46,47,57],blank:57,bleed:57,blerg:16,blink:45,blob_plain:21,block:[1,6,8,11,15,38,44,46,57],block_byref:3,block_byref_cal:3,block_copi:[1,2,3,4,30],block_decl:4,block_descriptor_1:3,block_field_:3,block_field_is_block:3,block_field_is_byref:3,block_field_is_object:3,block_field_is_weak:3,block_foo:4,block_fooptr:4,block_fooref:4,block_has_copy_dispos:3,block_has_ctor:3,block_has_signatur:3,block_has_stret:3,block_is_glob:3,block_is_noescap:3,block_literal_1:3,block_literal_express:4,block_priv:3,block_releas:[2,3,4],block_siz:3,blocka:3,blockb:3,blocklanguagespec:[1,30],blockreturningintwithintandcharargu:4,blockreturningvoidwithvoidargu:4,blockstoragefoo:3,blockti:1,blog:[51,56],blow:56,blue:[20,25,30,39],bmi2:6,bmi:6,bodi:[1,3,4,8,25,26,30,33,36,41,50,52,57],bogu:[25,52],boilerpl:38,bool:[1,8,9,25,30,33,39,42,44,56,57],boom:0,boost_foreach:8,bootclasspath:6,bootstrap:[24,33,37],borland:[6,11],bos_al:8,bos_non:8,bos_nonassign:8,both:[0,1,2,3,4,6,7,8,10,14,15,19,20,25,26,29,30,31,32,33,36,37,38,39,41,44,45,49,51,52,54,56,57],bottom:[38,45,57],bound:[0,1,4,6,7,15,20,28,30,33,38,56],boundari:[2,14,15,19,38,47,54],bounov:15,box:[1,19,35,55],bps_alwai:8,bps_auto:8,bps_never:8,bptr:2,brace:[2,8,25,30,57],bracebreakingstyl:8,bracewrap:8,bracewrappingflag:8,bracket:[6,8,19,25,30,47,57],bracketalignmentstyl:8,branch:[1,6,15,19,25,30,49,57],breakafterjavafieldannot:8,breakbeforebinaryoper:8,breakbeforebrac:8,breakbeforeternaryoper:8,breakconstructoriniti:8,breakconstructorinitializersstyl:8,breakinheritancelist:8,breakinheritanceliststyl:8,breakstringliter:8,breaktemplatedeclarationsstyl:8,brepro:57,brief:[12,20],briefli:2,bring:[2,25,33],brk:23,broad:[30,57],broadli:57,broken:[2,20],broomfield:45,brows:46,browser:[14,21],bs_allman:8,bs_attach:8,bs_custom:8,bs_gnu:8,bs_linux:8,bs_mozilla:8,bs_stroustrup:8,bs_webkit:8,bsd:57,bss:[6,30],btds_multilin:8,btds_no:8,btds_ye:8,budiu:14,buf:1,buffer2:1,buffer:[1,6,7,8,11,19,23,25,38,41,45,49,57],buffer_idx:1,bufferptr:25,bufwritepr:7,bug:[0,1,2,10,14,17,18,19,23,36,37,45,53,54,56,57],bugfix:[44,50,51],build:[1,5,6,7,9,10,11,14,15,16,20,21,23,25,30,31,32,35,38,41,44,45,49,51,54,55,57,58],build_dir:50,buildcfg:25,buildxxx:25,built:[1,7,11,14,15,19,20,25,29,30,33,35,37,38,41,46,51,55,57],builtin:[1,2,6,11,19,22,26,38,44,45,54,56],bulk:41,bullet:1,bunch:[25,35],bundl:[6,26,41],bundle_load:6,bundler:6,burden:1,burdensom:2,bypass:[47,49],byref:3,byref_dispos:3,byref_i:3,byref_keep:3,byref_obj:3,bytearraybuild:15,bzero1:1,bzero:2,c11:[11,19,38,57],c17:[11,38,57],c2x:1,c89:[1,11,19,57],c90:[11,19,38,57],c94:[1,57],c99:[1,4,11,19,25,38,57],c_002b_002b:27,c_aligna:30,c_alignof:30,c_atom:30,c_generic_select:30,c_include_path:11,c_static_assert:30,c_thread_loc:30,ca7fb:15,ca7fbb:15,ca7fc5:15,ca7fc8:15,ca7fcb:15,ca7fcf:15,ca7fd5:15,ca7fdb:15,ca7fe2:15,ca7fe6:15,ca7fec:15,ca8511:15,cabasicanim:39,cach:[1,6,11,30,38,49,57],cache_path_lto:51,cache_s:51,cache_size_byt:51,cache_size_fil:51,calcul:[1,15,52],call:[0,2,3,4,6,7,8,9,11,16,17,18,20,21,22,23,24,25,27,28,29,30,32,33,35,36,37,38,39,41,42,43,44,45,46,47,48,50,52,54,56,57],callabl:[18,32],callback:[15,19,25,32,33,46],calle:[1,2,14,15,19,32,46],caller2:44,caller3:44,caller4:44,caller:[1,2,15,30,44,52],callexpr:41,calloc:2,callq:[15,49],callsit:[1,6,57],callthem:1,came:25,camel:30,can:[0,1,2,3,4,5,6,7,8,9,10,11,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,56,57],cancel:40,candea:45,candid:[1,2,6,25,38,57],cannot:[1,2,7,15,17,18,19,20,25,30,35,36,38,41,45,51,52,56,57],canon:[1,8,19,30,33,40,41,44,55],canonic:[30,33],canonicaldelimit:8,cansyntaxcheckcod:35,cap:57,capabl:[1,2,19,25,33,39,57],capit:25,captur:[2,3,4,25,33,41,44,46],captured_i:3,captured_obj:3,captured_voidblock:3,care:[2,8,16,20,25,30,42,45,50,55,57],carefulli:[2,10,25,30],caret:[2,6,25,57],carolin:14,carri:[1,2],carryin:30,carryout:30,cascad:38,cast:[1,4,6,8,10,15,21,25,27,30,32,33,44,56,57],cat:[0,5,26,31,37,46,47,48,50,53,56,57],categor:[2,25,39,57],categori:[0,1,2,6,8,10,17,21,25,29,30,33,35,41,47],caught:[18,19,44,45,56],caus:[0,1,2,3,4,14,15,17,18,19,25,30,37,38,45,48,51,52,53,57],caution:[2,30],caveat:[1,2,20,38,44],cc1:[20,25,41,54,57],ccc:[8,16,20],cccc:8,ccccccccccccc:8,ccccccccccccccc:8,ccccccccccccccccccccccccccccccccccccccccc:8,ccmake:[24,33,35],center:39,centric:[25,41,52],cert:52,certain:[0,1,3,8,14,20,21,24,25,30,32,37,38,41,42,43,45,46,47,57],certainli:[2,25],cet:[1,15,49],cexpr:24,cf_audited_transf:2,cf_consum:[2,30],cf_returns_not_retain:[2,30],cf_returns_retain:[2,30],cf_unknown_transf:2,cfarrayref:3,cfe:[1,2,57,58],cffunction:19,cfg:57,cfgblock:25,cfguard:6,cfi:[6,29,47,48,57],cfprint:3,cfreleas:2,cfstring:6,cfstringref:[2,3],cgcall:57,chain:[20,25,30,54,57],challeng:18,chanc:[2,33],chang:[1,2,4,6,7,8,10,15,16,17,18,20,23,28,30,33,38,40,41,43,45,46,50,51,54,55,56,57],channel:49,char16_t:57,char32_t:57,char8_t:[6,19],charact:[1,2,6,8,25,28,38,39,51,57],character:[3,33],characterist:25,charg:[2,3],charset:[6,57],charsourcerang:[34,43],chart:1,cheap:25,check1:57,check2:57,check:[2,5,6,9,11,16,17,20,21,24,25,33,35,37,38,42,43,44,45,46,47,48,49,53,54,55,57],check_initialization_ord:0,checker:[19,21,25,33,55,57],checkout:[10,33,34,54],checkowai:14,checkplaceholderexpr:25,cheer:2,child:[20,26,41],children:[25,33],chmod:24,choic:[1,3,40,57],choos:[1,2,4,11,16,20,25,40,43,58],chose:2,chosen:[1,16,23,25,30,33,54],chrome:0,chromium:[7,8,14,45],chunk:40,cin:8,circuit:[18,30],circumst:[1,2,3,25],cl1:11,cl2:[11,57],cl_intel_device_side_avc_motion_estim:44,cl_intel_planar_yuv:44,cl_intel_required_subgroup_s:1,cl_khr_:57,cl_khr_fp16:57,cl_khr_fp64:57,claim:[2,3],clang:[0,2,4,5,7,14,15,20,23,28,29,31,34,35,36,37,38,39,40,42,45,46,47,48,50,52,53,56],clang_check_last_cmd:24,clang_config_file_system_dir:57,clang_config_file_user_dir:57,clang_index:21,clang_plugin:21,clangast:41,clangastmatch:33,clangattremitt:25,clangbas:[33,38],clangcheck:[9,10,24,35,58],clangcheckimpl:24,clangformat:[8,34,58],clangseri:38,clangtool:42,classa:8,classb:8,classc:8,classd:8,classdesign:19,classic:57,classif:2,classifi:[1,2,25,57],classnam:0,classpath:6,classref:57,claus:[1,4,38,40,44,57],clazi:21,clcreateprogramwithbinari:57,cldemot:6,cldoc:21,clean:25,cleanli:1,cleanup:[1,2,19,25,52],cleanupandunlock:52,clear:[1,2,25,30,38,52],clearer:2,clearli:[2,25],clenqueuendrangekernel:6,cleverli:33,clflushopt:6,clgetkernelarginfo:57,cli:10,click:25,client:[7,17,18,20,21,25,41,43,57],client_nam:6,clk_event_t:44,clobber:[1,19,57],clock:30,clone:[10,24,25,33],close:[1,8,14,19,20,25,26,30,32,40,44],closedenum:1,closedflagenum:1,closer:15,closest:8,closur:30,cltoolex:57,cltoolpath:57,clue:16,clwb:6,clzero:6,cmake:[0,16,28,33,35,37,50,51,53,54,56,57],cmake_c_compil:57,cmake_cxx_compil:[33,57],cmake_exe_linker_flag:51,cmake_export_compile_command:[28,35],cmakecach:51,cmakelist:[33,42],cmd:[1,7,24],cmonster:21,cmovg:15,cmp:[15,23,46,49],cmpb:6,cmptr:30,coalesc:40,coars:57,coclass:19,cocoa:[2,30,39,41],code16gcc:57,code:[1,2,3,4,6,7,9,10,14,15,16,17,18,20,21,23,24,25,26,28,30,32,33,34,36,38,39,40,41,42,43,44,45,46,49,52,53,54,55,58],codebas:[8,44,57],codegen:57,codegenfunct:25,codeseg:19,codeset:19,codeview:[6,36,57],codifi:2,codingstandard:[8,34],coerc:39,coff:[1,41,51],coher:25,col:[5,26,39],cold:[1,6],coldcc:1,collabor:52,collaps:44,collect:[1,2,3,4,6,15,21,25,30,37,38,39,45,55,57],collectallcontext:25,collector:2,collid:[38,39],collingbourn:14,collis:[2,15,38],colon:[2,6,8,47,57],coloncolon:25,color:[6,7,25,30,39,57],column:[6,8,11,25,41,42,48,57],columnlimit:8,com:[0,1,8,21,24,29,31,33,34,37,46,53,57],combin:[1,3,8,10,11,12,15,16,25,29,31,32,35,42,43,45,50,51,54,56,57],combust:30,come:[1,8,11,16,17,25,38,57],comfort:2,comma:[1,2,6,8,11,19,39,57],command:[0,1,8,10,11,12,20,22,24,25,28,29,30,33,35,39,41,43,44,45,48,49,50,53,54,56,58],commandlin:[33,35],comment:[1,6,8,10,25,30,36,38,41,44],commentpragma:8,commit:[7,21,25],committe:[1,30,38],common:[1,2,6,8,10,11,14,15,16,18,25,26,30,33,37,38,39,41,42,43,44,52,54,57],commonhelp:[33,35],commonli:[8,30,39,41],commonoptionspars:[33,35],commun:[1,2,25],comp_ctor:3,comp_dtor:3,compact:[15,41,51,57],compactnamespac:8,compar:[1,6,15,20,23,25,30,33,39,51],comparison:[2,6,15,18,25,30,33,39,44,46],comparisonopt:30,compat:[1,2,6,8,14,15,23,25,29,30,38,41,44,54,55,57,58],compatibility_vers:6,compatibl:3,compel:2,compil:[1,2,3,4,5,9,10,13,14,15,17,18,19,21,23,24,25,26,29,30,31,33,35,36,37,39,40,41,42,45,46,47,48,49,51,52,53,55,56],compilationdatabas:[24,35],compile_command:[24,28,35],compile_flag:28,compilerinst:[9,42],compilerplugin:21,complain:38,complement:[6,10],complementari:15,compler:46,complet:[1,2,6,8,11,13,14,20,21,24,25,27,30,33,36,38,41,44,45,50,52,55,57,58],complex:[1,14,15,16,17,20,25,38,52,57],compli:[8,34,57],complianc:11,compliant:57,compliat:30,complic:[20,25,36,41,52],compon:[1,2,6,10,11,20,25,30,43,54,56,57],componentsseparatedbystr:39,compos:[1,57],composit:8,compound:[2,3,4,26,30,39,44],compound_statement_bodi:4,compoundstat:33,compoundstmt:[5,24,25,26],comprehens:50,compress:[6,15,41],compris:41,comput:[1,2,4,6,11,15,18,19,20,25,30,40,51,56,57],computea:57,computeb:57,con:55,concaten:[25,30],concept:[2,25,44],conceptu:[15,20,25],concern:[1,25,41,57],concis:[30,33,39,57],conclud:1,concret:[1,15,16,20,25,43,57],concurr:[1,2],cond:57,condit:[1,2,3,4,8,17,30,33,49,52],condition:[1,30],conditionvarnam:33,condvar:33,condvarnam:33,config:[6,7,8,38,57],config_macro:38,configur:[6,7,9,10,11,14,16,19,24,25,28,33,34,35,39,50,51,54],conflict:[2,30,39],conflict_a:38,conflict_b:38,conform:[1,6,8,14,17,18,19,36,57],confus:[0,2,20,25,38,57],conjug:19,conjunct:[20,52],connect:[3,20,21,25],conscious:2,consecut:[6,8,15,19,33,41,46],consequ:[1,2,16,30,38,39,54,56,57],conserv:[1,2,15,20,40,52],consid:[1,2,3,6,14,15,19,25,30,33,37,38,41,46,50,54,55,56,57],consist:[0,1,2,3,4,8,15,19,20,21,25,28,29,30,33,36,37,38,47,50,53,57],consol:57,const_cast:[10,19,30],constant:[2,6,15,18,23,26,38,39,41,43,46,57],constantin:21,constexpr:[1,57],constrain:[1,2],constraint:[1,2,19,52],construct:[1,2,3,4,6,15,19,20,25,30,36,39,40,41,43,44,57],constructana:30,constructor:[1,2,3,4,6,8,25,35,43,46,57],constructorinitializerallononelineoroneperlin:8,constructorinitializerindentwidth:8,consult:57,consum:[19,25,36,44,49],consumpt:[25,49],contact:44,contain:[0,1,2,3,4,6,7,8,9,10,11,14,15,16,17,18,20,23,25,28,30,33,38,40,41,43,44,46,47,50,52,54,56,57],content:[1,8,25,30,33,38,57],context:[1,7,8,19,33,38,41,42,43,57],contextu:33,contigu:2,continu:[0,1,2,3,4,8,14,15,25,30,33,36,39,52,56],continuationindentwidth:8,contract:[3,6,8,28,30],contradict:8,contrast:[2,49],contribut:[8,26,38,53],contributor:[8,21],contriv:30,control:[1,6,8,10,11,16,17,19,20,29,34,36,38,39,41,44,45,46,47,48,49,50,52,55,56,58],controlstat:8,convei:25,conveni:[1,2,4,19,24,30,33,38,42,57],convent:[2,3,6,8,15,28,30,36,38,45,57],converg:25,convers:[1,4,6,10,11,25,33,36,39,44,56,57],convert:[2,3,6,10,19,25,30,33,39,54,57],converttyp:25,converttypeformem:25,convfunc:1,convinc:2,convolut:2,cooki:[6,57],cooper:2,coordin:2,cope:[24,25],copi:[0,1,2,6,7,15,16,17,18,20,24,25,30,36,38,44,50,52,54,57],coprocessor:[1,6],copy_help:3,copyabl:[1,19],copysign:25,core:[1,2,16,21,25,33,34,38,41,51,52,55,57],corefound:[1,2,30],coro:30,coro_fram:30,corollari:29,coroutin:[6,19,38],coroutine_handl:30,correct:[1,2,14,15,16,17,25,27,29,30,39,45,47,57],correctli:[2,6,14,15,19,20,25,29,35,38,44,57],correspond:[1,2,4,8,12,15,18,19,20,25,30,32,38,41,43,44,46,52,57],corrupt:[0,1,2,15,57],cortex:[6,16],cost:[2,6,8,30,40,41,45,56,57],could:[0,1,2,3,8,10,11,15,16,18,19,23,25,30,37,38,41,43,45,46,49,51,56,57],count:[1,4,6,15,25,32,38,39,41,48,50,57],counter:[1,25,30,41,44,52,57],counteract:2,counterpart:57,coupl:[10,25,43],cours:[2,3,8,15,16,30],cout:[8,10],cov:[46,50,57],cover:[2,15,16,17,19,25,36,38,46,50,54,56,57],coverag:[6,57,58],coverage_dir:46,coverage_interfac:46,cpath:11,cpi:45,cplus_include_path:11,cplusplu:38,cplusplus11:38,cplusplus14:38,cplusplus17:38,cpp03:8,cpp11:8,cpp11bracedliststyl:8,cpp:[0,6,7,8,9,14,20,24,25,33,35,42,52,56,57],cppguid:34,cpu:[1,6,11,19,45],cpu_dispatch:19,crai:6,crash:[2,6,30],crbit:6,crc:[6,57],creat:[1,2,3,4,6,7,8,14,16,18,19,20,24,25,28,30,36,37,39,41,45,46,47,53,54,55,57],create_gcov:57,create_llvm_prof:57,createactionrul:43,createastconsum:42,createastdeclnodelist:24,createastdump:24,createastprint:24,createinsert:25,createrefactoringactionrul:43,createremov:25,createreplac:25,createsourcereplac:43,createstackrestorepoint:45,creation:[1,25,30,39,41,43,56,57],creator:32,crisp:21,criteria:[1,33],critic:[2,15,30,46],cross:[6,11,14,21,25,43,51,57,58],crt:1,crucial:38,crude:38,crypto:6,cstdio:38,ctag:21,ctor:6,ctrl:[7,19],ctype:38,cuda:[1,6,11,16,19,25,44],culprit:33,curiou:33,curli:[2,25],current:[1,2,3,6,7,8,10,11,14,15,18,19,20,21,23,24,25,28,29,30,33,34,36,39,40,41,45,46,47,48,49,50,54],current_vers:6,currentlocal:30,curs:24,cursor:[7,43,55],cursorvisitor:25,custom:[2,6,7,8,17,25,30,33,35,38,44,47,50,57],custom_error:57,customev:6,cut:26,cwd:[6,11],cwindow:24,cx16:6,cxa:6,cxcompilationdatabas:28,cxx11:[25,27],cxx:[6,24,52],cxx_:30,cxx_access_control_sfina:30,cxx_aggregate_nsdmi:30,cxx_alias_templ:30,cxx_aligna:30,cxx_alignof:30,cxx_attribut:30,cxx_auto_typ:30,cxx_binary_liter:30,cxx_constexpr:30,cxx_constexpr_string_builtin:30,cxx_contextual_convers:30,cxx_decltyp:30,cxx_decltype_auto:30,cxx_decltype_incomplete_return_typ:30,cxx_default_function_template_arg:30,cxx_defaulted_funct:30,cxx_delegating_constructor:30,cxx_deleted_funct:30,cxx_except:30,cxx_explicit_convers:30,cxx_generalized_initi:30,cxx_generic_lambda:30,cxx_implicit_mov:30,cxx_inheriting_constructor:30,cxx_init_captur:30,cxx_inline_namespac:30,cxx_lambda:30,cxx_local_type_template_arg:30,cxx_noexcept:30,cxx_nonstatic_member_init:30,cxx_nullptr:30,cxx_override_control:30,cxx_range_for:30,cxx_raw_string_liter:30,cxx_reference_qualified_funct:30,cxx_relaxed_constexpr:30,cxx_return_type_deduct:30,cxx_rtti:30,cxx_runtime_arrai:30,cxx_rvalue_refer:30,cxx_static_assert:30,cxx_strong_enum:30,cxx_thread_loc:30,cxx_trailing_return:30,cxx_unicode_liter:30,cxx_unrestricted_union:30,cxx_user_liter:30,cxx_variable_templ:30,cxx_variadic_templ:30,cxxbasespecifi:26,cxxconstructornam:25,cxxconversionfunctionnam:25,cxxdestructornam:25,cxxliteraloperatornam:25,cxxmap:57,cxxoperatornam:25,cxxrecorddecl:42,cxxusingdirect:25,cycl:[2,30,57],cycles_to_do_someth:30,cygm:57,d1pp:57,d1reportallclasslayout:57,d__stdc_constant_macro:[9,35],d__stdc_format_macro:9,d__stdc_limit_macro:[9,35],d_debug:9,d_gnu_sourc:9,dag:41,dai:38,daili:25,damag:3,danger:2,dangl:[4,19],danieljasp:5,darwin9:[20,41],darwin:[11,16,20,38,49,56],dash:[30,33],data:[1,2,3,4,6,15,17,18,19,20,21,25,33,36,39,41,44,52,53,56,57],databas:[5,6,21,24,33,35,58],dataflow:57,dataflowsanit:[57,58],dataload:8,datatyp:1,date:[30,39,41,44],dawn:45,dc2:15,dc5:15,dcc:15,dcf:15,dcmake_ar:51,dcmake_c_compil:[24,51,57],dcmake_cxx_compil:[24,51,57],dcmake_export_compile_command:[24,35],dcmake_link:51,dcmake_ranlib:51,dd2:15,dd6:15,dda:15,ddc:15,dddddddddd:8,ddddddddddddd:8,de1:15,de4:15,de6:15,de9:15,dead:[6,57],dead_strip:6,deadlock:52,deal:[0,2,3,12,20,25,32,33],dealloc:[1,6,19,30,57],debug:[1,11,13,19,20,24,25,36,37,38,40,41,42,44,46,56],debug_rang:6,debugg:[1,11,25,36],debuginfo:50,decent:25,decid:[1,17,18,20,23,25,30,33,57],decim:[25,57],decis:[1,6,8,25,30,34,51,57],decl:[6,25,26,33,38,41,42],declar:[3,5,6,8,9,11,18,21,24,26,29,32,33,35,39,40,42,43,44,45,49,50,52,56,57],declarationnam:25,declarationnamet:25,declcontext:[25,26,41],declnod:25,declrefexpr:[26,33],decls_begin:25,decls_end:25,declspec:[6,25,57],declstmt:[5,26,33],decltyp:[2,19],declus:[6,38],decompos:20,decor:30,decreas:[2,15],decrement:[2,19,52],dedic:[15,41,45,50],deduc:[2,10,19,30],deduct:[2,19,44],dedupl:56,deem:[2,44,54,57],deepli:57,def:[0,25,37],default_:57,default_xxxx:57,defaultlvalueconvers:25,defect:19,defens:[1,38],defer:[36,57],defin:[0,1,2,4,6,8,11,14,15,16,17,18,20,29,32,33,37,38,39,40,41,43,44,46,49,50,52,53,54,56,57],defined_in:1,definit:[1,2,4,6,8,11,14,20,25,29,30,32,33,38,39,41,50,52,54,57],definitionreturntypebreakingstyl:8,degrad:19,deiniti:[2,30],delai:[2,6,36,38,52,57],deleg:[2,8,19,20],delet:[0,2,3,6,8,43],deleteselect:43,deleteselectedrang:43,deliber:[21,52,56],delimit:[2,8,11,25],delta:57,demand:[25,57],demangl:[46,50],demonstr:[9,17,35,39,52],demot:56,denomin:16,denorm:[6,57],denot:[8,25,39,47],dens:25,densemap:25,denseset:25,dep:6,depend:[0,1,2,8,11,15,16,19,20,25,28,30,32,35,36,37,38,39,41,45,49,50,53,54,55,57],depfil:6,deploi:[1,14,52],deploy:[1,6,11,14,23,30,38],depositimpl:52,deprec:[0,6,8,25,38,45,52,56,57],depth:[2,6,30,57],derefer:[1,4,46],dereferenc:[4,19,25],deriv:[1,2,4,6,14,18,25,26,27,29,38,43,57],derived1:1,derivepointeralign:8,desc:18,descent:25,describ:[1,2,3,4,6,7,8,10,13,15,20,25,27,28,29,30,33,34,38,39,41,43,44,45,46,47,52,54,57],descript:[8,9,13,18,25,30,33,35,43,57],descriptor:[3,6],deseri:41,deserv:25,design:[0,1,2,6,10,11,21,25,39,43,49,51,52,54,57],desir:[1,7,8,14,16,20,25,33,45,56,57],despit:[1,4,19],dest:[1,3,17],dest_label:17,destaddr:3,destin:[2,3,17,19,56,57],destroi:[1,2,3,4,6,19,30,52,57],destruct:[2,25],destructor:[1,2,3,4,6,14,25,30,37],detail:[0,1,10,11,12,14,15,20,23,25,27,30,33,37,39,41,44,45,47,50,52,54,55,57],detect:[1,2,6,8,10,11,14,15,17,18,23,24,25,28,30,31,38,44,45,52,53,54,56,57],detect_leak:[0,31],detect_stack_use_after_return:0,detector:[0,31,37,56,57],determin:[1,6,7,8,11,20,25,27,29,30,33,41,43,50,52,56,57],dev:[2,25,57],develop:[1,2,8,10,14,16,17,19,21,22,26,30,38,43,51,52,55,57],deviat:15,devic:[1,6,19,44,57],devirtu:[6,29,38,57],dfs:18,dfsan:18,dfsan_add_label:18,dfsan_create_label:[17,18],dfsan_get_label:[17,18],dfsan_get_label_info:18,dfsan_has_label:[17,18],dfsan_has_label_with_desc:18,dfsan_interfac:[17,18],dfsan_label:[17,18],dfsan_label_info:18,dfsan_set_label:[17,18],dfsw:18,diag1:1,diag2:1,diag:25,diagdata:15,diaggroup:25,diagnos:[1,25,30,36,38,44],diagnose_if:19,diagnost:[1,2,10,13,15,30,38,41,54,58],diagnosticgroup:25,diagnostickind:25,diagnosticsemakind:25,diagnosticsengin:21,diagram:20,diagtool:13,dialect:[1,2,38,41,57],dict:8,dictat:[1,52],dictionari:[19,30],dictionarywithobject:39,dictionarywithobjectsandkei:39,did:[2,3,19,25,44],didn:37,die:25,dif:57,diff:[7,25,30],differ:[0,1,2,3,6,7,8,9,10,11,12,14,15,16,19,20,23,24,25,26,28,30,32,33,34,35,36,37,38,39,41,42,43,45,46,47,49,50,52,53,54,55],differenti:30,difficult:[2,33,37,52,57],dig:25,digit:[19,25],digraph:[6,19,57],dimens:[1,36],dimitar:15,dir:[6,11,38,44,51,57],direct:[1,2,6,8,11,18,20,25,30,31,39,41,44,48,57],directli:[1,2,8,9,10,11,18,19,20,21,22,25,26,30,38,39,41,44,50,51,52,54,56,57],directori:[6,7,8,9,11,16,22,24,28,30,33,35,44,47,50,51,57],dirnam:[35,57],disabl:[1,2,6,11,14,23,25,37,38,43,44,46,47,50,51,52,53],disableexpand:25,disableformat:8,disadvantag:2,disagre:25,disallow:[1,2,6,30,57],disambigu:[19,39],disappear:46,discard:[1,6,8,17,18,30,50,57],discourag:[2,19,52],discov:[33,38,49],discover:8,discrimin:[27,57],discuss:[2,3,21,23,25,34,38,41,52,57],disjoint:[15,41,45],disk:[19,41,46,50,51,57],dislik:23,dispatch:[1,6,15,19],displai:[1,6,7,10,11,25,33,35,50],dispos:[3,4],dispose_help:3,disproportion:57,distanc:[1,15],distinct:[2,4,15,20,25,36,38,43,45,50,51],distinguish:[1,2,3,25,28,38,57],distribut:[3,11,16,19,36,38,40,44,57],div:46,divid:[6,8,20,56,57],divis:[6,19,46,56,57],dlclose:15,dlibcxx_use_compiler_rt:54,dlibcxxabi_use_compiler_rt:54,dlibcxxabi_use_llvm_unwind:54,dll:57,dllexport:[19,29,30,36,44,57],dllexportinlin:44,dllimport:[29,44,57],dllvm_binutils_incdir:51,dllvm_build_instrumented_coverag:50,dllvm_build_test:33,dllvm_enable_lto:51,dllvm_profile_data_dir:50,dllvm_profile_merge_pool_s:50,dlopen:15,do_someth:[8,30],do_something_completely_differ:8,do_something_els:[8,30],do_somthing_completely_differ:8,doacross:40,doc:[1,5,8,23,25,34,44,47],doccatconsum:25,doccatfunct:25,doccatstmt:25,doccattyp:25,doccatvari:25,document:[0,1,3,6,9,10,13,14,16,17,19,20,21,24,26,28,30,32,33,34,35,37,38,39,41,43,44,47,50,52,54,55,57],doe:[0,1,2,3,4,7,8,11,14,15,16,17,19,20,23,25,26,27,28,30,33,35,36,38,39,41,44,47,49,50,51,52,53,54,56,57],doesn:[1,2,8,16,19,20,24,25,27,30,33,38,52,56,57],dogfood:10,doing:[2,11,23,24,25,30,38],dollar:6,domain:32,domin:[18,54,57],don:[0,1,2,6,8,10,11,15,16,20,25,30,33,36,37,38,43,44,46,55,57],done:[1,2,8,15,16,17,20,21,23,25,30,33,45,50,57],dont_initialize_m:44,dontalign:8,dosomeio:52,dosometh:52,dosomethingtwic:52,dot:[6,38,57],doubl:[0,1,2,6,8,19,30,39,52,57],double__builtin_canonicalizel:30,doubt:55,down:[1,2,14,16,20,25,30,32,33,37,44],downcast:56,downgrad:57,download:[7,16,33,44],downsid:[9,20],doxygen:[19,26,57],dozen:[8,57],dr1170:30,draft:[11,30,57],dragonfli:57,drain:2,dramat:50,drastic:[2,38,41],drill:42,drive:10,driven:[20,28,41,57],driver:[6,36,54,57,58],dromaeo:14,drop:[2,4,19,20,56],drothli:21,drtbs_all:8,drtbs_none:8,drtbs_toplevel:8,dsl:[21,32,33],dso:[6,14,29,45,46,57],dsomedef:28,dsopath:6,dsp:[6,57],dspr2:6,dst:3,dst_vec_typ:30,dsymutil:0,dtor:[6,37,57],dual:52,dubiou:25,due:[1,2,4,14,19,23,28,30,38,41,44,49,53],duff:44,dummi:46,dump:[5,7,8,20,22,24,25,26,32,33,42,46,48,57],dumpmachin:6,dumpvers:6,duplic:[1,19,25,41,44,46],durat:[1,30],dure:[1,2,6,9,10,11,14,16,18,19,20,21,25,30,34,37,39,41,42,43,44,46,51,52,56,57],dwarf:[6,57],dwarfstd:57,dwo:6,dwp:6,dxr:21,dyld:6,dyld_insert_librari:0,dylib:[1,11],dylib_fil:6,dylink:6,dylinker_install_nam:6,dyn_cast:25,dynam:[0,1,2,4,6,9,11,14,15,17,18,23,32,39,45,46,54,55,56,57],dynamic_cast:19,dynamiclib:6,e0b:15,eabi:[6,16],each:[1,2,3,4,6,8,10,11,12,14,15,16,17,18,19,20,24,25,26,28,29,30,33,35,38,39,41,43,48,50,53,54,56,57],earli:[18,57],earlier:[0,11,19,30,41,51,54,57],earliest:2,eas:[20,57],easi:[2,7,8,10,16,25,33,36,43,55,57],easier:[2,16,37,38],easiest:57,easili:[18,20,21,25,30,38,52,57],eat:25,eax:[1,15,30,49],ebx:15,ecc:6,echo:[24,33,57],ecx:[1,15],edg:[25,45,50,57],edit:[7,24,41],editor:[6,7,10,34,43],edx:[1,15],effect:[1,2,4,6,8,15,16,19,23,25,29,30,38,50,57],effici:[1,2,11,14,15,18,20,23,25,30,38,51,57],effort:[1,2,7,25,56,57],eic:1,either:[0,1,2,3,4,6,8,11,14,15,16,20,24,25,26,28,29,30,32,38,41,43,45,46,49,51,52,54,56,57],elabor:4,elect:2,elem:18,element:[1,2,3,8,15,19,30,39,44],elf:[1,6,16,41,46,51,57],elid:[2,6,30,57],elif:30,elig:33,elimin:[0,1,2,6,20,25,30,37,38,41],elis:[19,57],ellipsi:1,els:[1,2,8,15,18,24,25,30,39,45,52,57],elseif:24,elsewher:[2,57],email:21,emb:[3,6],embed:[3,6,15,19,20,25,38,56,57],emiss:[1,2,6,30,44,57],emit:[1,2,3,6,11,14,15,19,20,21,25,27,30,36,38,39,41,46,50,51,54,56],empir:27,emploi:57,empti:[1,4,8,11,25,29,30,38,39,44,47,57],emul:[6,23,30,57],emutl:6,enabl:[0,1,2,4,6,7,11,14,15,19,25,26,30,33,37,38,39,41,43,44,45,47,49,51,52,53,56],enable_if:19,enas_dontalign:8,enas_left:8,enas_right:8,encapsul:[2,52],enclos:[1,2,3,4,8,19,25,38,52,57],enclosingfunct:8,encod:[6,15,25,26,27,30,39,41,57],encompass:[2,11,38],encount:[2,19,38,41,57],encourag:[2,57],encrypt:45,end:[1,2,4,5,6,7,8,10,15,16,18,20,25,28,30,31,32,33,35,41,44,45,46,52,54,56,57],endbr:1,endbranch:15,endfunct:[7,24],endian:[6,15,19],endif:[0,1,2,8,24,30,37,38,39,45,49,52,53,57],endl:10,enforc:[1,2,6,14,15,45,49,52,57],eng:46,engag:2,engin:[26,52,58],english:25,enhanc:[15,53],enjoi:10,enough:[1,2,16,19,20,25,33,46,52,56,57],enqueu:[44,57],enqueue_kernel:57,ensu:1,ensur:[1,2,14,15,18,21,25,30,33,38,39,40,41,45,52,54,57],enter:[2,19,25],entir:[1,2,10,15,20,25,29,30,38,41,44,46,49,57],entiti:[0,1,7,14,25,29,33,37,38,41,47,53,56],entranc:25,entrant:52,entri:[1,2,6,15,18,19,33,38,41,42,46,47,52,57],entrypoint:2,enum1:30,enum2:30,enum_const:30,enumer:[1,8,19,25,39,41,56],enumerator_attribut:30,env:[6,57],environ:[0,1,2,3,4,6,19,20,23,28,37,38,46,48,50,52,55,56,57],eod:25,eof:[1,5,25,50],epc:1,ephemer:2,epilog:49,epilogu:[1,23],epoch:6,equal:[1,2,15,18,25,30,33,36,40,44,47,56,57],equival:[1,2,4,6,11,14,15,19,25,30,38,39,57],eras:52,erasur:57,erlingsson:14,err_:25,err_attribute_wrong_decl_typ:25,err_typecheck_invalid_operand:25,erratum:6,errno:[6,11,38],erron:19,error:[1,2,3,4,5,6,11,14,15,16,19,20,21,24,25,30,31,35,36,37,38,39,41,43,44,45,47,51,52,53,54,55],errorcode_t:30,escap:[1,2,4,6,8,25,28,52,54,57],escapednewlinealignmentstyl:8,escapingfunc:1,eschult:21,esp:30,especi:[2,25,38,52,53,57],essenti:[1,2,25],establish:[2,4,8,41],estim:1,etaoin:21,etc:[1,2,3,8,10,16,20,21,25,30,38,41,44,46,52,57],etw:36,evalu:[1,2,3,4,25,30,39,41,43,56,57],evaluat:25,even:[1,2,3,6,8,15,16,19,21,25,30,36,37,38,43,45,49,50,57],evenli:15,event:[2,3,25],eventu:[6,17,25,30,38],ever:[1,2,20,25,35,38,43,45],everi:[1,2,6,8,11,15,16,17,18,19,23,25,29,30,33,36,38,41,46,51,52,54,56,57],everyth:[2,15,25,26,38,42,45,52],everywher:[6,38],exact:[0,1,2,25,28,45,52,57],exactli:[1,2,3,4,8,10,15,20,25,30,33,38,46,57],examin:[32,33,41],exampl:[1,2,3,4,9,10,11,14,15,16,18,20,22,24,25,26,27,28,30,32,33,35,36,37,38,41,42,43,44,45,46,48,50,51,52,53,55,57,58],example_categori:47,example_pragma:9,example_useafterfre:0,examplefunc:47,examplepragmahandl:9,exce:19,excel:38,except:[1,4,6,8,11,14,15,17,20,23,25,36,39,42,44,50,54,57],excess:[38,57],exclipi:21,exclud:[1,2,6,30,38,44,57],exclude_cap:52,exclus:[1,3,4,19,23,52],exclusive_lock_funct:[1,52],exclusive_locks_requir:52,exclusive_trylock_funct:52,exe:[36,51,53,54,57],exec:[0,1,11,57],execut:[0,1,2,3,4,6,11,14,18,19,20,25,28,29,30,31,32,33,37,38,42,44,45,46,48,49,50,52,53,54,56,57],exercis:[30,57],exhaust:[2,38],exhibit:38,exist:[1,2,3,4,8,11,14,24,25,28,30,33,38,39,41,50,52,54,57],existingblock:3,exit:[0,1,2,6,7,18,19,20,37,46,48,50,52,56,57],expand:[1,2,24,25,30,33,39,44,50,54,57],expans:[11,25,28,50,54,57],expect:[0,1,2,4,5,8,14,15,16,19,20,23,25,30,32,36,37,38,43,53,56,57],expect_tru:35,expens:[1,30,38,40,41,44],experi:27,experienc:38,experiment:[0,1,6,8,14,15,30,37,44,46,49,52,57],experimentalautodetectbinpack:8,expir:51,explain:[1,25,32,33,39,50,57],explan:[33,57],explanatori:25,explicit:[1,4,6,10,15,27,35,38,39,42,44,57],explicitli:[1,2,6,18,19,25,30,33,38,41,44,52,54,57],explod:30,exploit:[2,49],explor:57,expon:56,export_a:38,exported_symbols_list:6,expos:[2,30,34,38,49,52,57],expr:[25,26,33,57],exprconst:25,exprerror:25,express:[1,3,6,8,11,26,29,33,38,44,47,52,57],exprresult:25,ext:[6,57],ext_:25,ext_vector_typ:30,extdir:6,extend:[2,4,6,7,8,15,17,18,25,33,36,38,40,44,47],extens:[1,6,7,8,10,11,14,15,16,18,24,36,38,41,44,49,52,58],extent:[2,17,23,57],extern:[1,3,6,8,11,14,15,25,38,41,46,50,52,53,54,57,58],extern_c:38,externalastsourc:41,externalsemasourc:41,externalslocentrysourc:41,extra:[2,6,8,9,11,15,18,20,23,25,30,31,33,38,44,45,46,57],extract:[16,18,23,30,32,33,41,42],extrahelp:[33,35],extran:19,extrem:[2,16,25,30,38,57],extwarn:25,f16:30,f16c:6,f2c:6,f95:54,fabi:16,faccess:6,face:[2,25,30],facil:[1,20,25,30,38],facilit:[2,6,21,30],fact:[1,2,4,15,25,57],factor:[1,25,30,37],factorymethodpool:41,faddrsig:[6,57],faggress:6,fail:[1,2,4,6,14,15,16,20,25,30,35,36,37,38,39,43,51,52,57],failur:[1,14,15,19,25,38,52,57],fair:2,fairli:[25,33,38],faithfulli:2,fake:[52,57],falign:6,fall:[1,2,6,19,29,30,38,41,57],fallback:[1,7,8,30],fallow:6,fallthrough:[2,30],fals:[0,1,6,8,19,25,30,33,37,39,42,52,53,56,57],falseconst:1,falsenumb:39,faltivec:6,familar:26,famili:[1,11,25,30,38,54,57],familiar:[2,16,20,30],fancynewmethod:30,fansi:[6,57],fappl:6,fapplic:6,faq:[57,58],far:[2,8,25,30,33,38],fasm:6,fassoci:6,fassum:6,fast:[0,1,6,10,20,25,30,41,51,56,57],fastcp:6,faster:[0,11,24,37,41,57],fastest:11,fastf:6,fasynchron:6,fatal:[19,22,25,57],fatbinari:6,fault:45,fauto:6,fautolink:6,fautomat:6,favor:19,favorit:26,favoritecolor:39,fbackslash:6,fbacktrac:6,fbla:6,fblock:[6,11,57],fbootclasspath:6,fborland:[6,11],fbound:6,fbracket:[6,57],fbuild:6,fbuiltin:[6,38],fcall:6,fcaret:[6,11,57],fcf:[6,19,57],fchar8_t:6,fcheck:6,fclang:[6,44],fclasspath:6,fcntl:1,fcoarrai:6,fcolor:[6,57],fcomment:[6,57],fcommon:[6,11],fcompil:6,fcomplet:[6,14,57],fconstant:6,fconstexpr:[6,57],fconvert:6,fcoroutin:6,fcoverag:[6,50,57],fcrai:6,fcrash:6,fcreat:6,fct:8,fcuda:6,fcxx:6,fdata:6,fdebug:[6,57],fdeclspec:[1,6],fdefault:6,fdelai:[6,36,57],fdelet:6,fdenorm:[6,57],fdepfil:6,fdiagnost:[6,11,57],fdigraph:6,fdiscard:[6,57],fdollar:6,fdoubl:6,fdump:6,fdwarf:6,feasibl:[2,38],featur:[1,2,6,8,10,11,23,25,29,37,38,39,50,51,52,55,56],feature_nam:30,feed:57,feel:[21,33,44],felid:6,felimin:6,felt:2,femb:6,femit:6,femul:[6,57],fenc:1,fencod:6,fentri:6,fenv:38,fenv_access:19,ferror:[6,57],fescap:6,fetch:1,fetch_or_zero:1,few:[1,8,10,15,20,25,33,36,38,41,50,57],fewer:[1,15,49],fexcept:[6,11],fexec:6,fexperiment:[6,19,57],fextdir:6,fextern:6,ff2c:6,ffake:57,ffast:[6,19,57],ffine:[6,19],ffinit:6,ffix:[6,49],ffor:6,fforc:[6,57],ffp:[6,30],ffpe:6,ffree:6,ffreestand:[6,11],ffrontend:6,ffunction:6,fgnu89:[1,6],fgnu:6,fgpu:6,fheinou:6,fhonor:6,fhost:6,fidel:2,fident:6,field:[1,3,6,8,14,15,25,28,30,41,57],fielddecl:25,figur:[16,24,25,28,32,33,35,56],file1:51,file2:51,file:[0,1,2,3,7,8,9,10,11,14,15,16,17,18,20,21,22,24,28,29,33,35,36,37,42,43,44,45,46,47,48,50,51,52,53,54,55,56],filecheck:25,filelist:6,filemanag:25,filenam:[6,7,8,11,12,20,24,25,38,44,50,57],filesystem:[6,44],fileurl:39,fill:[2,8,25,30,33,52,57],filt:0,filter:[2,6,7,24,25,33,44,57],fimplicit:[6,38,57],finclud:57,find:[0,1,2,6,7,8,10,11,14,15,16,19,23,24,25,32,33,35,36,37,38,41,42,43,44,45,50,54,57],findclassdecl:42,finder:33,findirect:6,findnamedclassact:42,findnamedclassconsum:42,findnamedclassvisitor:42,findsymboloccurr:43,findsymboloccurrencesrefactoringrul:43,fine:[2,6,25,30,56,57],finish:[19,20,32,36,57],finit:6,finlin:6,finput:6,finstrument:6,finteg:6,fintegr:6,fintrins:6,fiq:1,fire:48,firefox:0,first:[0,1,2,3,4,7,8,9,14,15,19,20,24,25,26,30,33,36,37,38,39,41,43,44,46,48,49,52,56,57],first_param:[1,2],firstid:33,firstli:43,firstvalu:8,fission:6,fit:[1,3,8,15,19,25,26,28,36,52,57],five:[2,20,25],fix:[0,1,2,6,8,10,15,16,21,33,36,38,39,41,44,49,52,53,55,57],fixit:[6,10,11,21,25,55,57],fixithint:25,fixm:[34,57],fixnamespacecom:8,fjump:6,fkeep:6,flag:[0,1,2,3,8,10,11,12,14,15,16,20,21,23,25,26,28,29,31,36,37,38,40,41,45,46,47,48,49,50,53,54,56,58],flat:[1,25,57],flat_namespac:6,flavor:57,flavour:15,flax:[6,11],flexibl:[16,25,32,39,57],flimit:6,float128:6,float2:30,float4:30,flow:[1,2,6,8,17,18,29,30,45,47,48,49,50,56,57,58],flto:[6,11,14,29,48,51,57],flush:[6,30,57],fly:[25,57],fma4:6,fma:[6,30],fmacro:6,fmath:[6,11],fmax:[6,57],fmerg:[6,57],fmessag:[6,11],fmodul:[6,19,30,38,57],fms:[1,6,11,36,57],fmsc:[6,11,57],fmudflap:6,fmudflapth:6,fn10:57,fn11:57,fn12:57,fn1:57,fn2:57,fn3:57,fn4:57,fn5:57,fn6:57,fn7:57,fn8:57,fn9:57,fna:57,fnaddr:30,fnb:57,fnest:6,fnew:6,fnext:6,fno:[0,1,2,6,11,14,20,30,37,38,54,56,57],fnoxrai:6,fns:9,fobjc:[1,2,6,11,30,57],focu:[10,25,57],focus:[2,10,57],fold:57,foldabl:25,foldingsetnodeid:33,follow:[0,1,2,3,4,6,7,8,10,12,13,15,17,18,19,20,23,25,27,29,30,33,36,37,38,39,40,41,42,43,44,46,47,48,49,50,51,52,53,54,56,57],fomit:[6,20],foo1:[1,8,50],foo2:[1,50],foo3:[1,50],foo:[1,2,3,4,8,10,15,20,23,25,27,30,32,36,38,46,47,49,50,52,57],foo_ctor:3,foo_dtor:3,foo_priv:38,fooarg:2,foobar:[8,30,57],foobodi:25,foocfg:25,fool:8,fooneg:52,foopriv:38,fooptr:[1,4],fooref:4,fopenmp:[6,40,57],fopenmp_optimistic_collaps:44,foper:[6,57],foptim:[6,57],forbid:[2,14,19,39],forbidden:[14,19],forc:[0,1,2,4,6,8,19,20,22,23,25,38,51,57],force_cpusubtype_al:6,force_cuda_host_devic:19,force_flat_namespac:6,force_load:6,forcibl:23,forcontinuationandindent:8,foreach:8,foreachmacro:8,forget:[2,16,19],forindent:8,forkei:39,forkeyedsubscript:39,forloop:33,form:[0,1,2,3,4,6,7,8,10,11,14,15,18,25,26,30,33,38,39,40,41,42,43,44,51,53,57],formal:[1,2,30,52],format:[0,6,7,11,16,30,32,34,38,41,44,55,58],formatdiff:7,formatonsav:7,formatstyl:[8,34],formatt:25,formatted_cod:8,formatted_code_again:8,former:[17,25,38],formerli:30,forstmt:[33,41],fortran:54,fortun:36,fortytwo:39,fortytwolong:39,fortytwolonglong:39,fortytwounsign:39,forward:[1,3,6,11,20,30,41,45,50,57],found:[1,2,3,4,7,8,15,18,20,22,24,25,30,33,34,38,41,42,52,57],foundat:[1,2,4],four:[1,2,12,15,20,25,30,48,50],fourth:48,foutput:6,fp32:6,fp_contract:[6,30],fpack:6,fpars:[6,57],fpascal:[6,11],fpcc:6,fpch:6,fpic:[6,19,53],fpie:[6,53],fplt:6,fplugin:[6,9],fpp:54,fprebuilt:[6,38],fpreserv:6,fprint:11,fprnd:6,fprofil:[6,44,50,57],fprotect:6,fptoint:6,fpu:1,fraction:41,fragil:[2,11,30,38],fragment1:57,fragment2:57,fragment:[25,57],fragmentkind:57,frame:[0,2,4,6,11,19,20,23,36,37,39,45,47,53,56,57],framework:[1,2,6,10,11,17,18,38,39],frang:6,freal:6,frealloc:6,freciproc:6,frecord:6,frecurs:6,free:[0,1,2,3,6,19,21,23,30,32,38,39,44,49],freebsd:[0,1,37,38,45,53,56,57],freed:[0,2],freeli:2,freestand:[6,11,19,38],freg:6,fregist:6,frelax:6,frepack:6,frequenc:1,frequent:[1,2,15,36,39,45,57,58],frerol:6,fresh:[25,38],freshli:42,fretain:6,frewrit:6,frexp:30,friend:57,friendli:50,from:[0,1,4,5,6,7,8,9,10,11,14,16,17,18,20,21,23,24,25,26,27,29,30,31,32,33,35,37,38,39,41,42,43,44,45,46,47,49,50,51,52,54,55,56,57],from_promis:30,fromtyp:30,fromvalu:39,front:[1,8,25,41,57],frontend:[6,22,26,33,35,41,42,44,57],frontendact:[9,33,35],frontendactionfactori:35,frontendpluginregistri:9,fropi:6,frtlib:6,frtti:6,frwpi:6,fsanit:[0,6,15,19,23,29,31,37,44,45,46,47,48,49,53,54,56,57],fsave:[6,57],fsecond:6,fseh:6,fsgsbase:6,fshort:6,fshow:[6,11,57],fsign:6,fsignal:6,fsize:6,fsjlj:6,fslp:6,fspell:6,fsplit:[1,6,57],fstack:[1,6,49],fstandalon:[6,11,57],fstrict:[6,57],fstruct:6,fsyntax:[6,9,11,20,26],ftabstop:6,ftemplat:[6,57],ftermin:6,ftest:[6,50],fthinlto:6,fthreadsaf:6,ftime:[6,11],ftl:[6,11,57],ftrap:[6,57],ftrapv:[6,11,56],ftree:6,ftrigraph:6,ftrivial:[1,6,44],fuchsia:49,fulfil:33,full:[0,1,2,3,6,9,11,14,15,19,25,26,28,30,37,38,41,42,50,52,55,56,57],fulli:[0,1,2,11,15,20,25,30,36,37,40,44,51,57],fullloc:42,fullsourceloc:42,fun:[0,14,17,37,47,53,56],func:[1,6,25,27,46,57],function1:[8,57],function2:8,function3:8,function_doing_unaligned_access:56,functioncal:3,functiondecl:[5,25,26,41],functiongroup:19,functionpoint:4,functionprototyp:41,functiontyp:30,fundament:[8,10,19,25],funderscor:6,funiqu:6,funit:6,funrol:6,funsaf:6,funsign:6,funwind:6,furnish:3,further:[1,2,3,11,17,18,25,30,32,33,35,41,52,57],furthermor:[1,2,10,33,45],fuse:[2,6,30,48,54],fusion:30,fusiong:30,futur:[1,11,19,20,25,34,39,45,46,52,53,57],fuzz:[36,46,56],fuzzer:36,fveclib:6,fvector:6,fverbos:6,fvisibl:[6,11,14,29,44,48,57],fwhole:[6,29,57],fwrapv:6,fwritabl:[6,11],fxrai:6,fxsr:6,fzero:6,fzvector:6,gain:[1,30],gamma:[25,57],gap:15,garbag:[2,3,4,30,45],gather:[6,43,48,57],gcc5:27,gcc:[1,3,4,6,14,16,24,25,27,30,38,44,50,54],gcc_version:57,gcda:57,gch:57,gcno:57,gcodeview:[6,57],gcolumn:6,gcov:[44,50],gdb:[25,57],gdwarf:6,gemb:6,gen:[25,57],gener:[0,3,5,7,8,13,17,18,19,20,21,22,23,24,25,26,28,32,33,36,38,39,41,42,44,46,47,49,50,52,54],generalis:17,generated_declar:1,gentl:26,geoff:14,georg:45,gep:46,gerrit:21,get:[0,1,3,8,10,11,13,16,20,21,25,27,31,32,33,35,36,37,38,41,46,50,53,56,57],get_enqueued_local_s:57,get_local_s:57,get_max_sub_group_s:1,get_ptr:44,getactiontyp:9,getasidentifierinfo:25,getaspointertyp:25,getastcontext:42,getattr:25,getbegin:43,getbeginloc:42,getblockid:25,getc:38,getcanonicaldecl:33,getcharrang:43,getcommand:43,getcompil:[33,35],getcxxconstructornam:25,getcxxconversionfunctionnam:25,getcxxdestructornam:25,getcxxliteralidentifi:25,getcxxnametyp:25,getcxxoperatornam:25,getcxxoverloadedoper:25,getdeclcontext:25,getderiv:25,getdescript:43,getelem:52,getelemementptr:46,getentri:25,getenv:39,getexit:25,getforloc:33,getfullloc:42,getgooglestyl:34,getlexicaldeclcontext:25,getllvmstyl:34,getlocforendoftoken:25,getmu:52,getnam:43,getnamekind:25,getnodea:33,getobjcselector:25,getprimarycontext:25,getqualifiednameasstr:42,getsema:25,getsourc:43,getsourcemanag:33,getsourcepathlist:[33,35],getsourcerang:25,getspellingcolumnnumb:42,getspellinglinenumb:42,getter:[2,3,6,30,52],gettranslationunitdecl:[26,42],gettyp:25,gettypenam:25,gfni:6,gfortran:6,gfull:[6,20],gfx900:57,ggdb0:6,ggdb1:6,ggdb2:6,ggdb3:6,ggdb:[6,57],ggnu:6,ghash:[6,57],ginv:6,git:[7,10,21,24,33],github:[0,21,24,31,33,37,46,53,57],gitweb:21,give:[1,2,6,10,19,20,25,26,30,33,35,40,55,57],given:[0,1,2,4,6,7,8,12,15,16,18,19,20,22,25,30,35,38,41,43,46,52,54,56,57],glibc:[1,17,25,45,57],gline:[6,11,57],glldb:[6,57],global:[0,2,3,4,6,7,11,15,19,25,38,39,40,41,42,43,45,49,53,57],globallayoutbuild:15,globalsplit:15,glue:15,glut:2,gmarpon:21,gmlt:6,gmock:8,gmodul:[6,11],gninja:57,gno:6,gnu11:[11,30,57],gnu17:[11,57],gnu89:[1,6,11,57],gnu90:11,gnu99:[11,57],gnu:[1,6,8,11,16,19,25,27,30,38,50,57],gnu_inlin:19,gnueabi:[16,38],gnueabihf:16,gnuinlineasm:38,goal:[2,8,10,25],goe:[15,25,30,57],going:[2,8,25,33,44],gold:[14,48,50,51,54],good:[1,2,10,14,15,20,25,26,30,33,44,52,55],good_rect:39,googl:[0,7,8,31,34,37,46,52,53,57],googlecod:34,govern:25,gpopt:6,gpu:[6,57],gpubnam:6,gracefulli:25,gradual:38,grain:[6,19,25,30,56,57],grammar:[25,38],grammat:25,grant:[1,3],granular:[23,50],graph:[2,25,28,41,46],great:[16,25,57],greater:[1,6,10,19,30,56],greatli:[2,25,57],grecord:6,green:[20,25,30,39],gregcal:57,grew:25,gritti:55,gross:25,group:[1,2,6,8,12,19,25,43,44,47,56],grow:[20,38,41],gs_rel:30,gsce:[6,57],gsl:1,gsplit:6,gstrict:6,gtest:8,guarante:[1,2,6,15,19,22,23,27,30,38,39,52,57],guard:[2,6,25,27,30,38,44,49,52,57],guard_vari:46,guess:[8,33],gui:[10,25,33,52],guid:[6,8,10,16,19,21,30,33,34,46,50,56],guidelin:[1,57],guse:6,gvsnb:20,hack:[14,25],had:[2,3,19,25,30,36,38,41,53,57],half:[25,51,57],halt:[1,57],hamper:18,hand:[2,14,16,18,19,20,25,33,35,36,39,42,56],handiwork:33,handl:[1,2,3,6,8,9,11,14,15,16,19,20,23,29,33,38,41,44,46,50,52,54,56,57],handlepragma:9,handler:[1,6,9,15,19,23,25,45],handlesimpleattribut:25,handletranslationunit:42,handleyourattr:25,handoff:52,happen:[0,1,2,10,11,15,16,19,25,38,57],happi:44,hard:[1,16,25,28,33,34,37,38,44,52,57],harden:[1,6,14,44],harder:[16,20],hardwar:[1,16,19,30,45,49,54,57,58],hardware_concurr:51,harmless:[30,54],has:[0,1,2,3,4,6,7,8,9,14,15,16,18,19,20,23,24,25,26,29,30,33,36,37,38,39,40,41,43,44,45,46,49,50,52,54,56,57],hasattr:25,hascondit:33,hascustompars:25,hash:[6,8,15,25,33,41,57],hasincr:33,hasiniti:33,haslh:33,hasloopinit:33,hasn:51,hasnam:32,hasoperatornam:33,hasrh:33,hassingledecl:33,hastyp:[30,33],hasunaryoperand:33,hatch:52,have:[0,1,2,3,6,7,8,9,11,14,15,16,17,18,19,20,21,23,24,25,26,27,28,29,30,33,35,36,38,39,40,41,43,44,45,46,49,50,52,54,55,56,57],haven:[1,2,57],haystack:30,hdf5:1,hdrstop:[19,44],head:[7,15,21,25,57],header:[1,2,6,8,9,11,14,16,17,18,30,33,35,36,44,50,52,54,58],headerpad_max_install_nam:6,heap:[0,2,3,4,25,30,37,45,57],heavi:14,heavier:23,heavili:15,height:25,held:[1,2,4,19],hello:[3,4,22,25,36,39,41],help:[1,2,6,7,11,13,16,17,18,19,21,25,30,32,33,35,38,41,43,48,51,53,57],helper:[2,19,20,25],helperclass:19,helpmessag:[33,35],henc:[2,38,45],here:[0,1,2,6,8,10,16,19,20,24,25,30,31,38,39,43,44,47,52,56,57],herebi:3,heretofor:2,heurist:[1,6,30],hex:19,hexadecim:19,hexagonv55:6,hexagonv5:6,hexagonv60:6,hexagonv62:6,hexagonv65:6,hexagonv66:6,hhbebh:20,hidden:[1,6,7,13,14,19,29,41,44,48,57],hide:[1,19,45,52],hierarch:41,hierarchi:[2,26,29,32,41],high:[1,2,10,11,15,21,25,30,50,55,57],higher:[0,1,11,14,19,23,30,37,53,56,57],highest:15,highli:[11,57],highlight:[25,41,57],hijack:[15,45],hint:[1,6,8,10,21,36,57],hip:6,histor:[1,2,25,36,39,52],histori:[2,25,41],hit:24,hlt:23,hoc:2,hoist:25,hold:[1,2,3,4,11,15,19,20,25,41,52],holder:3,holist:2,holtgrew:21,home:[24,28,57],homogen:1,honeypot:1,honor:[2,6],hook:[2,42],hope:20,hopefulli:10,horizont:8,horrif:38,host:[2,6,11,16,25,51,57],hostnam:[50,57],hot:[1,6,47,57],hour:51,how:[1,2,3,5,6,8,9,10,11,13,15,16,17,18,20,21,28,29,30,33,35,36,38,39,41,44,50,52,54,55,58],howev:[0,1,2,3,8,10,14,15,16,20,25,30,36,38,41,43,44,46,49,50,51,52,54,57],htm:6,html:[1,6,8,25,27,34,50],http:[0,1,8,10,11,21,23,27,30,31,33,34,37,46,53,54,57],huge:[25,38],human:[25,32,57],hundr:[18,25,57],hurt:[30,44],hvx:[6,19],hw0:1,hw1:1,hw2:1,hw3:1,hw4:1,hw5:1,hwaddress:[6,23,57],hwaddresssanit:[6,57],hwasan:23,hygien:30,hyper:51,hypothet:1,i128:57,i16:18,i32:18,i368:57,i386:[0,1,16,20,41],i486:11,i64:18,i686:57,iOS:[0,1,19,30,38,57],i_hold:3,i_label:17,iamcu:6,ibm:16,iboutletcollect:19,ibs_merg:8,ibs_preserv:8,ibs_regroup:8,ibt:1,ical:[6,47,57],icc:1,icf:57,idea:[1,15,25,38],ideal:[1,2,10,23,25,41,52],ident:[1,6,14,19,25,30,57],identif:25,identifi:[1,2,6,8,15,18,21,25,26,30,33,38,42,43,52,57],identifierinfo:[25,41],identifierinfolookup:41,identifiert:41,idiom:25,idiraft:6,ids:32,idx:[39,46],iec:30,ieee:[30,57],ifcc:45,ifdef:[30,39,52],iff:[3,57],ifndef:[25,30,38,52],ifoo:[20,57],iframework:6,iframeworkwithsysroot:6,ifstmt:[24,25],ifunc:19,ignor:[0,1,2,3,6,8,11,14,16,23,25,30,33,36,38,44,47,57],ignoredattr:25,ignoringparenimpcast:33,iinclud:[9,35],ij_label:17,ijk_label:17,ill:[1,2,19,30,38,39],illeg:[1,19,25],illustr:[15,25,39,41,52,57],ilp:30,imacro:6,imag:[1,20,36,44,54],image2d_t:1,image_bas:6,imagea:1,imageb:1,imagin:[8,38],imaginari:30,imap:7,imbu:6,immedi:[0,1,2,6,14,15,25,30,33,41,48,52],immintrin:57,immut:[25,39],imp:52,impact:[25,36,38,51,56],imperfectli:2,implement:[1,2,4,6,8,9,14,15,17,21,23,30,33,34,35,36,38,39,40,41,42,43,45,49,50,51,52,54],impli:[1,2,3,6,8,20,29,33,38,41,57],implic:14,implicit:[1,2,6,11,25,27,32,33,38,44,56,57],implicitcastexpr:[24,26,33],implicitli:[1,2,4,6,14,18,19,25,28,30,38,39,40,44,54,57],importantli:[2,30],impos:2,imposs:[1,2,33,36],imprecis:2,improv:[1,2,3,6,11,15,21,30,38,39,41,45,51,55,57],imsvc:57,imultilib:6,inadequ:2,inadvert:[30,44],inadvis:50,inbranch:1,inc:3,incident:2,includ:[1,2,3,4,7,8,9,10,11,14,16,17,21,22,27,31,33,36,37,41,42,44,46,47,50,51,52,53,54,55,56,57],include_alia:19,include_next:[19,30,38],includeblock:8,includeblocksstyl:8,includecategori:8,includeismainregex:8,inclus:[6,19,25,38],incom:25,incompat:[1,2,36,38,50,56,57],incomplet:[2,30],inconclus:8,inconsist:[0,2,30],inconveni:2,incorpor:[2,30],incorrect:[1,19,25,30,36,56,57],incorrectli:19,incourag:33,increas:[0,2,6,8,14,15,19,23,37,40,45,57],increment:[2,6,30,33,46,50,52,57],incrementvari:33,incrementvarnam:33,incur:[19,20,49,57],incvar:33,incvarnam:33,indent:[8,57],indentbrac:8,indentcaselabel:8,indentppdirect:8,indentwidth:[7,8],indentwrappedfunctionnam:8,independ:[1,19,20,23,25,28,37,38,41,53,55,56],indetermin:1,index1:30,index2:30,index:[1,6,15,19,20,21,25,26,30,33,38,39,40,41,43,46,49,50,51,56,57,58],indic:[1,2,6,11,19,20,25,30,32,33,38,41,42,46,50,51,52,56,57],indirect:[1,3,6,19,25,45,46,47,56,57],indirectli:[1,2],indistinguish:25,individu:[1,6,8,11,15,30,43,45],induc:25,industri:52,inequ:19,ines:38,inescap:2,inf:[6,8,30,57],infeas:[1,2,23,38],infer:[4,6,14,29,38],infil:42,infin:[6,30],infinit:6,inflat:2,influenc:[2,57],info:[0,6,11,25,36,38,44,46,56],inform:[1,2,3,5,8,10,11,14,15,17,19,20,22,24,25,26,28,29,32,33,35,36,38,40,41,42,43,45,46,50,55],infrastructur:[10,20,21,24,25,44,55],infrequ:57,ing:41,ingroup:25,inhabit:41,inher:[2,4,11,25,28,38],inherit:[1,2,8,19,25,36,41,57],inheritableattr:25,inheritableparamattr:25,inhibit:[1,6,30],init:[0,1,6,30,33,44,46,52],init_arrai:6,init_seg:19,initi:[1,2,3,4,6,8,11,15,18,25,33,36,37,39,41,43,44,46,52,57],initialitz:2,initialize_vector:57,initializer1:8,initializer2:8,initializer_list:[19,30],initmystringvalu:1,initvar:33,initvarnam:33,initwithobject:30,initwithurl:39,inject:25,inlin:[0,1,6,8,11,14,23,25,27,36,37,38,44,50,54,57],inlinedfastcheck:15,inlineonli:8,innat:1,inner:[2,3,8,32,40],innermost:[2,30],innerpoint:6,inplac:7,inprocess:20,input:[6,7,8,10,11,18,19,20,25,28,30,33,35,38,43,51,54,57],inputact:20,insecur:19,insensit:[8,54],insert:[1,2,6,7,8,15,18,25,30,32,39,45,46,57],insertvalu:18,insid:[0,1,8,15,19,20,24,25,29,30,35,36,39,41,44,57],inspect:[25,41,45],inspir:15,instal:[6,16,19,24,30,33,35,57],install_nam:6,instanc:[0,1,2,4,11,14,16,18,19,20,24,25,30,38,39,41,54,57],instancemethodpool:41,instances:19,instancesrespondtoselector:30,instancetyp:[6,30],instant:4,instantan:2,instanti:[1,2,25,30,41,50,57],instead:[1,2,6,7,8,11,14,15,17,18,19,20,23,24,25,26,30,38,39,43,44,45,46,50,51,52,54,56,57],instr:[6,50,57],instruct:[1,6,10,11,15,16,21,23,25,30,33,38,46,49,51,54,56,57],instrument:[1,6,14,15,17,18,21,37,44,45,49,53,54],insuffici:25,int128:6,int128_t:6,int32:8,int3:[15,30],int8_t:30,int8x8_t:30,int_max:[8,39],int_min:[39,56],intact:2,intargu:25,integ:[1,6,11,15,18,25,30,33,38,39,41,44,46,54,57],integerliter:[5,26,33,41],integr:[0,1,2,6,10,11,19,20,21,24,25,29,30,34,38,39,44,45,47,48,53,54,55,56,57,58],intel:[1,6,15,49,57],intel_sub_group_shuffl:57,intend:[1,2,4,10,17,19,20,22,24,25,30,33,36,38,39,41,49,51,52,57],intent:[1,2,19,25,44],intention:[2,10,54],inter:52,interact:[1,2,11,14,20,24,25,38,41,43],intercept:28,interceptor:[6,37,57],interceptor_via_fun:0,interceptor_via_lib:0,interchang:[30,57],interconvers:2,interest:[13,16,21,25,32,33,36,41,42,57],interfac:[1,8,10,20,24,28,30,32,38,40,41,42,43,44,52,54,57,58],interfer:30,interleav:1,interleave_count:30,intermedi:[1,6,11,19,20,30,37,54],intern:[1,2,11,17,18,26,29,30,38,44,52,57,58],internal_linkag:19,internal_mpi_double_int:1,interoper:[2,38,54],interposit:0,interpret:[1,8,19,25,38,52],interrupt:[19,25],interrupte:19,interspers:2,interv:[1,6,30,38,51],interven:2,intervent:38,intptr_t:2,intra:52,intrin:19,intrins:[1,6,45,49,54],intro:57,introduc:[0,1,2,3,4,7,8,9,14,15,19,25,30,33,37,38,39,41,45,46,47,52,53,57],introduct:[2,10,33,41,55,58],intrus:[1,21],intvar:33,invalid:[0,1,2,5,8,15,25,26,36,51,56,57],invari:[2,6,20,30,57],invas:2,invers:6,invis:[1,19],invoc:[1,2,4,6,19,20,24,37,43,57],invok:[1,2,3,7,11,18,19,22,24,25,43,54,57],involv:[1,2,20,25,29,38,39,54,56,57],invpcid:6,ioctl:1,ios:[1,38],iosonli:6,iossimul:38,iphon:11,iprefix:6,iquot:6,irel:28,irq:1,is_convertible_to:30,is_glob:30,is_inst:30,is_memb:30,is_paramet:30,is_thread_loc:30,is_union:30,is_wg_uniform:57,isa:[1,3,15,25,57],isatstartoflin:25,isbar:25,isdependenttyp:25,isderivedfrom:32,isdigit:1,isel:6,isequ:39,isfoo:25,isinteg:33,isl:8,isn:[1,2,18,19,20,25,33,44,57],iso9899:11,iso:[11,30,57],isol:[30,38,41,45],ispointertyp:25,issu:[1,3,6,10,15,17,18,21,23,25,30,36,44,52,54,57],istransparentcontext:25,istypedepend:25,isvalid:42,isvector:25,iswritteninmainfil:33,isysroot:[6,57],isystem:[6,57],itanium:[1,2,15,54,57],item:[1,7,8,17,18,25,57],iter:[19,25,30,33,40,41,44,55,57],itool:[9,35],its:[0,1,2,4,6,8,10,11,14,15,16,17,18,19,20,21,23,27,28,29,30,32,33,35,36,38,39,41,42,43,44,45,46,50,51,52,53,54,56,57],itself:[1,2,3,8,10,14,16,19,20,25,30,32,37,38,41,44,45,52,57],ivar:[2,6,30],ivfsoverlai:6,ivybridg:1,iwithprefix:6,iwithprefixbefor:6,iwithsysroot:6,j_label:17,jae:15,jai:14,jal:1,java:[7,8,54],javaimportgroup:8,javascript:[7,8],javascriptquot:8,javascriptquotestyl:8,javascriptwrapimport:8,jessevdk:21,jghqxi:20,jmp:[1,15],jne:[15,49],job:[6,20,25,51],john:56,join:[18,19],join_str:1,joinedarg:20,jom:[6,57],json:[8,19,24,35,50,58],jsqs_doubl:8,jsqs_leav:8,jsqs_singl:8,judg:[2,49],judgement:25,jump:[1,6,15,19,23],just:[0,1,2,4,7,15,20,24,25,30,32,33,34,37,38,39,41,45,46,49,52,57],justifi:2,k_label:17,kalign:15,kcc:46,kde:21,keep:[0,1,2,6,8,19,20,21,25,41,44,51,57],keep_private_extern:6,keepemptylinesatthestartofblock:8,kei:[1,4,7,8,19,20,23,25,28,30,39,44,51,52],kept:[2,4,8,10,15,20,25,38,56,57],kernel:[6,8,18,19,23,30,37,46,57],kerrorcodehack:30,kext:6,key1:8,key2:8,keyboard:7,keyword:[1,2,6,8,19,25,30,36,39,57],kfailedchecktarget:15,khrono:1,kind:[1,2,3,21,30,33,38,39,41,44,50,52,56,57],know:[2,6,15,16,20,21,25,30,33,46,50,52,54,56,57],knowingli:4,knowledg:[2,6,25,32,33,38,43,57],known:[1,3,6,11,15,16,17,18,19,20,25,30,36,37,39,40,47,53,54,56,57],krangebeg:15,kranges:15,kuznetsov:45,kw_for:25,label:[1,8,17,25],labelreturn:18,lack:[1,2,6,19,30,54],lai:[8,15],laid:[2,15,30],lambda:[2,8,36,40,44,57],langopt:[25,41],languag:[1,2,6,7,8,14,17,20,21,25,32,33,36,39,41,52,55,58],languagekind:8,languagestandard:8,lanugag:8,larg:[1,2,15,18,20,25,30,36,37,38,41,44,45,46,50,53,57],larger:[1,6,11,26,41,56],largest:[6,19],last:[1,2,4,6,8,11,15,16,19,20,24,25,30,33,41,44,46,56,57],lastpriv:44,laszlo:45,late:[2,57],latenc:[1,28,30],latent:2,later:[1,2,11,16,24,25,32,33,38,41,44,51,57],latest:[7,9,44,51],latom:54,latter:[15,25,38],launch:51,lax:[6,19],layer:[25,39,54],layout:[1,6,14,19,36,38,41,45,56,57],layout_compat:1,lazi:[24,41],lazili:[20,25,41],lazy_framework:6,lazy_librari:6,lbr:57,lclangbas:38,ld64:51,ldc1:6,ldd:57,ldp:49,ldr:[23,49],ldrb:23,ldrex:30,lea:15,lead:[0,2,4,8,19,25,30,37,38,39,41,52,53,57],leadingspac:25,leaf:[1,6,49,57],leak:[1,2,25,31,44,45,52],leaksanit:[0,58],learn:[21,32,42,43,44,55],least:[1,2,6,8,14,15,19,24,25,30,46,50,57],leav:[2,4,8,57],leewai:2,left:[1,2,8,15,19,25,30,33,39,41,42,46,51,56],leftmost:2,legaci:[1,6,11,19],legal:[1,2,4,6,39],legitim:2,len:1,lend:43,length:[1,6,7,8,11,15,25,30,56,57],lenient:1,lerner:15,less:[1,2,6,8,10,14,15,19,21,23,25,33,41,44,45,53,56],let:[1,7,9,15,24,25,26,33,35,42,46,54,57],letter:2,level:[1,2,8,9,10,11,15,19,20,21,25,29,32,38,41,44,46,47,50,54,55,56,57],lex:[25,34,38],lexer:[10,34,38],lexic:[4,41],lexicograph:[1,8,25],lhs:6,liabil:3,liabl:3,lib:[0,6,8,9,16,19,24,25,30,31,35,38,51,53,57],libasan:6,libastmatch:[32,58],libc:[1,11,15,19,30,31,37,44,53,57],libclang:[21,25,28,41],libclang_rt:[6,11,54],libcxx:16,libcxxabi:15,libdl:15,liber:38,liberti:2,libformat:[7,8,58],libgcc:[6,11,16,54],libgfortran:6,libm:16,libomp:40,libomptarget:6,librari:[1,2,6,7,9,10,11,17,18,20,21,29,30,31,33,34,35,36,37,38,39,40,43,45,50,51,52,53,55,56,57],library_path:19,libreoffic:21,libsan:6,libstdc:[6,11,30,37,53,57],libsupport:25,libsystem:3,libtool:[5,10,28,32,42,43,58],libxml:16,libz:16,lies:33,life:14,lifecycl:[1,21],lifetim:[1,4,19,30,56,57],lift:[2,10,38,41],ligatti:14,lightli:2,lightweight:20,like:[0,1,2,4,6,8,11,15,16,17,18,19,20,25,26,30,32,33,35,36,37,38,39,41,42,43,44,46,47,49,52,53,54,55,56,57],likelihood:57,likewis:[1,30],limit:[1,2,3,6,8,15,23,25,30,44,47,51,54,56],line:[0,1,2,5,7,8,10,11,12,20,22,24,25,26,28,29,30,33,35,37,39,41,42,43,44,45,47,48,49,50,53,54,56,58],linear:[1,19,38,41,49],linemark:[6,57],link:[0,1,6,11,14,15,16,20,23,24,29,30,31,36,37,39,40,42,44,45,46,49,50,51,53,54,56,57],linkag:[1,11,25,29],linker:[1,11,14,15,16,19,20,38,50,56,57],linkifi:25,linkonc:1,linkonce_odr:18,lint:55,linter:10,linti:21,linux:[0,8,16,17,18,23,28,31,37,38,40,45,46,53,56,57],lipo:20,list:[0,1,2,4,6,7,8,11,13,14,16,20,24,25,28,33,34,35,37,38,39,41,43,50,53,54,56,57,58],lit_test:53,liter:[1,2,3,6,8,11,25,33,38,57],littl:[2,15,20,25,33,41],live:[1,18,20,23,25,30,33,38,45,57],lk_cpp:8,lk_java:8,lk_javascript:8,lk_none:8,lk_objc:8,lk_proto:8,lk_tablegen:8,lk_textproto:8,lld:[1,36,51,54],lldb:57,lldltocach:51,lldltocachepolici:51,lldltojob:51,llvm:[0,1,2,5,6,7,8,10,11,14,15,16,18,20,21,23,28,30,33,34,35,36,37,39,40,41,42,44,46,53,56,58],llvm_build:33,llvm_clang_sourcemanager_h:41,llvm_link_compon:33,llvm_profile_fil:[6,50,57],llvmgold:51,load:[1,2,6,7,9,15,18,19,20,23,25,33,37,38,41,44,45,50,51,53,55,56,57],load_from_ac_struct:44,loadabl:57,loader:[8,19,23,57],loc:25,local:[0,2,3,4,6,7,11,14,24,25,27,36,38,40,41,43,45,49,57],local_funct:57,localiz:25,localrenam:43,locat:[0,1,2,4,6,7,8,11,15,16,19,20,22,24,25,32,33,35,38,39,41,42,43,45,51,56,57],lock:[1,19,23,50],lock_return:52,lockabl:52,lockandinit:52,locks_exclud:52,lockstep:1,log:[0,1,2,18,38,56],logic:[1,2,4,6,10,16,18,20,25,30,33,38,41,57],long_prefixed_uppercase_identifi:38,longcal:6,longer:[1,2,11,15,30,37,41,52,57],longest:[8,15],longfunct:8,longjmp:[45,50],look:[0,2,7,8,9,15,16,25,26,30,32,33,35,38,42,45,56,57],lookup:[2,15,19,25,41,57],lookup_result:25,lookupt:25,looooooooooongtyp:8,loooooooooooooooooooooongvari:8,loooooooooooooooooooooooooooooooongfunctiondeclar:8,loooooooooooooooooooooooooooooooooooooooongreturntyp:8,loop:[2,6,8,25,33,44,57],loopconvert:33,loopmatch:33,loopprint:33,loos:[6,11],lose:[2,10,19],loss:56,lossi:[6,56,57],lost:32,lot:[1,2,16,25,52,53],low:[1,2,3,6,11,18,25,28,47,50,57],lower:[1,2,19,25,41,54,57],lowercas:2,lozano:14,ls_auto:8,ls_cpp03:8,ls_cpp11:8,lsan:31,lsan_opt:0,lsomelib:38,lsr:23,lsupc:54,ltmp0:15,ltmp1:15,ltmp2:15,lto:[1,6,11,14,15,51,57,58],lto_visibility_publ:29,lucki:38,lui:14,lvalu:[2,25,26,33,56,57],lvaluetorvalu:26,lwp:6,lzcnt:6,m16:[6,57],m32:[6,57],m3dnow:6,m3dnowa:6,m64:6,m80387:6,m_pi:39,mab:[6,19],mabi:6,mabical:[6,19],mac:[2,3,6,11,30,38],mach:[6,41,57],machin:[0,1,2,6,11,15,16,25,38,50,51,54,57],machineri:[2,25,38,57],macho:16,maco:[1,30,38,40,44],macosx10:57,macosx:[1,45],macosx_deployment_target:11,macro:[1,2,6,8,11,25,32,33,39,41,44,45,49,50,52],macroblockbegin:8,macroblockend:8,macronam:[11,38],mad:6,madd4:6,madd:6,made:[1,2,8,14,15,19,21,24,25,30,34,38,56,57],madx:6,mae:6,magic:[16,46,47],magnitud:[16,19],mai:[0,1,2,3,4,6,8,11,14,15,16,17,18,19,20,21,23,25,29,30,33,37,38,39,41,43,44,45,46,47,49,50,51,52,53,54,56,57],mail:[21,25,44,57],main2:1,main:[0,1,2,6,8,9,10,15,16,17,18,19,20,22,25,28,29,30,31,33,35,37,39,42,44,46,47,48,50,53,54,56,57],mainli:[44,45],maintain:[0,1,2,8,10,14,15,16,20,23,25,33,38,41,54],major:[1,8,19,20,23,25,30,36,38,41,50,57],make:[0,1,2,3,6,8,9,11,14,15,16,18,19,20,25,26,27,28,30,31,32,33,34,37,38,39,40,41,44,45,46,48,49,52,53,54,55,56,57],makefil:[16,24,28,35,57],malform:39,malign:6,malloc:[1,2,11,17,18,23,25,30,31,47],maltivec:[6,30],man:58,manag:[1,4,16,17,25,30,42,57],mandatori:2,mang:1,mangl:[1,15,36,38,47,57],mani:[1,2,3,6,10,11,14,15,16,19,20,25,26,28,30,33,36,38,41,42,51,52,57],manipul:[1,20,25,45],manner:[1,2,3,4,15,24,25,30,52],manual:[1,2,6,11,16,18,30,41,44,45,47,50,54,58],map:[0,1,6,7,8,15,19,20,25,37,39,40,41,44,50,53,55],mappabl:6,mappletvo:6,mappletvsimul:6,march:[6,11,15],mark:[1,2,4,6,29,30,39,44,45,50,53,57],marked_vari:3,marker:[2,3,6,25],market:[2,30],marketplac:57,markup:25,martin:[14,24,33],mask:[1,15,25],masm:6,mass:[2,39],massiv:2,match:[0,1,4,6,8,14,15,16,20,23,25,38,41,46,51,52,56,57,58],matchcallback:33,matcher:[26,43],matchfind:33,matchresult:33,materi:30,math:[1,6,11,19,30,38,40,57],mathemat:30,mathia:45,matmul:6,matter:[4,14,15,25,27,52,57],matur:52,mavx2:6,mavx512bitalg:6,mavx512bw:6,mavx512cd:6,mavx512dq:6,mavx512er:6,mavx512f:6,mavx512ifma:6,mavx512pf:6,mavx512vbmi2:6,mavx512vbmi:6,mavx512vl:6,mavx512vnni:6,mavx512vpopcntdq:6,mavx:6,max:[1,6,19,39,57],maxemptylinestokeep:8,maxim:[1,25],maximum:[1,6,8,19,41,51,57],maxlen:1,may_throw:50,mayb:15,maybebindtotemporari:25,mbackchain:6,mbig:6,mbmi2:6,mbmi:6,mbranch:6,mcheck:6,mcldemot:6,mclflushopt:6,mclwb:6,mclzero:6,mcmodel:6,mcmpb:6,mcode:6,mcompact:[6,19,57],mconsol:6,mcount:6,mcpu:[6,16,57],mcrbit:6,mcrc:6,mcrypto:6,mcu:[6,19,57],mcx16:6,md5:15,mdd:57,mdefault:6,mdirect:6,mdll:6,mdoubl:6,mdsp:6,mdspr2:6,mdynam:6,meabi:6,mean:[0,1,2,3,6,8,11,16,18,19,20,23,25,30,36,37,38,39,44,47,49,52,53,57],meaning:[1,2,20,37,53,57],meaningless:19,meant:[1,2,25,30,38,41,44,50,57],measur:[14,45],measuretokenlength:25,mechan:[0,1,2,14,15,25,29,30,38,41,43,45,46,48,52,57],mediat:2,medit:25,meet:[1,2,6,25],mem:1,membed:6,member:[1,2,3,4,6,8,10,11,15,25,33,36,38,39,41,43,44,52,57],membership:2,memchr:30,memcmp:30,memcpi:[2,17,18],memop:6,memori:[1,3,4,6,15,17,20,21,25,31,40,45,49,51,53,55,56,57],memory_ord:30,memory_sanit:30,memory_scop:30,memorysanit:[1,6,30,46,47,57,58],memptr:6,memset:19,mention:[3,19,25,41,45,51,52,57],menu:7,merchant:3,mercuri:7,mere:[1,2,20,25],merg:[2,3,6,8,11,15,19,20,25,30,41,50,51,57],merit:2,messag:[0,1,2,4,6,7,8,17,25,33,35,37,38,39,52,53,54],met:1,metaclass:2,metadata:[1,2,6,15,20,25],metal:16,method2:1,method:[1,3,4,6,9,20,25,30,33,36,42,52,56,57],methodgroup:19,mexcept:6,mexecut:6,mextern:6,mf16c:6,mfcall:[14,29],mfentri:6,mfix:6,mfloat128:6,mfloat:[6,16],mfma4:6,mfma:6,mfocrf:6,mfp32:6,mfp64:6,mfpmath:6,mfprnd:6,mfpu:[6,16],mfsgsbase:6,mfxsr:6,mgener:[6,57],mgfni:6,mginv:6,mglobal:6,mgpopt:[6,19],mhard:6,mhtm:6,mhvx:[6,19],mhwdiv:[6,57],mhwmult:[6,19],miamcu:[6,57],mice:25,micromip:6,microsoft:[1,6,11,14,19,25,30,36,38,41],middl:[8,19,25],mieee:6,might:[1,2,8,10,11,16,19,20,21,25,27,30,36,38,43,45,52,57],migrat:[1,2,4,6,10,52,55,57],mihai:14,mii:11,mildli:1,mileston:1,mimic:[1,57],mimplicit:6,min:[1,6,11,39],mincrement:6,mind:[0,25,44],mindirect:6,mingw32:36,mingw:44,minim:[6,15,38,41,53,57],minimum:[1,2,6,11,19,25,30,38,57],minor:[19,25,30,41,50,56],minsiz:1,minut:51,minvari:6,minvpcid:6,mio:[1,6],mip:[16,19,44],miphoneo:[1,6,11,30],miphonesimul:6,mips16:6,mipsr6:57,mirror:[33,49,57],mis:2,misalign:[19,56],misbehav:2,misc:44,misel:6,mislead:0,mismatch:[1,2,14,18,23,38],miss:[1,6,8,25,30,32,38,40,41,43,44,46,50,52,53,57],misspel:20,mistak:[25,39],mistaken:57,misus:19,misusag:21,mitig:[1,15,20,30],mix:[1,19],mkdir:[24,33],mke:29,mkernel:6,mldc1:6,mlinker:6,mlittl:6,mllvm:[6,30,51,57],mlocal:6,mlong:[1,6,19],mlongcal:6,mlwp:6,mlzcnt:6,mmaco:6,mmacosx:[1,6,11,30],mmadd4:6,mmcu:[6,19],mmd:6,mmemop:6,mmfcrf:6,mmfocrf:6,mmicromip:[1,6],mmmx:6,mmovb:6,mmovdir64b:6,mmovdiri:6,mmpx:6,mms:6,mmsa:6,mmt:6,mmwaitx:6,mmx:[1,6],mnan:[6,19],mno:[1,6,44],mnocrc:6,mnontrap:6,mnv:6,mnvj:6,mock:8,modal:25,mode:[1,2,6,7,8,10,14,15,19,25,26,28,30,31,33,35,37,38,44,50,51,54,56],model:[1,2,6,11,19,26,30,32,36,40,41,51,52,57],moder:11,modern:[2,6,16,21,25,30,36,39],modif:[6,19,30,38],modifi:[1,2,3,6,8,18,25,30,40,41,46,49,51,52,56,57],modul:[0,1,6,8,11,15,18,20,37,45,46,51,53,54,57,58],module_nam:[1,46],module_priv:38,modulemap:38,modulo:[25,30],moment:[45,52,57],momit:6,monitor:[18,30],monolith:[11,15,20,51],month:30,more:[1,2,3,5,6,7,8,10,11,12,14,15,16,17,18,19,20,21,22,23,25,27,30,32,35,39,41,42,43,44,45,46,49,52,54,57],morehelp:[33,35],moreov:[2,15,38,39,52],moslib:6,most:[0,1,2,6,8,10,11,14,15,16,18,19,20,23,25,26,29,30,32,33,36,37,38,40,41,42,43,45,50,52,54,56,57],mostli:[1,2,18,20,23,25,36,57],motion:30,motiv:[1,10,20,57],mous:25,moutlin:[6,19],mov:[1,15,49],movab:15,movap:1,movb:6,movdir64b:6,movdiri:6,move:[0,1,2,3,4,6,15,22,25,39,45,57],movl:30,movt:6,movw:6,mozilla:[7,8,21],mpacket:6,mpascal:6,mpclmul:6,mpconfig:6,mpi:1,mpi_datatyp:1,mpi_datatype_double_int:1,mpi_datatype_int:1,mpi_datatype_nul:1,mpi_double_int:1,mpi_int:1,mpi_send:1,mpie:6,mpku:6,mpopcnt:6,mpopcntd:6,mpower8:6,mpower9:6,mprefer:6,mprefetchwt1:6,mprfchw:6,mptwrite:6,mpure:6,mpx:6,mqdsp6:6,mqpx:6,mrdpid:6,mrdrnd:6,mrdseed:6,mrecip:6,mred:6,mregparm:6,mrelax:[6,44],mrestrict:6,mretpolin:6,mrtd:6,mrtm:6,ms_struct:19,msa:6,msahf:6,msan:37,msan_new_delet:37,msan_opt:37,msan_symbolizer_path:37,msbuild:57,msdn:1,msecur:6,msgx:6,msha:6,mshstk:6,msign:6,msimd128:6,msingl:6,msmall:6,msoft:6,msp430:[19,25,57],msp430interruptattr:25,mspecul:[6,44],msram:6,msse2:6,msse3:6,msse4:6,msse4a:6,msse:6,mssse3:6,mstack:6,mstackrealign:6,msvc:[1,30,38,44,54,57,58],msy:57,mtbm:6,mtd:[29,57],mthread:6,mthumb:6,mtime:38,mtl:6,mtp:6,mtune:6,mtvo:[1,6],mu1:52,mu2:52,much:[2,4,6,10,11,16,20,23,25,41,44,52,57],multi:[1,6,19,25,41,52],multi_cpu:1,multi_modul:6,multibyt:57,multilin:8,multipl:[1,2,6,7,8,11,15,16,18,20,25,26,28,29,32,36,38,40,41,44,45,46,50,52,54,57],multiplex:25,multipli:[19,30],multiply_defin:6,multiply_defined_unus:6,multithread:1,multitud:26,multivers:1,munalign:6,municod:[6,44],munimpl:6,munl:52,must:[1,2,3,4,8,9,14,15,18,19,20,21,25,28,29,30,38,39,41,43,45,49,50,51,52,56,57],must_ab:1,must_be_nul:1,mut:52,mutabl:[2,25,39],mutablecopi:[1,2],mutat:[4,21],mutex:19,mutexlock:52,mutexunlock:52,mutual:[1,3,4],mv55:6,mv5:6,mv60:6,mv62:6,mv65:6,mv66:6,mvae:6,mvc:25,mvirt:6,mvpclmulqdq:6,mvsx:6,mvx:6,mwaitpkg:6,mwaitx:6,mwarn:6,mwatcho:[1,6],mwatchsimul:6,mwbnoinvd:6,mwindow:6,mx32:6,mx87:6,mxgot:6,mxnack:6,mxop:6,mxsave:6,mxsavec:6,mxsaveopt:6,my_calloc:1,my_enum:44,my_ext:57,my_fun:30,my_func:57,my_int_pair:1,my_malloc:1,my_memcpi:1,my_pair:1,my_program:46,my_sub_group_shuffl:57,my_t:57,myabort:30,myasan:0,myattribut:25,mybss:30,myclass:[32,52],myconst:39,mydata:30,myfoobar:[0,14,47],myframework:38,myframeworkcor:38,myfunct:8,myinclud:30,mylib:[25,38,57],mylocalnam:1,mylogg:38,mylsan:0,mymap:8,mynam:30,myobject:52,myplugin:9,myrodata:30,mysec:30,mysteri:[2,26],mystic:25,mytext:30,mytoolcategori:[33,35],myubsan:56,mzvector:6,n32:44,n3421:10,n4absl11string_view:57,n64:19,n_label:17,naiv:2,name:[0,1,2,3,6,7,8,9,11,12,14,15,16,17,18,20,24,26,27,28,33,38,39,41,42,43,46,47,48,52,53,54,56],nameddecl:25,nameofcfunctiontosuppress:0,nameofthelibrarytosuppress:0,namespac:[0,1,8,24,25,27,29,32,33,35,38,41,42,44],namespace2:0,namespacedecl:25,namespaceindent:8,namespaceindentationkind:8,nan:[6,25,57],narrow:[0,1,14,32,33],nasti:25,nativ:[0,11,16,17,18,30,37,49,51,53,54,57],natur:[1,2,25,41,57],navig:21,ndebug:[1,38],nearest:[19,25],nearli:[2,41],neatli:57,necess:[2,25],necessari:[1,2,3,14,15,17,18,19,20,21,25,33,36,38,52,54,57],necessarili:[25,28,30,55],need:[0,1,2,3,4,6,7,8,9,10,11,14,15,16,17,18,19,20,22,23,24,25,28,30,33,35,36,37,38,39,41,42,43,44,45,46,49,51,52,53,54,55,56,57],needl:30,needsclean:25,needstolock:52,neg:[6,8,25,44,56,57],negat:[1,6],neither:[1,2,25,30,33,39,56],neon:[16,19,30,38],neon_polyvector_typ:30,neon_vector_typ:30,nest:[4,6,8,25,30,32,38,44,57],nestednamespecifi:25,net:4,netbsd:[0,37,45,53,56],network:57,neutral:[20,54],never:[1,2,6,7,8,11,19,20,25,30,38,45,56,57],new_stat:1,new_valu:30,newastconsum:24,newbi:57,newer:[1,19,30,41,50],newest:30,newfrontendactionfactori:[33,35],newli:39,newlin:[8,25,57],newnameopt:43,newobject:39,newposit:39,newvalu:39,next:[1,2,6,7,8,15,25,30,32,33,35,38,39,41,42,43,50,51],ni_al:8,ni_inn:8,ni_non:8,nib:19,nice:[25,33,35],nicer:0,nil:[2,4,19,39],ninja:[28,33,57],nitti:55,nmake:[6,57],nmap:24,nmore:[33,35],no_address_safety_analysi:0,no_dead_strip_inits_and_term:6,no_sanit:14,no_sanitize_address:0,no_speculative_load_harden:44,no_undeclared_includ:38,nobodi:57,nobuiltininc:[6,11,57],nocf_check:19,nocheck:57,nocpp:6,nocudainc:6,nocudalib:6,node:[24,25,41,42,43,57],nodefaultlib:6,noderef:19,nodetyp:42,nodiscard:30,nodupfunc:1,noexcept:[1,19],nofixprebind:6,noinlin:[1,46,48],noisi:44,nolibc:6,nomin:18,nomultidef:6,non:[0,1,2,3,4,6,8,10,11,17,21,23,25,29,36,37,38,39,40,41,45,46,49,50,51,53,54,57],nonassign:8,nonatom:6,nonbitfield:25,noncopy:57,noncopyable2:57,none:[1,2,6,7,8,16,25,30,41,57],nonescapingfunc:1,nonetheless:2,nonfragil:[6,11],noninfring:3,nonliter:1,nonnul:56,nonport:6,nonscalar:19,nontrap:6,nontriv:2,nontrivi:2,nonumb:39,nonzero:[18,19,30],noopt:6,nopi:6,noprebind:6,nor:[1,2,16,30,38,39,52,56,57],noreturn:30,normal:[1,2,3,4,6,7,8,9,14,15,16,25,30,36,38,39,41,44,52,57],noseglinkedit:6,nostartfil:6,nostdinc:[6,11],nostdlib:6,nostdlibinc:[6,11],not_retain:19,notabl:[1,2,20,30,44],notat:[4,30,41],note:[0,1,2,3,4,6,7,8,9,10,11,13,14,15,25,26,30,32,33,38,39,43,50,51,52,57,58],note_ovl_candid:25,noth:[1,25,41,44],notic:[3,15,54],notifi:[25,41],notinbranch:1,notion:[25,38],noun:[32,33],nounroll_and_jam:1,nov:46,novel:15,novic:2,now:[1,2,3,15,19,24,25,29,30,33,35,36,39,42,44,46,52,57],nrvo:1,ns_consum:[2,19,30],ns_consumes_self:[2,30],ns_designated_initi:6,ns_enum:6,ns_map_begin:8,ns_map_end:8,ns_nonatomic_iosonli:6,ns_option:6,ns_requires_sup:1,ns_returns_:19,ns_returns_autoreleas:[2,30],ns_returns_inner_point:6,ns_returns_not_retain:[2,30],ns_returns_retain:[2,30],ns_table_:8,ns_table_foo_end:8,ns_table_head:8,nsapp:39,nsarrai:[1,2,19,30,39],nsautoreleasepool:2,nscaseinsensitivesearch:30,nscol:39,nscompar:30,nscomparisonresult:30,nscopi:39,nsdate:39,nsdictionari:39,nsfoo:2,nsforcedorderingsearch:30,nslocal:30,nslog:[30,39],nsmakerang:30,nsmutablearrai:39,nsmutabledictionari:39,nsnumericsearch:30,nsobject:[2,19,30],nsprocessinfo:39,nsrang:30,nsrespond:1,nssomeclass:30,nsstring:[1,19,30,39],nsstringcompareopt:30,nsuinteg:39,nsunrel:30,nsurl:39,nsusernam:39,nsvalu:[1,39],nsview:1,nswidthinsensitivesearch:30,null_resett:19,nullabl:[19,56],nullmacro:44,nullptr:[15,19,24],num:[7,57],num_of_total_sampl:57,num_predef_type_id:41,num_sgpr:1,num_thread:40,num_vgpr:1,number:[1,2,6,8,11,14,18,19,20,21,23,25,32,35,37,38,39,40,41,43,44,46,48,51,53,54,57],number_of_sampl:57,numberwithbool:39,numberwithchar:39,numberwithdoubl:39,numberwithfloat:39,numberwithint:39,numberwithlong:39,numberwithlonglong:39,numberwithunsignedchar:39,numberwithunsignedint:39,numer:[6,19,25,30,39,41],nvcall:14,nvcc:19,nvidia:[11,16,57],nvj:6,nvptx64:57,nvptx:6,nvs:6,o2i:57,ob0:57,ob1:57,ob2:57,obei:[1,2,25,30,57],obj:[3,11,51,52],objc:[1,2,3,6,8,11,25,38,39,57],objc_:30,objc_arc:[2,30,38],objc_arc_field:30,objc_arc_weak:30,objc_arc_weak_reference_unavail:2,objc_array_liter:[30,39],objc_assign_weak:3,objc_bool:39,objc_box:39,objc_boxed_express:39,objc_boxed_nsvalue_express:39,objc_categori:30,objc_default_synthesize_properti:30,objc_dictionary_liter:[30,39],objc_externally_retain:[2,19],objc_fixed_enum:30,objc_include_path:11,objc_independent_class:19,objc_instancetyp:30,objc_interfac:30,objc_method:30,objc_method_famili:[2,30],objc_precise_lifetim:2,objc_properti:30,objc_protocol:30,objc_protocol_qualifier_mangl:30,objc_read_weak:3,objc_returns_inner_point:2,objc_subscript:[30,39],objcbinpackprotocollist:8,objcblockindentwidth:8,objcclass0:25,objcclass:25,objcinst:25,objcinstance0:25,objcmethodtosuppress:0,objcmt:6,objcmultiargselector:25,objconeargselector:25,objcplus_include_path:11,objcspaceafterproperti:8,objcspacebeforeprotocollist:8,objctyp:39,objczeroargselector:25,objdump:41,object:[1,6,7,8,10,13,14,15,21,23,25,28,29,31,33,37,41,44,45,50,51,52,54,56],object_getclass:19,object_setclass:19,objectatindex:39,objectatindexedsubscript:39,objectforkei:39,objectforkeyedsubscript:39,objection:44,objectpoint:3,obscur:57,observ:[1,2,14,19,29],obsolet:[1,19],obtain:[3,15,25,54,57],obviou:[2,20,25],obvious:[2,25],occas:25,occasion:25,occupi:14,occur:[0,1,2,3,4,8,15,19,20,25,38,39,41,50,51,52,57],occurr:[2,8,43],octal:57,octob:45,odd:36,odr:[1,6,29,57],ofast:[6,11],ofe:1,off:[1,2,6,8,11,19,23,25,30,33,38,47,49,52,57],offend:30,offer:[2,10,33,46,56,57],offest:44,offici:57,offlin:0,offload:[1,6,19,40],offset1:57,offset2:57,offset:[1,3,7,15,19,23,41,44,46,57],offseta1:57,offseta:57,offsetb1:57,offsetb:57,offsetn:57,often:[1,2,16,18,25,28,30,32,36,38,51,52,56,57],oilpan:45,okai:[1,25,33,52],old:[1,2,3,15,19,23,30,38,39,44],old_valu:30,older:[4,19,30,37,39,41,54,57],oldobject:39,oldvalu:2,om_abortonerror:30,om_invalid:30,om_norm:30,om_terrifi:30,omiss:57,omit:[0,1,4,6,16,25,30,37,38,54,56],omp:[19,40,44,57],ompt:40,onc:[0,6,11,16,20,25,30,33,35,38,41,43,46,50,57],one:[0,1,2,3,4,7,8,11,14,15,16,17,18,19,20,23,25,26,27,28,30,32,33,35,37,38,39,40,41,42,43,44,45,46,49,51,52,53,54,56,57],ones:[3,4,8,11,15,16,20,25,30,33,35,57],ongo:36,onli:[0,1,2,3,4,6,7,8,9,10,11,14,15,16,17,19,20,22,23,24,25,26,28,29,30,33,35,37,38,39,40,41,42,43,44,45,46,48,49,50,51,52,53,54,55,56,57],onlin:[0,6,26],onlinedoc:[1,27],onoperationdon:8,onto:[3,6,8,15,25,57],onward:[19,30,50,54,56,57],oof:57,opaqu:[2,3,4,15,25,57],open:[1,2,8,24,39,51,57],openbsd:56,opencl:[11,19,30,38],openenum:1,openflagenum:1,openmp:[1,6,58],oper:[0,1,2,3,6,7,8,10,15,17,18,20,21,24,25,27,33,37,38,39,40,41,43,44,45,49,50,52,53,54,56],operand:[1,6,8,18,25,30,33,39,46,54,57],operation:1,operationmod:30,operatorcallexpr:33,opportun:[2,20,30,38],oppos:[1,8,44],ops:6,opt:[1,2,6,25,30,38,51,57],opt_i:20,optim:[0,1,3,4,11,14,18,25,29,37,38,41,44,46,49,51,54,56],optimist:40,option:[0,1,2,3,4,7,9,12,13,20,22,23,24,25,26,28,33,37,38,39,41,44,46,47,50,51,52,54,56,58],optionalrequiredopt:43,optioncategori:[33,35],optionrequir:43,optionspars:[33,35],optnon:30,orang:20,order:[1,2,3,8,11,16,18,20,25,27,29,31,33,34,36,37,38,39,41,46,52,54,57],ordin:25,ordinal0:25,ordinari:[1,52,57],org:[1,8,10,11,21,23,27,33,34,39,57],organ:[2,41],organization:10,orient:[1,10,45,50],origin:[1,2,3,6,14,15,17,18,19,20,23,25,30,38,41,52,56,57],orred:3,orthogon:3,os_log:19,os_trac:19,osdi:45,osobject:[1,19],other:[0,1,2,3,6,8,10,11,14,15,16,17,18,19,20,22,23,24,26,27,29,30,32,33,36,37,38,39,40,41,44,46,49,50,51,52,53,55,56],other_funct:30,othermethod:1,otherwis:[1,2,3,4,6,7,8,11,15,19,20,25,27,30,38,39,43,46,50,54,57],our:[1,15,21,25,26,33,35,36,38,42,50],ourselv:[2,33],out:[0,1,3,6,8,10,11,15,16,18,20,21,24,25,26,28,30,31,32,33,34,35,36,37,38,41,42,46,47,48,50,51,53,54,55,56,57],outdent:8,outer:[25,32],outermost:[2,32],outfit:33,outgo:25,outlin:[6,18,43],outliv:[2,4],output:[0,6,7,11,18,19,20,24,25,28,30,35,42,48,49,50,53,54],outsid:[2,8,15,25,29,30,38,39,45,52,55,57],over:[0,1,2,6,8,9,10,11,15,25,28,33,35,41,42,46,51,55,57],overal:[2,11,20,41],overflow:[6,8,11,23,30,45,49,57],overhead:[0,1,11,14,15,18,23,30,31,37,45,48,49,50,52,53,57],overlai:[6,46],overlap:15,overli:1,overload:[2,4,6,30,33,36,44],overloadable_unmark:1,overloadedoperatorkind:25,overnight:38,overrid:[1,2,6,8,9,14,38,41,43,44,57],overridden:[1,2,6,11,19,30,51,54,57],overriden:1,oversight:2,overview:[7,25,58],overwrit:[6,15,19,45,49,57],overwritten:[19,25],own:[1,2,6,8,10,14,15,16,17,18,19,20,21,23,25,30,33,36,39,41,46,51,52,57],owner:2,ownership:[1,25,30],p0057:30,p0936r0:1,pack:[3,6,8,25,57],packag:[0,16,38],packet:6,pad:[6,19,44,57],page:[1,6,15,19,21,23,25,30,44,45,57,58],pagezero_s:6,pair:[2,3,4,6,7,18,19,25,30,33,39,46,51],palat:25,paper:[1,23,45],paraamet:1,paragraph:19,parallel:[1,2,6,30,40,44,57],param:[1,3,6,19,57],paramet:[1,4,7,8,9,16,17,18,20,24,25,28,32,33,35,36,39,44,46,56,57],parameter:19,parameter_list:4,paren:6,parenexpr:26,parent:[1,4,7,8,38],parenthes:[1,2,8,25,30,33,39,57],parenthesi:26,parmvar:26,parmvardecl:26,pars:[4,6,7,9,11,25,26,28,30,36,38,40,41,44,50,52,54],parsabl:57,parse_text_proto:8,parseabl:[6,11,57],parsearg:9,parseargumentsasunevalu:25,parsedattr:25,parsegnuattributearg:25,parsekind:25,parsemicrosoftdeclspec:25,parser:[11,21,36,57],parsingfilenam:25,parsingpreprocessordirect:25,part:[0,1,2,3,10,11,14,15,16,19,20,25,26,27,28,30,32,33,35,38,41,42,44,45,46,52,55,56,57],parti:[11,38,39,41,57],partial:[1,6,8,23,30,36,40,43,57],particular:[0,1,2,3,6,15,17,18,20,25,30,37,38,41,43,47,52,53,56,57],particularli:[1,16,20,36,38,41,54,56,57],partit:39,partli:19,pas_left:8,pas_middl:8,pas_right:8,pascal:[6,11],pass:[0,1,3,6,9,11,13,14,15,17,18,19,20,22,23,25,26,30,33,36,37,38,39,40,42,43,44,45,46,47,48,49,50,51,52,54,56,57],passthrough:44,past:[2,25,38,50],patch:[1,8,30,50],path:[0,1,2,7,9,11,15,16,20,24,25,28,30,35,37,38,39,41,44,46,47,48,50,51,52,56,57],path_discrimin:57,pathcompon:39,pathnam:[6,57],pattern:[0,2,6,7,8,10,25,30,32,33,38,39,44,50,52,57],payer:45,pcdescr:46,pcflag:46,pch:[6,25,41,54],pchintern:38,pclmul:6,pcm:[38,54,57],pconfig:6,pcs_beg:46,pcs_end:46,pdb:[36,57],pdf:23,peculiar:2,pedant:[6,25,30,57],penalti:[1,2,8,15,19],penaltybreakassign:8,penaltybreakbeforefirstcallparamet:8,penaltybreakcom:8,penaltybreakfirstlessless:8,penaltybreakstr:8,penaltybreaktemplatedeclar:8,penaltyexcesscharact:8,penaltyreturntypeonitsownlin:8,pend:[30,57],peopl:[8,16,21,24,25,33,44,57],per:[1,6,8,15,18,25,28,30,38,40,41,42,44,46,50,53,57],percent:[25,51],percentag:[50,51],perf:57,perfect:[0,37,45],perfectli:[2,25],perform:[0,1,2,3,4,6,10,11,15,16,18,20,21,25,30,31,37,38,39,40,41,43,44,49,51,52,53,54,56,57],performwith:2,perhap:[1,38],period:[15,25,38,50,52],permiss:[1,3,25],permit:[1,2,3,19,30,38,44,57],permut:30,persist:[1,21,38],person:[3,8],perspect:[18,25,38,41],pervas:2,peter:14,pfoo:11,pgo:50,phabric:21,phase:[1,2,11,20,25,31,51,57],phoni:6,php:57,phrase:[2,25],physic:[52,57],pic:[6,44,57],pick:[1,15,16,25,39,43,54,57],pid:[46,53,57],pidoubl:39,pie:[6,15,53],piec:[1,25,33,44,52,54,57],pifloat:39,pike:14,piovertwo:39,pipe:[1,6,20,25,44,57],pipelin:[1,54],pitfal:1,pivot:45,pku:6,place:[1,2,3,6,7,8,14,15,16,18,19,25,30,38,39,41,47,50,52,54,57],placehold:[1,6,30],placement:[1,25,30,57],plai:1,plain:[1,25,53],plan:[34,38,53,55],platform:[1,6,10,11,15,16,19,20,29,30,36,41,49,54],platformtoolset:57,playstat:57,pleas:[1,9,11,14,17,21,25,30,39,41,44,45,50,54,57],plenti:8,plist:6,plop:8,plt:[6,15],plu:[11,25,27,53,57],plugin:[6,14,21,35,42,51,54,58],plural:25,pocl:57,pod:2,point:[0,1,2,6,7,8,14,15,16,18,21,25,28,31,33,35,37,38,39,42,50,52,56,57],pointe:[1,2,14,25,57],pointer:[0,1,3,4,6,8,15,18,20,23,25,30,36,37,39,40,44,45,52,56,57],pointeralign:8,pointeralignmentstyl:8,pointers_to_memb:36,pointertofunctionthatreturnsintwithchararg:4,pointertyp:[25,41],poison:[6,41,57],poison_in_dtor:37,poitner:1,polici:[14,51],polish:41,poll:25,pollut:25,poly8_t:30,poly8x16_t:30,polymorph:[6,14,15,30,32,57],pool:[18,30,50,57],poor:[2,38,57],poorli:2,pop:[2,4,19,30,41,49,57],pop_macro:19,popcnt:6,popcntd:6,popul:[3,20,41],popular:57,port:[0,56],portabl:[1,10,19,20,23,25,30,56,57],portion:[2,3,33,54],pose:18,posit:[0,1,2,6,7,19,30,35,37,39,41,44,52,53,56,57],posix:[6,8,54,57],possibl:[1,2,3,4,6,8,9,11,15,16,18,19,20,23,25,30,35,37,38,39,40,41,43,44,49,50,51,53,54,56,57],post:[2,33,51,57],potenti:[0,1,2,3,4,7,10,14,15,18,19,25,33,39,41,43,52,56,57],power8:6,power9:6,power:[1,2,10,19,25,30,33,42,55],powerpc64:57,powerpc:[20,25],ppc64:40,ppc:20,ppdirectiveindentstyl:8,ppdis_afterhash:8,ppdis_non:8,practic:[2,10,20,25,29,30,52,57],pragma:[2,6,8,25,36,38,40],pragma_clang_attribute_namespac:30,pragmahandl:9,pragmahandlerregistri:9,pragmaintroducerkind:9,pragmatok:9,pre:[6,30,33,38,57],preambl:[1,41,54],prebind:6,prebind_all_twolevel_modul:6,prebuilt:[6,29,38],preced:[1,2,8,19,20,30,38,44,50,57],precis:[1,6,15,25,45,50,52,57],preclud:[2,14],precompil:[6,11,19,38,44,54,58],precondit:[2,32],predecessor:25,predefin:[7,8,11,19,25,39,41],predic:[25,32,57],predict:[15,30,49],prefer:[1,6,7,8,25,30,38,44,57],prefetchwt1:6,prefix:[1,6,7,8,9,16,18,23,27,30,33,38,39,41,46,57],preload:6,prematur:19,prepar:[2,50],prepend:18,preprocess:[6,11,19,20,25,30,38,44,57],preprocessor:[2,8,9,20,38,50,54,57],presenc:[1,2,3,25,30,38,50,52,57],present:[1,3,11,19,25,30,36,38,40,56,57],preserv:[1,2,6,8,18,19,25,57],press:[7,33],pressur:[23,30],presum:57,pretend:[1,57],pretoken:44,pretti:[16,24,25,36,44],prettifi:27,prevail:1,prevent:[0,1,2,5,6,15,19,25,30,40,45,51,52,57],previou:[1,2,11,15,19,24,25,33,35,38,43,44,51,53,57],previous:[0,2,15,18,19,25,39,52,57],prfchw:6,primari:[1,2,10,19,21,25,38,57],primarili:[1,2,10,25,38,41],primit:[2,19,43],principl:[2,3,14,20],print:[0,6,9,11,12,14,15,20,24,25,30,33,37,38,41,46,47,53,54,56,57],print_stacktrac:56,printabl:57,printer:[25,33],printf:[1,3,4,22,25,30,37,41,44,46],printfunctionnam:9,prior:[1,2,3,6,19,41,50,52,57],prioriti:[1,8],privaci:18,privat:[2,6,25,30,33,42,43,57],private_bundl:6,privatehead:38,privileg:[1,30],pro:55,probabilist:[23,45],probabl:[15,16,19,23,25,55],probe:[6,57],problem:[0,2,16,18,20,23,25,30,33,36,41,47,54,56,57],problemat:[1,53],proce:[2,41,42],procedur:[2,52],process:[0,1,2,5,6,7,9,10,11,15,18,20,24,25,28,30,31,32,35,38,44,46,48,50,53,57],processdeclattribut:25,processdeclattributelist:25,processinfo:39,processor:[1,11,30,49,57],prod:30,produc:[0,1,2,4,11,14,16,17,19,20,26,29,30,33,38,41,42,43,44,46,48,52,54,56,57],product:[1,20,25,33,39,56],prof:57,profdata:[6,50,57],profil:[6,19,25,33,44,48],profiledata:57,profit:30,profraw:[6,50,57],prog:[6,11],program:[0,1,2,3,4,6,7,8,10,11,14,15,16,17,18,19,24,25,29,30,31,32,33,35,36,37,38,39,40,41,42,44,45,48,49,51,52,53,54,55,56,57],programm:[1,2,4,16,25,30,38,39,44,52,56],progress:[0,2,17,25,30,36,51],prohibit:[2,8],project:[0,1,2,5,7,8,10,20,28,31,33,35,36,38,41,45,46,51,53,54,55,56,57],prolog:[21,49],prologu:[1,23,57],promis:[2,19,30,53,57],promot:[1,23,30,44,56,57],prompt:[19,57],prone:[2,10],propag:[1,2,17,19,25,50,57],proper:[25,30,31,56,57],properli:[1,2,15,25,44,51,57],properti:[1,3,4,6,8,14,15,29,33,57],proport:41,propos:[15,18,38,49],protect:[1,2,6,14,15,19,20,23,30,45,49,52,57],protector:[1,6,49],proto:8,protobuf:7,protocol:[1,2,6,8,21,39],prototyp:[1,3,30],provabl:[2,56],prove:[1,2,4,37,39],proven:30,provid:[1,2,3,4,6,8,9,10,14,15,16,17,18,19,20,21,24,25,29,30,32,33,35,36,38,39,41,42,43,45,46,47,49,50,52,53,54,55,56,57],provis:4,proviso:2,prune:[6,38,46],prune_aft:51,prune_interv:51,ps4:[11,19],pseudo:[21,38],pth:44,pthread:[6,53],pthread_creat:53,pthread_join:53,pthread_t:53,ptr:[1,6,15,30,46],ptr_idx:1,ptr_kind:1,ptwrite:6,ptx:6,ptxa:6,publicli:8,publish:3,pubnam:6,pull:38,punt:33,pure:[2,17,30,37],purpos:[0,1,3,6,12,20,21,23,25,30,37,38,41,45,49,53,57],push:[19,25,30,41,44,49,57],push_back:[35,43],push_macro:19,put:[2,6,7,8,16,19,24,25,28,30,33,52,57],pwd:[24,46],pyf:7,python:[7,21,28,55],q0btox:20,q_unus:8,qconnectlint:21,qdsp6:6,qobject:21,qpx:6,qualif:4,qualifi:[1,14,21,24,25,38,41,42,56,57],qualiti:[1,20,57],qualtyp:41,quantiti:57,quarantin:23,queri:[1,2,20,25,30,32,38,41,43,57],question:[15,16,25,36,44,58],queue_t:44,quick:[3,33,35,43],quickfix_titl:24,quickli:[2,18,20,25,30,32],quirk:33,quit:[2,38,57],qunus:[6,11,57],quot:[1,6,8,19,25,28,30,57],qvec:57,r10:49,r11:[1,49],r19:6,r284050:51,r298942:51,r600:57,r_micromips_jalr:44,r_mips_jalr:44,race:[1,2,4,49,52,53,57],raii:52,rais:[2,23,30,39],rami:15,ran:57,random:[23,25,40,44,45],rang:[1,6,7,8,11,15,21,25,33,34,39,43,44,54,56,57],ranges_for:8,rank:[1,44],ranlib:51,rare:[1,2,20,25,45,57],rather:[1,2,4,6,15,19,20,25,30,33,38,41,44,49,52,54,57],raw:[8,19,25,41,50,57],rawstringformat:8,rax:[15,49],rbx:15,rcx:[1,15,49],rdc:6,rdi:15,rdpid:6,rdrnd:6,rdseed:6,rdx:[1,15],rdynam:6,reach:[2,9,19,26,30,33,38,41,56],reachabl:26,read:[0,1,2,3,6,7,11,15,16,19,23,25,28,33,34,35,37,39,41,46,49,51,52,57],read_only_reloc:6,readabl:[32,37,57],reader:[33,52],readerlock:52,readertrylock:52,readerunlock:52,readi:24,readm:[9,21],readonli:[1,6,8,15],readwrit:[6,19],real:[0,2,6,19,20,25,30,33,35,37,38,53,57],realign:[1,6],realist:[23,38],realli:[1,2,3,8,20,25,57],realloc:6,reason:[0,1,2,3,18,20,23,25,30,37,38,52,53,55,57],reassoci:6,rebas:33,rebuild:[38,55],rebuildxxx:25,rebuilt:[38,57],recal:1,receiv:[1,2,19,29,30],recent:[2,15,24,25,33,41,51],recipi:2,reciproc:6,reclaim:2,recogn:[1,2,6,19,25,28,30,57],recommend:[0,1,2,14,15,30,38,57],recompil:[2,33,37,38,41],reconstruct:41,record1:30,record2:30,record:[6,8,15,19,25,30,36,41,57],recorddecl:[25,32],recordtofil:39,recov:[1,2,4,6,14,15,25,36,56,57],recover:56,recoveri:[4,6,25,36,57],rect:39,recurs:[6,25,26,33,38,57],recursiveastvisitor:[9,21,25,26,58],red:[6,25,30,39],redeclar:[1,41],redefin:38,redefine_extnam:19,redefinit:38,redirect:[1,15],redo:25,reduc:[1,2,11,18,25,30,38,41,44,51,57],reduct:[40,44],redund:[1,2,11,15,30,38,46,57],redzon:[0,23],ref:[2,6],refactor:[10,21,26,55,58],refactoringact:43,refactoringactionrul:43,refactoringactionrulerequir:43,refactoringoptionsrequir:43,refactoringrulecontext:43,refcount:3,refer:[1,4,8,11,14,15,17,18,20,21,25,32,33,37,38,39,40,41,43,44,45,47,49,50,54,56,57,58],referenc:[3,4,11,14,19,25,29,33,38,41,57],reffer:57,reflect:[1,25,57],reflowcom:8,reformat:[8,10,34],refrain:2,reg:[6,57],regard:[1,25,57],regardless:[1,2,4,6,10,29,30,42,43,57],regehr:56,regener:57,regex:[6,7,8,44,57],region:[0,1,7,15,17,18,19,30,40,44,45,50],regist:[1,2,4,6,15,16,18,23,30,33,44,45,49,50,57],registr:[2,6],registri:[1,9],regress:45,regroup:8,regular:[3,6,8,14,30,47,51,57],reinject:25,reinterpret:15,reinterpret_cast:[1,2,10,19,30],reject:[20,36,39],rel:[0,1,2,6,14,15,22,28,30,35,36,38,41,47,56,57],relat:[1,6,14,15,16,19,21,24,25,33,35,38,40,43,44,45,55,57],relationship:2,relax:[6,14,15,36,37,44],releas:[1,2,3,6,14,19,30,33,38,39,51,57,58],release_cap:52,release_generic_cap:1,release_shared_cap:52,relev:[15,16,25,29,30,42,54,57],reli:[1,2,14,15,23,30,33,36,38,39,44,45,52,57],reliabl:[2,57],reloc:[6,44,57],relocat:6,remain:[1,2,15,25,30,33,38,45,52,57],remaind:[2,19,40,44],remap:[6,44],remark:[2,6,19,25,57],rememb:[0,14,25],remov:[1,2,6,8,10,19,20,23,25,30,38,39,44,51,57],renam:[7,8,10,43,44,52,57],renameoccurr:43,render:[2,25,50],renderscript:1,rendit:57,reorder:[2,19,30,38],rep:6,repack:6,repars:[24,25,41],repeat:[1,25,32,38,57],repetit:25,replac:[1,2,7,11,15,18,19,25,30,34,37,38,39,40,43,52,57],replai:28,replic:30,report:[1,6,11,15,19,20,36,38,43,47,53],repositori:[9,10,24,33,35,38],repres:[1,2,3,4,6,15,19,20,25,30,32,33,39,41,43,46,56,57],represent:[1,2,6,19,25,38,40,41,54,56,57],reproduc:[11,19,57],reproduct:[6,57],request:[1,2,4,6,18,19,44,57],requir:[1,2,3,4,6,8,14,16,18,20,23,24,25,28,29,30,33,36,37,39,40,41,44,45,46,49,51,54,56,57],requiredrefactoringopt:43,requires_cap:52,requires_shared_cap:52,rerol:6,rerun:[28,55],resembl:[26,32],reserv:[0,1,2,3,4,6,18,21,30,37,38,49,53],reset:[19,52],resid:[4,10,38,41,57],resolut:[1,2,6,19],resolv:[1,2,6,19,23,25,38,42,57],resort:[30,44],resourc:[1,2,6,25,38,44,52],respect:[1,2,3,4,8,11,25,30,38,39,41,47,51,56,57],respondstoselector:30,respons:[1,2,11,15,20,25,30,35,40,41,43],rest:[2,3,10,25,41,46,56,57],restor:[1,2,33,45,57],restrict:[1,3,6,14,19,25,30,33,38,41,52,57],restructuredtext:25,result:[0,1,4,6,7,8,11,15,18,20,24,25,26,29,33,35,36,37,38,39,41,43,50,51,52,56,57],resum:30,ret:[15,18,23,30,49],ret_label:17,retag:23,retain:[1,3,4,6,8,25,50,57],retaincount:2,retpolin:6,retq:49,retriev:[18,25,30,32,35,42],retroact:2,return_void:19,returnfunctionptr:4,returnstmt:26,returntypebreakingstyl:8,reuqest:1,reus:[2,25,50],rev:3,rev_i:30,rev_x:30,rev_z:30,revers:[30,41,57],revert:[7,30],review:[2,10],revis:[2,3,30,38,50,57],rewrit:[3,6,10,25,38],rewritten:[3,10,25,39,50],rex:25,rfg:15,rich:[25,57],right:[1,2,3,8,16,19,20,25,30,32,33,38,46,56,58],rigor:32,rip:15,risc:[1,19],risk:[2,8,30,57],rizsotto:21,rnd:6,rob:2,robust:[21,38],rodata:[6,30],roeder:14,rol:15,role:[1,19,25],roll:2,root:[2,6,16,57],ropi:6,rot_x:30,rotat:[15,30,44],roughli:[20,23,25],round:[1,6,8],rout:15,routin:[1,2,3,20,34,41,52],rpass:[6,30,57],rpath:6,rprichard:21,rsp:49,rst:[3,25],rtag:21,rtbs_all:8,rtbs_alldefinit:8,rtbs_none:8,rtbs_toplevel:8,rtbs_topleveldefinit:8,rtd:6,rtlib:[6,11,54],rtm:6,rtti:[6,14,15,19,36,44,56,57],rule:[1,2,6,8,11,21,25,27,29,36,38,39,44,52,57],run:[0,1,4,6,7,10,11,14,15,16,18,19,20,24,25,28,30,31,33,37,42,44,46,49,53,54,55,56,57],runtim:[0,1,4,6,9,11,14,15,17,18,19,36,37,39,40,45,49,51,55,57],runtooloncod:[35,42],rvalu:[2,19,25],rwpi:6,safe:[1,2,6,19,30,36,44,52,57],safe_stack:30,safe_stat:1,safer:[2,16,39],safestack:[15,30,49,58],safeti:[2,23,30,39,58],sahf:6,sai:[1,2,24,25,38,57],said:[1,2,3,4,30,39],same:[0,1,2,3,4,8,9,11,14,15,16,18,19,20,24,25,27,28,30,33,35,36,37,38,39,41,43,46,49,50,51,52,54,57],sampl:[1,6,35,43],sampleprofread:57,sampler:[19,44],san:1,sandbox:0,sandybridg:1,sane:[2,6,38,57],sanit:[0,1,6,14,15,17,18,31,37,46,48,50,53,56,57,58],saniti:[25,52],sanitize_address:23,sanitize_hwaddress:23,sanitizer_stats_path:48,sanitizercoverag:[50,57,58],sanitizerstat:[57,58],sanstat:48,satisfi:[1,17,20,38,43],save:[1,2,6,7,11,15,20,30,41,45,49,57],sbpo_alwai:8,sbpo_controlstat:8,sbpo_nev:8,scaffold:33,scalabl:[38,51],scalar:[2,3,25,30,39],scale:18,scan:[2,11,51,57],scanf:[1,19],sce_orbis_sdk_dir:19,scenario:[2,29,57],schedul:[40,44],scheme:[1,10,15,30,40,41,44,45,49,57],scope:[0,1,2,4,6,10,25,27,30,38,41,44,50,57],scoped_lock:[19,52],scratch:[1,49],script:[0,6,46,57],scroll:33,sdata:6,sdc1:6,sdk:[1,30,57],sdkset:19,seamlessli:2,search:[0,5,6,8,9,11,15,19,20,22,26,30,35,38,41,44,57,58],second:[1,2,3,4,6,7,8,14,15,19,20,25,30,33,36,38,39,43,46,48,51,52,57],second_param:[1,2],secondari:2,secondid:33,secondvalueveryveryveryverylong:8,sectalign:6,sectcreat:6,section:[2,6,8,12,14,15,19,20,22,25,32,33,38,39,41,43,44,46,47,50,52,57],sectobjectsymbol:6,sectord:6,secur:[14,18,30,44,52,57],security_critical_appl:30,see:[0,1,2,3,5,6,8,9,10,14,15,20,21,22,23,25,26,27,28,30,32,33,35,36,38,39,41,43,44,45,46,47,49,51,52,54,56,57],seek:1,seem:[2,23,30],seen:[0,2,8,30,39,41],seg1addr:6,seg:6,seg_addr_t:6,seg_addr_table_filenam:6,segaddr:6,segcreat:6,seglinkedit:6,segment:[1,6,19,45,49,57],segprot:6,segs_read_:6,segs_read_only_addr:6,segs_read_write_addr:6,seh:[6,36],sei:[1,52],sekar:45,sel_getnam:19,select:[1,6,7,9,19,20,25,38,39,50,54,56,57],select_ovl_candid:25,selector:[1,2,6,25,30,39,41],self:[1,4,8,25,30,37],sell:3,sema:[40,41,44],semacodecomplet:25,semadeclattr:25,semahandl:25,semant:[1,6,11,14,21,24,27,30,36,40,41,44,49,52,54,55,57],semi:[6,8,44,57],semicolon:[19,25,44],send:[2,19,21,30,39,48,57],sender:6,sens:[1,2,16,25,27,30,33,57],sensibl:[2,25,30],sensit:[1,18,25],sent:[2,4],sentinel:19,separ:[0,1,2,6,8,10,11,12,14,18,19,20,23,25,33,35,38,39,41,43,45,48,49,51,52,57],separatearg:20,seq:1,sequenc:[1,2,6,15,20,23,25,30,38,41,57],sequenti:[1,18,19,28,30,40,57],seri:[25,38,43,51],serial:[6,19,25,28,38,41,44,51],seriou:[2,41,44],serv:[2,10,20,21,25,33,41,52],server:[21,25,46],servic:[1,55],session:6,set:[0,1,2,3,4,6,7,8,10,11,14,15,16,18,20,21,24,25,27,29,30,33,35,37,38,39,40,41,43,44,46,48,50,51,52,53,54,55,56,57],setcompletionblock:8,setobject:39,setter:[2,3,6,30],setup:[5,6,10,15,16,35,58],setwidth:25,seven:20,sever:[1,2,4,7,8,12,15,19,25,29,30,33,41,43,44,54,56,57],sfs_all:8,sfs_empti:8,sfs_inlin:8,sfs_inlineonli:8,sfs_none:8,sgpr:1,sgx:6,sha:6,shadow:[17,18,19,23,30,45],shadowcallstack:58,shall:[1,2,3,18,38],shape:44,share:[0,1,2,4,6,10,11,18,19,20,25,35,37,38,41,45,50,51,52,54,55,57],shared_lock_funct:[1,52],shared_locks_requir:52,shared_object_with_vptr_failur:56,shared_trylock_funct:52,shell:[28,33,47,54],shell_error:24,shift:[2,25,30,41,56],ship:[3,22,50],shockingli:33,short__cal:1,shortcut:[7,38],shorten:2,shorter:[15,19,49],shortest:15,shortfunctionstyl:8,shorthand:30,should:[0,1,2,3,4,6,8,10,11,14,16,17,19,20,22,24,25,28,30,33,36,37,38,39,41,43,44,45,46,49,50,52,53,54,56,57],shouldn:[1,18,25,38,44],show:[6,7,11,15,20,21,25,29,30,33,42,43,50,51,57],showfilenam:57,showinclud:57,shown:[2,20,30,43,57],shstk:6,shuffl:[30,57],shutdown:46,sibl:[0,6,37],side:[1,2,4,6,8,10,15,18,19,25,30,33,39,49,54,56,57],sigaltstack:45,sigil:2,sign:[2,6,11,25,30,39,44,47,56,57],signal:[2,6,21,23,45,48,56,57],signatur:[1,2,3,6,15,17,30,50,57],signed:19,signifi:2,signific:[2,6,8,19,20,23,57],significantli:[2,23,25,41,44],sigusr2:48,silenc:[1,19,57],silence_unsigned_overflow:56,silent:[1,2,24,30],silli:25,simd128:6,simd:[6,19,40,44,57],simdlen:1,similar:[1,2,4,7,8,10,14,15,19,23,25,30,35,37,38,41,43,44,46,50,51,52,57],similarli:[3,10,15,20,23,30,38,39,46,49,52,57],similiarli:1,simpl:[2,8,9,16,18,19,23,25,26,28,30,33,36,38,39,41,43,46,48,55,57],simpler:[15,38],simplest:[3,21,33,50],simpli:[0,1,2,3,10,15,20,25,30,31,33,37,38,39,43,46,50,51,52,53,57],simplifi:[1,2,15,25,30,38,39,40,44],simplist:30,simt:[1,57],simul:[0,6],simultan:[2,51,52],sin:1,sinc:[1,2,3,6,15,16,20,21,23,25,28,30,33,38,39,41,45,46,52,57],sine:1,sinf:1,singl:[1,2,6,7,8,11,14,15,16,19,20,23,24,25,28,29,30,32,33,38,39,41,43,46,50,51,52,54,55,57],single_cpu:1,single_modul:6,sink:18,sinl:1,site:[1,7,14,25,44,45,48,57],situat:[2,30,57],size:[0,1,2,3,4,6,8,9,10,11,14,15,18,23,25,33,38,39,40,41,44,46,50,51,53,56],size_t:[1,6,17,18,30,38,57],sizeddealloc:57,sizeof:[1,3,4,17,19,25,30,46],sjlj:6,skim:33,skip:[2,7,19,50,54,57],slash:7,sled:6,slide:26,slightli:[23,37,38],sloc:[5,26],slot:[21,44,49,57],slow:[15,16,37],slowdown:[0,37,53],slower:16,slowpath:15,slp:6,sm_35:6,small:[1,2,5,6,11,19,20,25,30,33,41,42,45,56],smaller:[0,2,11,15,19,23,25,50,56,57],smallest:7,smallestint:39,smart:52,smash:6,sn4rkf:20,snippet:[5,25,42],snowleopard:3,soft:[6,16],softwar:[3,6,15,16,21,23,38,45,52],sole:[1,2,25],solut:[2,25,28,33,57],solv:21,some:[0,1,2,6,8,9,10,14,15,16,18,19,20,21,23,25,26,29,30,32,33,34,36,37,38,39,40,41,42,43,44,45,46,47,49,51,52,53,54,56,57],some_directori:57,some_struct:1,some_union:1,someclass:8,somefunct:8,somelib:38,somelongfunct:8,somelooooooooooooooooongfunct:8,somemessag:3,someon:[2,38],someth:[1,2,3,16,20,21,25,30,32,33,57],sometim:[1,2,8,36,52,54,56,57],somewhat:[2,23,25,38,44],somewher:[8,11,25,46,57],song:45,soni:57,soon:[2,36,57],sophist:2,sorin:15,sorri:19,sort:[1,2,7,8,10,25,27,30,43,57],sortedarrayusingcompar:30,sortinclud:8,sortusingdeclar:8,sound:57,sourc:[0,1,2,3,6,7,8,9,10,11,14,16,17,18,21,22,23,24,25,27,28,29,30,32,33,34,35,37,38,39,42,43,44,46,47,53,54,56,57,58],sourcebasedcodecoverag:46,sourcebuff:25,sourcechangerefactoringrul:43,sourcemanag:[34,41],sourcemgr:34,sourcerang:43,sourcerangeselectionrequir:43,sourceweb:21,space:[0,6,8,14,15,18,19,23,25,28,30,37,41,44,48,51,53,56,57],spaceaftercstylecast:8,spaceaftertemplatekeyword:8,spacebeforeassignmentoper:8,spacebeforecpp11bracedlist:8,spacebeforectorinitializercolon:8,spacebeforeinheritancecolon:8,spacebeforeparen:8,spacebeforeparensopt:8,spacebeforerangebasedforloopcolon:8,spaceinemptyparenthes:8,spacesbeforetrailingcom:8,spacesinangl:8,spacesincontainerliter:8,spacesincstylecastparenthes:8,spacesinparenthes:8,spacesinsquarebracket:8,span:[6,8,50],sparc:[23,57],spars:[15,18,50],spawn:[38,57],spec:[1,6,14,20],special:[0,1,3,8,11,14,15,16,17,18,20,25,28,30,37,40,41,50,52,53,55,56,57,58],special_sourc:47,specif:[1,2,6,7,8,10,11,14,15,17,18,19,20,21,24,25,26,29,32,33,34,35,36,38,39,40,41,42,43,44,45,47,50,52,54,55,56,58],specifi:[0,1,2,3,4,6,7,8,9,11,14,15,16,24,25,28,29,32,33,35,38,40,42,43,44,45,47,49,50,51,52,53,56,57],spectr:1,specul:[1,2,6,38,44],speculative_load_harden:44,speed:57,speedup:47,spell:[1,6,30,57],spent:57,spew:25,spill:[1,15,18,45],spir64:57,spir:[30,57],splat:30,split:[1,2,6,8,30,38,46,57],splitemptyfunct:8,splitemptynamespac:8,splitemptyrecord:8,spmd:[1,40,44,57],spread:[11,16,30,57],spuriou:[2,52],sqrt:6,squar:[6,8,25,30,47],sram:6,src:[0,1,3,14,17,37,47,53,54,56],src_label:17,src_vec:30,ssa:18,sse2:6,sse3:[6,16],sse4:[1,6,38],sse4a:6,sse:[1,6],ssp:6,ssse3:6,st17basic_string_viewicst11char_traitsice:57,st3__1:57,st7__cxx11:57,stabl:[15,22,38,55,57],stack:[0,1,2,3,4,6,11,15,25,30,37,38,41,44,47,50,53,54,57],stackrealign:[6,44],stage:[2,25,33,53],stai:53,stale:6,stand:[7,10,25,31,32,41],standalon:[6,10,11,34,38,42,53,55,57],standard:[1,2,6,7,8,10,11,14,16,19,25,26,29,34,36,38,44,52,55,56],standpoint:41,stapl:25,starequ:25,start:[0,1,2,3,4,6,7,8,11,15,18,19,21,25,26,30,31,32,33,37,38,39,41,42,46,47,51,56,57],startoflin:25,startup:46,stat:[6,11,38,41,48,57],state:[0,1,2,11,18,19,20,25,30,38,41,54,57],statement:[2,3,4,8,26,30,33,44,46,50,57],statementmacro:8,statementmatch:33,static_assert:19,static_cast:[8,10,14,19,30],statist:[6,11,19,41,48,50,57],statu:[1,30,36,44],std:[1,2,6,8,9,10,11,14,25,27,29,30,34,35,38,42,43,51,57],stdatom:30,stdc:[19,30],stdcall:6,stddef:35,stderr:[0,37,53,57],stdext:29,stdin:7,stdint:[30,46],stdio:[22,37,38,46],stdlib:[6,11,19,31,38,47,54],stdlibc:19,stdout:[6,7,24,57],stem:8,step:[0,1,2,6,15,19,20,21,24,25,28,31,32,35,37,38,42,43,50,51,54,55,57],stephen:14,sticki:1,still:[1,2,3,15,16,19,20,23,25,28,30,33,36,37,38,40,41,44,46,49,51,52,53,57],stmt:[25,26,33,44],stmtnode:25,stmtprinter:25,stmtprofil:25,stmtresult:25,stop:[2,8,11,19,20,25,41,42,46,54,57],storag:[1,3,11,15,18,25,30,38,57],store:[1,2,3,6,15,17,18,19,20,23,25,37,40,41,42,45,46,49,50,53,57],stp:49,str:[49,57],strai:[2,30],straightforward:[20,25,33],strang:25,strateg:15,strategi:[32,38],strbuf:1,strchr:[2,30],strcmp:30,stream:[10,25,34],strengthen:15,stret:3,strex:30,strict:[1,2,6,11,30,57],strictli:[1,2,52,57],strictstr:57,strike:2,string1:8,string1rang:30,string2:8,string:[1,2,6,7,8,9,11,15,20,24,27,28,32,33,35,38,41,43,46,50,51,57],string_liter:25,string_view:57,stringargu:25,stringiz:25,stringref:[42,43],stringwithutf8str:39,strip:[2,6,7,46,56,57],strip_path_prefix:46,strive:43,strlen:[11,25,30],strncat:19,strncmp:[19,30,39],strnlen:1,strnlen_chk:1,strong:[1,2,3,4,6,19],stronger:[6,19,45,49,52],strongli:[1,19,52],stroustrup:8,struct:[0,1,3,6,8,15,18,25,27,29,30,36,38,39,41,44,48,57],structur:[2,3,6,8,14,17,19,20,25,32,36,41,43,44,50,52,57],studio:[8,19,38,57],stuff:44,style:[1,2,4,6,7,10,11,20,21,25,30,38,44,52,55,57,58],styleguid:34,sub:[1,2,15,16,25,30,33,38,39,41,50],sub_librari:6,sub_umbrella:6,subclass:[1,2,19,30,39,43],subcommand:43,subdirectori:[38,57],subexpr:25,subexpress:[25,41],subgroup:[1,57],subject:[1,2,3,4,19,38,54],subjectlist:25,sublicens:3,subminor:19,submodul:[19,41],subnam:38,subobject:[2,19],suboper:2,subprocess:[19,20],subq:49,subrecord:6,subscript:6,subsequ:[0,1,2,6,11,20,25,30],subset:[2,8,14,25,29,30,55,56,57],subsetsubject:25,substanti:3,substat:41,substitut:[2,4,19,25,27,36,48,57],substr:[2,24],subsum:[18,20],subtarget:1,subtask:20,subtl:[1,2,38,57],subtract:[19,30],subtyp:2,subvers:[10,30,33,44,54],subvert:14,subview:1,succe:[1,41,50],succeed:43,success:[1,20,52],successfulli:[1,2,6,36,43,57],successor:25,sudo:[24,33],suffer:[2,49],suffic:25,suffici:[1,2,15,57],suffix:[1,8,19,20,25,30,39],sugar:[1,2,21],suggest:[0,1,19,23,25,36,37,53],suit:[0,1,8,14,36,53,56],suitabl:[1,6,10,11,19,25,43,52,54,56,57],sum:[16,30,57],summar:3,summari:[3,6,11,12,31,50,51],sunk:1,superclass:[2,19,30],superset:[2,19,25],supertyp:2,superview:1,supervisor:1,superword:6,supp:[0,56],supplement:2,suppli:[1,3,4,8,30,38,53,54,57],support:[4,6,7,8,10,11,16,17,18,19,20,31,33,35,36,38,39,41,43,46,47,48,49,50,51,52,54,58],supportsapilevel:1,suppos:[1,3,15,19,33,38],suppress:[2,6,14,19,30,37,38,53,57],sure:[0,1,8,16,20,25,31,33,37,52,56,57],surfac:56,surpris:2,surrog:19,surround:[8,19],surviv:[1,2],suspend:30,suspici:[1,6,56,57],svn:[7,10,33,34,54],svr4:6,sw0:1,sw1:1,swap:[25,30],swapcontext:45,sweep:45,swi:1,swift:[1,16,19],swiftprotocol:1,swig:52,swizzl:30,symbol:[1,3,6,11,15,19,20,29,38,43,44,46,50,53,57],symbolnam:21,symcov:46,symlink:38,symmetr:1,symposium:45,sync:33,synchron:[2,4,8,25,53],synonym:[0,1,6,19],syntact:[1,2,7,24,25,55],syntax:[2,4,6,8,10,11,25,28,30,33,35,38,39,41,52,55,57],syntaxonlyact:[33,35],synthes:[2,3,6,19,25],synthesi:[2,30],sys:[16,38],sysroot:[6,16,57],system:[1,2,3,6,9,11,16,17,18,20,22,25,33,36,38,41,44,45,49,52,54,55,56],system_framework:30,system_head:[19,38,57],syzkal:46,szeker:45,tab:[7,8,57],tabl:[1,2,6,11,18,25,26,30,36,56,57],tablegen:[8,25],tabwidth:8,tag:[1,17,21,23,30,52,58],tail:[0,1,6,37],tailor:12,taint:23,take:[1,2,3,4,6,8,9,11,14,19,22,24,25,27,30,32,33,35,36,38,39,42,43,48,50,55,57],taken:[1,2,8,14,15,19,25,30,41,45,57],talk:[25,43],tamper:1,target:[3,8,15,23,24,25,26,29,38,40,41,44,49,54,55],target_link_librari:[33,42],targetaddr:15,targetinfo:[25,57],targetspecificattribut:25,task:[20,32,40,46],tbaa:6,tbi:23,tblgen:[25,57],tbm:6,tbss:6,tc1:57,tc2:57,tc3:57,tdata:6,teach:[25,32,36],team:[40,44],teardown:2,technic:[1,2,14,38,57],techniqu:[15,25,41,57],technolog:[1,45,49],tell:[1,6,25,33,57],temp:[6,11,20],templat:[1,6,8,25,27,32,33,38,44,50,52,57],templateidannot:25,temporari:[2,6,11,20,30,57],tend:[2,38],tent:[19,25],terabyt:[0,37],term:[1,2,15,20,24,30,56],termin:[1,2,3,19,25,35,39,57],terminolog:52,ternari:[8,25],test:[0,1,2,8,10,15,20,24,25,26,27,30,33,35,36,38,39,41,44,45,52,53,56,57],testb:15,tested_st:1,testframework:30,testm:4,text:[1,6,7,8,19,25,27,30,33,35,38,43],textdiagnosticbuff:25,textdiagnosticprint:25,textproto:8,textsubstitut:25,textual:[25,38,54,57],tgsin:1,than:[0,1,2,4,6,8,11,14,15,16,20,21,23,25,29,30,32,33,37,38,39,40,41,45,46,49,52,53,54,55,56,57],thankfulli:33,the_new_extension_nam:57,thei:[1,2,3,4,6,8,10,11,14,15,16,20,21,25,27,29,30,32,33,35,36,37,38,39,41,43,44,47,50,52,54,55,57],theletterz:39,them:[1,2,3,4,6,10,14,15,16,20,22,24,25,30,32,33,35,38,39,41,42,43,45,46,50,52,54,57],themselv:[8,10,14,20,25,38,42,43],theoret:2,theori:2,therefor:[1,2,15,25,29,30,38,39,41,45,53,57],thi:[0,1,3,4,6,7,8,9,10,11,14,15,16,17,18,20,21,22,23,24,25,26,27,28,29,30,32,33,34,35,36,37,38,39,40,41,42,43,45,46,47,48,49,50,51,52,53,54,55,56,57],thin:[6,11,14,51,57],thing:[2,16,20,21,25,28,30,42,44,57],think:[8,25,30,52],thinlto:[6,11,58],third:[1,2,25,30,36,38,39,41,48],those:[1,2,4,6,7,8,9,10,14,15,17,20,25,30,32,33,36,38,40,41,44,46,52,54,57],though:[1,2,19,25,30,33,38,45,50,53,57],thousand:[18,32,57],thrash:1,thread1:53,thread:[0,2,4,6,11,19,30,36,38,40,45,47,49,51,57,58],thread_annotation_attribute__:52,thread_limit:40,thread_loc:6,thread_safety_analysis_mutex_h:52,thread_sanit:30,threadpriv:57,threadsaf:6,threadsafeinit:57,threadsanit:[1,6,30,47,57,58],threadsanitizercppmanu:53,three:[1,2,10,15,16,19,25,30,33,39,41,50,52,57],threshold:[6,57],thrice:30,through:[1,2,3,6,9,11,15,17,19,20,25,30,33,34,35,37,38,41,42,45,47,50,51,52,55,56,57],throughout:[38,41,57],thrown:[4,11,19],thu:[1,3,4,7,8,11,15,18,25,26,30,35,38,40,41,42,46,52],thumb:[6,16,57],thunk:6,thusli:3,tice:14,tidbit:30,tidi:1,tied:[1,2,30],tighten:2,tightli:[2,25,57],time:[0,1,2,4,6,11,14,15,16,18,20,25,26,28,29,30,31,32,33,35,36,37,38,39,40,41,43,44,46,47,48,49,50,51,52,53,54,56,57],timestamp:6,tini:41,tiny_rac:53,tip:35,titl:57,tls:[6,38,57],tls_model:[11,57],tmp:[11,20,46,50],tmpdir:11,to_glob:57,to_loc:57,to_priv:57,todai:[38,39],todo:[23,57],togeth:[0,2,7,8,11,15,19,20,25,29,30,37,38,46,50,53,54,56,57],toggl:35,toi:21,tok:25,token:[4,6,9,10,11,30,34,38,39,41,44,52,57],tokenkind:25,toler:[2,18],tolow:[17,18],tom:14,ton:25,too:[1,2,3,6,15,22,44,51,52,57],took:41,tool:[0,1,2,5,9,11,13,14,16,17,18,20,23,25,26,28,30,32,34,36,37,38,40,41,42,43,45,47,50,53,55,57],toolchain:[6,19,36,57,58],toolkit:10,toolset:57,top:[2,7,8,9,15,19,20,23,25,28,30,37,38,41,45,55,57],toplevel:[8,26,35],topleveldefinit:8,tort:3,total:[3,50,51,57],total_head_sampl:57,total_sampl:57,totyp:30,touch:7,tovalu:39,toyclangplugin:21,tparam:19,tr1:10,trace:[0,1,6,37,53,57],trace_pc_guard:46,track:[1,2,6,10,16,17,18,25,38,44,50,52,57],tracker:57,trade:[23,49],tradeoff:[15,29],tradit:[2,6,30,57],trail:[1,8,19,57],trait:57,transcendent:6,transfer:[1,2,15],transferfrom:52,transform:[2,6,10,25,32,36,43,51,57],transformxxx:25,transformyyi:25,transit:[1,3,25,38,41,52],translat:[0,1,2,3,6,11,14,17,18,26,28,29,30,32,33,35,38,39,40,41,42,43,52,57],translationunitdecl:[5,25,26,41],transpar:[1,11,19,41,51],transparent_union:19,trap:[6,15,19,23,49,56,57],travers:[25,26,33,41,42],traversedecl:42,treacher:2,tread:2,treat:[2,3,4,6,11,14,17,19,25,29,30,38,47,52,57],treatment:1,tree:[6,9,10,11,20,24,25,28,32,33,35,38,41,44,57],treetransform:25,tri:[1,2,20,21,25,27,52,57],triag:57,trick:[2,38],tricki:[25,57],trigger:[2,38,41,55],trigraph:[6,11,19,25,57],trim:56,trip:[1,30],tripl:[6,19,41,44,50,57],trivial:[1,2,6,17,19,25,30,33,38,40],trivial_abi:19,truct:3,trueconst:1,truenumb:39,truncat:[15,18,19,30,44,50,56],trunk:[10,30,34,54],trust:[2,15],truthi:1,try_acquire_cap:52,try_acquire_shared_cap:52,tryannotatecxxscopetoken:25,tryannotatetypeorscopetoken:25,trylock:52,tsan:53,tsan_interceptor:53,ttext:6,tune:[1,51,53],tupl:[1,57],turn:[0,2,3,6,11,19,20,25,26,30,33,38,45,47,52,57],tutori:[9,26,35,42,58],tvo:[1,30],tweak:[36,57],twice:[2,30],two:[1,2,4,6,8,9,14,15,16,18,19,20,25,26,29,30,33,34,35,38,39,40,41,43,45,47,50,52,56,57],twolevel_namespac:6,twolevel_namespace_hint:6,twophas:57,txt:[1,23,28,33,42,47,51,57],type1:30,type2:30,type3:30,type:[0,3,6,8,10,11,14,15,17,18,20,26,27,33,35,37,38,39,40,42,44,47,48,49,51,52,53,56,57],type_alia:30,type_express:4,type_idx:1,type_tag_idx:1,type_trait:[30,38],typeattr:25,typecheck:2,typedef:[1,2,4,25,30,38,39,44,57],typedefdecl:5,typedeftyp:25,typedev:6,typeid:19,typeinfo:15,typeloc:42,typenam:[1,8,19,25,30,36,50,57],typest:1,typic:[0,1,2,8,11,15,16,21,23,25,36,37,38,43,46,52,53,54,57],ubfx:23,ubsan:56,ubsan_opt:56,ubuntu:0,ucontext:45,ud2:[15,49],uglier:38,uint16_t:[30,46],uint32_t:[30,46],uint64:15,uint64_t:[30,46],uint8_t:[30,46],uint:7,uintptr_t:46,ulimit:[0,37,53],ultim:[2,11,25],umbrella:[6,43,52],umr2:37,umr:37,unabl:[1,19],unaccept:[2,49],unaffect:8,unalign:[6,19],unannot:[1,19],unari:[4,8,25,30,33],unaryoper:33,unavail:[1,38],unavoid:[0,2],unbalanc:2,unbeliev:57,unblock:0,unbound:25,unbridg:2,unchang:28,uncheck:15,unclear:1,uncommon:[2,25],uncomput:25,uncondit:[25,30],uncondition:30,unconsum:[1,19],uncontroversi:2,uncov:36,undeclar:[19,52],undef:[1,6,11,18,19,38,41],undefin:[1,2,3,6,11,14,18,30,38,57],undefinedbehaviorsanit:[57,58],undefinit:38,under:[0,1,2,3,4,6,7,14,15,17,18,19,21,25,34,37,38,39,43,45,47,49,51,52,53,54,57],undergo:[2,19,25],undergon:57,underli:[1,2,3,10,15,18,19,25,37,38,39,44,52,54,57],underneath:57,underscor:[1,2,6,30,57],understand:[2,8,11,16,20,21,25,32,33,37,41,48,50,52,57],undo:7,undocu:[25,57],unelabor:19,unescap:28,unevalu:[1,19,25],unexpect:[2,19],unexported_symbols_list:6,unfold:25,unforgiv:[2,25],unformatted_cod:8,unfortun:[1,2,25,33,38],unhandled_except:19,unicod:[19,44],unifi:[7,19],uniform:[1,6],unimpl:6,unimport:[1,38,57],uniniti:[2,3,6,14,37,44,57],uninstru:[15,17,37,46,49,50],uninstrument:17,unintend:38,unintent:56,unintention:2,unintrus:1,unintuit:1,union:[1,3,8,17,18,25,27,32,41,44,57],uniqu:[1,6,11,15,20,25,30,33,38,39,41,57],unique_ptr:[8,25,42,52],unit:[0,1,2,6,11,14,16,17,18,25,26,28,29,30,32,35,38,39,41,42,43,52,57],univers:[19,20],unix:[28,30,38],unknown:[1,15,16,17,38,57],unknownmemb:36,unknowntyp:36,unlabel:[17,18],unless:[1,2,3,8,14,17,19,25,30,38,43,44,49,51,52,56,57],unlik:[1,2,15,17,18,25,30,38,39,52,53,56,57],unlist:30,unlock:52,unlock_funct:[1,52],unlucki:38,unmaintain:44,unmanag:2,unmark:1,unmodifi:57,unnam:[25,29],unnecessari:[1,2,19,20,41,44],unneed:21,unordered_map:10,unpack:16,unpleasantli:2,unpredict:[19,30,50],unprotect:45,unprototyp:1,unqualifi:[2,27,30,57],unreach:[6,19,44,56,57],unrealist:38,unrecogn:19,unreduc:26,unregist:2,unrel:[14,41],unrelatedcast:14,unresolv:15,unrol:[6,19,57],unroll_and_jam:1,unroll_count:[1,30],unroot:2,unsaf:[2,6,30,45,52],unsafe_unretain:[2,19,30],unsafeincr:52,unsav:7,unsequenc:[2,19],unsign:[0,1,3,5,6,8,9,25,30,37,39,44,50,57],unsiz:30,unspecifi:[1,2,4,8,11,19,25,57],unstabl:14,unsuit:[14,54],unsupport:6,unsur:43,unten:2,untermin:19,until:[2,4,15,31,32,36,52,57],untransl:20,untyp:30,unus:[6,11,18,25,30,38,57],unusu:25,unwant:1,unwind:[1,2,6,11,30,50],unzip:16,updat:[2,4,8,11,17,25,41,43,50,52,57],upgrad:[1,25,50],upload:57,upon:[1,2,3,4,14,38,39,57],uppercas:2,upsid:20,upward:41,urg:1,usabl:[1,8,30,57],usag:[1,6,7,8,30,33,46],use:[0,1,2,3,4,5,6,7,8,9,10,11,13,14,15,16,17,18,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,49,50,51,52,53,54,55,56,57],use_lbr:57,use_lock_style_thread_safety_attribut:52,use_multipli:30,used:[0,1,2,3,4,5,6,7,8,10,11,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,34,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,56,57],useful:[1,2,3,10,11,21,24,25,30,33,37,38,41,43,46,56,57],useless:38,usenix:45,user:[1,2,5,6,8,9,10,11,14,17,18,20,21,22,23,25,26,28,32,36,38,39,40,41,42,43,44,46,47,51,52,58],userdata:18,userdefinedconvers:24,usersmanu:44,uses:[0,1,2,3,6,8,10,11,14,15,16,17,18,20,21,23,25,28,29,30,32,33,37,38,39,40,42,44,50,52,53,54,57],usetab:8,usetabstyl:8,using:[0,1,2,3,4,6,7,8,9,10,14,15,17,18,20,21,23,24,25,29,30,32,35,37,38,39,40,41,42,43,44,46,47,50,51,52,53,54,56,57,58],usr:[0,3,24,28,33,38,51,57],usual:[0,1,2,3,4,6,9,10,15,16,20,25,26,28,30,36,37,38,39,45,50,52,53,57],usualunaryconvers:25,ut_alwai:8,ut_forcontinuationandindent:8,ut_forindent:8,ut_nev:8,utf:[19,25,39,57],util:[1,2,8,25,41,50,51],uuid:[19,29],v4si:30,v6m:16,v7a:16,v7m:16,va_arg:19,va_list:1,va_start:[1,19],vae:6,vagu:2,val2:1,val3:1,val4:1,val:[1,30,44,46],valgrind:37,valid:[1,2,3,4,6,8,11,15,19,21,25,28,30,38,39,41,57],valu:[1,3,4,6,7,8,10,11,14,15,17,18,20,23,25,30,32,33,36,37,38,39,40,41,42,43,44,45,46,50,51,52,56],value1:8,value2:8,value_typ:1,valuedecl:33,valuetyp:10,valuewithbyt:39,valuewithcgpoint:39,vardecl:[5,26,33,41],vari:[1,2,41,54,57],variabl:[0,6,8,11,15,18,21,24,25,26,33,36,37,40,41,44,45,48,50,51,56,57],variad:[1,4,25,32,39],variant:[1,15,17,23,25,38,57],variat:[4,30],varieti:[7,38,44,45,54,57],variou:[0,1,2,3,4,6,10,15,21,25,30,38,41,43,44,50,52,56],varnam:44,vast:[1,2,25,38],vcall:[14,29,47,48],vcvarsal:57,vec1:30,vec2:30,vec:19,vec_add:30,vec_step:19,vector4doubl:30,vector4float:30,vector4short:30,vector:[1,2,6,8,9,11,20,25,34,35,38,40,44,46,57],vector_s:19,vectorize_width:30,vend:38,vendor:[16,25,30,38,44,57],verbatim:[15,19,25],verbos:[6,7,10,11,38,54,56,57],veri:[1,2,4,10,20,25,30,31,33,37,38,41,44,46,49,50,52,56,57],verif:[15,45],verifi:[6,15,21,23,25,30,32,41,45],verifydiagnosticconsum:25,verifyintegerconstantexpress:25,versa:[2,4,18,23,41,52],version:[1,2,3,4,6,7,9,10,11,14,15,19,20,25,30,33,35,37,38,39,41,44,50,51,52,54,57],verylongimportsareannoi:8,veryveryveryveryverylongcom:8,veryveryveryveryveryveryveryveryveryveryverylongcom:8,veryveryveryveryveryveryveryveryveryveryverylongdescript:8,vfp:[1,19],vgpr:1,vi1:30,vi2:30,vi3:30,vi4:30,vi5:30,via:[1,2,3,4,6,7,9,11,14,15,16,19,20,25,26,30,38,39,40,42,44,51,52,53,54],viabl:[1,19,25,57],vice:[2,4,18,41,52],view:[12,25,39,41,50],vim:[24,33],vimrc:[7,24],violat:[1,2,6,11,14,15,25,29,30,38,52,56,57],virt:[6,30],virtual:[0,1,6,25,29,33,36,37,42,45,47,48,51,53,55,57],vise:23,visibl:[1,6,11,14,25,38,41,52,57,58],visit:[11,25,42],visitcxxrecorddecl:42,visitnodetyp:42,visitor:42,visual:[6,8,19,25,30,36,38,43,46,57],vital:57,vla:[56,57],vmb:57,vmg:57,vmm:57,vms:57,vmv:57,voidarg:4,voidblock:3,volatil:[2,6,25,30,37,41,44,57],volodymyr:45,volum:1,vote:30,vpclmulqdq:6,vprintf:1,vptr:[14,56,57],vsi:30,vsx:6,vtabl:[6,11,14,15,29,44,57],vtordisp:57,vulner:[1,6,14,45,49],wai:[1,2,6,7,8,9,15,16,18,19,24,25,26,27,28,29,30,32,33,35,38,39,40,41,45,47,50,52,55,57],wait:[19,52],waitpkg:6,walk:[25,47],walkthrough:[9,35],wall:[24,57],wambigu:57,want:[0,1,2,8,10,14,16,20,22,24,25,26,30,32,33,34,35,36,42,43,46,47,55,56,57],warn:[1,6,11,17,21,25,30,36,37,38,39,44,53,55],warn_:25,warn_attribute_wrong_decl_typ:25,warranti:3,wasn:[19,38],wast:54,watch:25,watchdog:23,watcho:[1,30],water:2,wave:1,wavefront:1,wbind:57,wbnoinvd:6,wcdicw:20,wchar:6,wchar_t:[6,30,38],wconfig:38,wcschr:30,wcscmp:30,wcslen:30,wcsncmp:30,wdeprec:[6,30],wdocument:57,weak:[1,3,6,38],weak_framework:6,weak_import:1,weak_librari:6,weak_reference_mismatch:6,weaker:15,weakli:[1,30],weakrefer:30,web:[14,21,25,44,57],webassembl:1,webkit:[7,8],websit:[1,57],week:51,weigh:2,weight:[2,57],weird:25,welcom:[23,53],well:[0,1,2,3,4,6,7,8,10,11,14,15,16,19,20,25,30,34,36,38,39,41,43,44,50,51,54,55,56,57],wempti:44,went:37,were:[1,2,4,8,11,14,19,20,21,25,27,30,32,37,38,39,41,43,46,52,57],werror:57,weveryth:57,wextra:[44,57],wfoo:57,wformat:[1,30,57],wframe:6,wg21:[1,30],what:[1,2,6,13,15,16,20,25,30,32,33,35,36,38,52,56,57],whatev:[20,41,46,57],whatsload:6,whatsoev:2,when:[0,1,2,3,4,6,7,8,11,15,16,18,19,20,24,25,29,30,32,35,36,37,38,39,40,41,42,43,44,45,46,49,50,51,52,54,55,56,57],whenev:[1,2,3,8,19,25,33,41,52,57],where:[1,2,3,4,6,8,10,11,14,15,16,17,18,20,21,23,25,28,29,30,32,35,36,40,41,44,49,52,54,56,57],wherea:[1,2,14,15,16,18,30],wherev:[1,4,25,33,40],whether:[0,1,2,3,4,6,8,11,14,15,17,18,20,25,28,29,30,33,35,37,38,39,41,42,45,49,52,53,57],which:[0,1,2,3,5,6,7,8,9,10,11,12,14,15,16,17,18,19,20,21,23,24,25,26,27,28,29,30,31,32,33,35,36,38,39,41,42,43,44,45,47,49,50,51,52,54,55,56,57],white:6,whitelist:6,whitespac:[8,10,25,57],who:[1,2,10,26,30,33,38,57],whole:[1,6,15,26,29,38,44,51,57],whom:3,whose:[1,2,6,14,19,25,26,30,33,43,49,56,57],why:[1,2,25,33],whyload:6,wide:[1,15,19,36,38,44,50,54,57],wide_string_liter:25,widecharact:30,widget:2,width:[1,6,8,30,44,56],wiki:[0,31,37,53,57],wild:8,wildcard:[0,38,47],willing:8,wimplicit:1,win32:[1,16,38],win:[2,11,57],wincomplet:38,window:[0,1,6,11,15,24,29,36,38,40,49,51,54,56],winx86_64abiinfo:57,wire:25,wish:[1,2,16,25,33,44,54],withdraw:52,withdrawimpl:52,within:[1,2,4,6,7,8,10,14,15,17,18,19,25,30,38,39,41,44,50,52,54,57],withnumb:1,without:[1,2,3,4,6,7,8,11,14,18,19,20,21,25,28,29,30,33,38,41,43,44,45,46,47,49,52,53,54,56,57],wlarg:6,wmemchr:30,wmemcmp:30,wmodul:38,wno:[6,19,57],wnonport:6,wobbl:2,wobbleamount:2,woboq:21,woboq_codebrows:21,won:[1,8,16,25,30,38,50],woption:57,word:[2,3,6,15,25,30,38,52,57],work:[0,1,2,3,6,7,8,10,11,14,16,17,19,20,24,25,26,28,29,30,32,33,35,36,37,38,39,41,43,44,45,46,47,49,50,52,53,54,56,57],workabl:2,workaround:[6,38,50,52],workflow:7,world:[2,3,4,16,22,25,36,37,38,41,57],worri:2,wors:[2,57],worst:[2,15],worth:[20,25],would:[1,2,3,4,6,7,8,14,15,19,20,23,25,30,31,33,35,36,38,41,43,45,49,52,54,55,56,57],wouldn:33,wrap:[8,17,25,30,39,52],wrapper:[5,17,18,21,25,30],wrapv:6,writabl:[6,11],write:[1,2,3,6,7,11,17,19,20,21,24,25,30,33,34,36,37,38,39,41,45,48,49,50,52,53,55,57,58],writer:[50,52],written:[1,2,7,19,21,25,26,30,32,36,38,39,41,44,46,47,48,50,54,57],wrl:36,wrong:[2,14,16,19,25,56,57],wrongli:29,wrote:[21,25],wrt:57,wsign:44,wsystem:57,wthread:52,wtype:1,wundef:25,wunguard:30,wunus:1,wunused_macro:25,www:[1,23],x10:6,x11:6,x12:6,x13:6,x14:6,x15:6,x18:[6,49],x20:6,x29:49,x30:49,x64:[1,36,57],x86:[1,11,14,15,16,25,36,40,41,45,56],x86_64:[0,1,14,15,16,17,18,20,31,40,49,56,57],x86intrin:1,x86v7a:16,x87:6,x_consum:1,x_label:17,x_returns_x_retain:1,xalancbmk:14,xanalyz:[6,11],xarch_:[6,20],xarch_i386:20,xassembl:[6,11],xclang:[6,9,22,25,26,57],xcode:[51,55],xcu:1,xcuda:6,xgot:6,xlinker:[6,11],xml:[7,34],xmm0:1,xmm5:1,xmm:1,xmmintrin:30,xnack:6,xnu:1,xop:[1,6],xopenmp:6,xor:49,xpreprocessor:[6,11],xrai:[1,6],xsave:6,xsavec:6,xsaveopt:6,xxx:57,xyzw:30,yaml:[6,8,57],year:30,yes:30,yesnumb:39,yet:[0,1,2,14,19,25,36,38,40,41,44,45,53],yield:[2,25,38,57],ymm0:1,ymm5:1,ymm:1,you:[0,1,2,7,8,9,10,11,13,14,15,16,19,21,22,24,25,26,30,32,33,34,35,36,37,38,39,41,42,43,44,46,48,49,51,54,55,56,57],your:[0,1,2,7,8,9,10,11,14,16,21,22,24,25,26,30,31,33,35,36,37,38,39,40,41,43,49,53,54,56,57,58],yourattr:25,yourself:[0,26],yyi:57,zero:[0,1,2,3,4,6,7,8,18,25,30,33,37,44,50,56,57],zip:16,zlib:19,zone:6,zvector:6,zzz:57},titles:["AddressSanitizer","Attributes in Clang","Objective-C Automatic Reference Counting (ARC)","Block Implementation Specification","Language Specification for Blocks","ClangCheck","Clang command line argument reference","ClangFormat","Clang-Format Style Options","Clang Plugins","Overview","clang - the Clang C, C++, and Objective-C compiler","diagtool - clang diagnostics tool","Clang \u201cman\u201d pages","Control Flow Integrity","Control Flow Integrity Design Documentation","Cross-compilation using Clang","DataFlowSanitizer","DataFlowSanitizer Design Document","Diagnostic flags in Clang","Driver Design & Internals","External Clang Examples","Frequently Asked Questions (FAQ)","Hardware-assisted AddressSanitizer Design Documentation","How To Setup Clang Tooling For LLVM","\u201cClang\u201d CFE Internals Manual","Introduction to the Clang AST","ABI tags","JSON Compilation Database Format Specification","LTO Visibility","Clang Language Extensions","LeakSanitizer","Matching the Clang AST","Tutorial for building tools using LibTooling and LibASTMatchers","LibFormat","LibTooling","MSVC compatibility","MemorySanitizer","Modules","Objective-C Literals","OpenMP Support","Precompiled Header and Modules Internals","How to write RecursiveASTVisitor based ASTFrontendActions.","Clang\u2019s refactoring engine","Clang 8.0.0 Release Notes","SafeStack","SanitizerCoverage","Sanitizer special case list","SanitizerStats","ShadowCallStack","Source-based Code Coverage","ThinLTO","Thread Safety Analysis","ThreadSanitizer","Assembling a Complete Toolchain","Choosing the Right Interface for Your Application","UndefinedBehaviorSanitizer","Clang Compiler User\u2019s Manual","Welcome to Clang's documentation!"],titleterms:{"8bit":46,"abstract":19,"break":19,"case":[15,18,19,47],"char":19,"class":[15,19,25,30],"const":[3,19],"default":[19,30,46],"enum":[19,39],"export":[38,50],"final":19,"float":[19,30],"function":[1,3,14,15,19,27,30,32],"goto":19,"import":[3,19,38],"int":19,"long":19,"new":[10,19,44],"null":19,"public":[14,19,45],"return":[2,15,19,30],"short":15,"static":[6,19,30,50,57],"super":19,"switch":19,"var":19,"void":[2,19],Adding:[8,25],For:24,Ones:15,PCs:46,The:[4,20,25,50,52,57],Use:[18,37,38],Using:[9,24,33,38,41,42,50,57,58],__attribute__:[0,3,37,45,49,53,56],__autoreleas:2,__block:[3,4],__builtin___get_unsafe_stack_bottom:45,__builtin___get_unsafe_stack_ptr:45,__builtin___get_unsafe_stack_start:45,__builtin___get_unsafe_stack_top:45,__builtin_addressof:30,__builtin_assum:30,__builtin_bitrevers:30,__builtin_canonic:30,__builtin_convertvector:30,__builtin_operator_delet:30,__builtin_operator_new:30,__builtin_readcyclecount:30,__builtin_rotateleft:30,__builtin_shufflevector:30,__builtin_unpredict:30,__builtin_unreach:30,__c11_atom:30,__declspec:1,__has_attribut:30,__has_builtin:30,__has_c_attribut:30,__has_cpp_attribut:30,__has_declspec_attribut:30,__has_extens:30,__has_featur:[0,30,37,45,49,53],__has_includ:30,__has_include_next:30,__has_warn:30,__is_identifi:30,__multiple_inherit:1,__read_onli:1,__read_writ:1,__single_inherti:1,__sync_swap:30,__virtual_inherit:1,__weak:3,__write_onli:1,_nonnul:1,_noreturn:1,_null_unspecifi:1,_nullabl:1,_static_assert:30,_thread_loc:30,aarch64:[6,30],aarch64_vector_pc:1,abi:[16,17,18,27,30,36,44,54],abi_tag:1,about:[2,22,38],abs:19,absolut:19,access:[3,19,23,30,42],accessor:19,acquir:52,acquire_cap:1,acquire_shar:52,acquire_shared_cap:1,acquired_aft:52,acquired_befor:52,action:[6,43],activ:27,add:25,addit:[0,8,20,30,39,44,56],address:[0,1,19],address_sanit:0,address_spac:57,addresssanit:[0,23],after:[19,37],aggreg:30,aggress:19,algorithm:23,alia:[30,52],alias:19,align:[15,19,30],align_valu:1,alignof:19,all:[9,15,19,42,57],alloc:1,alloc_align:1,alloc_s:1,also:11,altern:28,always_destroi:1,ambigu:19,amd:1,amdgpu:6,amdgpu_flat_work_group_s:1,amdgpu_num_sgpr:1,amdgpu_num_vgpr:1,amdgpu_waves_per_eu:1,analysi:[19,30,52],analyz:[6,57],annot:[1,25],anon:19,anonym:19,api:[19,45,49],applic:55,approach:25,arc:2,architectur:[23,57],arg:19,argument:[2,6,18,19,20,25,30],argument_with_type_tag:1,arith:19,arithmet:[19,30],arm:[1,6,30,57],around:19,arrai:[19,30,39],artifici:1,ask:[22,52],asm:19,assembl:54,assert_cap:[1,52],assert_shared_cap:[1,52],assign:[19,30],assist:23,assume_align:1,ast:[25,26,32,33,41],ast_matcher_p:32,astconsum:42,astcontext:42,astfrontendact:42,atom:[19,30,54],attr:25,attribut:[1,19,23,25,30,38,44,57],audit:2,auto:[19,30],automat:[2,30],autoreleas:19,autoreleasepool:2,autosynthesi:[19,30],avail:[1,14,19,27,30,39,56],avr:1,backend:[19,51],background:[2,28],backward:15,bad:14,barrier:30,base:[19,30,32,42,50,57],basic:[13,25,33,51,52,57],bbedit:7,befor:19,behavior:[30,44],being:22,beta:19,between:57,binari:[19,30],bind:[19,32],bit:15,bitfield:19,blacklist:[0,14,37,53,56],block:[2,3,4,19,25,30,41],bodi:19,boilerpl:25,bool:[19,52],bootstrap:51,bound:19,box:39,brace:19,bridg:[2,19],bug:11,build:[0,19,24,28,33,37,48,53,56],builtin:[30,35,57],bzero:19,c11:30,cach:51,call:[1,14,15,19,49],callable_when:1,callsitetypeid:15,canon:25,capabl:52,captur:[19,30],carries_depend:1,cast:[2,14,19],categori:[19,57],caveat:39,cc1:[9,22],certain:2,cf_consum:1,cf_returns_not_retain:1,cf_returns_retain:1,cfe:25,cfg:25,cfi:[14,15],cfi_check:15,cfi_slowpath:15,cfstring:19,chain:41,chang:[19,25,44],charact:19,chariz:19,charsourcerang:25,check:[0,1,10,14,15,18,19,30,39,52,56],chk:19,choos:55,circular:19,clang:[1,6,8,9,10,11,12,13,16,19,21,22,24,25,26,30,32,33,41,43,44,51,54,55,57,58],clangcheck:5,clangformat:7,clangtool:[33,35],claus:19,cmake:24,cocoa:19,code:[0,8,11,19,35,37,50,56,57],code_seg:1,codegen:25,collaps:40,collect:50,command:[6,9,13,19,38,57],comment:[19,57],common:35,compar:19,comparison:[19,23,49],compat:[19,20,36,45,49,50],compil:[0,6,11,16,20,28,38,44,50,54,57,58],complet:[19,54],complex:[19,30],complic:33,compon:19,compound:19,comprehens:44,compress:19,concaten:19,concept:[20,52],condit:[0,19,25],condition:52,config:19,configur:[8,38,56,57],conflict:[19,38],consist:18,constant:[1,19,25,30],constexpr:[19,30],constructor:[19,30,52],consum:[1,2],contain:[19,39],content:41,context:[2,25,26],contextu:30,control:[2,4,14,15,25,30,51,57],convent:[1,19],converg:[1,57],convers:[2,19,30],copi:[3,4,19],copyright:3,core:[10,19],coroutin:30,count:[2,19,30],counter:[40,46],coverag:[46,50],cpp:19,cpu:[16,57],cpu_dispatch:1,cpu_specif:1,crash:57,creat:[32,33,35,42,43,50],creation:32,cross:[15,16],cst:19,ctor:19,cuda:40,current:[0,17,37,38,51,52,53,56,57],cycl:19,cygwin:57,darwin:57,data:[30,40,46,50],databas:28,dataflowsanit:[17,18],date:19,dealloc:2,debug:[6,57],debugg:[6,57],decai:19,decl:19,declar:[1,2,4,19,25,27,30,38,41],declspec:19,decltyp:30,decomposit:19,deduct:30,def:19,defin:[9,19,25,30],definit:19,deleg:30,delet:[19,30],depend:6,deploy:19,deprec:[1,19,30],derefer:19,deriv:32,descript:[11,12],design:[14,15,17,18,19,20,23,34,41,45,58],dest:2,destruct:37,destructor:[19,52],detect:[0,37],devic:40,diagnose_if:1,diagnost:[6,11,12,14,19,25,44,57],diagnosticconsum:25,diagtool:12,dictionari:39,differ:57,digit:30,dir:19,direct:[19,38,40],directori:[19,38,46],disabl:[0,8,19,30,56,57],disable_tail_cal:1,disallow:19,discard:19,discuss:39,displai:57,distinct:19,distribut:30,div:19,dll:19,dllexport:1,dllexportinlin:57,dllimport:[1,19],document:[2,15,18,23,25,58],dot:19,drawback:50,driver:[11,20,22,25],dso:15,dtor:19,dump:6,durat:2,dynam:[19,30],edg:[14,15,46],elem:19,elf:30,elimin:15,ellipsi:19,els:19,emac:7,emit:57,empti:19,empty_bas:1,enabl:[12,50,57],enable_if:1,encod:19,end:19,engin:43,entri:25,enum_extens:1,enumer:[2,30],environ:11,eof:19,equal:19,error:[0,22,23,56,57],escap:[3,19],evalu:19,evolut:2,examin:26,exampl:[8,17,21,29,39,47,49,56],except:[2,19,30,45],exclud:52,exclude_from_explicit_instanti:1,exclus:30,execut:[15,40],exist:19,exit:25,expans:19,experiment:24,explicit:[2,19,30],expr:19,express:[2,4,19,25,30,32,39,41],extend:30,extens:[2,3,4,19,25,30,57],extern:[0,2,19,21,37],external_source_symbol:1,extra:[10,19],fail:19,fallback:57,fallthrough:[1,19],famili:2,faq:22,far:1,fast:2,fastcal:1,featur:[19,20,30,36,40,44,57],fetch:19,field:[2,19],file:[6,19,25,30,38,41,57],filenam:19,find:12,first:35,fix:[19,25,30],flag:[6,19,30,44,52,57],flag_enum:1,flatten:1,flexibl:[19,20],flow:[4,14,15,25,46],fold:[19,25],force_align_arg_point:1,form:19,format:[1,8,10,19,25,28,46,47,50,57],fortran:6,forward:[14,15,19],found:19,fpu:16,framework:[19,30],frequent:[22,52],friend:19,from:[2,3,15,19],frontend:[25,54],frontendact:42,fsanit:14,func:19,futur:38,gcc:[19,20,57],gcov:57,gener:[1,2,6,11,14,15,16,30,40,57],get:[22,52],getter:19,global:[1,23,30],gnu:54,gnu_inlin:1,goal:[15,20,47],gpopt:19,gpu:1,grammar:39,group:[15,57],guarante:50,guard:[19,46],guarded_bi:52,guarded_var:52,guid:[52,57],half:30,handl:[25,37,45],hardwar:[15,23],header:[19,22,25,38,41,57],heap:23,held:52,helper:3,hexagon:6,hierarchi:15,high:3,hint:[25,30],histori:3,homoglyph:19,how:[0,24,25,32,37,42,43,48,53,56,57],html:19,hygien:19,iboutlet:19,ical:14,idea:10,identifi:[19,41],ifunc:1,ignor:19,imaginari:19,implement:[3,18,19,20,25,46,57],implicit:[19,30],import_modul:1,import_nam:1,improv:[40,44],inaccess:19,includ:[6,19,25,30,35,38],incompat:19,incomplet:19,increment:[19,51],independ:[6,15,57],indic:58,indirect:[2,14,15],indirectli:15,individu:57,infer:[2,19,30],info:57,inform:[0,6,30,31,37,44,51,53,56,57],inherit:30,init:[2,19],init_seg:1,initi:[0,19,30,50],inlin:[15,19,30,46,52],insid:52,instanti:[19,36],instr:19,instrument:[0,23,46,50,56,57],integ:[19,56],integr:[7,14,15,28,41],intel_reqd_sub_group_s:1,intention:57,interfac:[2,18,19,25,34,55],interior:2,interleav:[15,30],intermezzo:33,intern:[19,20,25,41],internal_linkag:1,interoper:30,interpret:50,interrupt:1,intrins:[19,30],introduct:[0,1,6,9,14,16,17,19,20,21,23,24,25,26,27,30,31,32,35,37,38,39,42,43,44,45,46,47,48,49,50,51,52,53,54,56,57],introspect:19,invalid:19,invok:4,ios:19,isa:19,isel:19,iso:19,issu:[0,16,56],iter:2,its:[3,25],ivar:19,json:28,kernel:[1,44],kind:[6,25],known:[2,45,52],label:[18,19],lambda:[19,30],languag:[4,11,19,30,38,44,54,57],larg:19,larger:19,layout:[3,15,18],layout_vers:1,lead:15,leaf:15,leak:[0,19],leaksanit:31,learn:[33,38],length:19,level:[3,6,30,45,49],lexer:25,lexic:[3,25,38,52],libastmatch:33,libatom:54,libc:54,libclang:55,libcxxrt:54,libformat:34,libgcc_:54,librari:[0,14,15,16,19,25,54,58],libstdc:54,libsupc:54,libtool:[33,35,55],libunwind:54,lifetim:2,lifetimebound:1,limit:[0,19,37,40,45,50,52,53,57],line:[6,9,19,38,57],link:[35,38],linkag:19,linker:[6,30,51,54],list:[12,15,17,18,19,21,30,44,47],liter:[4,19,30,39],live:2,llvm:[24,25,50,51,54,57],load:30,local:[1,19,30],lock:52,logic:19,long_cal:1,lookup:36,loop:[1,19,30,40],low:[20,30,45,49],lto:29,lto_visibility_publ:1,lvalu:19,mac:57,macro:[19,30,38,57],major:44,make:24,man:13,manag:[2,6,18,41],mangl:[19,27,30],manual:[25,57],map:[38,57],mark:[3,19],match:[19,30,32,33],matcher:[32,33],max:30,mayb:19,maybe_unus:1,memaccess:19,member:[14,19,30],memcpi:19,memori:[0,2,18,19,23,30,35,37],memory_sanit:37,memorysanit:37,messag:[19,30,57],metadata:[41,57],method:[2,19,39,41],micromip:1,microsoft:57,min:30,min_vector_width:1,mingw32:57,mingw:57,minim:56,mip:[1,6],miscellan:2,mismatch:19,miss:[19,22],mode:[11,40,57],model:38,modifi:[19,44],modul:[19,30,38,41],modular:[19,38],more:[0,31,33,37,38,51,53,56],move:[19,30],ms_abi:1,msvc:36,multilib:16,multipl:[19,30],multipleincludeopt:25,multipli:25,multiprecis:30,multivers:19,mutabl:19,mutex:52,name:[19,25,30,32,36,57],namespac:[19,30],nan:19,nand:19,narrow:19,neg:[19,52],nest:[3,19,40],newlin:19,next:19,ninja:24,no_address_safety_analysi:1,no_caller_saved_regist:1,no_destroi:1,no_sanit:[0,1,37,45,49,53,56],no_sanitize_address:1,no_sanitize_memori:1,no_sanitize_thread:1,no_split_stack:1,no_stack_protector:1,no_thread_safety_analysi:52,noalia:1,nocf_check:1,node:[26,32,33],nodebug:1,noderef:1,nodiscard:1,nodupl:[1,57],noescap:[1,19],noexcept:30,nomicromip:1,non:[14,15,19,30,44],nonarc:19,noncopi:19,nonexist:19,nongnu:54,nonliter:19,nonnul:[1,19],nonunifi:19,noreturn:[1,19],nosvm:[1,57],not_tail_cal:1,note:[20,44],nothrow:1,nounrol:1,novtabl:1,ns_consum:1,ns_consumes_self:1,ns_returns_autoreleas:1,ns_returns_not_retain:1,ns_returns_retain:1,nsnumber:39,nsobject:3,nullabl:1,nullptr:30,number:[15,30],objc:19,objc_autoreleas:2,objc_autoreleasepoolpop:2,objc_autoreleasepoolpush:2,objc_autoreleasereturnvalu:2,objc_box:1,objc_copyweak:2,objc_destroyweak:2,objc_externally_retain:1,objc_initweak:2,objc_loadweak:2,objc_loadweakretain:2,objc_method_famili:1,objc_moveweak:2,objc_releas:2,objc_requires_sup:1,objc_retain:2,objc_retainautoreleas:2,objc_retainautoreleasedreturnvalu:2,objc_retainautoreleasereturnvalu:2,objc_retainblock:2,objc_runtime_nam:1,objc_runtime_vis:1,objc_storestrong:2,objc_storeweak:2,objc_subclassing_restrict:1,object:[2,3,4,11,19,20,30,38,39,57],obtain:33,offsetof:19,omit:19,omp:1,onc:[15,19],open:19,opencl:[1,6,44,57],opencl_unroll_hint:[1,57],openmp:[19,40,44,57],oper:[4,19,30,57],operand:[2,19],opt:19,optim:[2,6,15,19,30,57],option:[6,8,11,16,19,30,34,35,43,57],optnon:1,order:[0,15,19,30],org:54,organ:10,origin:37,os_consum:1,os_consumes_thi:1,os_returns_not_retain:1,os_returns_retain:1,os_returns_retained_on_non_zero:1,os_returns_retained_on_zero:1,other:[25,43,54,57],out:[2,19],output:[46,57],outsid:19,overflow:[19,56],overhead:20,overlap:19,overload:[1,19,25],overrid:[19,30],overview:[4,10,20],own:32,ownership:[2,19],pack:19,pad:15,page:13,parallel:51,param:32,param_typest:1,paramet:[2,19,30,38],paramtyp:32,paren:19,parenthes:19,pars:[19,20,35,57],parser:25,partial:19,pass:2,pass_object_s:1,past:19,patch:7,path:[6,19],pathscal:54,pch:[19,57],pcs:1,pedant:19,per:19,perform:[14,19,45],performselector:19,philosophi:41,piec:8,pipelin:20,platform:[0,37,38,45,53,56,57],plu:19,plugin:[9,19,55],pluginastact:9,pod:19,point:[19,30,41,46],pointer:[2,14,19],pointer_with_type_tag:1,pool:[2,41],posit:15,power:15,powerpc:[6,57],pragma:[1,9,19,30,44,57],pre:15,precis:[2,19,30],precompil:[25,41,57],preprocessor:[6,11,19,25,41],preserve_al:1,preserve_most:1,primit:30,privaci:19,privat:[1,19,38,52],problem:38,produc:25,profil:[50,57],program:50,project:[21,50],promo:19,promot:19,propag:18,properti:[2,19,25,30],protector:19,protocol:[19,30],prototyp:19,prune:51,pseudo:19,pt_guarded_bi:52,pt_guarded_var:52,ptr:19,pure:19,purpos:2,put:[9,35,42],qual:19,qualif:[2,19],qualifi:[2,4,19,30],qualtyp:25,question:[22,52],rang:[19,30],rational:2,raw:30,rcfi:15,read_onli:1,read_writ:1,reader:41,readonli:19,recompil:[0,56],recurs:19,recursiveastvisitor:42,redeclar:[19,25],redefin:19,redefinit:19,redund:19,refactor:43,refer:[2,3,6,19,30,52],reformat:7,regcal:1,regist:[9,19],regparm:1,reiniti:1,reinterpret:19,relat:[2,20,23,30],relax:30,releas:[4,44,52],release_cap:1,release_shar:52,release_shared_cap:1,relocat:57,remap:57,repeat:19,report:[0,23,37,46,50,56,57],represent:18,requir:[15,19,27,38,43,52],require_constant_initi:1,requires_shar:52,reserv:19,restrict:2,result:[2,19,30],retain:[2,19,30],retriev:33,return_cap:52,return_typest:1,returns_nonnul:1,revis:4,rgba:19,right:55,riscv:[1,6],rmodul:19,root:19,rpass:19,rremark:19,rsanit:19,rtti:30,rule:[19,30,43],run:[9,22,35,48,50,52],runtim:[2,3,30,50,54,56],rvalu:30,safe:45,safe_stack:45,safestack:45,safeti:[1,19,52],sampl:57,sancov:46,sanit:[19,44,47,54],sanitizercoverag:46,sanitizerstat:48,scalar:19,scheme:14,scope:[3,19,52],scoped_cap:52,script:7,sdk:19,seal:19,section:[1,30],secur:[19,45,49],see:11,segment:30,seh:19,sel:19,select:[11,30,43],selectani:1,selector:19,self:[2,19],sema:25,semant:[2,19,25,38],semi:19,separ:[15,30],seq:19,sequenc:19,set:19,set_typest:1,setjmp:45,setter:19,setup:24,sfina:30,shadow:[15,49],shadow_call_stack:49,shadowcallstack:49,share:[14,15,40],shift:19,short_cal:1,show:12,sign:19,signal:1,signatur:19,silenc:56,simd:1,simpl:20,site:15,size:[19,30,57],small:15,snippet:35,solv:38,some:[22,35],sourc:[19,41,50],sourceloc:25,sourcemanag:[25,42],sourcerang:25,space:1,spec:19,special:[2,19,47],specif:[3,4,16,28,30,57],specifi:[19,30],speculative_load_harden:1,spell:[2,25],split:15,src:2,stack:[19,23,45,49,56],stage:[11,20],standalon:[7,35],standard:[30,54,57],start:52,stat:19,state:6,statement:[1,15,19,25,41],static_assert:30,statu:[0,17,37,51,53,56],std:19,stdarg:22,stdcall:1,stddef:22,step:33,stmt:19,storag:[2,4,19],store:30,strict:14,string:[19,25,30,39,52],strip:15,strlcat:19,strongli:30,struct:[2,19],structur:[38,39],studio:7,style:[8,19,34,39],subclass:25,subcommand:12,subject:[25,30],submodul:38,subscript:[19,30,39],subsystem:25,support:[0,1,2,3,14,15,23,25,28,30,37,40,44,45,53,56,57],suppress:[0,1,56],suspici:19,swift_context:1,swift_error_result:1,swift_indirect_result:1,swiftcal:1,symbol:[0,37,56],sync:19,synopsi:[11,12],syntax:[1,19],synthesi:19,sysroot:19,system:[19,24,28,30,57],tabl:[15,41,46,58],tag:[19,27],taint:18,target:[1,6,11,16,19,30,57],templat:[2,19,30,36],tempor:30,temporari:19,terminolog:57,test_typest:1,text:57,than:19,thi:[2,19,44],thinlto:51,thiscal:1,thread:[1,52,53],thread_loc:30,thread_sanit:53,threadsanit:53,through:18,tidi:10,time:19,tls_model:1,togeth:[9,35,42],token:[19,25],tokenlex:25,too:19,tool:[7,10,12,21,24,33,35,46,54,58],toolchain:[16,20,54],trace:[46,56],track:37,trail:[15,30],trait:30,translat:[19,20,25],transpar:25,transparent_union:1,transpos:19,trap:14,travers:15,tree:12,tripl:16,trivial_abi:1,try_acquir:52,try_acquire_cap:1,try_acquire_shar:52,try_acquire_shared_cap:1,tune:[6,57],tutori:33,type:[1,2,4,19,25,30,32,41,43],type_tag_for_datatyp:1,typedef:19,ubsan:44,umbrella:[19,38],unavail:[2,19,30],uncaptur:19,undefin:[19,44,56],undefinedbehaviorsanit:56,underli:30,unhandl:19,unicod:30,unifi:20,unimpl:52,uniniti:[1,19],union:[2,19,30],unit:19,unknown:19,unnam:[19,30],unprofil:19,unqualifi:19,unrel:19,unrestrict:30,unretain:2,unrol:[1,30],unsaf:19,unsign:[19,56],unsupport:[19,57],unus:[1,19,20],unwind:54,usag:[0,17,19,31,37,45,47,49,51,53,56,57],use:19,user:[19,30,57],uses:19,using:[16,19,33],valu:[2,19,57],vararg:19,variabl:[1,2,3,4,19,27,30],variad:[19,30],variadicdyncastallofmatch:32,variou:57,vbase:19,vector:[15,19,30],vectorcal:1,verbos:19,via:57,vim:7,virtual:[14,15,19],visibl:[19,29],visual:7,volatil:[19,56],vptr:19,vtabl:19,w64:57,wabi:19,wabsolut:19,wabstract:19,waddress:19,waggreg:19,wall:19,walloca:19,wambigu:19,wanalyz:19,wanonym:19,warc:19,wargument:19,warn:[12,19,20,52,57],warn_unused_result:1,warrai:19,wasm:19,wassign:19,wassum:19,wat:19,watimport:19,watom:19,wattribut:19,wauto:19,wavail:19,wbackend:19,wbackslash:19,wbad:19,wbinari:19,wbind:19,wbitfield:19,wbitwis:19,wblock:19,wbool:19,wbrace:19,wbridg:19,wbuiltin:19,wc11:19,wc99:19,wcall:19,wcast:19,wcfstring:19,wchar:19,wcl4:19,wclang:19,wclass:19,wcomma:19,wcomment:19,wcompar:19,wcomplex:19,wcondit:19,wconfig:19,wconstant:19,wconstexpr:19,wconsum:19,wconvers:19,wcoroutin:19,wcover:19,wcpp:19,wcstring:19,wctor:19,wctu:19,wcuda:19,wcustom:19,wdangl:19,wdarwin:19,wdate:19,wdealloc:19,wdebug:19,wdeclar:19,wdefault:19,wdeleg:19,wdelet:19,wdeprec:19,wdirect:19,wdisabl:19,wdiscard:19,wdistribut:19,wdiv:19,wdivis:19,wdll:19,wdllexport:19,wdllimport:19,wdocument:19,wdollar:19,wdoubl:19,wduplic:19,wdynam:19,weak:[2,19,30],webassembl:6,weffc:19,weird:22,wembed:19,wempti:19,wencod:19,wendif:19,wenum:19,wexcept:19,wexit:19,wexpans:19,wexperiment:19,wexplicit:19,wextern:19,wextra:19,wfallback:19,wfix:19,wflag:19,wflexibl:19,wfloat:19,wfor:19,wformat:19,wfour:19,wframe:19,wframework:19,wfunction:19,wfutur:19,wgcc:19,wglobal:19,wgnu:19,what:44,wheader:19,where:38,whitespac:19,widiomat:19,width:19,wignor:19,wimplicit:19,wimplicitli:19,wimport:19,winaccess:19,winclud:19,wincompat:19,wincomplet:19,winconsist:19,wincrement:19,windependentclass:19,window:[44,57],winfinit:19,winit:19,winiti:19,winject:19,winlin:19,winstanti:19,wint:19,winteg:19,winvalid:19,within:3,without:50,wjump:19,wkeyword:19,wknr:19,wlanguag:19,wlarg:19,wliblto:19,wliter:19,wlocal:19,wlogic:19,wlong:19,wloop:19,wmacro:19,wmain:19,wmalform:19,wmani:19,wmax:19,wmemset:19,wmemsiz:19,wmethod:19,wmicrosoft:19,wmismatch:19,wmiss:19,wmodul:19,wmost:19,wmove:19,wmsvc:19,wmultichar:19,wmultipl:19,wnarrow:19,wnest:19,wnew:19,wnewlin:19,wnoderef:19,wnoexcept:19,wnon:19,wnonnul:19,wnonport:19,wnontrivi:19,wnsconsum:19,wnsobject:19,wnsreturn:19,wnull:19,wnullabl:19,wobjc:19,wodr:19,wold:19,wopencl:19,wopenmp:19,woption:19,worder:19,work:[15,23],workflow:50,wout:19,wover:19,woverflow:19,woverlength:19,woverload:19,woverrid:19,wpack:19,wpad:19,wparenthes:19,wpartial:19,wpass:19,wpch:19,wpedant:19,wpessim:19,wpointer:19,wpotenti:19,wpragma:19,wpredefin:19,wprivat:19,wprofil:19,wproperti:19,wprotocol:19,wqualifi:19,wquot:19,wrang:19,wreadonli:19,wreceiv:19,wredeclar:19,wredund:19,wregist:19,wreinterpret:19,wreorder:19,wrequir:19,wreserv:19,wretain:19,wreturn:19,writabl:19,write:[9,32,35,42],write_onli:1,writeback:2,wsection:19,wselector:19,wself:19,wsemicolon:19,wsentinel:19,wsequenc:19,wserial:19,wshadow:19,wshift:19,wshorten:19,wsign:19,wsizeof:19,wslash:19,wsometim:19,wsourc:19,wspir:19,wstack:19,wstatic:19,wstdlibcxx:19,wstrict:19,wstring:19,wstrlcpy:19,wstrncat:19,wsuper:19,wsuspici:19,wswitch:19,wsync:19,wsynth:19,wtautolog:19,wtent:19,wthread:19,wtrigraph:19,wtype:19,wtypedef:19,wtypenam:19,wunabl:19,wunavail:19,wundeclar:19,wundef:19,wundefin:19,wunevalu:19,wunguard:19,wunicod:19,wuniniti:19,wunknown:19,wunnam:19,wunneed:19,wunreach:19,wunsequenc:19,wunsupport:19,wunus:19,wuse:19,wuser:19,wvararg:19,wvariad:19,wvec:19,wvector:19,wvex:19,wvisibl:19,wvla:19,wvoid:19,wvolatil:19,wweak:19,wwritabl:19,wwrite:19,wzero:19,x86:[6,30,57],xray_always_instru:1,xray_log_arg:1,xray_never_instru:1,y2k:19,yet:57,your:[32,55],zero:[15,19]}})
\ No newline at end of file

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/.buildinfo
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/.buildinfo?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/.buildinfo (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/.buildinfo Wed Mar 20 02:13:27 2019
@@ -0,0 +1,4 @@
+# Sphinx build info version 1
+# This file hashes the configuration used when building these files. When it is not found, a full rebuild will be done.
+config: 0792458b7665278a901a4ef8695bcbaf
+tags: 645f666f9bcd5a90fca523b33c5a78b7

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ModularizeUsage.html
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ModularizeUsage.html?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ModularizeUsage.html (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ModularizeUsage.html Wed Mar 20 02:13:27 2019
@@ -0,0 +1,169 @@
+
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+  "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<html xmlns="http://www.w3.org/1999/xhtml">
+  <head>
+    <meta http-equiv="X-UA-Compatible" content="IE=Edge" />
+    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+    <title>Modularize Usage — Extra Clang Tools 8 documentation</title>
+    <link rel="stylesheet" href="_static/haiku.css" type="text/css" />
+    <link rel="stylesheet" href="_static/pygments.css" type="text/css" />
+    <link rel="stylesheet" href="_static/clang-tools-extra-styles.css" type="text/css" />
+    <script type="text/javascript" id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script>
+    <script type="text/javascript" src="_static/jquery.js"></script>
+    <script type="text/javascript" src="_static/underscore.js"></script>
+    <script type="text/javascript" src="_static/doctools.js"></script>
+    <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/mathjax/2.7.1/MathJax.js?config=TeX-AMS-MML_HTMLorMML"></script>
+    <link rel="index" title="Index" href="genindex.html" />
+    <link rel="search" title="Search" href="search.html" />
+    <link rel="next" title="pp-trace User’s Manual" href="pp-trace.html" />
+    <link rel="prev" title="Modularize User’s Manual" href="modularize.html" /> 
+  </head><body>
+      <div class="header" role="banner"><h1 class="heading"><a href="index.html">
+          <span>Extra Clang Tools 8 documentation</span></a></h1>
+        <h2 class="heading"><span>Modularize Usage</span></h2>
+      </div>
+      <div class="topnav" role="navigation" aria-label="top navigation">
+      
+        <p>
+        «  <a href="modularize.html">Modularize User’s Manual</a>
+          ::  
+        <a class="uplink" href="index.html">Contents</a>
+          ::  
+        <a href="pp-trace.html">pp-trace User’s Manual</a>  Â»
+        </p>
+
+      </div>
+      <div class="content">
+        
+        
+  <div class="section" id="modularize-usage">
+<h1>Modularize Usage<a class="headerlink" href="#modularize-usage" title="Permalink to this headline">¶</a></h1>
+<p><code class="docutils literal notranslate"><span class="pre">modularize</span> <span class="pre">[<modularize-options>]</span> <span class="pre">[<module-map>|<include-files-list>]*</span>
+<span class="pre">[<front-end-options>...]</span></code></p>
+<p><code class="docutils literal notranslate"><span class="pre"><modularize-options></span></code> is a place-holder for options
+specific to modularize, which are described below in
+<cite>Modularize Command Line Options</cite>.</p>
+<p><code class="docutils literal notranslate"><span class="pre"><module-map></span></code> specifies the path of a file name for an
+existing module map. The module map must be well-formed in
+terms of syntax. Modularize will extract the header file names
+from the map. Only normal headers are checked, assuming headers
+marked “private”, “textual”, or “exclude” are not to be checked
+as a top-level include, assuming they either are included by
+other headers which are checked, or they are not suitable for
+modules.</p>
+<p><code class="docutils literal notranslate"><span class="pre"><include-files-list></span></code> specifies the path of a file name for a
+file containing the newline-separated list of headers to check
+with respect to each other. Lines beginning with ‘#’ and empty
+lines are ignored. Header file names followed by a colon and
+other space-separated file names will include those extra files
+as dependencies. The file names can be relative or full paths,
+but must be on the same line. For example:</p>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">header1</span><span class="o">.</span><span class="n">h</span>
+<span class="n">header2</span><span class="o">.</span><span class="n">h</span>
+<span class="n">header3</span><span class="o">.</span><span class="n">h</span><span class="p">:</span> <span class="n">header1</span><span class="o">.</span><span class="n">h</span> <span class="n">header2</span><span class="o">.</span><span class="n">h</span>
+</pre></div>
+</div>
+<p>Note that unless a <code class="docutils literal notranslate"><span class="pre">-prefix</span> <span class="pre">(header</span> <span class="pre">path)</span></code> option is specified,
+non-absolute file paths in the header list file will be relative
+to the header list file directory. Use -prefix to specify a different
+directory.</p>
+<p><code class="docutils literal notranslate"><span class="pre"><front-end-options></span></code> is a place-holder for regular Clang
+front-end arguments, which must follow the <include-files-list>.
+Note that by default, modularize assumes .h files
+contain C++ source, so if you are using a different language,
+you might need to use a <code class="docutils literal notranslate"><span class="pre">-x</span></code> option to tell Clang that the
+header contains another language, i.e.:  <code class="docutils literal notranslate"><span class="pre">-x</span> <span class="pre">c</span></code></p>
+<p>Note also that because modularize does not use the clang driver,
+you will likely need to pass in additional compiler front-end
+arguments to match those passed in by default by the driver.</p>
+<div class="section" id="modularize-command-line-options">
+<h2>Modularize Command Line Options<a class="headerlink" href="#modularize-command-line-options" title="Permalink to this headline">¶</a></h2>
+<dl class="option">
+<dt id="cmdoption-prefix">
+<code class="descname">-prefix</code><code class="descclassname">=<header-path></code><a class="headerlink" href="#cmdoption-prefix" title="Permalink to this definition">¶</a></dt>
+<dd><p>Prepend the given path to non-absolute file paths in the header list file.
+By default, headers are assumed to be relative to the header list file
+directory. Use <code class="docutils literal notranslate"><span class="pre">-prefix</span></code> to specify a different directory.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-module-map-path">
+<code class="descname">-module-map-path</code><code class="descclassname">=<module-map-path></code><a class="headerlink" href="#cmdoption-module-map-path" title="Permalink to this definition">¶</a></dt>
+<dd><p>Generate a module map and output it to the given file. See the description
+in <a class="reference internal" href="modularize.html#module-map-generation"><span class="std std-ref">Module Map Generation</span></a>.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-problem-files-list">
+<code class="descname">-problem-files-list</code><code class="descclassname">=<problem-files-list-file-name></code><a class="headerlink" href="#cmdoption-problem-files-list" title="Permalink to this definition">¶</a></dt>
+<dd><p>For use only with module map assistant. Input list of files that
+have problems with respect to modules. These will still be
+included in the generated module map, but will be marked as
+“excluded” headers.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-root-module">
+<code class="descname">-root-module</code><code class="descclassname">=<root-name></code><a class="headerlink" href="#cmdoption-root-module" title="Permalink to this definition">¶</a></dt>
+<dd><p>Put modules generated by the -module-map-path option in an enclosing
+module with the given name. See the description in <a class="reference internal" href="modularize.html#module-map-generation"><span class="std std-ref">Module Map Generation</span></a>.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-block-check-header-list-only">
+<code class="descname">-block-check-header-list-only</code><code class="descclassname"></code><a class="headerlink" href="#cmdoption-block-check-header-list-only" title="Permalink to this definition">¶</a></dt>
+<dd><p>Limit the #include-inside-extern-or-namespace-block
+check to only those headers explicitly listed in the header list.
+This is a work-around for avoiding error messages for private includes that
+purposefully get included inside blocks.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-no-coverage-check">
+<code class="descname">-no-coverage-check</code><code class="descclassname"></code><a class="headerlink" href="#cmdoption-no-coverage-check" title="Permalink to this definition">¶</a></dt>
+<dd><p>Don’t do the coverage check for a module map.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-coverage-check-only">
+<code class="descname">-coverage-check-only</code><code class="descclassname"></code><a class="headerlink" href="#cmdoption-coverage-check-only" title="Permalink to this definition">¶</a></dt>
+<dd><p>Only do the coverage check for a module map.</p>
+</dd></dl>
+
+<dl class="option">
+<dt id="cmdoption-display-file-lists">
+<code class="descname">-display-file-lists</code><code class="descclassname"></code><a class="headerlink" href="#cmdoption-display-file-lists" title="Permalink to this definition">¶</a></dt>
+<dd><p>Display lists of good files (no compile errors), problem files,
+and a combined list with problem files preceded by a ‘#’.
+This can be used to quickly determine which files have problems.
+The latter combined list might be useful in starting to modularize
+a set of headers. You can start with a full list of headers,
+use -display-file-lists option, and then use the combined list as
+your intermediate list, uncommenting-out headers as you fix them.</p>
+</dd></dl>
+
+</div>
+</div>
+
+
+      </div>
+      <div class="bottomnav" role="navigation" aria-label="bottom navigation">
+      
+        <p>
+        «  <a href="modularize.html">Modularize User’s Manual</a>
+          ::  
+        <a class="uplink" href="index.html">Contents</a>
+          ::  
+        <a href="pp-trace.html">pp-trace User’s Manual</a>  Â»
+        </p>
+
+      </div>
+
+    <div class="footer" role="contentinfo">
+        © Copyright 2007-2019, The Clang Team.
+      Created using <a href="http://sphinx-doc.org/">Sphinx</a> 1.7.5.
+    </div>
+  </body>
+</html>
\ No newline at end of file

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/ReleaseNotes.html Wed Mar 20 02:13:27 2019
@@ -0,0 +1,324 @@
+
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+  "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+
+<html xmlns="http://www.w3.org/1999/xhtml">
+  <head>
+    <meta http-equiv="X-UA-Compatible" content="IE=Edge" />
+    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+    <title>Extra Clang Tools 8.0.0 Release Notes — Extra Clang Tools 8 documentation</title>
+    <link rel="stylesheet" href="_static/haiku.css" type="text/css" />
+    <link rel="stylesheet" href="_static/pygments.css" type="text/css" />
+    <link rel="stylesheet" href="_static/clang-tools-extra-styles.css" type="text/css" />
+    <script type="text/javascript" id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script>
+    <script type="text/javascript" src="_static/jquery.js"></script>
+    <script type="text/javascript" src="_static/underscore.js"></script>
+    <script type="text/javascript" src="_static/doctools.js"></script>
+    <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/mathjax/2.7.1/MathJax.js?config=TeX-AMS-MML_HTMLorMML"></script>
+    <link rel="index" title="Index" href="genindex.html" />
+    <link rel="search" title="Search" href="search.html" />
+    <link rel="next" title="Clang-Tidy" href="clang-tidy/index.html" />
+    <link rel="prev" title="Introduction" href="index.html" /> 
+  </head><body>
+      <div class="header" role="banner"><h1 class="heading"><a href="index.html">
+          <span>Extra Clang Tools 8 documentation</span></a></h1>
+        <h2 class="heading"><span>Extra Clang Tools 8.0.0 Release Notes</span></h2>
+      </div>
+      <div class="topnav" role="navigation" aria-label="top navigation">
+      
+        <p>
+        «  <a href="index.html">Introduction</a>
+          ::  
+        <a class="uplink" href="index.html">Contents</a>
+          ::  
+        <a href="clang-tidy/index.html">Clang-Tidy</a>  Â»
+        </p>
+
+      </div>
+      <div class="content">
+        
+        
+  <div class="section" id="extra-clang-tools-8-0-0-release-notes">
+<h1>Extra Clang Tools 8.0.0 Release Notes<a class="headerlink" href="#extra-clang-tools-8-0-0-release-notes" title="Permalink to this headline">¶</a></h1>
+<div class="contents local topic" id="contents">
+<ul class="simple">
+<li><a class="reference internal" href="#introduction" id="id1">Introduction</a></li>
+<li><a class="reference internal" href="#what-s-new-in-extra-clang-tools-8-0-0" id="id2">What’s New in Extra Clang Tools 8.0.0?</a><ul>
+<li><a class="reference internal" href="#improvements-to-clangd" id="id3">Improvements to clangd</a></li>
+<li><a class="reference internal" href="#improvements-to-clang-query" id="id4">Improvements to clang-query</a></li>
+<li><a class="reference internal" href="#improvements-to-clang-tidy" id="id5">Improvements to clang-tidy</a></li>
+</ul>
+</li>
+</ul>
+</div>
+<p>Written by the <a class="reference external" href="https://llvm.org/">LLVM Team</a></p>
+<div class="section" id="introduction">
+<h2><a class="toc-backref" href="#id1">Introduction</a><a class="headerlink" href="#introduction" title="Permalink to this headline">¶</a></h2>
+<p>This document contains the release notes for the Extra Clang Tools, part of the
+Clang release 8.0.0. Here we describe the status of the Extra Clang Tools in
+some detail, including major improvements from the previous release and new
+feature work. All LLVM releases may be downloaded
+from the <a class="reference external" href="https://releases.llvm.org/">LLVM releases web site</a>.</p>
+<p>For more information about Clang or LLVM, including information about
+the latest release, please see the <a class="reference external" href="https://clang.llvm.org">Clang Web Site</a> or
+the <a class="reference external" href="https://llvm.org">LLVM Web Site</a>.</p>
+</div>
+<div class="section" id="what-s-new-in-extra-clang-tools-8-0-0">
+<h2><a class="toc-backref" href="#id2">What’s New in Extra Clang Tools 8.0.0?</a><a class="headerlink" href="#what-s-new-in-extra-clang-tools-8-0-0" title="Permalink to this headline">¶</a></h2>
+<p>Some of the major new features and improvements to Extra Clang Tools are listed
+here. Generic improvements to Extra Clang Tools as a whole or to its underlying
+infrastructure are described first, followed by tool-specific sections.</p>
+<div class="section" id="improvements-to-clangd">
+<h3><a class="toc-backref" href="#id3">Improvements to clangd</a><a class="headerlink" href="#improvements-to-clangd" title="Permalink to this headline">¶</a></h3>
+<ul>
+<li><p class="first">clangd now adds namespace qualifiers in code completion, for example, if you
+type “<code class="docutils literal notranslate"><span class="pre">vec</span></code>”, the list of completions will include “<code class="docutils literal notranslate"><span class="pre">std::vector</span></code>”.</p>
+<p>See also: <a class="reference external" href="https://reviews.llvm.org/rL343248">r343248</a>.</p>
+</li>
+<li><p class="first">When a <a class="reference internal" href="clangd/Installation.html#project-wide-index"><span class="std std-ref">global index</span></a> is available, clangd will use it to augment the
+results of “go to definition” and “find references” queries. Global index
+also enables global code completion, which suggests symbols that are not
+imported in the current file and automatically inserts the missing
+<code class="docutils literal notranslate"><span class="pre">#include</span></code> directives.</p>
+</li>
+<li><p class="first">clangd stores the symbol index on disk in a new compact binary serialization
+format.  It is 10x more compact than YAML and 40% more compact than gzipped
+YAML.</p>
+<p>See also: <a class="reference external" href="https://reviews.llvm.org/rL341375">r341375</a>.</p>
+</li>
+<li><p class="first">clangd has a new efficient symbol index suitable for complex and fuzzy
+queries and large code bases (e.g., LLVM, Chromium).  This index is used for
+code completion, go to definition, and cross-references.  The architecture of
+the index allows for complex and fuzzy retrieval criteria and sophisticated
+scoring.</p>
+<p>See also: <a class="reference external" href="http://lists.llvm.org/pipermail/cfe-dev/2018-July/058487.html">discussion on the mailing list</a>, <a class="reference external" href="https://docs.google.com/document/d/1C-A6PGT6TynyaX4PXyExNMiGmJ2jL1UwV91Kyx11gOI/edit">design
+doc</a>.</p>
+</li>
+<li><p class="first">clangd has a new LSP extension that communicates information about activity
+on clangd’s per-file worker thread.  This information can be displayed to
+users to let them know that the language server is busy with something.  For
+example, in clangd, building the AST blocks many other operations.</p>
+<p>More info: <a class="reference internal" href="clangd/Extensions.html#lsp-extension-file-status"><span class="std std-ref">File status</span></a>.</p>
+</li>
+<li><p class="first">clangd has a new LSP extension that allows the client to supply the
+compilation commands over LSP, instead of finding compile_commands.json on
+disk.</p>
+<p>More info: <a class="reference internal" href="clangd/Extensions.html#lsp-extension-compilation-commands"><span class="std std-ref">Compilation commands</span></a>.</p>
+</li>
+<li><p class="first">clangd has a new LSP extension that allows the client to request fixes to be
+sent together with diagnostics, instead of asynchronously.</p>
+<p>More info: <a class="reference internal" href="clangd/Extensions.html#lsp-extension-code-actions-in-diagnostics"><span class="std std-ref">Inline fixes for diagnostics</span></a>.</p>
+</li>
+<li><p class="first">clangd has a new LSP extension that allows the client to resolve a symbol in
+a light-weight manner, without retrieving further information (like
+definition location, which may require consulting an index).</p>
+<p>More info: <a class="reference internal" href="clangd/Extensions.html#lsp-extension-symbol-info"><span class="std std-ref">Symbol info request</span></a>.</p>
+</li>
+</ul>
+</div>
+<div class="section" id="improvements-to-clang-query">
+<h3><a class="toc-backref" href="#id4">Improvements to clang-query</a><a class="headerlink" href="#improvements-to-clang-query" title="Permalink to this headline">¶</a></h3>
+<ul>
+<li><p class="first">A new command line parameter <code class="docutils literal notranslate"><span class="pre">--preload</span></code> was added to
+run commands from a file and then start the interactive interpreter.</p>
+</li>
+<li><p class="first">The command <code class="docutils literal notranslate"><span class="pre">q</span></code> can was added as an alias for <code class="docutils literal notranslate"><span class="pre">quit</span></code> to exit the
+<code class="docutils literal notranslate"><span class="pre">clang-query</span></code> interpreter.</p>
+</li>
+<li><p class="first">It is now possible to bind to named values (the result of <code class="docutils literal notranslate"><span class="pre">let</span></code>
+expressions). For example:</p>
+<div class="highlight-none notranslate"><div class="highlight"><pre><span></span>let fn functionDecl()
+match fn.bind("foo")
+</pre></div>
+</div>
+</li>
+<li><p class="first">It is now possible to write comments in <code class="docutils literal notranslate"><span class="pre">clang-query</span></code> code. This
+is primarily useful when using script-mode. Comments are all content
+following the <code class="docutils literal notranslate"><span class="pre">#</span></code> character on a line:</p>
+<div class="highlight-none notranslate"><div class="highlight"><pre><span></span># This is a comment
+match fn.bind("foo") # This is a trailing comment
+</pre></div>
+</div>
+</li>
+<li><p class="first">The new <code class="docutils literal notranslate"><span class="pre">set</span> <span class="pre">print-matcher</span> <span class="pre">true</span></code> command now causes <code class="docutils literal notranslate"><span class="pre">clang-query</span></code> to
+print the evaluated matcher together with the resulting bindings.</p>
+</li>
+<li><p class="first">A new output mode <code class="docutils literal notranslate"><span class="pre">detailed-ast</span></code> was added to <code class="docutils literal notranslate"><span class="pre">clang-query</span></code>. The
+existing <code class="docutils literal notranslate"><span class="pre">dump</span></code> output mode is now a deprecated alias
+for <code class="docutils literal notranslate"><span class="pre">detailed-ast</span></code></p>
+</li>
+<li><p class="first">Output modes can now be enabled or disabled non-exclusively.  For example,</p>
+<div class="highlight-none notranslate"><div class="highlight"><pre><span></span># Enable detailed-ast without disabling other output, such as diag
+enable output detailed-ast
+m functionDecl()
+
+# Disable detailed-ast only
+disable output detailed-ast
+m functionDecl()
+</pre></div>
+</div>
+</li>
+</ul>
+</div>
+<div class="section" id="improvements-to-clang-tidy">
+<h3><a class="toc-backref" href="#id5">Improvements to clang-tidy</a><a class="headerlink" href="#improvements-to-clang-tidy" title="Permalink to this headline">¶</a></h3>
+<ul>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-duration-comparison.html"><span class="doc">abseil-duration-comparison</span></a> check.</p>
+<p>Checks for comparisons which should be done in the <code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> domain
+instead of the float of integer domains.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-duration-division.html"><span class="doc">abseil-duration-division</span></a> check.</p>
+<p>Checks for uses of <code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> division that is done in a
+floating-point context, and recommends the use of a function that
+returns a floating-point value.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-duration-factory-float.html"><span class="doc">abseil-duration-factory-float</span></a> check.</p>
+<p>Checks for cases where the floating-point overloads of various
+<code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> factory functions are called when the more-efficient
+integer versions could be used instead.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-duration-factory-scale.html"><span class="doc">abseil-duration-factory-scale</span></a> check.</p>
+<p>Checks for cases where arguments to <code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> factory functions are
+scaled internally and could be changed to a different factory function.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-duration-subtraction.html"><span class="doc">abseil-duration-subtraction</span></a> check.</p>
+<p>Checks for cases where subtraction should be performed in the
+<code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> domain.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-faster-strsplit-delimiter.html"><span class="doc">abseil-faster-strsplit-delimiter</span></a> check.</p>
+<p>Finds instances of <code class="docutils literal notranslate"><span class="pre">absl::StrSplit()</span></code> or <code class="docutils literal notranslate"><span class="pre">absl::MaxSplits()</span></code> where the
+delimiter is a single character string literal and replaces with a character.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-no-internal-dependencies.html"><span class="doc">abseil-no-internal-dependencies</span></a> check.</p>
+<p>Gives a warning if code using Abseil depends on internal details.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-no-namespace.html"><span class="doc">abseil-no-namespace</span></a> check.</p>
+<p>Ensures code does not open <code class="docutils literal notranslate"><span class="pre">namespace</span> <span class="pre">absl</span></code> as that violates Abseil’s
+compatibility guidelines.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-redundant-strcat-calls.html"><span class="doc">abseil-redundant-strcat-calls</span></a> check.</p>
+<p>Suggests removal of unnecessary calls to <code class="docutils literal notranslate"><span class="pre">absl::StrCat</span></code> when the result is
+being passed to another <code class="docutils literal notranslate"><span class="pre">absl::StrCat</span></code> or <code class="docutils literal notranslate"><span class="pre">absl::StrAppend</span></code>.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-str-cat-append.html"><span class="doc">abseil-str-cat-append</span></a> check.</p>
+<p>Flags uses of <code class="docutils literal notranslate"><span class="pre">absl::StrCat()</span></code> to append to a <code class="docutils literal notranslate"><span class="pre">std::string</span></code>. Suggests
+<code class="docutils literal notranslate"><span class="pre">absl::StrAppend()</span></code> should be used instead.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/abseil-upgrade-duration-conversions.html"><span class="doc">abseil-upgrade-duration-conversions</span></a> check.</p>
+<p>Finds calls to <code class="docutils literal notranslate"><span class="pre">absl::Duration</span></code> arithmetic operators and factories whose
+argument needs an explicit cast to continue compiling after upcoming API
+changes.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/bugprone-too-small-loop-variable.html"><span class="doc">bugprone-too-small-loop-variable</span></a> check.</p>
+<p>Detects those <code class="docutils literal notranslate"><span class="pre">for</span></code> loops that have a loop variable with a “too small” type
+which means this type can’t represent all values which are part of the
+iteration range.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/cppcoreguidelines-macro-usage.html"><span class="doc">cppcoreguidelines-macro-usage</span></a> check.</p>
+<p>Finds macro usage that is considered problematic because better language
+constructs exist for the task.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/google-objc-function-naming.html"><span class="doc">google-objc-function-naming</span></a> check.</p>
+<p>Checks that function names in function declarations comply with the naming
+conventions described in the Google Objective-C Style Guide.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/misc-non-private-member-variables-in-classes.html"><span class="doc">misc-non-private-member-variables-in-classes</span></a> check.</p>
+<p>Finds classes that not only contain the data (non-static member variables),
+but also have logic (non-static member functions), and diagnoses all member
+variables that have any other scope other than <code class="docutils literal notranslate"><span class="pre">private</span></code>.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/modernize-avoid-c-arrays.html"><span class="doc">modernize-avoid-c-arrays</span></a> check.</p>
+<p>Finds C-style array types and recommend to use <code class="docutils literal notranslate"><span class="pre">std::array<></span></code> /
+<code class="docutils literal notranslate"><span class="pre">std::vector<></span></code>.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/modernize-concat-nested-namespaces.html"><span class="doc">modernize-concat-nested-namespaces</span></a> check.</p>
+<p>Checks for uses of nested namespaces in the form of
+<code class="docutils literal notranslate"><span class="pre">namespace</span> <span class="pre">a</span> <span class="pre">{</span> <span class="pre">namespace</span> <span class="pre">b</span> <span class="pre">{</span> <span class="pre">...</span> <span class="pre">}}</span></code> and offers change to
+syntax introduced in C++17 standard: <code class="docutils literal notranslate"><span class="pre">namespace</span> <span class="pre">a::b</span> <span class="pre">{</span> <span class="pre">...</span> <span class="pre">}</span></code>.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/modernize-deprecated-ios-base-aliases.html"><span class="doc">modernize-deprecated-ios-base-aliases</span></a> check.</p>
+<p>Detects usage of the deprecated member types of <code class="docutils literal notranslate"><span class="pre">std::ios_base</span></code> and replaces
+those that have a non-deprecated equivalent.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/modernize-use-nodiscard.html"><span class="doc">modernize-use-nodiscard</span></a> check.</p>
+<p>Adds <code class="docutils literal notranslate"><span class="pre">[[nodiscard]]</span></code> attributes (introduced in C++17) to member functions
+to highlight at compile time which return values should not be ignored.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/readability-const-return-type.html"><span class="doc">readability-const-return-type</span></a> check.</p>
+<p>Checks for functions with a <code class="docutils literal notranslate"><span class="pre">const</span></code>-qualified return type and recommends
+removal of the <code class="docutils literal notranslate"><span class="pre">const</span></code> keyword.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/readability-isolate-declaration.html"><span class="doc">readability-isolate-decl</span></a> check.</p>
+<p>Detects local variable declarations declaring more than one variable and
+tries to refactor the code to one statement per declaration.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/readability-magic-numbers.html"><span class="doc">readability-magic-numbers</span></a> check.</p>
+<p>Detects usage of magic numbers, numbers that are used as literals instead of
+introduced via constants or symbols.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/readability-redundant-preprocessor.html"><span class="doc">readability-redundant-preprocessor</span></a> check.</p>
+<p>Finds potentially redundant preprocessor directives.</p>
+</li>
+<li><p class="first">New <a class="reference internal" href="clang-tidy/checks/readability-uppercase-literal-suffix.html"><span class="doc">readability-uppercase-literal-suffix</span></a> check.</p>
+<p>Detects when the integral literal or floating point literal has non-uppercase
+suffix, and suggests to make the suffix uppercase. The list of destination
+suffixes can be optionally provided.</p>
+</li>
+<li><p class="first">New alias <a class="reference internal" href="clang-tidy/checks/cert-dcl16-c.html"><span class="doc">cert-dcl16-c</span></a> to <a class="reference internal" href="clang-tidy/checks/readability-uppercase-literal-suffix.html"><span class="doc">readability-uppercase-literal-suffix</span></a>
+added.</p>
+</li>
+<li><p class="first">New alias <a class="reference internal" href="clang-tidy/checks/cppcoreguidelines-avoid-c-arrays.html"><span class="doc">cppcoreguidelines-avoid-c-arrays</span></a>
+to <a class="reference internal" href="clang-tidy/checks/modernize-avoid-c-arrays.html"><span class="doc">modernize-avoid-c-arrays</span></a> added.</p>
+</li>
+<li><p class="first">New alias <a class="reference internal" href="clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes.html"><span class="doc">cppcoreguidelines-non-private-member-variables-in-classes</span></a>
+to <a class="reference internal" href="clang-tidy/checks/misc-non-private-member-variables-in-classes.html"><span class="doc">misc-non-private-member-variables-in-classes</span></a>
+added.</p>
+</li>
+<li><p class="first">New alias <a class="reference internal" href="clang-tidy/checks/hicpp-avoid-c-arrays.html"><span class="doc">hicpp-avoid-c-arrays</span></a>
+to <a class="reference internal" href="clang-tidy/checks/modernize-avoid-c-arrays.html"><span class="doc">modernize-avoid-c-arrays</span></a> added.</p>
+</li>
+<li><p class="first">New alias <a class="reference internal" href="clang-tidy/checks/hicpp-uppercase-literal-suffix.html"><span class="doc">hicpp-uppercase-literal-suffix</span></a> to
+<a class="reference internal" href="clang-tidy/checks/readability-uppercase-literal-suffix.html"><span class="doc">readability-uppercase-literal-suffix</span></a>
+added.</p>
+</li>
+<li><p class="first">The <a class="reference internal" href="clang-tidy/checks/cppcoreguidelines-narrowing-conversions.html"><span class="doc">cppcoreguidelines-narrowing-conversions</span></a> check now
+detects more narrowing conversions:
+- integer to narrower signed integer (this is compiler implementation defined),
+- integer - floating point narrowing conversions,
+- floating point - integer narrowing conversions,
+- constants with narrowing conversions (even in ternary operator).</p>
+</li>
+<li><p class="first">The <a class="reference internal" href="clang-tidy/checks/objc-property-declaration.html"><span class="doc">objc-property-declaration</span></a> check now ignores the
+<cite>Acronyms</cite> and <cite>IncludeDefaultAcronyms</cite> options.</p>
+</li>
+<li><p class="first">The <a class="reference internal" href="clang-tidy/checks/readability-redundant-smartptr-get.html"><span class="doc">readability-redundant-smartptr-get</span></a> check does not warn
+about calls inside macros anymore by default.</p>
+</li>
+<li><p class="first">The <a class="reference internal" href="clang-tidy/checks/readability-uppercase-literal-suffix.html"><span class="doc">readability-uppercase-literal-suffix</span></a> check does not warn
+about literal suffixes inside macros anymore by default.</p>
+</li>
+</ul>
+</div>
+</div>
+</div>
+
+
+      </div>
+      <div class="bottomnav" role="navigation" aria-label="bottom navigation">
+      
+        <p>
+        «  <a href="index.html">Introduction</a>
+          ::  
+        <a class="uplink" href="index.html">Contents</a>
+          ::  
+        <a href="clang-tidy/index.html">Clang-Tidy</a>  Â»
+        </p>
+
+      </div>
+
+    <div class="footer" role="contentinfo">
+        © Copyright 2007-2019, The Clang Team.
+      Created using <a href="http://sphinx-doc.org/">Sphinx</a> 1.7.5.
+    </div>
+  </body>
+</html>
\ No newline at end of file

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ApplyFixInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ApplyFixInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ApplyFixInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInEmacsCompanyMode.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInEmacsCompanyMode.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInEmacsCompanyMode.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInSublimeText.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInSublimeText.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInSublimeText.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInVSCode.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInVSCode.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInVSCode.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInYCM.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInYCM.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInYCM.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInsertsNamespaceQualifiersInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInsertsNamespaceQualifiersInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/CodeCompletionInsertsNamespaceQualifiersInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/DiagnosticsInEmacsEglot.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/DiagnosticsInEmacsEglot.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/DiagnosticsInEmacsEglot.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ErrorsInVSCode.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ErrorsInVSCode.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/ErrorsInVSCode.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FindAllReferencesInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FindAllReferencesInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FindAllReferencesInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FormatSelectionInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FormatSelectionInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/FormatSelectionInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/GoToDefinitionInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/GoToDefinitionInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/GoToDefinitionInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/NavigationWithBreadcrumbsInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/NavigationWithBreadcrumbsInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/NavigationWithBreadcrumbsInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/OutlineInVSCode.png
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/OutlineInVSCode.png?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/OutlineInVSCode.png
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/SignatureHelpInVSCode.gif
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/SignatureHelpInVSCode.gif?rev=356539&view=auto
==============================================================================
Binary file - no diff available.

Propchange: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_images/SignatureHelpInVSCode.gif
------------------------------------------------------------------------------
    svn:mime-type = application/octet-stream

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ModularizeUsage.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ModularizeUsage.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ModularizeUsage.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ModularizeUsage.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,98 @@
+================
+Modularize Usage
+================
+
+``modularize [<modularize-options>] [<module-map>|<include-files-list>]*
+[<front-end-options>...]``
+
+``<modularize-options>`` is a place-holder for options
+specific to modularize, which are described below in
+`Modularize Command Line Options`.
+
+``<module-map>`` specifies the path of a file name for an
+existing module map. The module map must be well-formed in
+terms of syntax. Modularize will extract the header file names
+from the map. Only normal headers are checked, assuming headers
+marked "private", "textual", or "exclude" are not to be checked
+as a top-level include, assuming they either are included by
+other headers which are checked, or they are not suitable for
+modules.
+
+``<include-files-list>`` specifies the path of a file name for a
+file containing the newline-separated list of headers to check
+with respect to each other. Lines beginning with '#' and empty
+lines are ignored. Header file names followed by a colon and
+other space-separated file names will include those extra files
+as dependencies. The file names can be relative or full paths,
+but must be on the same line. For example::
+
+  header1.h
+  header2.h
+  header3.h: header1.h header2.h
+
+Note that unless a ``-prefix (header path)`` option is specified,
+non-absolute file paths in the header list file will be relative
+to the header list file directory. Use -prefix to specify a different
+directory.
+
+``<front-end-options>`` is a place-holder for regular Clang
+front-end arguments, which must follow the <include-files-list>.
+Note that by default, modularize assumes .h files
+contain C++ source, so if you are using a different language,
+you might need to use a ``-x`` option to tell Clang that the
+header contains another language, i.e.:  ``-x c``
+
+Note also that because modularize does not use the clang driver,
+you will likely need to pass in additional compiler front-end
+arguments to match those passed in by default by the driver.
+
+Modularize Command Line Options
+===============================
+
+.. option:: -prefix=<header-path>
+
+  Prepend the given path to non-absolute file paths in the header list file.
+  By default, headers are assumed to be relative to the header list file
+  directory. Use ``-prefix`` to specify a different directory.
+
+.. option:: -module-map-path=<module-map-path>
+
+  Generate a module map and output it to the given file. See the description
+  in :ref:`module-map-generation`.
+
+.. option:: -problem-files-list=<problem-files-list-file-name>
+
+  For use only with module map assistant. Input list of files that
+  have problems with respect to modules. These will still be
+  included in the generated module map, but will be marked as
+  "excluded" headers.
+
+.. option:: -root-module=<root-name>
+
+  Put modules generated by the -module-map-path option in an enclosing
+  module with the given name. See the description in :ref:`module-map-generation`.
+
+.. option:: -block-check-header-list-only
+
+  Limit the #include-inside-extern-or-namespace-block
+  check to only those headers explicitly listed in the header list.
+  This is a work-around for avoiding error messages for private includes that
+  purposefully get included inside blocks.
+
+.. option:: -no-coverage-check
+
+  Don't do the coverage check for a module map.
+
+.. option:: -coverage-check-only
+
+  Only do the coverage check for a module map.
+
+.. option:: -display-file-lists
+
+  Display lists of good files (no compile errors), problem files,
+  and a combined list with problem files preceded by a '#'.
+  This can be used to quickly determine which files have problems.
+  The latter combined list might be useful in starting to modularize
+  a set of headers. You can start with a full list of headers,
+  use -display-file-lists option, and then use the combined list as
+  your intermediate list, uncommenting-out headers as you fix them.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ReleaseNotes.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ReleaseNotes.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ReleaseNotes.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/ReleaseNotes.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,330 @@
+=====================================
+Extra Clang Tools 8.0.0 Release Notes
+=====================================
+
+.. contents::
+   :local:
+   :depth: 3
+
+Written by the `LLVM Team <https://llvm.org/>`_
+
+Introduction
+============
+
+This document contains the release notes for the Extra Clang Tools, part of the
+Clang release 8.0.0. Here we describe the status of the Extra Clang Tools in
+some detail, including major improvements from the previous release and new
+feature work. All LLVM releases may be downloaded
+from the `LLVM releases web site <https://releases.llvm.org/>`_.
+
+For more information about Clang or LLVM, including information about
+the latest release, please see the `Clang Web Site <https://clang.llvm.org>`_ or
+the `LLVM Web Site <https://llvm.org>`_.
+
+What's New in Extra Clang Tools 8.0.0?
+======================================
+
+Some of the major new features and improvements to Extra Clang Tools are listed
+here. Generic improvements to Extra Clang Tools as a whole or to its underlying
+infrastructure are described first, followed by tool-specific sections.
+
+
+Improvements to clangd
+----------------------
+
+- clangd now adds namespace qualifiers in code completion, for example, if you
+  type "``vec``", the list of completions will include "``std::vector``".
+
+  See also: `r343248 <https://reviews.llvm.org/rL343248>`__.
+
+- When a :ref:`global index <project-wide-index>` is available, clangd will use it to augment the
+  results of "go to definition" and "find references" queries. Global index
+  also enables global code completion, which suggests symbols that are not
+  imported in the current file and automatically inserts the missing
+  ``#include`` directives.
+
+- clangd stores the symbol index on disk in a new compact binary serialization
+  format.  It is 10x more compact than YAML and 40% more compact than gzipped
+  YAML.
+
+  See also: `r341375 <https://reviews.llvm.org/rL341375>`__.
+
+- clangd has a new efficient symbol index suitable for complex and fuzzy
+  queries and large code bases (e.g., LLVM, Chromium).  This index is used for
+  code completion, go to definition, and cross-references.  The architecture of
+  the index allows for complex and fuzzy retrieval criteria and sophisticated
+  scoring.
+
+  See also: `discussion on the mailing list
+  <http://lists.llvm.org/pipermail/cfe-dev/2018-July/058487.html>`__, `design
+  doc
+  <https://docs.google.com/document/d/1C-A6PGT6TynyaX4PXyExNMiGmJ2jL1UwV91Kyx11gOI/edit>`__.
+
+- clangd has a new LSP extension that communicates information about activity
+  on clangd's per-file worker thread.  This information can be displayed to
+  users to let them know that the language server is busy with something.  For
+  example, in clangd, building the AST blocks many other operations.
+
+  More info: :ref:`lsp-extension-file-status`.
+
+- clangd has a new LSP extension that allows the client to supply the
+  compilation commands over LSP, instead of finding compile_commands.json on
+  disk.
+
+  More info: :ref:`lsp-extension-compilation-commands`.
+
+- clangd has a new LSP extension that allows the client to request fixes to be
+  sent together with diagnostics, instead of asynchronously.
+
+  More info: :ref:`lsp-extension-code-actions-in-diagnostics`.
+
+- clangd has a new LSP extension that allows the client to resolve a symbol in
+  a light-weight manner, without retrieving further information (like
+  definition location, which may require consulting an index).
+
+  More info: :ref:`lsp-extension-symbol-info`.
+
+
+Improvements to clang-query
+---------------------------
+
+- A new command line parameter ``--preload`` was added to
+  run commands from a file and then start the interactive interpreter.
+
+- The command ``q`` can was added as an alias for ``quit`` to exit the
+  ``clang-query`` interpreter.
+
+- It is now possible to bind to named values (the result of ``let``
+  expressions). For example:
+
+  .. code-block:: none
+
+    let fn functionDecl()
+    match fn.bind("foo")
+
+- It is now possible to write comments in ``clang-query`` code. This
+  is primarily useful when using script-mode. Comments are all content
+  following the ``#`` character on a line:
+
+  .. code-block:: none
+
+    # This is a comment
+    match fn.bind("foo") # This is a trailing comment
+
+- The new ``set print-matcher true`` command now causes ``clang-query`` to
+  print the evaluated matcher together with the resulting bindings.
+
+- A new output mode ``detailed-ast`` was added to ``clang-query``. The
+  existing ``dump`` output mode is now a deprecated alias
+  for ``detailed-ast``
+
+- Output modes can now be enabled or disabled non-exclusively.  For example,
+
+  .. code-block:: none
+
+    # Enable detailed-ast without disabling other output, such as diag
+    enable output detailed-ast
+    m functionDecl()
+
+    # Disable detailed-ast only
+    disable output detailed-ast
+    m functionDecl()
+
+Improvements to clang-tidy
+--------------------------
+
+- New :doc:`abseil-duration-comparison
+  <clang-tidy/checks/abseil-duration-comparison>` check.
+
+  Checks for comparisons which should be done in the ``absl::Duration`` domain
+  instead of the float of integer domains.
+
+- New :doc:`abseil-duration-division
+  <clang-tidy/checks/abseil-duration-division>` check.
+
+  Checks for uses of ``absl::Duration`` division that is done in a
+  floating-point context, and recommends the use of a function that
+  returns a floating-point value.
+
+- New :doc:`abseil-duration-factory-float
+  <clang-tidy/checks/abseil-duration-factory-float>` check.
+
+  Checks for cases where the floating-point overloads of various
+  ``absl::Duration`` factory functions are called when the more-efficient
+  integer versions could be used instead.
+
+- New :doc:`abseil-duration-factory-scale
+  <clang-tidy/checks/abseil-duration-factory-scale>` check.
+
+  Checks for cases where arguments to ``absl::Duration`` factory functions are
+  scaled internally and could be changed to a different factory function.
+
+- New :doc:`abseil-duration-subtraction
+  <clang-tidy/checks/abseil-duration-subtraction>` check.
+
+  Checks for cases where subtraction should be performed in the
+  ``absl::Duration`` domain.
+
+- New :doc:`abseil-faster-strsplit-delimiter
+  <clang-tidy/checks/abseil-faster-strsplit-delimiter>` check.
+
+  Finds instances of ``absl::StrSplit()`` or ``absl::MaxSplits()`` where the
+  delimiter is a single character string literal and replaces with a character.
+
+- New :doc:`abseil-no-internal-dependencies
+  <clang-tidy/checks/abseil-no-internal-dependencies>` check.
+
+  Gives a warning if code using Abseil depends on internal details.
+
+- New :doc:`abseil-no-namespace
+  <clang-tidy/checks/abseil-no-namespace>` check.
+
+  Ensures code does not open ``namespace absl`` as that violates Abseil's
+  compatibility guidelines.
+
+- New :doc:`abseil-redundant-strcat-calls
+  <clang-tidy/checks/abseil-redundant-strcat-calls>` check.
+
+  Suggests removal of unnecessary calls to ``absl::StrCat`` when the result is
+  being passed to another ``absl::StrCat`` or ``absl::StrAppend``.
+
+- New :doc:`abseil-str-cat-append
+  <clang-tidy/checks/abseil-str-cat-append>` check.
+
+  Flags uses of ``absl::StrCat()`` to append to a ``std::string``. Suggests
+  ``absl::StrAppend()`` should be used instead.
+
+- New :doc:`abseil-upgrade-duration-conversions
+  <clang-tidy/checks/abseil-upgrade-duration-conversions>` check.
+
+  Finds calls to ``absl::Duration`` arithmetic operators and factories whose
+  argument needs an explicit cast to continue compiling after upcoming API
+  changes.
+
+- New :doc:`bugprone-too-small-loop-variable
+  <clang-tidy/checks/bugprone-too-small-loop-variable>` check.
+
+  Detects those ``for`` loops that have a loop variable with a "too small" type
+  which means this type can't represent all values which are part of the
+  iteration range.
+
+- New :doc:`cppcoreguidelines-macro-usage
+  <clang-tidy/checks/cppcoreguidelines-macro-usage>` check.
+
+  Finds macro usage that is considered problematic because better language
+  constructs exist for the task.
+
+- New :doc:`google-objc-function-naming
+  <clang-tidy/checks/google-objc-function-naming>` check.
+
+  Checks that function names in function declarations comply with the naming
+  conventions described in the Google Objective-C Style Guide.
+
+- New :doc:`misc-non-private-member-variables-in-classes
+  <clang-tidy/checks/misc-non-private-member-variables-in-classes>` check.
+
+  Finds classes that not only contain the data (non-static member variables),
+  but also have logic (non-static member functions), and diagnoses all member
+  variables that have any other scope other than ``private``.
+
+- New :doc:`modernize-avoid-c-arrays
+  <clang-tidy/checks/modernize-avoid-c-arrays>` check.
+
+  Finds C-style array types and recommend to use ``std::array<>`` /
+  ``std::vector<>``.
+
+- New :doc:`modernize-concat-nested-namespaces
+  <clang-tidy/checks/modernize-concat-nested-namespaces>` check.
+
+  Checks for uses of nested namespaces in the form of
+  ``namespace a { namespace b { ... }}`` and offers change to
+  syntax introduced in C++17 standard: ``namespace a::b { ... }``.
+
+- New :doc:`modernize-deprecated-ios-base-aliases
+  <clang-tidy/checks/modernize-deprecated-ios-base-aliases>` check.
+
+  Detects usage of the deprecated member types of ``std::ios_base`` and replaces
+  those that have a non-deprecated equivalent.
+
+- New :doc:`modernize-use-nodiscard
+  <clang-tidy/checks/modernize-use-nodiscard>` check.
+
+  Adds ``[[nodiscard]]`` attributes (introduced in C++17) to member functions
+  to highlight at compile time which return values should not be ignored.
+
+- New :doc:`readability-const-return-type
+  <clang-tidy/checks/readability-const-return-type>` check.
+
+  Checks for functions with a ``const``-qualified return type and recommends
+  removal of the ``const`` keyword.
+
+- New :doc:`readability-isolate-decl
+  <clang-tidy/checks/readability-isolate-declaration>` check.
+
+  Detects local variable declarations declaring more than one variable and
+  tries to refactor the code to one statement per declaration.
+
+- New :doc:`readability-magic-numbers
+  <clang-tidy/checks/readability-magic-numbers>` check.
+
+  Detects usage of magic numbers, numbers that are used as literals instead of
+  introduced via constants or symbols.
+
+- New :doc:`readability-redundant-preprocessor
+  <clang-tidy/checks/readability-redundant-preprocessor>` check.
+
+  Finds potentially redundant preprocessor directives.
+
+- New :doc:`readability-uppercase-literal-suffix
+  <clang-tidy/checks/readability-uppercase-literal-suffix>` check.
+
+  Detects when the integral literal or floating point literal has non-uppercase
+  suffix, and suggests to make the suffix uppercase. The list of destination
+  suffixes can be optionally provided.
+
+- New alias :doc:`cert-dcl16-c
+  <clang-tidy/checks/cert-dcl16-c>` to :doc:`readability-uppercase-literal-suffix
+  <clang-tidy/checks/readability-uppercase-literal-suffix>`
+  added.
+
+- New alias :doc:`cppcoreguidelines-avoid-c-arrays
+  <clang-tidy/checks/cppcoreguidelines-avoid-c-arrays>`
+  to :doc:`modernize-avoid-c-arrays
+  <clang-tidy/checks/modernize-avoid-c-arrays>` added.
+
+- New alias :doc:`cppcoreguidelines-non-private-member-variables-in-classes
+  <clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes>`
+  to :doc:`misc-non-private-member-variables-in-classes
+  <clang-tidy/checks/misc-non-private-member-variables-in-classes>`
+  added.
+
+- New alias :doc:`hicpp-avoid-c-arrays
+  <clang-tidy/checks/hicpp-avoid-c-arrays>`
+  to :doc:`modernize-avoid-c-arrays
+  <clang-tidy/checks/modernize-avoid-c-arrays>` added.
+
+- New alias :doc:`hicpp-uppercase-literal-suffix
+  <clang-tidy/checks/hicpp-uppercase-literal-suffix>` to
+  :doc:`readability-uppercase-literal-suffix
+  <clang-tidy/checks/readability-uppercase-literal-suffix>`
+  added.
+
+- The :doc:`cppcoreguidelines-narrowing-conversions
+  <clang-tidy/checks/cppcoreguidelines-narrowing-conversions>` check now
+  detects more narrowing conversions:
+  - integer to narrower signed integer (this is compiler implementation defined),
+  - integer - floating point narrowing conversions,
+  - floating point - integer narrowing conversions,
+  - constants with narrowing conversions (even in ternary operator).
+
+- The :doc:`objc-property-declaration
+  <clang-tidy/checks/objc-property-declaration>` check now ignores the
+  `Acronyms` and `IncludeDefaultAcronyms` options.
+
+- The :doc:`readability-redundant-smartptr-get
+  <clang-tidy/checks/readability-redundant-smartptr-get>` check does not warn
+  about calls inside macros anymore by default.
+
+- The :doc:`readability-uppercase-literal-suffix
+  <clang-tidy/checks/readability-uppercase-literal-suffix>` check does not warn
+  about literal suffixes inside macros anymore by default.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-doc.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-doc.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-doc.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-doc.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,65 @@
+===================
+Clang-Doc
+===================
+
+.. contents::
+
+.. toctree::
+   :maxdepth: 1
+
+:program:`clang-doc` is a tool for generating C and C++ documenation from 
+source code and comments. 
+
+The tool is in a very early development stage, so you might encounter bugs and
+crashes. Submitting reports with information about how to reproduce the issue
+to `the LLVM bugtracker <https://llvm.org/bugs>`_ will definitely help the
+project. If you have any ideas or suggestions, please to put a feature request
+there.
+
+Use
+=====
+
+:program:`clang-doc` is a `LibTooling
+<http://clang.llvm.org/docs/LibTooling.html>`_-based tool, and so requires a
+compile command database for your project (for an example of how to do this 
+see `How To Setup Tooling For LLVM
+<http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html>`_).
+
+The tool can be used on a single file or multiple files as defined in 
+the compile commands database:
+
+.. code-block:: console
+
+  $ clang-doc /path/to/file.cpp -p /path/to/compile/commands
+
+This generates an intermediate representation of the declarations and their
+associated information in the specified TUs, serialized to LLVM bitcode.
+
+As currently implemented, the tool is only able to parse TUs that can be 
+stored in-memory. Future additions will extend the current framework to use
+map-reduce frameworks to allow for use with large codebases.
+
+:program:`clang-doc` offers the following options:
+
+.. code-block:: console
+
+	$ clang-doc --help
+  USAGE: clang-doc [options] <source0> [... <sourceN>]
+
+  OPTIONS:
+
+  Generic Options:
+
+    -help                      - Display available options (-help-hidden for more)
+    -help-list                 - Display list of available options (-help-list-hidden for more)
+    -version                   - Display the version of this program
+
+  clang-doc options:
+
+    -doxygen                   - Use only doxygen-style comments to generate docs.
+    -dump                      - Dump intermediate results to bitcode file.
+    -extra-arg=<string>        - Additional argument to append to the compiler command line
+    -extra-arg-before=<string> - Additional argument to prepend to the compiler command line
+    -omit-filenames            - Omit filenames in output.
+    -output=<string>           - Directory for outputting generated files.
+    -p=<string>                - Build path

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-modernize.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-modernize.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-modernize.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-modernize.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,4 @@
+:orphan:
+
+All :program:`clang-modernize` transforms have moved to :doc:`clang-tidy/index`
+(see the ``modernize`` module).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-rename.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-rename.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-rename.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-rename.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,166 @@
+============
+Clang-Rename
+============
+
+.. contents::
+
+See also:
+
+.. toctree::
+   :maxdepth: 1
+
+
+:program:`clang-rename` is a C++ refactoring tool. Its purpose is to perform
+efficient renaming actions in large-scale projects such as renaming classes,
+functions, variables, arguments, namespaces etc.
+
+The tool is in a very early development stage, so you might encounter bugs and
+crashes. Submitting reports with information about how to reproduce the issue
+to `the LLVM bugtracker <https://llvm.org/bugs>`_ will definitely help the
+project. If you have any ideas or suggestions, you might want to put a feature
+request there.
+
+Using Clang-Rename
+==================
+
+:program:`clang-rename` is a `LibTooling
+<http://clang.llvm.org/docs/LibTooling.html>`_-based tool, and it's easier to
+work with if you set up a compile command database for your project (for an
+example of how to do this see `How To Setup Tooling For LLVM
+<http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html>`_). You can also
+specify compilation options on the command line after `--`:
+
+.. code-block:: console
+
+  $ clang-rename -offset=42 -new-name=foo test.cpp -- -Imy_project/include -DMY_DEFINES ...
+
+
+To get an offset of a symbol in a file run
+
+.. code-block:: console
+
+  $ grep -FUbo 'foo' file.cpp
+
+
+The tool currently supports renaming actions inside a single translation unit
+only. It is planned to extend the tool's functionality to support multi-TU
+renaming actions in the future.
+
+:program:`clang-rename` also aims to be easily integrated into popular text
+editors, such as Vim and Emacs, and improve the workflow of users.
+
+Although a command line interface exists, it is highly recommended to use the
+text editor interface instead for better experience.
+
+You can also identify one or more symbols to be renamed by giving the fully
+qualified name:
+
+.. code-block:: console
+
+  $ clang-rename -qualified-name=foo -new-name=bar test.cpp
+
+Renaming multiple symbols at once is supported, too. However,
+:program:`clang-rename` doesn't accept both `-offset` and `-qualified-name` at
+the same time. So, you can either specify multiple `-offset` or
+`-qualified-name`.
+
+.. code-block:: console
+
+  $ clang-rename -offset=42 -new-name=bar1 -offset=150 -new-name=bar2 test.cpp
+
+or
+
+.. code-block:: console
+
+  $ clang-rename -qualified-name=foo1 -new-name=bar1 -qualified-name=foo2 -new-name=bar2 test.cpp
+
+
+Alternatively, {offset | qualified-name} / new-name pairs can be put into a YAML
+file:
+
+.. code-block:: yaml
+
+  ---
+  - Offset:         42
+    NewName:        bar1
+  - Offset:         150
+    NewName:        bar2
+  ...
+
+or
+
+.. code-block:: yaml
+
+  ---
+  - QualifiedName:  foo1
+    NewName:        bar1
+  - QualifiedName:  foo2
+    NewName:        bar2
+  ...
+
+That way you can avoid spelling out all the names as command line arguments:
+
+.. code-block:: console
+
+  $ clang-rename -input=test.yaml test.cpp
+
+:program:`clang-rename` offers the following options:
+
+.. code-block:: console
+
+  $ clang-rename --help
+  USAGE: clang-rename [subcommand] [options] <source0> [... <sourceN>]
+
+  OPTIONS:
+
+  Generic Options:
+
+    -help                      - Display available options (-help-hidden for more)
+    -help-list                 - Display list of available options (-help-list-hidden for more)
+    -version                   - Display the version of this program
+
+  clang-rename common options:
+
+    -export-fixes=<filename>   - YAML file to store suggested fixes in.
+    -extra-arg=<string>        - Additional argument to append to the compiler command line
+    -extra-arg-before=<string> - Additional argument to prepend to the compiler command line
+    -force                     - Ignore nonexistent qualified names.
+    -i                         - Overwrite edited <file>s.
+    -input=<string>            - YAML file to load oldname-newname pairs from.
+    -new-name=<string>         - The new name to change the symbol to.
+    -offset=<uint>             - Locates the symbol by offset as opposed to <line>:<column>.
+    -p=<string>                - Build path
+    -pl                        - Print the locations affected by renaming to stderr.
+    -pn                        - Print the found symbol's name prior to renaming to stderr.
+    -qualified-name=<string>   - The fully qualified name of the symbol.
+
+Vim Integration
+===============
+
+You can call :program:`clang-rename` directly from Vim! To set up
+:program:`clang-rename` integration for Vim see
+`clang-rename/tool/clang-rename.py
+<http://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/clang-rename/tool/clang-rename.py>`_.
+
+Please note that **you have to save all buffers, in which the replacement will
+happen before running the tool**.
+
+Once installed, you can point your cursor to symbols you want to rename, press
+`<leader>cr` and type new desired name. The `<leader> key
+<http://vim.wikia.com/wiki/Mapping_keys_in_Vim_-_Tutorial_(Part_3)#Map_leader>`_
+is a reference to a specific key defined by the mapleader variable and is bound
+to backslash by default.
+
+Emacs Integration
+=================
+
+You can also use :program:`clang-rename` while using Emacs! To set up
+:program:`clang-rename` integration for Emacs see
+`clang-rename/tool/clang-rename.el
+<http://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/clang-rename/tool/clang-rename.el>`_.
+
+Once installed, you can point your cursor to symbols you want to rename, press
+`M-X`, type `clang-rename` and new desired name.
+
+Please note that **you have to save all buffers, in which the replacement will
+happen before running the tool**.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,6 @@
+:orphan:
+
+.. meta::
+   :http-equiv=refresh: 0;URL='clang-tidy/'
+
+clang-tidy documentation has moved here: http://clang.llvm.org/extra/clang-tidy/

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Contributing.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Contributing.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Contributing.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Contributing.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,512 @@
+================
+Getting Involved
+================
+
+:program:`clang-tidy` has several own checks and can run Clang static analyzer
+checks, but its power is in the ability to easily write custom checks.
+
+Checks are organized in modules, which can be linked into :program:`clang-tidy`
+with minimal or no code changes in :program:`clang-tidy`.
+
+Checks can plug into the analysis on the preprocessor level using `PPCallbacks`_
+or on the AST level using `AST Matchers`_. When an error is found, checks can
+report them in a way similar to how Clang diagnostics work. A fix-it hint can be
+attached to a diagnostic message.
+
+The interface provided by :program:`clang-tidy` makes it easy to write useful
+and precise checks in just a few lines of code. If you have an idea for a good
+check, the rest of this document explains how to do this.
+
+There are a few tools particularly useful when developing clang-tidy checks:
+  * ``add_new_check.py`` is a script to automate the process of adding a new
+    check, it will create the check, update the CMake file and create a test;
+  * ``rename_check.py`` does what the script name suggests, renames an existing
+    check;
+  * :program:`clang-query` is invaluable for interactive prototyping of AST
+    matchers and exploration of the Clang AST;
+  * `clang-check`_ with the ``-ast-dump`` (and optionally ``-ast-dump-filter``)
+    provides a convenient way to dump AST of a C++ program.
+
+If CMake is configured with ``CLANG_ENABLE_STATIC_ANALYZER``,
+:program:`clang-tidy` will not be built with support for the
+``clang-analyzer-*`` checks or the ``mpi-*`` checks.
+
+
+.. _AST Matchers: https://clang.llvm.org/docs/LibASTMatchers.html
+.. _PPCallbacks: https://clang.llvm.org/doxygen/classclang_1_1PPCallbacks.html
+.. _clang-check: https://clang.llvm.org/docs/ClangCheck.html
+
+
+Choosing the Right Place for your Check
+---------------------------------------
+
+If you have an idea of a check, you should decide whether it should be
+implemented as a:
+
++ *Clang diagnostic*: if the check is generic enough, targets code patterns that
+  most probably are bugs (rather than style or readability issues), can be
+  implemented effectively and with extremely low false positive rate, it may
+  make a good Clang diagnostic.
+
++ *Clang static analyzer check*: if the check requires some sort of control flow
+  analysis, it should probably be implemented as a static analyzer check.
+
++ *clang-tidy check* is a good choice for linter-style checks, checks that are
+  related to a certain coding style, checks that address code readability, etc.
+
+
+Preparing your Workspace
+------------------------
+
+If you are new to LLVM development, you should read the `Getting Started with
+the LLVM System`_, `Using Clang Tools`_ and `How To Setup Clang Tooling For
+LLVM`_ documents to check out and build LLVM, Clang and Clang Extra Tools with
+CMake.
+
+Once you are done, change to the ``llvm/tools/clang/tools/extra`` directory, and
+let's start!
+
+.. _Getting Started with the LLVM System: https://llvm.org/docs/GettingStarted.html
+.. _Using Clang Tools: https://clang.llvm.org/docs/ClangTools.html
+.. _How To Setup Clang Tooling For LLVM: https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
+
+
+The Directory Structure
+-----------------------
+
+:program:`clang-tidy` source code resides in the
+``llvm/tools/clang/tools/extra`` directory and is structured as follows:
+
+::
+
+  clang-tidy/                       # Clang-tidy core.
+  |-- ClangTidy.h                   # Interfaces for users and checks.
+  |-- ClangTidyModule.h             # Interface for clang-tidy modules.
+  |-- ClangTidyModuleRegistry.h     # Interface for registering of modules.
+     ...
+  |-- google/                       # Google clang-tidy module.
+  |-+
+    |-- GoogleTidyModule.cpp
+    |-- GoogleTidyModule.h
+          ...
+  |-- llvm/                         # LLVM clang-tidy module.
+  |-+
+    |-- LLVMTidyModule.cpp
+    |-- LLVMTidyModule.h
+          ...
+  |-- objc/                         # Objective-C clang-tidy module.
+  |-+
+    |-- ObjCTidyModule.cpp
+    |-- ObjCTidyModule.h
+          ...
+  |-- tool/                         # Sources of the clang-tidy binary.
+          ...
+  test/clang-tidy/                  # Integration tests.
+      ...
+  unittests/clang-tidy/             # Unit tests.
+  |-- ClangTidyTest.h
+  |-- GoogleModuleTest.cpp
+  |-- LLVMModuleTest.cpp
+  |-- ObjCModuleTest.cpp
+      ...
+
+
+Writing a clang-tidy Check
+--------------------------
+
+So you have an idea of a useful check for :program:`clang-tidy`.
+
+First, if you're not familiar with LLVM development, read through the `Getting
+Started with LLVM`_ document for instructions on setting up your workflow and
+the `LLVM Coding Standards`_ document to familiarize yourself with the coding
+style used in the project. For code reviews we mostly use `LLVM Phabricator`_.
+
+.. _Getting Started with LLVM: https://llvm.org/docs/GettingStarted.html
+.. _LLVM Coding Standards: https://llvm.org/docs/CodingStandards.html
+.. _LLVM Phabricator: https://llvm.org/docs/Phabricator.html
+
+Next, you need to decide which module the check belongs to. Modules
+are located in subdirectories of `clang-tidy/
+<https://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/clang-tidy/>`_
+and contain checks targeting a certain aspect of code quality (performance,
+readability, etc.), certain coding style or standard (Google, LLVM, CERT, etc.)
+or a widely used API (e.g. MPI). Their names are same as user-facing check
+groups names described :ref:`above <checks-groups-table>`.
+
+After choosing the module and the name for the check, run the
+``clang-tidy/add_new_check.py`` script to create the skeleton of the check and
+plug it to :program:`clang-tidy`. It's the recommended way of adding new checks.
+
+If we want to create a `readability-awesome-function-names`, we would run:
+
+.. code-block:: console
+
+  $ clang-tidy/add_new_check.py readability awesome-function-names
+
+
+The ``add_new_check.py`` script will:
+  * create the class for your check inside the specified module's directory and
+    register it in the module and in the build system;
+  * create a lit test file in the ``test/clang-tidy/`` directory;
+  * create a documentation file and include it into the
+    ``docs/clang-tidy/checks/list.rst``.
+
+Let's see in more detail at the check class definition:
+
+.. code-block:: c++
+
+  ...
+
+  #include "../ClangTidy.h"
+
+  namespace clang {
+  namespace tidy {
+  namespace readability {
+
+  ...
+  class AwesomeFunctionNamesCheck : public ClangTidyCheck {
+  public:
+    AwesomeFunctionNamesCheck(StringRef Name, ClangTidyContext *Context)
+        : ClangTidyCheck(Name, Context) {}
+    void registerMatchers(ast_matchers::MatchFinder *Finder) override;
+    void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
+  };
+
+  } // namespace readability
+  } // namespace tidy
+  } // namespace clang
+
+  ...
+
+Constructor of the check receives the ``Name`` and ``Context`` parameters, and
+must forward them to the ``ClangTidyCheck`` constructor.
+
+In our case the check needs to operate on the AST level and it overrides the
+``registerMatchers`` and ``check`` methods. If we wanted to analyze code on the
+preprocessor level, we'd need instead to override the ``registerPPCallbacks``
+method.
+
+In the ``registerMatchers`` method we create an AST Matcher (see `AST Matchers`_
+for more information) that will find the pattern in the AST that we want to
+inspect. The results of the matching are passed to the ``check`` method, which
+can further inspect them and report diagnostics.
+
+.. code-block:: c++
+
+  using namespace ast_matchers;
+
+  void AwesomeFunctionNamesCheck::registerMatchers(MatchFinder *Finder) {
+    Finder->addMatcher(functionDecl().bind("x"), this);
+  }
+
+  void AwesomeFunctionNamesCheck::check(const MatchFinder::MatchResult &Result) {
+    const auto *MatchedDecl = Result.Nodes.getNodeAs<FunctionDecl>("x");
+    if (MatchedDecl->getName().startswith("awesome_"))
+      return;
+    diag(MatchedDecl->getLocation(), "function %0 is insufficiently awesome")
+        << MatchedDecl
+        << FixItHint::CreateInsertion(MatchedDecl->getLocation(), "awesome_");
+  }
+
+(If you want to see an example of a useful check, look at
+`clang-tidy/google/ExplicitConstructorCheck.h
+<https://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/clang-tidy/google/ExplicitConstructorCheck.h>`_
+and `clang-tidy/google/ExplicitConstructorCheck.cpp
+<https://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/clang-tidy/google/ExplicitConstructorCheck.cpp>`_).
+
+
+Registering your Check
+----------------------
+
+(The ``add_new_check.py`` takes care of registering the check in an existing
+module. If you want to create a new module or know the details, read on.)
+
+The check should be registered in the corresponding module with a distinct name:
+
+.. code-block:: c++
+
+  class MyModule : public ClangTidyModule {
+   public:
+    void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override {
+      CheckFactories.registerCheck<ExplicitConstructorCheck>(
+          "my-explicit-constructor");
+    }
+  };
+
+Now we need to register the module in the ``ClangTidyModuleRegistry`` using a
+statically initialized variable:
+
+.. code-block:: c++
+
+  static ClangTidyModuleRegistry::Add<MyModule> X("my-module",
+                                                  "Adds my lint checks.");
+
+
+When using LLVM build system, we need to use the following hack to ensure the
+module is linked into the :program:`clang-tidy` binary:
+
+Add this near the ``ClangTidyModuleRegistry::Add<MyModule>`` variable:
+
+.. code-block:: c++
+
+  // This anchor is used to force the linker to link in the generated object file
+  // and thus register the MyModule.
+  volatile int MyModuleAnchorSource = 0;
+
+And this to the main translation unit of the :program:`clang-tidy` binary (or
+the binary you link the ``clang-tidy`` library in)
+``clang-tidy/tool/ClangTidyMain.cpp``:
+
+.. code-block:: c++
+
+  // This anchor is used to force the linker to link the MyModule.
+  extern volatile int MyModuleAnchorSource;
+  static int MyModuleAnchorDestination = MyModuleAnchorSource;
+
+
+Configuring Checks
+------------------
+
+If a check needs configuration options, it can access check-specific options
+using the ``Options.get<Type>("SomeOption", DefaultValue)`` call in the check
+constructor. In this case the check should also override the
+``ClangTidyCheck::storeOptions`` method to make the options provided by the
+check discoverable. This method lets :program:`clang-tidy` know which options
+the check implements and what the current values are (e.g. for the
+``-dump-config`` command line option).
+
+.. code-block:: c++
+
+  class MyCheck : public ClangTidyCheck {
+    const unsigned SomeOption1;
+    const std::string SomeOption2;
+
+  public:
+    MyCheck(StringRef Name, ClangTidyContext *Context)
+      : ClangTidyCheck(Name, Context),
+        SomeOption(Options.get("SomeOption1", -1U)),
+        SomeOption(Options.get("SomeOption2", "some default")) {}
+
+    void storeOptions(ClangTidyOptions::OptionMap &Opts) override {
+      Options.store(Opts, "SomeOption1", SomeOption1);
+      Options.store(Opts, "SomeOption2", SomeOption2);
+    }
+    ...
+
+Assuming the check is registered with the name "my-check", the option can then
+be set in a ``.clang-tidy`` file in the following way:
+
+.. code-block:: yaml
+
+  CheckOptions:
+    - key: my-check.SomeOption1
+      value: 123
+    - key: my-check.SomeOption2
+      value: 'some other value'
+
+If you need to specify check options on a command line, you can use the inline
+YAML format:
+
+.. code-block:: console
+
+  $ clang-tidy -config="{CheckOptions: [{key: a, value: b}, {key: x, value: y}]}" ...
+
+
+Testing Checks
+--------------
+
+To run tests for :program:`clang-tidy` use the command:
+
+.. code-block:: console
+
+  $ ninja check-clang-tools
+
+:program:`clang-tidy` checks can be tested using either unit tests or
+`lit`_ tests. Unit tests may be more convenient to test complex replacements
+with strict checks. `Lit`_ tests allow using partial text matching and regular
+expressions which makes them more suitable for writing compact tests for
+diagnostic messages.
+
+The ``check_clang_tidy.py`` script provides an easy way to test both
+diagnostic messages and fix-its. It filters out ``CHECK`` lines from the test
+file, runs :program:`clang-tidy` and verifies messages and fixes with two
+separate `FileCheck`_ invocations: once with FileCheck's directive
+prefix set to ``CHECK-MESSAGES``, validating the diagnostic messages,
+and once with the directive prefix set to ``CHECK-FIXES``, running
+against the fixed code (i.e., the code after generated fix-its are
+applied). In particular, ``CHECK-FIXES:`` can be used to check
+that code was not modified by fix-its, by checking that it is present
+unchanged in the fixed code. The full set of `FileCheck`_ directives
+is available (e.g., ``CHECK-MESSAGES-SAME:``, ``CHECK-MESSAGES-NOT:``), though
+typically the basic ``CHECK`` forms (``CHECK-MESSAGES`` and ``CHECK-FIXES``)
+are sufficient for clang-tidy tests. Note that the `FileCheck`_
+documentation mostly assumes the default prefix (``CHECK``), and hence
+describes the directive as ``CHECK:``, ``CHECK-SAME:``, ``CHECK-NOT:``, etc.
+Replace ``CHECK`` by either ``CHECK-FIXES`` or ``CHECK-MESSAGES`` for
+clang-tidy tests.
+
+An additional check enabled by ``check_clang_tidy.py`` ensures that
+if `CHECK-MESSAGES:` is used in a file then every warning or error
+must have an associated CHECK in that file. Or, you can use ``CHECK-NOTES:``
+instead, if you want to **also** ensure that all the notes are checked.
+
+To use the ``check_clang_tidy.py`` script, put a .cpp file with the
+appropriate ``RUN`` line in the ``test/clang-tidy`` directory. Use
+``CHECK-MESSAGES:`` and ``CHECK-FIXES:`` lines to write checks against
+diagnostic messages and fixed code.
+
+It's advised to make the checks as specific as possible to avoid checks matching
+to incorrect parts of the input. Use ``[[@LINE+X]]``/``[[@LINE-X]]``
+substitutions and distinct function and variable names in the test code.
+
+Here's an example of a test using the ``check_clang_tidy.py`` script (the full
+source code is at `test/clang-tidy/google-readability-casting.cpp`_):
+
+.. code-block:: c++
+
+  // RUN: %check_clang_tidy %s google-readability-casting %t
+
+  void f(int a) {
+    int b = (int)a;
+    // CHECK-MESSAGES: :[[@LINE-1]]:11: warning: redundant cast to the same type [google-readability-casting]
+    // CHECK-FIXES: int b = a;
+  }
+
+To check more than one scenario in the same test file use
+``-check-suffix=SUFFIX-NAME`` on ``check_clang_tidy.py`` command line or
+``-check-suffixes=SUFFIX-NAME-1,SUFFIX-NAME-2,...``.
+With ``-check-suffix[es]=SUFFIX-NAME`` you need to replace your ``CHECK-*``
+directives with ``CHECK-MESSAGES-SUFFIX-NAME`` and ``CHECK-FIXES-SUFFIX-NAME``.
+
+Here's an example:
+
+.. code-block:: c++
+
+   // RUN: %check_clang_tidy -check-suffix=USING-A %s misc-unused-using-decls %t -- -- -DUSING_A
+   // RUN: %check_clang_tidy -check-suffix=USING-B %s misc-unused-using-decls %t -- -- -DUSING_B
+   // RUN: %check_clang_tidy %s misc-unused-using-decls %t
+   ...
+   // CHECK-MESSAGES-USING-A: :[[@LINE-8]]:10: warning: using decl 'A' {{.*}}
+   // CHECK-MESSAGES-USING-B: :[[@LINE-7]]:10: warning: using decl 'B' {{.*}}
+   // CHECK-MESSAGES: :[[@LINE-6]]:10: warning: using decl 'C' {{.*}}
+   // CHECK-FIXES-USING-A-NOT: using a::A;$
+   // CHECK-FIXES-USING-B-NOT: using a::B;$
+   // CHECK-FIXES-NOT: using a::C;$
+
+
+There are many dark corners in the C++ language, and it may be difficult to make
+your check work perfectly in all cases, especially if it issues fix-it hints. The
+most frequent pitfalls are macros and templates:
+
+1. code written in a macro body/template definition may have a different meaning
+   depending on the macro expansion/template instantiation;
+2. multiple macro expansions/template instantiations may result in the same code
+   being inspected by the check multiple times (possibly, with different
+   meanings, see 1), and the same warning (or a slightly different one) may be
+   issued by the check multiple times; :program:`clang-tidy` will deduplicate
+   _identical_ warnings, but if the warnings are slightly different, all of them
+   will be shown to the user (and used for applying fixes, if any);
+3. making replacements to a macro body/template definition may be fine for some
+   macro expansions/template instantiations, but easily break some other
+   expansions/instantiations.
+
+.. _lit: https://llvm.org/docs/CommandGuide/lit.html
+.. _FileCheck: https://llvm.org/docs/CommandGuide/FileCheck.html
+.. _test/clang-tidy/google-readability-casting.cpp: https://reviews.llvm.org/diffusion/L/browse/clang-tools-extra/trunk/test/clang-tidy/google-readability-casting.cpp
+
+
+Running clang-tidy on LLVM
+--------------------------
+
+To test a check it's best to try it out on a larger code base. LLVM and Clang
+are the natural targets as you already have the source code around. The most
+convenient way to run :program:`clang-tidy` is with a compile command database;
+CMake can automatically generate one, for a description of how to enable it see
+`How To Setup Clang Tooling For LLVM`_. Once ``compile_commands.json`` is in
+place and a working version of :program:`clang-tidy` is in ``PATH`` the entire
+code base can be analyzed with ``clang-tidy/tool/run-clang-tidy.py``. The script
+executes :program:`clang-tidy` with the default set of checks on every
+translation unit in the compile command database and displays the resulting
+warnings and errors. The script provides multiple configuration flags.
+
+.. _How To Setup Clang Tooling For LLVM: https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
+
+
+* The default set of checks can be overridden using the ``-checks`` argument,
+  taking the identical format as :program:`clang-tidy` does. For example
+  ``-checks=-*,modernize-use-override`` will run the ``modernize-use-override``
+  check only.
+
+* To restrict the files examined you can provide one or more regex arguments
+  that the file names are matched against.
+  ``run-clang-tidy.py clang-tidy/.*Check\.cpp`` will only analyze clang-tidy
+  checks. It may also be necessary to restrict the header files warnings are
+  displayed from using the ``-header-filter`` flag. It has the same behavior
+  as the corresponding :program:`clang-tidy` flag.
+
+* To apply suggested fixes ``-fix`` can be passed as an argument. This gathers
+  all changes in a temporary directory and applies them. Passing ``-format``
+  will run clang-format over changed lines.
+
+
+On checks profiling
+-------------------
+
+:program:`clang-tidy` can collect per-check profiling info, and output it
+for each processed source file (translation unit).
+
+To enable profiling info collection, use the ``-enable-check-profile`` argument.
+The timings will be output to ``stderr`` as a table. Example output:
+
+.. code-block:: console
+
+  $ clang-tidy -enable-check-profile -checks=-*,readability-function-size source.cpp
+  ===-------------------------------------------------------------------------===
+                            clang-tidy checks profiling
+  ===-------------------------------------------------------------------------===
+    Total Execution Time: 1.0282 seconds (1.0258 wall clock)
+
+     ---User Time---   --System Time--   --User+System--   ---Wall Time---  --- Name ---
+     0.9136 (100.0%)   0.1146 (100.0%)   1.0282 (100.0%)   1.0258 (100.0%)  readability-function-size
+     0.9136 (100.0%)   0.1146 (100.0%)   1.0282 (100.0%)   1.0258 (100.0%)  Total
+
+It can also store that data as JSON files for further processing. Example output:
+
+.. code-block:: console
+
+  $ clang-tidy -enable-check-profile -store-check-profile=.  -checks=-*,readability-function-size source.cpp
+  $ # Note that there won't be timings table printed to the console.
+  $ ls /tmp/out/
+  20180516161318717446360-source.cpp.json
+  $ cat 20180516161318717446360-source.cpp.json
+  {
+  "file": "/path/to/source.cpp",
+  "timestamp": "2018-05-16 16:13:18.717446360",
+  "profile": {
+    "time.clang-tidy.readability-function-size.wall": 1.0421266555786133e+00,
+    "time.clang-tidy.readability-function-size.user": 9.2088400000005421e-01,
+    "time.clang-tidy.readability-function-size.sys": 1.2418899999999974e-01
+  }
+  }
+
+There is only one argument that controls profile storage:
+
+* ``-store-check-profile=<prefix>``
+
+  By default reports are printed in tabulated format to stderr. When this option
+  is passed, these per-TU profiles are instead stored as JSON.
+  If the prefix is not an absolute path, it is considered to be relative to the
+  directory from where you have run :program:`clang-tidy`. All ``.`` and ``..``
+  patterns in the path are collapsed, and symlinks are resolved.
+
+  Example:
+  Let's suppose you have a source file named ``example.cpp``, located in the
+  ``/source`` directory. Only the input filename is used, not the full path
+  to the source file. Additionally, it is prefixed with the current timestamp.
+
+  * If you specify ``-store-check-profile=/tmp``, then the profile will be saved
+    to ``/tmp/<ISO8601-like timestamp>-example.cpp.json``
+
+  * If you run :program:`clang-tidy` from within ``/foo`` directory, and specify
+    ``-store-check-profile=.``, then the profile will still be saved to
+    ``/foo/<ISO8601-like timestamp>-example.cpp.json``

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Integrations.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Integrations.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Integrations.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/Integrations.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,117 @@
+==================================
+Clang-tidy IDE/Editor Integrations
+==================================
+
+.. _Clangd: https://clang.llvm.org/extra/clangd.html
+
+Apart from being a standalone tool, :program:`clang-tidy` is integrated into
+various IDEs, code analyzers, and editors. Besides, it is currently being
+integrated into Clangd_. The following table shows the most
+well-known :program:`clang-tidy` integrations in detail.
+
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|                                      |        Feature                                                                                                                                           |
++======================================+========================+=================================+==========================+=========================================+==========================+
+|  **Tool**                            | On-the-fly inspection  | Check list configuration (GUI)  | Options to checks (GUI)  | Configuration via ``.clang-tidy`` files | Custom clang-tidy binary |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|A.L.E. for Vim                        |         \+\            |               \-\               |           \-\            |                 \-\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Clang Power Tools for Visual Studio   |         \-\            |               \+\               |           \-\            |                 \+\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Clangd                                |         \+\            |               \-\               |           \-\            |                 \-\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|CLion IDE                             |         \+\            |               \+\               |           \+\            |                 \+\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|CodeChecker                           |         \-\            |               \-\               |           \-\            |                 \-\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|CPPCheck                              |         \-\            |               \-\               |           \-\            |                 \-\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|CPPDepend                             |         \-\            |               \-\               |           \-\            |                 \-\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Flycheck for Emacs                    |         \+\            |               \-\               |           \-\            |                 \+\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|KDevelop IDE                          |         \-\            |               \+\               |           \+\            |                 \+\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Qt Creator IDE                        |         \+\            |               \+\               |           \-\            |                 \-\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|ReSharper C++ for Visual Studio       |         \+\            |               \+\               |           \-\            |                 \+\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Syntastic for Vim                     |         \+\            |               \-\               |           \-\            |                 \-\                     |           \+\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+|Visual Assist for Visual Studio       |         \+\            |               \+\               |           \-\            |                 \-\                     |           \-\            |
++--------------------------------------+------------------------+---------------------------------+--------------------------+-----------------------------------------+--------------------------+
+
+**IDEs**
+
+.. _CLion: https://www.jetbrains.com/clion/
+.. _integrates clang-tidy: https://www.jetbrains.com/help/clion/clang-tidy-checks-support.html
+
+CLion_ 2017.2 and later `integrates clang-tidy`_ as an extension to the
+built-in code analyzer. Starting from 2018.2 EAP, CLion allows using
+:program:`clang-tidy` via Clangd. Inspections and applicable quick-fixes are
+performed on the fly, and checks can be configured in standard command line
+format. In this integration, you can switch to the :program:`clang-tidy`
+binary different from the bundled one, pass the configuration in
+``.clang-tidy`` files instead of using the IDE settings, and configure
+options for particular checks.
+
+.. _KDevelop: https://www.kdevelop.org/
+.. _kdev-clang-tidy: https://github.com/KDE/kdev-clang-tidy/
+
+KDevelop_ with the kdev-clang-tidy_ plugin, starting from version 5.1, performs
+static analysis using :program:`clang-tidy`. The plugin launches the
+:program:`clang-tidy` binary from the specified location and parses its
+output to provide a list of issues.
+
+.. _QtCreator: https://www.qt.io/
+.. _Clang Code Model: http://doc.qt.io/qtcreator/creator-clang-codemodel.html
+
+QtCreator_ 4.6 integrates :program:`clang-tidy` warnings into the editor
+diagnostics under the `Clang Code Model`_. To employ :program:`clang-tidy`
+inspection in QtCreator, you need to create a copy of one of the presets and
+choose the checks to be performed in the Clang Code Model Warnings menu.
+
+.. _MS Visual Studio: https://visualstudio.microsoft.com/
+.. _ReSharper C++: https://www.jetbrains.com/help/resharper/Clang_Tidy_Integration.html
+.. _Visual Assist: https://docs.wholetomato.com/default.asp?W761
+.. _Clang Power Tools: https://marketplace.visualstudio.com/items?itemName=caphyon.ClangPowerTools
+.. _clang-tidy-vs: https://github.com/llvm-mirror/clang-tools-extra/tree/master/clang-tidy-vs
+
+`MS Visual Studio`_ has a native clang-tidy-vs_ plugin and also can integrate
+:program:`clang-tidy` by means of three other tools. The `ReSharper C++`_
+extension, version 2017.3 and later, provides seamless :program:`clang-tidy`
+integration: checks and quick-fixes run alongside native inspections. Apart
+from that, ReSharper C++ incorporates :program:`clang-tidy` as a separate
+step of its code clean-up process. `Visual Assist`_ build 2210 includes a
+subset of :program:`clang-tidy` checklist to inspect the code as you edit.
+Another way to bring :program:`clang-tidy` functionality to Visual Studio is
+the `Clang Power Tools`_ plugin, which includes most of the
+:program:`clang-tidy` checks and runs them during compilation or as a separate
+step of code analysis.
+
+**Editors**
+
+.. _Flycheck: https://github.com/ch1bo/flycheck-clang-tidy
+.. _Syntastic: https://github.com/vim-syntastic/syntastic
+.. _A.L.E.: https://github.com/w0rp/ale
+.. _Emacs24: https://www.gnu.org/s/emacs/
+.. _Vim: https://www.vim.org/
+
+Emacs24_, when expanded with the Flycheck_ plugin, incorporates the
+:program:`clang-tidy` inspection into the syntax analyzer. For Vim_, you can
+use Syntastic_, which includes :program:`clang-tidy`, or `A.L.E.`_,
+a lint engine that applies :program:`clang-tidy` along with other linters.
+
+**Analyzers**
+
+.. _CPPDepend: https://www.cppdepend.com/cppdependv2018
+.. _CPPCheck: https://sourceforge.net/p/cppcheck/news/
+.. _CodeChecker: https://github.com/Ericsson/codechecker
+.. _plugin: https://github.com/Ericsson/CodeCheckerEclipsePlugin
+
+:program:`clang-tidy` is integrated in CPPDepend_ starting from version 2018.1
+and CPPCheck_ 1.82. CPPCheck integration lets you import Visual Studio
+solutions and run the :program:`clang-tidy` inspection on them. The
+CodeChecker_ application of version 5.3 or later, which also comes as a plugin_
+for Eclipse, supports :program:`clang-tidy` as a static analysis instrument and
+allows to use a custom :program:`clang-tidy` binary.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-comparison.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-comparison.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-comparison.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-comparison.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,33 @@
+.. title:: clang-tidy - abseil-duration-comparison
+
+abseil-duration-comparison
+==========================
+
+Checks for comparisons which should be in the ``absl::Duration`` domain instead
+of the floating point or integer domains.
+
+N.B.: In cases where a ``Duration`` was being converted to an integer and then
+compared against a floating-point value, truncation during the ``Duration``
+conversion might yield a different result. In practice this is very rare, and
+still indicates a bug which should be fixed.
+
+Examples:
+
+.. code-block:: c++
+
+  // Original - Comparison in the floating point domain
+  double x;
+  absl::Duration d;
+  if (x < absl::ToDoubleSeconds(d)) ...
+
+  // Suggested - Compare in the absl::Duration domain instead
+  if (absl::Seconds(x) < d) ...
+
+
+  // Original - Comparison in the integer domain
+  int x;
+  absl::Duration d;
+  if (x < absl::ToInt64Microseconds(d)) ...
+
+  // Suggested - Compare in the absl::Duration domain instead
+  if (absl::Microseconds(x) < d) ...

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-division.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-division.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-division.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-division.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,36 @@
+.. title:: clang-tidy - abseil-duration-division
+
+abseil-duration-division
+========================
+
+``absl::Duration`` arithmetic works like it does with integers. That means that
+division of two ``absl::Duration`` objects returns an ``int64`` with any fractional
+component truncated toward 0. See `this link <https://github.com/abseil/abseil-cpp/blob/29ff6d4860070bf8fcbd39c8805d0c32d56628a3/absl/time/time.h#L137>`_ for more information on arithmetic with ``absl::Duration``.
+
+For example:
+
+.. code-block:: c++
+
+ absl::Duration d = absl::Seconds(3.5);
+ int64 sec1 = d / absl::Seconds(1);     // Truncates toward 0.
+ int64 sec2 = absl::ToInt64Seconds(d);  // Equivalent to division.
+ assert(sec1 == 3 && sec2 == 3);
+
+ double dsec = d / absl::Seconds(1);  // WRONG: Still truncates toward 0.
+ assert(dsec == 3.0);
+
+If you want floating-point division, you should use either the
+``absl::FDivDuration()`` function, or one of the unit conversion functions such
+as ``absl::ToDoubleSeconds()``. For example:
+
+.. code-block:: c++
+
+ absl::Duration d = absl::Seconds(3.5);
+ double dsec1 = absl::FDivDuration(d, absl::Seconds(1));  // GOOD: No truncation.
+ double dsec2 = absl::ToDoubleSeconds(d);                 // GOOD: No truncation.
+ assert(dsec1 == 3.5 && dsec2 == 3.5);
+
+
+This check looks for uses of ``absl::Duration`` division that is done in a
+floating-point context, and recommends the use of a function that returns a
+floating-point value.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-float.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-float.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-float.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-float.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+.. title:: clang-tidy - abseil-duration-factory-float
+
+abseil-duration-factory-float
+=============================
+
+Checks for cases where the floating-point overloads of various
+``absl::Duration`` factory functions are called when the more-efficient
+integer versions could be used instead.
+
+This check will not suggest fixes for literals which contain fractional
+floating point values or non-literals. It will suggest removing
+superfluous casts.
+
+Examples:
+
+.. code-block:: c++
+
+  // Original - Providing a floating-point literal.
+  absl::Duration d = absl::Seconds(10.0);
+
+  // Suggested - Use an integer instead.
+  absl::Duration d = absl::Seconds(10);
+
+
+  // Original - Explicitly casting to a floating-point type.
+  absl::Duration d = absl::Seconds(static_cast<double>(10));
+
+  // Suggested - Remove the explicit cast
+  absl::Duration d = absl::Seconds(10);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-scale.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-scale.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-scale.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-factory-scale.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,35 @@
+.. title:: clang-tidy - abseil-duration-factory-scale
+
+abseil-duration-factory-scale
+=============================
+
+Checks for cases where arguments to ``absl::Duration`` factory functions are
+scaled internally and could be changed to a different factory function. This
+check also looks for arguements with a zero value and suggests using
+``absl::ZeroDuration()`` instead.
+
+Examples:
+
+.. code-block:: c++
+
+  // Original - Internal multiplication.
+  int x;
+  absl::Duration d = absl::Seconds(60 * x);
+
+  // Suggested - Use absl::Minutes instead.
+  absl::Duration d = absl::Minutes(x);
+
+
+  // Original - Internal division.
+  int y;
+  absl::Duration d = absl::Milliseconds(y / 1000.);
+
+  // Suggested - Use absl:::Seconds instead.
+  absl::Duration d = absl::Seconds(y);
+
+
+  // Original - Zero-value argument.
+  absl::Duration d = absl::Hours(0);
+
+  // Suggested = Use absl::ZeroDuration instead
+  absl::Duration d = absl::ZeroDuration();

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-subtraction.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-subtraction.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-subtraction.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-duration-subtraction.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,36 @@
+.. title:: clang-tidy - abseil-duration-subtraction
+
+abseil-duration-subtraction
+===========================
+
+Checks for cases where subtraction should be performed in the
+``absl::Duration`` domain. When subtracting two values, and the first one is
+known to be a conversion from ``absl::Duration``, we can infer that the second
+should also be interpreted as an ``absl::Duration``, and make that inference
+explicit.
+
+Examples:
+
+.. code-block:: c++
+
+  // Original - Subtraction in the double domain
+  double x;
+  absl::Duration d;
+  double result = absl::ToDoubleSeconds(d) - x;
+
+  // Suggestion - Subtraction in the absl::Duration domain instead
+  double result = absl::ToDoubleSeconds(d - absl::Seconds(x));
+
+
+  // Original - Subtraction of two Durations in the double domain
+  absl::Duration d1, d2;
+  double result = absl::ToDoubleSeconds(d1) - absl::ToDoubleSeconds(d2);
+
+  // Suggestion - Subtraction in the absl::Duration domain instead
+  double result = absl::ToDoubleSeconds(d1 - d2);
+
+Note: As with other ``clang-tidy`` checks, it is possible that multiple fixes
+may overlap (as in the case of nested expressions), so not all occurences can
+be transformed in one run. In particular, this may occur for nested subtraction
+expressions. Running ``clang-tidy`` multiple times will find and fix these
+overlaps.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-faster-strsplit-delimiter.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-faster-strsplit-delimiter.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-faster-strsplit-delimiter.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-faster-strsplit-delimiter.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,41 @@
+.. title:: clang-tidy - abseil-faster-strsplit-delimiter
+
+abseil-faster-strsplit-delimiter
+================================
+
+Finds instances of ``absl::StrSplit()`` or ``absl::MaxSplits()`` where the
+delimiter is a single character string literal and replaces with a character.
+The check will offer a suggestion to change the string literal into a character.
+It will also catch code using ``absl::ByAnyChar()`` for just a single character
+and will transform that into a single character as well.
+
+These changes will give the same result, but using characters rather than
+single character string literals is more efficient and readable.
+
+Examples:
+
+.. code-block:: c++
+
+  // Original - the argument is a string literal.
+  for (auto piece : absl::StrSplit(str, "B")) {
+
+  // Suggested - the argument is a character, which causes the more efficient
+  // overload of absl::StrSplit() to be used.
+  for (auto piece : absl::StrSplit(str, 'B')) {
+
+
+  // Original - the argument is a string literal inside absl::ByAnyChar call.
+  for (auto piece : absl::StrSplit(str, absl::ByAnyChar("B"))) {
+
+  // Suggested - the argument is a character, which causes the more efficient
+  // overload of absl::StrSplit() to be used and we do not need absl::ByAnyChar
+  // anymore.
+  for (auto piece : absl::StrSplit(str, 'B')) {
+
+
+  // Original - the argument is a string literal inside absl::MaxSplits call.
+  for (auto piece : absl::StrSplit(str, absl::MaxSplits("B", 1))) {
+
+  // Suggested - the argument is a character, which causes the more efficient
+  // overload of absl::StrSplit() to be used.
+  for (auto piece : absl::StrSplit(str, absl::MaxSplits('B', 1))) {

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-internal-dependencies.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-internal-dependencies.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-internal-dependencies.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-internal-dependencies.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,24 @@
+subl.. title:: clang-tidy - abseil-no-internal-dependencies
+
+abseil-no-internal-dependencies
+===============================
+
+Warns if code using Abseil depends on internal details. If something is in a
+namespace that includes the word “internal”, code is not allowed to depend upon
+it beaucse it’s an implementation detail. They cannot friend it, include it,
+you mention it or refer to it in any way. Doing so violates Abseil's
+compatibility guidelines and may result in breakage. See
+https://abseil.io/about/compatibility for more information.
+
+The following cases will result in warnings:
+
+.. code-block:: c++
+
+  absl::strings_internal::foo();
+  // warning triggered on this line
+  class foo {
+    friend struct absl::container_internal::faa;
+    // warning triggered on this line
+  };
+  absl::memory_internal::MakeUniqueResult();
+  // warning triggered on this line

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-namespace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-namespace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-namespace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-no-namespace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - abseil-no-namespace
+
+abseil-no-namespace
+===================
+
+Ensures code does not open ``namespace absl`` as that violates Abseil's
+compatibility guidelines. Code should not open ``namespace absl`` as that
+conflicts with Abseil's compatibility guidelines and may result in breakage.
+
+Any code that uses:
+
+.. code-block:: c++
+
+ namespace absl {
+  ...
+ }
+
+will be prompted with a warning.
+
+See `the full Abseil compatibility guidelines <https://
+abseil.io/about/compatibility>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-redundant-strcat-calls.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-redundant-strcat-calls.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-redundant-strcat-calls.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-redundant-strcat-calls.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - abseil-redundant-strcat-calls
+
+abseil-redundant-strcat-calls
+=============================
+
+Suggests removal of unnecessary calls to ``absl::StrCat`` when the result is 
+being passed to another call to ``absl::StrCat`` or ``absl::StrAppend``.
+
+The extra calls cause unnecessary temporary strings to be constructed. Removing
+them makes the code smaller and faster.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string s = absl::StrCat("A", absl::StrCat("B", absl::StrCat("C", "D")));
+  //before
+
+  std::string s = absl::StrCat("A", "B", "C", "D");
+  //after
+
+  absl::StrAppend(&s, absl::StrCat("E", "F", "G"));
+  //before
+  
+  absl::StrAppend(&s, "E", "F", "G");
+  //after

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-str-cat-append.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-str-cat-append.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-str-cat-append.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-str-cat-append.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - abseil-str-cat-append
+
+abseil-str-cat-append
+=====================
+
+Flags uses of ``absl::StrCat()`` to append to a ``std::string``. Suggests 
+``absl::StrAppend()`` should be used instead.
+
+The extra calls cause unnecessary temporary strings to be constructed. Removing
+them makes the code smaller and faster.
+
+.. code-block:: c++
+
+  a = absl::StrCat(a, b); // Use absl::StrAppend(&a, b) instead.
+
+Does not diagnose cases where ``absl::StrCat()`` is used as a template
+argument for a functor.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-string-find-startswith.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-string-find-startswith.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-string-find-startswith.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-string-find-startswith.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,41 @@
+.. title:: clang-tidy - abseil-string-find-startswith
+
+abseil-string-find-startswith
+=============================
+
+Checks whether a ``std::string::find()`` result is compared with 0, and
+suggests replacing with ``absl::StartsWith()``. This is both a readability and
+performance issue.
+
+.. code-block:: c++
+
+  string s = "...";
+  if (s.find("Hello World") == 0) { /* do something */ }
+
+becomes
+
+
+.. code-block:: c++
+
+  string s = "...";
+  if (absl::StartsWith(s, "Hello World")) { /* do something */ }
+
+
+Options
+-------
+
+.. option:: StringLikeClasses
+
+   Semicolon-separated list of names of string-like classes. By default only
+   ``std::basic_string`` is considered. The list of methods to considered is
+   fixed.
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.
+
+.. option:: AbseilStringsMatchHeader
+
+   The location of Abseil's ``strings/match.h``. Defaults to
+   ``absl/strings/match.h``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-upgrade-duration-conversions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-upgrade-duration-conversions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-upgrade-duration-conversions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/abseil-upgrade-duration-conversions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,43 @@
+.. title:: clang-tidy - abseil-upgrade-duration-conversions
+
+abseil-upgrade-duration-conversions
+===================================
+
+Finds calls to ``absl::Duration`` arithmetic operators and factories whose
+argument needs an explicit cast to continue compiling after upcoming API
+changes.
+
+The operators ``*=``, ``/=``, ``*``, and ``/`` for ``absl::Duration`` currently
+accept an argument of class type that is convertible to an arithmetic type. Such
+a call currently converts the value to an ``int64_t``, even in a case such as
+``std::atomic<float>`` that would result in lossy conversion.
+
+Additionally, the ``absl::Duration`` factory functions (``absl::Hours``,
+``absl::Minutes``, etc) currently accept an ``int64_t`` or a floating-point
+type. Similar to the arithmetic operators, calls with an argument of class type
+that is convertible to an arithmetic type go through the ``int64_t`` path.
+
+These operators and factories will be changed to only accept arithmetic types to
+prevent unintended behavior. After these changes are released, passing an
+argument of class type will no longer compile, even if the type is implicitly
+convertible to an arithmetic type.
+
+Here are example fixes created by this check:
+
+.. code-block:: c++
+
+  std::atomic<int> a;
+  absl::Duration d = absl::Milliseconds(a);
+  d *= a;
+
+becomes
+
+.. code-block:: c++
+
+  std::atomic<int> a;
+  absl::Duration d = absl::Milliseconds(static_cast<int64_t>(a));
+  d *= static_cast<int64_t>(a);
+
+Note that this check always adds a cast to ``int64_t`` in order to preserve the
+current behavior of user code. It is possible that this uncovers unintended
+behavior due to types implicitly convertible to a floating-point type.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-accept
+
+android-cloexec-accept
+======================
+
+The usage of ``accept()`` is not recommended, it's better to use ``accept4()``.
+Without this flag, an opened sensitive file descriptor would remain open across
+a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  accept(sockfd, addr, addrlen);
+
+  // becomes
+
+  accept4(sockfd, addr, addrlen, SOCK_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept4.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept4.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept4.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-accept4.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-accept4
+
+android-cloexec-accept4
+=======================
+
+``accept4()`` should include ``SOCK_CLOEXEC`` in its type argument to avoid the
+file descriptor leakage. Without this flag, an opened sensitive file would
+remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  accept4(sockfd, addr, addrlen, SOCK_NONBLOCK);
+
+  // becomes
+
+  accept4(sockfd, addr, addrlen, SOCK_NONBLOCK | SOCK_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-creat.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-creat.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-creat.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-creat.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - android-cloexec-creat
+
+android-cloexec-creat
+=====================
+
+The usage of ``creat()`` is not recommended, it's better to use ``open()``.
+
+Examples:
+
+.. code-block:: c++
+
+  int fd = creat(path, mode);
+
+  // becomes
+
+  int fd = open(path, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, mode);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-dup.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-dup.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-dup.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-dup.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-dup
+
+android-cloexec-dup
+===================
+
+The usage of ``dup()`` is not recommended, it's better to use ``fcntl()``,
+which can set the close-on-exec flag. Otherwise, an opened sensitive file would
+remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  int fd = dup(oldfd);
+
+  // becomes
+
+  int fd = fcntl(oldfd, F_DUPFD_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - android-cloexec-epoll-create
+
+android-cloexec-epoll-create
+============================
+
+The usage of ``epoll_create()`` is not recommended, it's better to use
+``epoll_create1()``, which allows close-on-exec.
+
+Examples:
+
+.. code-block:: c++
+
+  epoll_create(size);
+
+  // becomes
+
+  epoll_create1(EPOLL_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create1.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create1.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create1.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-epoll-create1.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-epoll-create1
+
+android-cloexec-epoll-create1
+=============================
+
+``epoll_create1()`` should include ``EPOLL_CLOEXEC`` in its type argument to
+avoid the file descriptor leakage. Without this flag, an opened sensitive file
+would remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  epoll_create1(0);
+
+  // becomes
+
+  epoll_create1(EPOLL_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-fopen.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-fopen.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-fopen.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-fopen.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-fopen
+
+android-cloexec-fopen
+=====================
+
+``fopen()`` should include ``e`` in their mode string; so ``re`` would be
+valid. This is equivalent to having set ``FD_CLOEXEC on`` that descriptor.
+
+Examples:
+
+.. code-block:: c++
+
+  fopen("fn", "r");
+
+  // becomes
+
+  fopen("fn", "re");
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - android-cloexec-inotify-init
+
+android-cloexec-inotify-init
+============================
+
+The usage of ``inotify_init()`` is not recommended, it's better to use
+``inotify_init1()``.
+
+Examples:
+
+.. code-block:: c++
+
+  inotify_init();
+
+  // becomes
+
+  inotify_init1(IN_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init1.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init1.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init1.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-inotify-init1.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-inotify-init1
+
+android-cloexec-inotify-init1
+=============================
+
+``inotify_init1()`` should include ``IN_CLOEXEC`` in its type argument to avoid the
+file descriptor leakage. Without this flag, an opened sensitive file would
+remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  inotify_init1(IN_NONBLOCK);
+
+  // becomes
+
+  inotify_init1(IN_NONBLOCK | IN_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-memfd-create.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-memfd-create.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-memfd-create.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-memfd-create.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-memfd-create
+
+android-cloexec-memfd-create
+============================
+
+``memfd_create()`` should include ``MFD_CLOEXEC`` in its type argument to avoid
+the file descriptor leakage. Without this flag, an opened sensitive file would
+remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  memfd_create(name, MFD_ALLOW_SEALING);
+
+  // becomes
+
+  memfd_create(name, MFD_ALLOW_SEALING | MFD_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-open.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-open.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-open.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-open.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,24 @@
+.. title:: clang-tidy - android-cloexec-open
+
+android-cloexec-open
+====================
+
+A common source of security bugs is code that opens a file without using the
+``O_CLOEXEC`` flag.  Without that flag, an opened sensitive file would remain
+open across a fork+exec to a lower-privileged SELinux domain, leaking that
+sensitive data. Open-like functions including ``open()``, ``openat()``, and
+``open64()`` should include ``O_CLOEXEC`` in their flags argument.
+
+Examples:
+
+.. code-block:: c++
+
+  open("filename", O_RDWR);
+  open64("filename", O_RDWR);
+  openat(0, "filename", O_RDWR);
+
+  // becomes
+
+  open("filename", O_RDWR | O_CLOEXEC);
+  open64("filename", O_RDWR | O_CLOEXEC);
+  openat(0, "filename", O_RDWR | O_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-socket.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-socket.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-socket.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-cloexec-socket.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - android-cloexec-socket
+
+android-cloexec-socket
+======================
+
+``socket()`` should include ``SOCK_CLOEXEC`` in its type argument to avoid the
+file descriptor leakage. Without this flag, an opened sensitive file would
+remain open across a fork+exec to a lower-privileged SELinux domain.
+
+Examples:
+
+.. code-block:: c++
+
+  socket(domain, type, SOCK_STREAM);
+
+  // becomes
+
+  socket(domain, type, SOCK_STREAM | SOCK_CLOEXEC);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-comparison-in-temp-failure-retry.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-comparison-in-temp-failure-retry.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-comparison-in-temp-failure-retry.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/android-comparison-in-temp-failure-retry.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,36 @@
+.. title:: clang-tidy - android-comparison-in-temp-failure-retry
+
+android-comparison-in-temp-failure-retry
+========================================
+
+Diagnoses comparisons that appear to be incorrectly placed in the argument to
+the ``TEMP_FAILURE_RETRY`` macro. Having such a use is incorrect in the vast
+majority of cases, and will often silently defeat the purpose of the
+``TEMP_FAILURE_RETRY`` macro.
+
+For context, ``TEMP_FAILURE_RETRY`` is `a convenience macro
+<https://www.gnu.org/software/libc/manual/html_node/Interrupted-Primitives.html>`_
+provided by both glibc and Bionic. Its purpose is to repeatedly run a syscall
+until it either succeeds, or fails for reasons other than being interrupted.
+
+Example buggy usage looks like:
+
+.. code-block:: c
+
+  char cs[1];
+  while (TEMP_FAILURE_RETRY(read(STDIN_FILENO, cs, sizeof(cs)) != 0)) {
+    // Do something with cs.
+  }
+
+Because TEMP_FAILURE_RETRY will check for whether the result *of the comparison*
+is ``-1``, and retry if so.
+
+If you encounter this, the fix is simple: lift the comparison out of the
+``TEMP_FAILURE_RETRY`` argument, like so:
+
+.. code-block:: c
+
+  char cs[1];
+  while (TEMP_FAILURE_RETRY(read(STDIN_FILENO, cs, sizeof(cs))) != 0) {
+    // Do something with cs.
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/boost-use-to-string.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/boost-use-to-string.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/boost-use-to-string.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/boost-use-to-string.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,22 @@
+.. title:: clang-tidy - boost-use-to-string
+
+boost-use-to-string
+===================
+
+This check finds conversion from integer type like ``int`` to ``std::string`` or
+``std::wstring`` using ``boost::lexical_cast``, and replace it with calls to
+``std::to_string`` and ``std::to_wstring``.
+
+It doesn't replace conversion from floating points despite the ``to_string``
+overloads, because it would change the behaviour.
+
+
+.. code-block:: c++
+
+    auto str = boost::lexical_cast<std::string>(42);
+    auto wstr = boost::lexical_cast<std::wstring>(2137LL);
+
+    // Will be changed to
+    auto str = std::to_string(42);
+    auto wstr = std::to_wstring(2137LL);
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-argument-comment.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-argument-comment.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-argument-comment.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-argument-comment.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+.. title:: clang-tidy - bugprone-argument-comment
+
+bugprone-argument-comment
+=========================
+
+Checks that argument comments match parameter names.
+
+The check understands argument comments in the form ``/*parameter_name=*/``
+that are placed right before the argument.
+
+.. code-block:: c++
+
+  void f(bool foo);
+
+  ...
+
+  f(/*bar=*/true);
+  // warning: argument name 'bar' in comment does not match parameter name 'foo'
+
+The check tries to detect typos and suggest automated fixes for them.
+
+Options
+-------
+
+.. option:: StrictMode
+
+   When zero (default value), the check will ignore leading and trailing
+   underscores and case when comparing names -- otherwise they are taken into
+   account.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-assert-side-effect.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-assert-side-effect.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-assert-side-effect.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-assert-side-effect.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,23 @@
+.. title:: clang-tidy - bugprone-assert-side-effect
+
+bugprone-assert-side-effect
+===========================
+
+Finds ``assert()`` with side effect.
+
+The condition of ``assert()`` is evaluated only in debug builds so a
+condition with side effect can cause different behavior in debug / release
+builds.
+
+Options
+-------
+
+.. option:: AssertMacros
+
+   A comma-separated list of the names of assert macros to be checked.
+
+.. option:: CheckFunctionCalls
+
+   Whether to treat non-const member and non-member functions as they produce
+   side effects. Disabled by default because it can increase the number of false
+   positive warnings.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-bool-pointer-implicit-conversion.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - bugprone-bool-pointer-implicit-conversion
+
+bugprone-bool-pointer-implicit-conversion
+=========================================
+
+Checks for conditions based on implicit conversion from a ``bool`` pointer to
+``bool``.
+
+Example:
+
+.. code-block:: c++
+
+  bool *p;
+  if (p) {
+    // Never used in a pointer-specific way.
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-copy-constructor-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-copy-constructor-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-copy-constructor-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-copy-constructor-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+.. title:: clang-tidy - bugprone-copy-constructor-init
+
+bugprone-copy-constructor-init
+==============================
+
+Finds copy constructors where the constructor doesn't call
+the copy constructor of the base class.
+
+.. code-block:: c++
+
+    class Copyable {
+    public:
+      Copyable() = default;
+      Copyable(const Copyable &) = default;
+    };
+    class X2 : public Copyable {
+      X2(const X2 &other) {} // Copyable(other) is missing
+    };
+
+Also finds copy constructors where the constructor of
+the base class don't have parameter.
+
+.. code-block:: c++
+
+    class X4 : public Copyable {
+      X4(const X4 &other) : Copyable() {} // other is missing
+    };
+
+The check also suggests a fix-its in some cases.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-dangling-handle.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-dangling-handle.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-dangling-handle.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-dangling-handle.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,38 @@
+.. title:: clang-tidy - bugprone-dangling-handle
+
+bugprone-dangling-handle
+========================
+
+Detect dangling references in value handles like
+``std::experimental::string_view``.
+These dangling references can be a result of constructing handles from temporary
+values, where the temporary is destroyed soon after the handle is created.
+
+Examples:
+
+.. code-block:: c++
+
+  string_view View = string();  // View will dangle.
+  string A;
+  View = A + "A";  // still dangle.
+
+  vector<string_view> V;
+  V.push_back(string());  // V[0] is dangling.
+  V.resize(3, string());  // V[1] and V[2] will also dangle.
+
+  string_view f() {
+    // All these return values will dangle.
+    return string();
+    string S;
+    return S;
+    char Array[10]{};
+    return Array;
+  }
+
+Options
+-------
+
+.. option:: HandleClasses
+
+   A semicolon-separated list of class names that should be treated as handles.
+   By default only ``std::experimental::basic_string_view`` is considered.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-exception-escape.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-exception-escape.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-exception-escape.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-exception-escape.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,39 @@
+.. title:: clang-tidy - bugprone-exception-escape
+
+bugprone-exception-escape
+=========================
+
+Finds functions which may throw an exception directly or indirectly, but they
+should not. The functions which should not throw exceptions are the following:
+* Destructors
+* Move constructors
+* Move assignment operators
+* The ``main()`` functions
+* ``swap()`` functions
+* Functions marked with ``throw()`` or ``noexcept``
+* Other functions given as option
+
+A destructor throwing an exception may result in undefined behavior, resource
+leaks or unexpected termination of the program. Throwing move constructor or
+move assignment also may result in undefined behavior or resource leak. The
+``swap()`` operations expected to be non throwing most of the cases and they
+are always possible to implement in a non throwing way. Non throwing ``swap()``
+operations are also used to create move operations. A throwing ``main()``
+function also results in unexpected termination.
+
+WARNING! This check may be expensive on large source files.
+
+Options
+-------
+
+.. option:: FunctionsThatShouldNotThrow
+
+   Comma separated list containing function names which should not throw. An
+   example value for this parameter can be ``WinMain`` which adds function
+   ``WinMain()`` in the Windows API to the list of the funcions which should
+   not throw. Default value is an empty string.
+
+.. option:: IgnoredExceptions
+
+   Comma separated list containing type names which are not counted as thrown
+   exceptions in the check. Default value is an empty string.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-fold-init-type.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-fold-init-type.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-fold-init-type.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-fold-init-type.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+.. title:: clang-tidy - bugprone-fold-init-type
+
+bugprone-fold-init-type
+=======================
+
+The check flags type mismatches in
+`folds <https://en.wikipedia.org/wiki/Fold_(higher-order_function)>`_
+like ``std::accumulate`` that might result in loss of precision.
+``std::accumulate`` folds an input range into an initial value using the type of
+the latter, with ``operator+`` by default. This can cause loss of precision
+through:
+
+- Truncation: The following code uses a floating point range and an int
+  initial value, so trucation wil happen at every application of ``operator+``
+  and the result will be `0`, which might not be what the user expected.
+
+.. code-block:: c++
+
+  auto a = {0.5f, 0.5f, 0.5f, 0.5f};
+  return std::accumulate(std::begin(a), std::end(a), 0);
+
+- Overflow: The following code also returns `0`.
+
+.. code-block:: c++
+
+  auto a = {65536LL * 65536 * 65536};
+  return std::accumulate(std::begin(a), std::end(a), 0);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forward-declaration-namespace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forward-declaration-namespace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forward-declaration-namespace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forward-declaration-namespace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,20 @@
+.. title:: clang-tidy - bugprone-forward-declaration-namespace
+
+bugprone-forward-declaration-namespace
+======================================
+
+Checks if an unused forward declaration is in a wrong namespace.
+
+The check inspects all unused forward declarations and checks if there is any
+declaration/definition with the same name existing, which could indicate that
+the forward declaration is in a potentially wrong namespace.
+
+.. code-block:: c++
+
+  namespace na { struct A; }
+  namespace nb { struct A {}; }
+  nb::A a;
+  // warning : no definition found for 'A', but a definition with the same name
+  // 'A' found in another namespace 'nb::'
+
+This check can only generate warnings, but it can't suggest a fix at this point.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forwarding-reference-overload.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forwarding-reference-overload.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forwarding-reference-overload.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-forwarding-reference-overload.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - bugprone-forwarding-reference-overload
+
+bugprone-forwarding-reference-overload
+======================================
+
+The check looks for perfect forwarding constructors that can hide copy or move
+constructors. If a non const lvalue reference is passed to the constructor, the
+forwarding reference parameter will be a better match than the const reference
+parameter of the copy constructor, so the perfect forwarding constructor will be
+called, which can be confusing.
+For detailed description of this issue see: Scott Meyers, Effective Modern C++,
+Item 26.
+
+Consider the following example:
+
+.. code-block:: c++
+
+    class Person {
+    public:
+      // C1: perfect forwarding ctor
+      template<typename T>
+      explicit Person(T&& n) {}
+
+      // C2: perfect forwarding ctor with parameter default value
+      template<typename T>
+      explicit Person(T&& n, int x = 1) {}
+
+      // C3: perfect forwarding ctor guarded with enable_if
+      template<typename T, typename X = enable_if_t<is_special<T>,void>>
+      explicit Person(T&& n) {}
+
+      // (possibly compiler generated) copy ctor
+      Person(const Person& rhs);
+    };
+
+The check warns for constructors C1 and C2, because those can hide copy and move
+constructors. We suppress warnings if the copy and the move constructors are both
+disabled (deleted or private), because there is nothing the perfect forwarding
+constructor could hide in this case. We also suppress warnings for constructors
+like C3 that are guarded with an enable_if, assuming the programmer was aware of
+the possible hiding.
+
+Background
+----------
+
+For deciding whether a constructor is guarded with enable_if, we consider the
+default values of the type parameters and the types of the constructor
+parameters. If any part of these types is std::enable_if or std::enable_if_t, we
+assume the constructor is guarded.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-inaccurate-erase.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-inaccurate-erase.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-inaccurate-erase.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-inaccurate-erase.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - bugprone-inaccurate-erase
+
+bugprone-inaccurate-erase
+=========================
+
+
+Checks for inaccurate use of the ``erase()`` method.
+
+Algorithms like ``remove()`` do not actually remove any element from the
+container but return an iterator to the first redundant element at the end
+of the container. These redundant elements must be removed using the
+``erase()`` method. This check warns when not all of the elements will be
+removed due to using an inappropriate overload.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-incorrect-roundings.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-incorrect-roundings.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-incorrect-roundings.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-incorrect-roundings.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - bugprone-incorrect-roundings
+
+bugprone-incorrect-roundings
+============================
+
+Checks the usage of patterns known to produce incorrect rounding.
+Programmers often use::
+
+   (int)(double_expression + 0.5)
+
+to round the double expression to an integer. The problem with this:
+
+1. It is unnecessarily slow.
+2. It is incorrect. The number 0.499999975 (smallest representable float
+   number below 0.5) rounds to 1.0. Even worse behavior for negative
+   numbers where both -0.5f and -1.4f both round to 0.0.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-integer-division.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-integer-division.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-integer-division.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-integer-division.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,39 @@
+.. title:: clang-tidy - bugprone-integer-division
+
+bugprone-integer-division
+=========================
+
+Finds cases where integer division in a floating point context is likely to
+cause unintended loss of precision.
+
+No reports are made if divisions are part of the following expressions:
+
+- operands of operators expecting integral or bool types,
+- call expressions of integral or bool types, and
+- explicit cast expressions to integral or bool types,
+
+as these are interpreted as signs of deliberateness from the programmer.
+
+Examples:
+
+.. code-block:: c++
+
+  float floatFunc(float);
+  int intFunc(int);
+  double d;
+  int i = 42;
+
+  // Warn, floating-point values expected.
+  d = 32 * 8 / (2 + i);
+  d = 8 * floatFunc(1 + 7 / 2);
+  d = i / (1 << 4);
+
+  // OK, no integer division.
+  d = 32 * 8.0 / (2 + i);
+  d = 8 * floatFunc(1 + 7.0 / 2);
+  d = (double)i / (1 << 4);
+
+  // OK, there are signs of deliberateness.
+  d = 1 << (i / 2);
+  d = 9 + intFunc(6 * i / 32);
+  d = (int)(i / 32) - 8;

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-lambda-function-name.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-lambda-function-name.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-lambda-function-name.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-lambda-function-name.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+.. title:: clang-tidy - bugprone-lambda-function-name
+
+bugprone-lambda-function-name
+=============================
+
+Checks for attempts to get the name of a function from within a lambda
+expression. The name of a lambda is always something like ``operator()``, which
+is almost never what was intended.
+
+Example:
+
+.. code-block:: c++
+								
+  void FancyFunction() {
+    [] { printf("Called from %s\n", __func__); }();
+    [] { printf("Now called from %s\n", __FUNCTION__); }();
+  }
+
+Output::
+
+  Called from operator()
+  Now called from operator()
+
+Likely intended output::
+
+  Called from FancyFunction
+  Now called from FancyFunction

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-parentheses.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-parentheses.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-parentheses.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-parentheses.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,19 @@
+.. title:: clang-tidy - bugprone-macro-parentheses
+
+bugprone-macro-parentheses
+==========================
+
+
+Finds macros that can have unexpected behaviour due to missing parentheses.
+
+Macros are expanded by the preprocessor as-is. As a result, there can be
+unexpected behaviour; operators may be evaluated in unexpected order and
+unary operators may become binary operators, etc.
+
+When the replacement list has an expression, it is recommended to surround
+it with parentheses. This ensures that the macro result is evaluated
+completely before it is used.
+
+It is also recommended to surround macro arguments in the replacement list
+with parentheses. This ensures that the argument value is calculated
+properly.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-repeated-side-effects.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-repeated-side-effects.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-repeated-side-effects.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-macro-repeated-side-effects.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,7 @@
+.. title:: clang-tidy - bugprone-macro-repeated-side-effects
+
+bugprone-macro-repeated-side-effects
+====================================
+
+
+Checks for repeated argument with side effects in macros.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,57 @@
+.. title:: clang-tidy - bugprone-misplaced-operator-in-strlen-in-alloc
+
+bugprone-misplaced-operator-in-strlen-in-alloc
+==============================================
+
+Finds cases where ``1`` is added to the string in the argument to ``strlen()``,
+``strnlen()``, ``strnlen_s()``, ``wcslen()``, ``wcsnlen()``, and ``wcsnlen_s()``
+instead of the result and the value is used as an argument to a memory
+allocation function (``malloc()``, ``calloc()``, ``realloc()``, ``alloca()``) or
+the ``new[]`` operator in `C++`. The check detects error cases even if one of
+these functions (except the ``new[]`` operator) is called by a constant function
+pointer.  Cases where ``1`` is added both to the parameter and the result of the
+``strlen()``-like function are ignored, as are cases where the whole addition is
+surrounded by extra parentheses.
+
+`C` example code:
+
+.. code-block:: c
+
+    void bad_malloc(char *str) {
+      char *c = (char*) malloc(strlen(str + 1));
+    }
+
+
+The suggested fix is to add ``1`` to the return value of ``strlen()`` and not
+to its argument. In the example above the fix would be
+
+.. code-block:: c
+
+      char *c = (char*) malloc(strlen(str) + 1);
+
+
+`C++` example code:
+
+.. code-block:: c++
+
+    void bad_new(char *str) {
+      char *c = new char[strlen(str + 1)];
+    }
+
+
+As in the `C` code with the ``malloc()`` function, the suggested fix is to
+add ``1`` to the return value of ``strlen()`` and not to its argument. In the
+example above the fix would be
+
+.. code-block:: c++
+
+      char *c = new char[strlen(str) + 1];
+
+
+Example for silencing the diagnostic:
+
+.. code-block:: c
+
+    void bad_malloc(char *str) {
+      char *c = (char*) malloc(strlen((str + 1)));
+    }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-widening-cast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-widening-cast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-widening-cast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-misplaced-widening-cast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,65 @@
+.. title:: clang-tidy - bugprone-misplaced-widening-cast
+
+bugprone-misplaced-widening-cast
+================================
+
+This check will warn when there is a cast of a calculation result to a bigger
+type. If the intention of the cast is to avoid loss of precision then the cast
+is misplaced, and there can be loss of precision. Otherwise the cast is
+ineffective.
+
+Example code:
+
+.. code-block:: c++
+
+    long f(int x) {
+        return (long)(x * 1000);
+    }
+
+The result ``x * 1000`` is first calculated using ``int`` precision. If the
+result exceeds ``int`` precision there is loss of precision. Then the result is
+casted to ``long``.
+
+If there is no loss of precision then the cast can be removed or you can
+explicitly cast to ``int`` instead.
+
+If you want to avoid loss of precision then put the cast in a proper location,
+for instance:
+
+.. code-block:: c++
+
+    long f(int x) {
+        return (long)x * 1000;
+    }
+
+Implicit casts
+--------------
+
+Forgetting to place the cast at all is at least as dangerous and at least as
+common as misplacing it. If :option:`CheckImplicitCasts` is enabled the check
+also detects these cases, for instance:
+
+.. code-block:: c++
+
+    long f(int x) {
+        return x * 1000;
+    }
+
+Floating point
+--------------
+
+Currently warnings are only written for integer conversion. No warning is
+written for this code:
+
+.. code-block:: c++
+
+    double f(float x) {
+        return (double)(x * 10.0f);
+    }
+
+Options
+-------
+
+.. option:: CheckImplicitCasts
+
+   If non-zero, enables detection of implicit casts. Default is non-zero.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-move-forwarding-reference.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-move-forwarding-reference.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-move-forwarding-reference.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-move-forwarding-reference.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,60 @@
+.. title:: clang-tidy - bugprone-move-forwarding-reference
+
+bugprone-move-forwarding-reference
+==================================
+
+Warns if ``std::move`` is called on a forwarding reference, for example:
+
+.. code-block:: c++
+
+    template <typename T>
+    void foo(T&& t) {
+      bar(std::move(t));
+    }
+
+`Forwarding references
+<http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2014/n4164.pdf>`_ should
+typically be passed to ``std::forward`` instead of ``std::move``, and this is
+the fix that will be suggested.
+
+(A forwarding reference is an rvalue reference of a type that is a deduced
+function template argument.)
+
+In this example, the suggested fix would be
+
+.. code-block:: c++
+
+    bar(std::forward<T>(t));
+
+Background
+----------
+
+Code like the example above is sometimes written with the expectation that
+``T&&`` will always end up being an rvalue reference, no matter what type is
+deduced for ``T``, and that it is therefore not possible to pass an lvalue to
+``foo()``. However, this is not true. Consider this example:
+
+.. code-block:: c++
+
+    std::string s = "Hello, world";
+    foo(s);
+
+This code compiles and, after the call to ``foo()``, ``s`` is left in an
+indeterminate state because it has been moved from. This may be surprising to
+the caller of ``foo()`` because no ``std::move`` was used when calling
+``foo()``.
+
+The reason for this behavior lies in the special rule for template argument
+deduction on function templates like ``foo()`` -- i.e. on function templates
+that take an rvalue reference argument of a type that is a deduced function
+template argument. (See section [temp.deduct.call]/3 in the C++11 standard.)
+
+If ``foo()`` is called on an lvalue (as in the example above), then ``T`` is
+deduced to be an lvalue reference. In the example, ``T`` is deduced to be
+``std::string &``. The type of the argument ``t`` therefore becomes
+``std::string& &&``; by the reference collapsing rules, this collapses to
+``std::string&``.
+
+This means that the ``foo(s)`` call passes ``s`` as an lvalue reference, and
+``foo()`` ends up moving ``s`` and thereby placing it into an indeterminate
+state.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-multiple-statement-macro.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-multiple-statement-macro.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-multiple-statement-macro.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-multiple-statement-macro.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - bugprone-multiple-statement-macro
+
+bugprone-multiple-statement-macro
+=================================
+
+Detect multiple statement macros that are used in unbraced conditionals. Only
+the first statement of the macro will be inside the conditional and the other
+ones will be executed unconditionally.
+
+Example:
+
+.. code-block:: c++
+
+  #define INCREMENT_TWO(x, y) (x)++; (y)++
+  if (do_increment)
+    INCREMENT_TWO(a, b);  // (b)++ will be executed unconditionally.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-parent-virtual-call.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-parent-virtual-call.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-parent-virtual-call.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-parent-virtual-call.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,23 @@
+.. title:: clang-tidy - bugprone-parent-virtual-call
+
+bugprone-parent-virtual-call
+============================
+
+Detects and fixes calls to grand-...parent virtual methods instead of calls
+to overridden parent's virtual methods.
+
+.. code-block:: c++
+
+  class A {
+    int virtual foo() {...}
+  };
+
+  class B: public A {
+    int foo() override {...}
+  };
+
+  class C: public B {
+    int foo() override { A::foo(); }
+  //                     ^^^^^^^^
+  // warning: qualified name A::foo refers to a member overridden in subclass; did you mean 'B'?  [bugprone-parent-virtual-call]
+  };

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-container.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-container.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-container.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-container.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - bugprone-sizeof-container
+
+bugprone-sizeof-container
+=========================
+
+The check finds usages of ``sizeof`` on expressions of STL container types. Most
+likely the user wanted to use ``.size()`` instead.
+
+All class/struct types declared in namespace ``std::`` having a const ``size()``
+method are considered containers, with the exception of ``std::bitset`` and
+``std::array``.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string s;
+  int a = 47 + sizeof(s); // warning: sizeof() doesn't return the size of the container. Did you mean .size()?
+
+  int b = sizeof(std::string); // no warning, probably intended.
+
+  std::string array_of_strings[10];
+  int c = sizeof(array_of_strings) / sizeof(array_of_strings[0]); // no warning, definitely intended.
+
+  std::array<int, 3> std_array;
+  int d = sizeof(std_array); // no warning, probably intended.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-expression.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-expression.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-expression.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-sizeof-expression.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,189 @@
+.. title:: clang-tidy - bugprone-sizeof-expression
+
+bugprone-sizeof-expression
+==========================
+
+The check finds usages of ``sizeof`` expressions which are most likely errors.
+
+The ``sizeof`` operator yields the size (in bytes) of its operand, which may be
+an expression or the parenthesized name of a type. Misuse of this operator may
+be leading to errors and possible software vulnerabilities.
+
+Suspicious usage of 'sizeof(K)'
+-------------------------------
+
+A common mistake is to query the ``sizeof`` of an integer literal. This is
+equivalent to query the size of its type (probably ``int``). The intent of the
+programmer was probably to simply get the integer and not its size.
+
+.. code-block:: c++
+
+  #define BUFLEN 42
+  char buf[BUFLEN];
+  memset(buf, 0, sizeof(BUFLEN));  // sizeof(42) ==> sizeof(int)
+
+Suspicious usage of 'sizeof(expr)'
+----------------------------------
+
+In cases, where there is an enum or integer to represent a type, a common
+mistake is to query the ``sizeof`` on the integer or enum that represents the
+type that should be used by ``sizeof``. This results in the size of the integer
+and not of the type the integer represents:
+
+.. code-block:: c++
+
+  enum data_type {
+    FLOAT_TYPE,
+    DOUBLE_TYPE
+  };
+
+  struct data {
+    data_type type;
+    void* buffer;
+    data_type get_type() {
+      return type;
+    }
+  };
+
+  void f(data d, int numElements) {
+    // should be sizeof(float) or sizeof(double), depending on d.get_type()
+    int numBytes = numElements * sizeof(d.get_type());
+    ...
+  }
+
+
+Suspicious usage of 'sizeof(this)'
+----------------------------------
+
+The ``this`` keyword is evaluated to a pointer to an object of a given type.
+The expression ``sizeof(this)`` is returning the size of a pointer. The
+programmer most likely wanted the size of the object and not the size of the
+pointer.
+
+.. code-block:: c++
+
+  class Point {
+    [...]
+    size_t size() { return sizeof(this); }  // should probably be sizeof(*this)
+    [...]
+  };
+
+Suspicious usage of 'sizeof(char*)'
+-----------------------------------
+
+There is a subtle difference between declaring a string literal with
+``char* A = ""`` and ``char A[] = ""``. The first case has the type ``char*``
+instead of the aggregate type ``char[]``. Using ``sizeof`` on an object declared
+with ``char*`` type is returning the size of a pointer instead of the number of
+characters (bytes) in the string literal.
+
+.. code-block:: c++
+
+  const char* kMessage = "Hello World!";      // const char kMessage[] = "...";
+  void getMessage(char* buf) {
+    memcpy(buf, kMessage, sizeof(kMessage));  // sizeof(char*)
+  }
+
+Suspicious usage of 'sizeof(A*)'
+--------------------------------
+
+A common mistake is to compute the size of a pointer instead of its pointee.
+These cases may occur because of explicit cast or implicit conversion.
+
+.. code-block:: c++
+
+  int A[10];
+  memset(A, 0, sizeof(A + 0));
+
+  struct Point point;
+  memset(point, 0, sizeof(&point));
+
+Suspicious usage of 'sizeof(...)/sizeof(...)'
+---------------------------------------------
+
+Dividing ``sizeof`` expressions is typically used to retrieve the number of
+elements of an aggregate. This check warns on incompatible or suspicious cases.
+
+In the following example, the entity has 10-bytes and is incompatible with the
+type ``int`` which has 4 bytes.
+
+.. code-block:: c++
+
+  char buf[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 };  // sizeof(buf) => 10
+  void getMessage(char* dst) {
+    memcpy(dst, buf, sizeof(buf) / sizeof(int));  // sizeof(int) => 4  [incompatible sizes]
+  }
+
+In the following example, the expression ``sizeof(Values)`` is returning the
+size of ``char*``. One can easily be fooled by its declaration, but in parameter
+declaration the size '10' is ignored and the function is receiving a ``char*``.
+
+.. code-block:: c++
+
+  char OrderedValues[10] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 };
+  return CompareArray(char Values[10]) {
+    return memcmp(OrderedValues, Values, sizeof(Values)) == 0;  // sizeof(Values) ==> sizeof(char*) [implicit cast to char*]
+  }
+
+Suspicious 'sizeof' by 'sizeof' expression
+------------------------------------------
+
+Multiplying ``sizeof`` expressions typically makes no sense and is probably a
+logic error. In the following example, the programmer used ``*`` instead of
+``/``.
+
+.. code-block:: c++
+
+  const char kMessage[] = "Hello World!";
+  void getMessage(char* buf) {
+    memcpy(buf, kMessage, sizeof(kMessage) * sizeof(char));  //  sizeof(kMessage) / sizeof(char)
+  }
+
+This check may trigger on code using the arraysize macro. The following code is
+working correctly but should be simplified by using only the ``sizeof``
+operator.
+
+.. code-block:: c++
+
+  extern Object objects[100];
+  void InitializeObjects() {
+    memset(objects, 0, arraysize(objects) * sizeof(Object));  // sizeof(objects)
+  }
+
+Suspicious usage of 'sizeof(sizeof(...))'
+-----------------------------------------
+
+Getting the ``sizeof`` of a ``sizeof`` makes no sense and is typically an error
+hidden through macros.
+
+.. code-block:: c++
+
+  #define INT_SZ sizeof(int)
+  int buf[] = { 42 };
+  void getInt(int* dst) {
+    memcpy(dst, buf, sizeof(INT_SZ));  // sizeof(sizeof(int)) is suspicious.
+  }
+
+Options
+-------
+
+.. option:: WarnOnSizeOfConstant
+
+   When non-zero, the check will warn on an expression like
+   ``sizeof(CONSTANT)``. Default is `1`.
+
+.. option:: WarnOnSizeOfIntegerExpression
+
+   When non-zero, the check will warn on an expression like ``sizeof(expr)``
+   where the expression results in an integer. Default is `0`.
+
+.. option:: WarnOnSizeOfThis
+
+   When non-zero, the check will warn on an expression like ``sizeof(this)``.
+   Default is `1`.
+
+.. option:: WarnOnSizeOfCompareToConstant
+
+   When non-zero, the check will warn on an expression like
+   ``sizeof(epxr) <= k`` for a suspicious constant `k` while `k` is `0` or
+   greater than `0x8000`. Default is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-constructor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-constructor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-constructor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-constructor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,44 @@
+.. title:: clang-tidy - bugprone-string-constructor
+
+bugprone-string-constructor
+===========================
+
+Finds string constructors that are suspicious and probably errors.
+
+A common mistake is to swap parameters to the 'fill' string-constructor.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string str('x', 50); // should be str(50, 'x')
+
+Calling the string-literal constructor with a length bigger than the literal is
+suspicious and adds extra random characters to the string.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string("test", 200);   // Will include random characters after "test".
+
+Creating an empty string from constructors with parameters is considered
+suspicious. The programmer should use the empty constructor instead.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string("test", 0);   // Creation of an empty string.
+
+Options
+-------
+
+.. option::  WarnOnLargeLength
+
+   When non-zero, the check will warn on a string with a length greater than
+   `LargeLengthThreshold`. Default is `1`.
+
+.. option::  LargeLengthThreshold
+
+   An integer specifying the large length threshold. Default is `0x800000`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-integer-assignment.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-integer-assignment.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-integer-assignment.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-integer-assignment.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,37 @@
+.. title:: clang-tidy - bugprone-string-integer-assignment
+
+bugprone-string-integer-assignment
+==================================
+
+The check finds assignments of an integer to ``std::basic_string<CharT>``
+(``std::string``, ``std::wstring``, etc.). The source of the problem is the
+following assignment operator of ``std::basic_string<CharT>``:
+
+.. code-block:: c++
+
+  basic_string& operator=( CharT ch );
+
+Numeric types can be implicitly casted to character types.
+
+.. code-block:: c++
+
+  std::string s;
+  int x = 5965;
+  s = 6;
+  s = x;
+
+Use the appropriate conversion functions or character literals.
+
+.. code-block:: c++
+
+  std::string s;
+  int x = 5965;
+  s = '6';
+  s = std::to_string(x);
+
+In order to suppress false positives, use an explicit cast.
+
+.. code-block:: c++
+
+  std::string s;
+  s = static_cast<char>(6);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,36 @@
+.. title:: clang-tidy - bugprone-string-literal-with-embedded-nul
+
+bugprone-string-literal-with-embedded-nul
+=========================================
+
+Finds occurrences of string literal with embedded NUL character and validates
+their usage.
+
+Invalid escaping
+----------------
+
+Special characters can be escaped within a string literal by using their
+hexadecimal encoding like ``\x42``. A common mistake is to escape them
+like this ``\0x42`` where the ``\0`` stands for the NUL character.
+
+.. code-block:: c++
+
+  const char* Example[] = "Invalid character: \0x12 should be \x12";
+  const char* Bytes[] = "\x03\0x02\0x01\0x00\0xFF\0xFF\0xFF";
+
+Truncated literal
+-----------------
+
+String-like classes can manipulate strings with embedded NUL as they are keeping
+track of the bytes and the length. This is not the case for a ``char*``
+(NUL-terminated) string.
+
+A common mistake is to pass a string-literal with embedded NUL to a string
+constructor expecting a NUL-terminated string. The bytes after the first NUL
+character are truncated.
+
+.. code-block:: c++
+
+  std::string str("abc\0def");  // "def" is truncated
+  str += "\0";                  // This statement is doing nothing
+  if (str == "\0abc") return;   // This expression is always true

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-enum-usage.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-enum-usage.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-enum-usage.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-enum-usage.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,78 @@
+.. title:: clang-tidy - bugprone-suspicious-enum-usage
+
+bugprone-suspicious-enum-usage
+==============================
+
+The checker detects various cases when an enum is probably misused (as a bitmask
+).
+  
+1. When "ADD" or "bitwise OR" is used between two enum which come from different
+   types and these types value ranges are not disjoint.
+
+The following cases will be investigated only using :option:`StrictMode`. We 
+regard the enum as a (suspicious)
+bitmask if the three conditions below are true at the same time:
+
+* at most half of the elements of the enum are non pow-of-2 numbers (because of
+  short enumerations)
+* there is another non pow-of-2 number than the enum constant representing all
+  choices (the result "bitwise OR" operation of all enum elements)
+* enum type variable/enumconstant is used as an argument of a `+` or "bitwise OR
+  " operator
+
+So whenever the non pow-of-2 element is used as a bitmask element we diagnose a
+misuse and give a warning.
+
+2. Investigating the right hand side of `+=` and `|=` operator.
+3. Check only the enum value side of a `|` and `+` operator if one of them is not
+   enum val.
+4. Check both side of `|` or `+` operator where the enum values are from the
+   same enum type.
+
+Examples:
+
+.. code-block:: c++
+
+  enum { A, B, C };
+  enum { D, E, F = 5 };
+  enum { G = 10, H = 11, I = 12 };
+  
+  unsigned flag;
+  flag =
+      A |
+      H; // OK, disjoint value intervalls in the enum types ->probably good use.
+  flag = B | F; // Warning, have common values so they are probably misused.
+  
+  // Case 2:
+  enum Bitmask {
+    A = 0,
+    B = 1,
+    C = 2,
+    D = 4,
+    E = 8,
+    F = 16,
+    G = 31 // OK, real bitmask.
+  };
+  
+  enum Almostbitmask {
+    AA = 0,
+    BB = 1,
+    CC = 2,
+    DD = 4,
+    EE = 8,
+    FF = 16,
+    GG // Problem, forgot to initialize.
+  };
+  
+  unsigned flag = 0;
+  flag |= E; // OK.
+  flag |=
+      EE; // Warning at the decl, and note that it was used here as a bitmask.
+
+Options
+-------
+.. option:: StrictMode
+
+   Default value: 0.
+   When non-null the suspicious bitmask usage will be investigated additionally
+   to the different enum usage check.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-memset-usage.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-memset-usage.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-memset-usage.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-memset-usage.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,54 @@
+.. title:: clang-tidy - bugprone-suspicious-memset-usage
+
+bugprone-suspicious-memset-usage
+================================
+
+This check finds ``memset()`` calls with potential mistakes in their arguments.
+Considering the function as ``void* memset(void* destination, int fill_value,
+size_t byte_count)``, the following cases are covered:
+
+**Case 1: Fill value is a character ``'0'``**
+
+Filling up a memory area with ASCII code 48 characters is not customary,
+possibly integer zeroes were intended instead.
+The check offers a replacement of ``'0'`` with ``0``. Memsetting character
+pointers with ``'0'`` is allowed.
+
+**Case 2: Fill value is truncated**
+
+Memset converts ``fill_value`` to ``unsigned char`` before using it. If
+``fill_value`` is out of unsigned character range, it gets truncated
+and memory will not contain the desired pattern.
+
+**Case 3: Byte count is zero**
+
+Calling memset with a literal zero in its ``byte_count`` argument is likely
+to be unintended and swapped with ``fill_value``. The check offers to swap
+these two arguments.
+
+Corresponding cpplint.py check name: ``runtime/memset``.
+
+
+Examples:
+
+.. code-block:: c++
+
+  void foo() {
+    int i[5] = {1, 2, 3, 4, 5};
+    int *ip = i;
+    char c = '1';
+    char *cp = &c;
+    int v = 0;
+
+    // Case 1
+    memset(ip, '0', 1); // suspicious
+    memset(cp, '0', 1); // OK
+
+    // Case 2
+    memset(ip, 0xabcd, 1); // fill value gets truncated
+    memset(ip, 0x00, 1);   // OK
+
+    // Case 3
+    memset(ip, sizeof(int), v); // zero length, potentially swapped
+    memset(ip, 0, 1);           // OK
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-missing-comma.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-missing-comma.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-missing-comma.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-missing-comma.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,59 @@
+.. title:: clang-tidy - bugprone-suspicious-missing-comma
+
+bugprone-suspicious-missing-comma
+=================================
+
+String literals placed side-by-side are concatenated at translation phase 6
+(after the preprocessor). This feature is used to represent long string
+literal on multiple lines.
+
+For instance, the following declarations are equivalent:
+
+.. code-block:: c++
+
+  const char* A[] = "This is a test";
+  const char* B[] = "This" " is a "    "test";
+
+A common mistake done by programmers is to forget a comma between two string
+literals in an array initializer list.
+
+.. code-block:: c++
+
+  const char* Test[] = {
+    "line 1",
+    "line 2"     // Missing comma!
+    "line 3",
+    "line 4",
+    "line 5"
+  };
+
+The array contains the string "line 2line3" at offset 1 (i.e. Test[1]). Clang
+won't generate warnings at compile time.
+
+This check may warn incorrectly on cases like:
+
+.. code-block:: c++
+
+  const char* SupportedFormat[] = {
+    "Error %s",
+    "Code " PRIu64,   // May warn here.
+    "Warning %s",
+  };
+
+Options
+-------
+
+.. option::  SizeThreshold
+
+   An unsigned integer specifying the minimum size of a string literal to be
+   considered by the check. Default is `5U`.
+
+.. option::  RatioThreshold
+
+   A string specifying the maximum threshold ratio [0, 1.0] of suspicious string
+   literals to be considered. Default is `".2"`.
+
+.. option::  MaxConcatenatedTokens
+
+   An unsigned integer specifying the maximum number of concatenated tokens.
+   Default is `5U`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-semicolon.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-semicolon.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-semicolon.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-semicolon.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,72 @@
+.. title:: clang-tidy - bugprone-suspicious-semicolon
+
+bugprone-suspicious-semicolon
+=============================
+
+Finds most instances of stray semicolons that unexpectedly alter the meaning of
+the code. More specifically, it looks for ``if``, ``while``, ``for`` and
+``for-range`` statements whose body is a single semicolon, and then analyzes the
+context of the code (e.g. indentation) in an attempt to determine whether that
+is intentional.
+
+.. code-block:: c++
+
+    if (x < y);
+    {
+      x++;
+    }
+
+Here the body of the ``if`` statement consists of only the semicolon at the end
+of the first line, and `x` will be incremented regardless of the condition.
+
+
+.. code-block:: c++
+
+    while ((line = readLine(file)) != NULL);
+      processLine(line);
+
+As a result of this code, `processLine()` will only be called once, when the
+``while`` loop with the empty body exits with `line == NULL`. The indentation of
+the code indicates the intention of the programmer.
+
+
+.. code-block:: c++
+
+    if (x >= y);
+    x -= y;
+
+While the indentation does not imply any nesting, there is simply no valid
+reason to have an `if` statement with an empty body (but it can make sense for
+a loop). So this check issues a warning for the code above.
+
+To solve the issue remove the stray semicolon or in case the empty body is
+intentional, reflect this using code indentation or put the semicolon in a new
+line. For example:
+
+.. code-block:: c++
+
+    while (readWhitespace());
+      Token t = readNextToken();
+
+Here the second line is indented in a way that suggests that it is meant to be
+the body of the `while` loop - whose body is in fact empty, because of the
+semicolon at the end of the first line.
+
+Either remove the indentation from the second line:
+
+.. code-block:: c++
+
+    while (readWhitespace());
+    Token t = readNextToken();
+
+... or move the semicolon from the end of the first line to a new line:
+
+.. code-block:: c++
+
+    while (readWhitespace())
+      ;
+
+      Token t = readNextToken();
+
+In this case the check will assume that you know what you are doing, and will
+not raise a warning.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-string-compare.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-string-compare.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-string-compare.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-suspicious-string-compare.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,64 @@
+.. title:: clang-tidy - bugprone-suspicious-string-compare
+
+bugprone-suspicious-string-compare
+==================================
+
+Find suspicious usage of runtime string comparison functions.
+This check is valid in C and C++.
+
+Checks for calls with implicit comparator and proposed to explicitly add it.
+
+.. code-block:: c++
+
+    if (strcmp(...))       // Implicitly compare to zero
+    if (!strcmp(...))      // Won't warn
+    if (strcmp(...) != 0)  // Won't warn
+
+Checks that compare function results (i,e, ``strcmp``) are compared to valid
+constant. The resulting value is
+
+.. code::
+
+    <  0    when lower than,
+    >  0    when greater than,
+    == 0    when equals.
+
+A common mistake is to compare the result to `1` or `-1`.
+
+.. code-block:: c++
+
+    if (strcmp(...) == -1)  // Incorrect usage of the returned value.
+
+Additionally, the check warns if the results value is implicitly cast to a
+*suspicious* non-integer type. It's happening when the returned value is used in
+a wrong context.
+
+.. code-block:: c++
+
+    if (strcmp(...) < 0.)  // Incorrect usage of the returned value.
+
+Options
+-------
+
+.. option:: WarnOnImplicitComparison
+
+   When non-zero, the check will warn on implicit comparison. `1` by default.
+
+.. option:: WarnOnLogicalNotComparison
+
+   When non-zero, the check will warn on logical not comparison. `0` by default.
+
+.. option:: StringCompareLikeFunctions
+
+   A string specifying the comma-separated names of the extra string comparison
+   functions. Default is an empty string.
+   The check will detect the following string comparison functions:
+   `__builtin_memcmp`, `__builtin_strcasecmp`, `__builtin_strcmp`,
+   `__builtin_strncasecmp`, `__builtin_strncmp`, `_mbscmp`, `_mbscmp_l`,
+   `_mbsicmp`, `_mbsicmp_l`, `_mbsnbcmp`, `_mbsnbcmp_l`, `_mbsnbicmp`,
+   `_mbsnbicmp_l`, `_mbsncmp`, `_mbsncmp_l`, `_mbsnicmp`, `_mbsnicmp_l`,
+   `_memicmp`, `_memicmp_l`, `_stricmp`, `_stricmp_l`, `_strnicmp`,
+   `_strnicmp_l`, `_wcsicmp`, `_wcsicmp_l`, `_wcsnicmp`, `_wcsnicmp_l`,
+   `lstrcmp`, `lstrcmpi`, `memcmp`, `memicmp`, `strcasecmp`, `strcmp`,
+   `strcmpi`, `stricmp`, `strncasecmp`, `strncmp`, `strnicmp`, `wcscasecmp`,
+   `wcscmp`, `wcsicmp`, `wcsncmp`, `wcsnicmp`, `wmemcmp`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-swapped-arguments.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-swapped-arguments.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-swapped-arguments.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-swapped-arguments.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - bugprone-swapped-arguments
+
+bugprone-swapped-arguments
+==========================
+
+Finds potentially swapped arguments by looking at implicit conversions.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-terminating-continue.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-terminating-continue.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-terminating-continue.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-terminating-continue.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - bugprone-terminating-continue
+
+bugprone-terminating-continue
+=============================
+
+Detects `do while` loops with a condition always evaluating to false that
+have a `continue` statement, as this `continue` terminates the loop
+effectively.
+
+.. code-block:: c++
+
+  void f() {
+  do {
+  	// some code
+    continue; // terminating continue
+    // some other code
+  } while(false);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-throw-keyword-missing.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-throw-keyword-missing.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-throw-keyword-missing.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-throw-keyword-missing.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - bugprone-throw-keyword-missing
+
+bugprone-throw-keyword-missing
+==============================
+
+Warns about a potentially missing ``throw`` keyword. If a temporary object is created, but the
+object's type derives from (or is the same as) a class that has 'EXCEPTION', 'Exception' or
+'exception' in its name, we can assume that the programmer's intention was to throw that object.
+
+Example:
+
+.. code-block:: c++
+
+  void f(int i) {
+    if (i < 0) {
+      // Exception is created but is not thrown.
+      std::runtime_error("Unexpected argument");
+    }
+  }
+
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-too-small-loop-variable.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-too-small-loop-variable.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-too-small-loop-variable.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-too-small-loop-variable.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+.. title:: clang-tidy - bugprone-too-small-loop-variable
+
+bugprone-too-small-loop-variable
+================================
+
+Detects those ``for`` loops that have a loop variable with a "too small" type
+which means this type can't represent all values which are part of the
+iteration range.
+
+.. code-block:: c++
+
+  int main() {
+    long size = 294967296l;
+    for (short i = 0; i < size; ++i) {}
+  }
+
+This ``for`` loop is an infinite loop because the ``short`` type can't represent
+all values in the ``[0..size]`` interval.
+
+In a real use case size means a container's size which depends on the user input.
+
+.. code-block:: c++
+
+  int doSomething(const std::vector& items) {
+    for (short i = 0; i < items.size(); ++i) {}
+  }
+
+This algorithm works for small amount of objects, but will lead to freeze for a
+a larger user input.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undefined-memory-manipulation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undefined-memory-manipulation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undefined-memory-manipulation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undefined-memory-manipulation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,7 @@
+.. title:: clang-tidy - bugprone-undefined-memory-manipulation
+
+bugprone-undefined-memory-manipulation
+======================================
+
+Finds calls of memory manipulation functions ``memset()``, ``memcpy()`` and
+``memmove()`` on not TriviallyCopyable objects resulting in undefined behavior.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undelegated-constructor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undelegated-constructor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undelegated-constructor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-undelegated-constructor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - bugprone-undelegated-constructor
+
+bugprone-undelegated-constructor
+================================
+
+Finds creation of temporary objects in constructors that look like a
+function call to another constructor of the same class.
+
+The user most likely meant to use a delegating constructor or base class
+initializer.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-raii.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-raii.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-raii.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-raii.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,30 @@
+.. title:: clang-tidy - bugprone-unused-raii
+
+bugprone-unused-raii
+====================
+
+Finds temporaries that look like RAII objects.
+
+The canonical example for this is a scoped lock.
+
+.. code-block:: c++
+
+  {
+    scoped_lock(&global_mutex);
+    critical_section();
+  }
+
+The destructor of the scoped_lock is called before the ``critical_section`` is
+entered, leaving it unprotected.
+
+We apply a number of heuristics to reduce the false positive count of this
+check:
+
+- Ignore code expanded from macros. Testing frameworks make heavy use of this.
+
+- Ignore types with trivial destructors. They are very unlikely to be RAII
+  objects and there's no difference when they are deleted.
+
+- Ignore objects at the end of a compound statement (doesn't change behavior).
+
+- Ignore objects returned from a call.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-return-value.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-return-value.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-return-value.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-unused-return-value.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,31 @@
+.. title:: clang-tidy - bugprone-unused-return-value
+
+bugprone-unused-return-value
+============================
+
+Warns on unused function return values. The checked funtions can be configured.
+
+Options
+-------
+
+.. option:: CheckedFunctions
+
+   Semicolon-separated list of functions to check. Defaults to
+   ``::std::async;::std::launder;::std::remove;::std::remove_if;::std::unique;::std::unique_ptr::release;::std::basic_string::empty;::std::vector::empty``.
+   This means that the calls to following functions are checked by default:
+
+   - ``std::async()``. Not using the return value makes the call synchronous.
+   - ``std::launder()``. Not using the return value usually means that the
+     function interface was misunderstood by the programmer. Only the returned
+     pointer is "laundered", not the argument.
+   - ``std::remove()``, ``std::remove_if()`` and ``std::unique()``. The returned
+     iterator indicates the boundary between elements to keep and elements to be
+     removed. Not using the return value means that the information about which
+     elements to remove is lost.
+   - ``std::unique_ptr::release()``. Not using the return value can lead to
+     resource leaks if the same pointer isn't stored anywhere else. Often,
+     ignoring the ``release()`` return value indicates that the programmer
+     confused the function with ``reset()``.
+   - ``std::basic_string::empty()`` and ``std::vector::empty()``. Not using the
+     return value often indicates that the programmer confused the function with
+     ``clear()``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-use-after-move.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-use-after-move.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-use-after-move.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-use-after-move.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,206 @@
+.. title:: clang-tidy - bugprone-use-after-move
+
+bugprone-use-after-move
+=======================
+
+Warns if an object is used after it has been moved, for example:
+
+.. code-block:: c++
+
+    std::string str = "Hello, world!\n";
+    std::vector<std::string> messages;
+    messages.emplace_back(std::move(str));
+    std::cout << str;
+
+The last line will trigger a warning that ``str`` is used after it has been
+moved.
+
+The check does not trigger a warning if the object is reinitialized after the
+move and before the use. For example, no warning will be output for this code:
+
+.. code-block:: c++
+
+    messages.emplace_back(std::move(str));
+    str = "Greetings, stranger!\n";
+    std::cout << str;
+
+The check takes control flow into account. A warning is only emitted if the use
+can be reached from the move. This means that the following code does not
+produce a warning:
+
+.. code-block:: c++
+
+    if (condition) {
+      messages.emplace_back(std::move(str));
+    } else {
+      std::cout << str;
+    }
+
+On the other hand, the following code does produce a warning:
+
+.. code-block:: c++
+
+    for (int i = 0; i < 10; ++i) {
+      std::cout << str;
+      messages.emplace_back(std::move(str));
+    }
+
+(The use-after-move happens on the second iteration of the loop.)
+
+In some cases, the check may not be able to detect that two branches are
+mutually exclusive. For example (assuming that ``i`` is an int):
+
+.. code-block:: c++
+
+    if (i == 1) {
+      messages.emplace_back(std::move(str));
+    }
+    if (i == 2) {
+      std::cout << str;
+    }
+
+In this case, the check will erroneously produce a warning, even though it is
+not possible for both the move and the use to be executed.
+
+An erroneous warning can be silenced by reinitializing the object after the
+move:
+
+.. code-block:: c++
+
+    if (i == 1) {
+      messages.emplace_back(std::move(str));
+      str = "";
+    }
+    if (i == 2) {
+      std::cout << str;
+    }
+
+Subsections below explain more precisely what exactly the check considers to be
+a move, use, and reinitialization.
+
+Unsequenced moves, uses, and reinitializations
+----------------------------------------------
+
+In many cases, C++ does not make any guarantees about the order in which
+sub-expressions of a statement are evaluated. This means that in code like the
+following, it is not guaranteed whether the use will happen before or after the
+move:
+
+.. code-block:: c++
+
+    void f(int i, std::vector<int> v);
+    std::vector<int> v = { 1, 2, 3 };
+    f(v[1], std::move(v));
+
+In this kind of situation, the check will note that the use and move are
+unsequenced.
+
+The check will also take sequencing rules into account when reinitializations
+occur in the same statement as moves or uses. A reinitialization is only
+considered to reinitialize a variable if it is guaranteed to be evaluated after
+the move and before the use.
+
+Move
+----
+
+The check currently only considers calls of ``std::move`` on local variables or
+function parameters. It does not check moves of member variables or global
+variables.
+
+Any call of ``std::move`` on a variable is considered to cause a move of that
+variable, even if the result of ``std::move`` is not passed to an rvalue
+reference parameter.
+
+This means that the check will flag a use-after-move even on a type that does
+not define a move constructor or move assignment operator. This is intentional.
+Developers may use ``std::move`` on such a type in the expectation that the type
+will add move semantics in the future. If such a ``std::move`` has the potential
+to cause a use-after-move, we want to warn about it even if the type does not
+implement move semantics yet.
+
+Furthermore, if the result of ``std::move`` *is* passed to an rvalue reference
+parameter, this will always be considered to cause a move, even if the function
+that consumes this parameter does not move from it, or if it does so only
+conditionally. For example, in the following situation, the check will assume
+that a move always takes place:
+
+.. code-block:: c++
+
+    std::vector<std::string> messages;
+    void f(std::string &&str) {
+      // Only remember the message if it isn't empty.
+      if (!str.empty()) {
+        messages.emplace_back(std::move(str));
+      }
+    }
+    std::string str = "";
+    f(std::move(str));
+
+The check will assume that the last line causes a move, even though, in this
+particular case, it does not. Again, this is intentional.
+
+When analyzing the order in which moves, uses and reinitializations happen (see
+section `Unsequenced moves, uses, and reinitializations`_), the move is assumed
+to occur in whichever function the result of the ``std::move`` is passed to.
+
+Use
+---
+
+Any occurrence of the moved variable that is not a reinitialization (see below)
+is considered to be a use.
+
+An exception to this are objects of type ``std::unique_ptr``,
+``std::shared_ptr`` and ``std::weak_ptr``, which have defined move behavior
+(objects of these classes are guaranteed to be empty after they have been moved
+from). Therefore, an object of these classes will only be considered to be used
+if it is dereferenced, i.e. if ``operator*``, ``operator->`` or ``operator[]``
+(in the case of ``std::unique_ptr<T []>``) is called on it.
+
+If multiple uses occur after a move, only the first of these is flagged.
+
+Reinitialization
+----------------
+
+The check considers a variable to be reinitialized in the following cases:
+
+  - The variable occurs on the left-hand side of an assignment.
+
+  - The variable is passed to a function as a non-const pointer or non-const
+    lvalue reference. (It is assumed that the variable may be an out-parameter
+    for the function.)
+
+  - ``clear()`` or ``assign()`` is called on the variable and the variable is of
+    one of the standard container types ``basic_string``, ``vector``, ``deque``,
+    ``forward_list``, ``list``, ``set``, ``map``, ``multiset``, ``multimap``,
+    ``unordered_set``, ``unordered_map``, ``unordered_multiset``,
+    ``unordered_multimap``.
+
+  - ``reset()`` is called on the variable and the variable is of type
+    ``std::unique_ptr``, ``std::shared_ptr`` or ``std::weak_ptr``.
+
+  - A member function marked with the ``[[clang::reinitializes]]`` attribute is
+    called on the variable.
+
+If the variable in question is a struct and an individual member variable of
+that struct is written to, the check does not consider this to be a
+reinitialization -- even if, eventually, all member variables of the struct are
+written to. For example:
+
+.. code-block:: c++
+
+    struct S {
+      std::string str;
+      int i;
+    };
+    S s = { "Hello, world!\n", 42 };
+    S s_other = std::move(s);
+    s.str = "Lorem ipsum";
+    s.i = 99;
+
+The check will not consider ``s`` to be reinitialized after the last line;
+instead, the line that assigns to ``s.str`` will be flagged as a use-after-move.
+This is intentional as this pattern of reinitializing a struct is error-prone.
+For example, if an additional member variable is added to ``S``, it is easy to
+forget to add the reinitialization for this additional member. Instead, it is
+safer to assign to the entire struct in one go, and this will also avoid the
+use-after-move warning.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-virtual-near-miss.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-virtual-near-miss.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-virtual-near-miss.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/bugprone-virtual-near-miss.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,20 @@
+.. title:: clang-tidy - bugprone-virtual-near-miss
+
+bugprone-virtual-near-miss
+==========================
+
+Warn if a function is a near miss (ie. the name is very similar and the function
+signiture is the same) to a virtual function from a base class.
+
+Example:
+
+.. code-block:: c++
+
+  struct Base {
+    virtual void func();
+  };
+
+  struct Derived : Base {
+    virtual funk();
+    // warning: 'Derived::funk' has a similar name and the same signature as virtual method 'Base::func'; did you mean to override it?
+  };

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl03-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl03-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl03-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl03-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - cert-dcl03-c
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-static-assert.html
+
+cert-dcl03-c
+============
+
+The cert-dcl03-c check is an alias, please see
+`misc-static-assert <misc-static-assert.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl16-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl16-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl16-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl16-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - cert-dcl16-c
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-uppercase-literal-suffix.html
+
+cert-dcl16-c
+============
+
+The cert-dcl16-c check is an alias, please see
+`readability-uppercase-literal-suffix <readability-uppercase-literal-suffix.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl21-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl21-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl21-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl21-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - cert-dcl21-cpp
+
+cert-dcl21-cpp
+==============
+
+This check flags postfix ``operator++`` and ``operator--`` declarations
+if the return type is not a const object. This also warns if the return type
+is a reference type.
+
+This check corresponds to the CERT C++ Coding Standard recommendation
+`DCL21-CPP. Overloaded postfix increment and decrement operators should return a const object
+<https://www.securecoding.cert.org/confluence/display/cplusplus/DCL21-CPP.+Overloaded+postfix+increment+and+decrement+operators+should+return+a+const+object>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl50-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl50-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl50-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl50-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cert-dcl50-cpp
+
+cert-dcl50-cpp
+==============
+
+This check flags all function definitions (but not declarations) of C-style
+variadic functions.
+
+This check corresponds to the CERT C++ Coding Standard rule
+`DCL50-CPP. Do not define a C-style variadic function
+<https://www.securecoding.cert.org/confluence/display/cplusplus/DCL50-CPP.+Do+not+define+a+C-style+variadic+function>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl54-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl54-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl54-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl54-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-dcl54-cpp
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-new-delete-overloads.html
+
+cert-dcl54-cpp
+==============
+
+The cert-dcl54-cpp check is an alias, please see
+`misc-new-delete-overloads <misc-new-delete-overloads.html>`_ for more
+information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl58-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl58-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl58-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl58-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - cert-dcl58-cpp
+
+cert-dcl58-cpp
+==============
+
+Modification of the ``std`` or ``posix`` namespace can result in undefined
+behavior.
+This check warns for such modifications.
+
+Examples:
+
+.. code-block:: c++
+
+  namespace std {
+    int x; // May cause undefined behavior.
+  }
+
+
+This check corresponds to the CERT C++ Coding Standard rule
+`DCL58-CPP. Do not modify the standard namespaces
+<https://www.securecoding.cert.org/confluence/display/cplusplus/DCL58-CPP.+Do+not+modify+the+standard+namespaces>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl59-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl59-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl59-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-dcl59-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - cert-dcl59-cpp
+.. meta::
+   :http-equiv=refresh: 5;URL=google-build-namespaces.html
+
+cert-dcl59-cpp
+==============
+
+The cert-dcl59-cpp check is an alias, please see
+`google-build-namespaces <google-build-namespaces.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-env33-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-env33-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-env33-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-env33-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - cert-env33-c
+
+cert-env33-c
+============
+
+This check flags calls to ``system()``, ``popen()``, and ``_popen()``, which
+execute a command processor. It does not flag calls to ``system()`` with a null
+pointer argument, as such a call checks for the presence of a command processor
+but does not actually attempt to execute a command.
+
+This check corresponds to the CERT C Coding Standard rule
+`ENV33-C. Do not call system()
+<https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=2130132>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err09-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err09-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err09-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err09-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-err09-cpp
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-throw-by-value-catch-by-reference.html
+
+cert-err09-cpp
+==============
+
+The cert-err09-cpp check is an alias, please see
+`misc-throw-by-value-catch-by-reference <misc-throw-by-value-catch-by-reference.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err34-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err34-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err34-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err34-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,28 @@
+.. title:: clang-tidy - cert-err34-c
+
+cert-err34-c
+============
+
+This check flags calls to string-to-number conversion functions that do not
+verify the validity of the conversion, such as ``atoi()`` or ``scanf()``. It
+does not flag calls to ``strtol()``, or other, related conversion functions that
+do perform better error checking.
+
+.. code-block:: c
+
+  #include <stdlib.h>
+
+  void func(const char *buff) {
+    int si;
+
+    if (buff) {
+      si = atoi(buff); /* 'atoi' used to convert a string to an integer, but function will
+                           not report conversion errors; consider using 'strtol' instead. */
+    } else {
+      /* Handle error */
+    }
+  }
+
+This check corresponds to the CERT C Coding Standard rule
+`ERR34-C. Detect errors when converting a string to a number
+<https://www.securecoding.cert.org/confluence/display/c/ERR34-C.+Detect+errors+when+converting+a+string+to+a+number>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err52-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err52-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err52-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err52-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-err52-cpp
+
+cert-err52-cpp
+==============
+
+This check flags all call expressions involving ``setjmp()`` and ``longjmp()``.
+
+This check corresponds to the CERT C++ Coding Standard rule
+`ERR52-CPP. Do not use setjmp() or longjmp()
+<https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=1834>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err58-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err58-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err58-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err58-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cert-err58-cpp
+
+cert-err58-cpp
+==============
+
+This check flags all ``static`` or ``thread_local`` variable declarations where
+the initializer for the object may throw an exception.
+
+This check corresponds to the CERT C++ Coding Standard rule
+`ERR58-CPP. Handle all exceptions thrown before main() begins executing
+<https://www.securecoding.cert.org/confluence/display/cplusplus/ERR58-CPP.+Handle+all+exceptions+thrown+before+main%28%29+begins+executing>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err60-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err60-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err60-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err60-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cert-err60-cpp
+
+cert-err60-cpp
+==============
+
+This check flags all throw expressions where the exception object is not nothrow
+copy constructible.
+
+This check corresponds to the CERT C++ Coding Standard rule
+`ERR60-CPP. Exception objects must be nothrow copy constructible
+<https://www.securecoding.cert.org/confluence/display/cplusplus/ERR60-CPP.+Exception+objects+must+be+nothrow+copy+constructible>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err61-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err61-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err61-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-err61-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-err61-cpp
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-throw-by-value-catch-by-reference.html
+
+cert-err61-cpp
+==============
+
+The cert-err61-cpp check is an alias, please see
+`misc-throw-by-value-catch-by-reference <misc-throw-by-value-catch-by-reference.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-fio38-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-fio38-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-fio38-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-fio38-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-fio38-c
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-non-copyable-objects.html
+
+cert-fio38-c
+============
+
+The cert-fio38-c check is an alias, please see
+`misc-non-copyable-objects <misc-non-copyable-objects.html>`_ for more
+information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-flp30-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-flp30-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-flp30-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-flp30-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cert-flp30-c
+
+cert-flp30-c
+============
+
+This check flags ``for`` loops where the induction expression has a
+floating-point type.
+
+This check corresponds to the CERT C Coding Standard rule
+`FLP30-C. Do not use floating-point variables as loop counters
+<https://www.securecoding.cert.org/confluence/display/c/FLP30-C.+Do+not+use+floating-point+variables+as+loop+counters>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc30-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc30-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc30-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc30-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - cert-msc30-c
+.. meta::
+   :http-equiv=refresh: 5;URL=cert-msc50-cpp.html
+
+cert-msc30-c
+============
+
+The cert-msc30-c check is an alias, please see
+`cert-msc50-cpp <cert-msc50-cpp.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc32-c.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc32-c.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc32-c.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc32-c.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - cert-msc32-c
+.. meta::
+   :http-equiv=refresh: 5;URL=cert-msc51-cpp.html
+
+cert-msc32-c
+============
+
+The cert-msc32-c check is an alias, please see
+`cert-msc51-cpp <cert-msc51-cpp.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc50-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc50-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc50-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc50-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cert-msc50-cpp
+
+cert-msc50-cpp
+==============
+
+Pseudorandom number generators use mathematical algorithms to produce a sequence
+of numbers with good statistical properties, but the numbers produced are not
+genuinely random. The ``std::rand()`` function takes a seed (number), runs a
+mathematical operation on it and returns the result. By manipulating the seed
+the result can be predictable. This check warns for the usage of
+``std::rand()``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc51-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc51-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc51-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-msc51-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,40 @@
+.. title:: clang-tidy - cert-msc51-cpp
+
+cert-msc51-cpp
+==============
+
+This check flags all pseudo-random number engines, engine adaptor
+instantiations and ``srand()`` when initialized or seeded with default argument,
+constant expression or any user-configurable type. Pseudo-random number
+engines seeded with a predictable value may cause vulnerabilities e.g. in
+security protocols.
+This is a CERT security rule, see
+`MSC51-CPP. Ensure your random number generator is properly seeded
+<https://wiki.sei.cmu.edu/confluence/display/cplusplus/MSC51-CPP.+Ensure+your+random+number+generator+is+properly+seeded>`_ and
+`MSC32-C. Properly seed pseudorandom number generators
+<https://wiki.sei.cmu.edu/confluence/display/c/MSC32-C.+Properly+seed+pseudorandom+number+generators>`_.
+
+Examples:
+
+.. code-block:: c++
+
+  void foo() {
+    std::mt19937 engine1; // Diagnose, always generate the same sequence
+    std::mt19937 engine2(1); // Diagnose
+    engine1.seed(); // Diagnose
+    engine2.seed(1); // Diagnose
+    
+    std::time_t t;
+    engine1.seed(std::time(&t)); // Diagnose, system time might be controlled by user
+
+    int x = atoi(argv[1]);
+    std::mt19937 engine3(x);  // Will not warn
+  }
+
+Options
+-------
+
+.. option:: DisallowedSeedTypes
+
+   A comma-separated list of the type names which are disallowed.
+   Default values are ``time_t``, ``std::time_t``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-oop11-cpp.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-oop11-cpp.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-oop11-cpp.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cert-oop11-cpp.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cert-oop11-cpp
+.. meta::
+   :http-equiv=refresh: 5;URL=performance-move-constructor-init.html
+
+cert-oop11-cpp
+==============
+
+The cert-oop11-cpp check is an alias, please see
+`performance-move-constructor-init <performance-move-constructor-init.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-c-arrays.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-c-arrays.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-c-arrays.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-c-arrays.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cppcoreguidelines-avoid-c-arrays
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-avoid-c-arrays.html
+
+cppcoreguidelines-avoid-c-arrays
+================================
+
+The cppcoreguidelines-avoid-c-arrays check is an alias, please see
+`modernize-avoid-c-arrays <modernize-avoid-c-arrays.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-goto.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,50 @@
+.. title:: clang-tidy - cppcoreguidelines-avoid-goto
+
+cppcoreguidelines-avoid-goto
+============================
+
+The usage of ``goto`` for control flow is error prone and should be replaced
+with looping constructs. Only forward jumps in nested loops are accepted.
+
+This check implements `ES.76 <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es76-avoid-goto>`_ 
+from the CppCoreGuidelines and 
+`6.3.1 from High Integrity C++ <http://www.codingstandard.com/rule/6-3-1-ensure-that-the-labels-for-a-jump-statement-or-a-switch-condition-appear-later-in-the-same-or-an-enclosing-block/>`_.
+
+For more information on why to avoid programming 
+with ``goto`` you can read the famous paper `A Case against the GO TO Statement. <https://www.cs.utexas.edu/users/EWD/ewd02xx/EWD215.PDF>`_.
+
+The check diagnoses ``goto`` for backward jumps in every language mode. These
+should be replaced with `C/C++` looping constructs.
+
+.. code-block:: c++
+
+  // Bad, handwritten for loop.
+  int i = 0;
+  // Jump label for the loop
+  loop_start:
+  do_some_operation();
+
+  if (i < 100) {
+    ++i;
+    goto loop_start;
+  }
+
+  // Better
+  for(int i = 0; i < 100; ++i)
+    do_some_operation();
+
+Modern C++ needs ``goto`` only to jump out of nested loops.
+
+.. code-block:: c++
+
+  for(int i = 0; i < 100; ++i) {
+    for(int j = 0; j < 100; ++j) {
+      if (i * j > 500)
+        goto early_exit;
+    }
+  }
+
+  early_exit:
+  some_operation();
+
+All other uses of ``goto`` are diagnosed in `C++`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-magic-numbers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-magic-numbers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-magic-numbers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-avoid-magic-numbers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cppcoreguidelines-avoid-magic-numbers
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-magic-numbers.html
+
+cppcoreguidelines-avoid-magic-numbers
+=====================================
+
+The cppcoreguidelines-avoid-magic-numbers check is an alias, please see
+`readability-magic-numbers <readability-magic-numbers.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-c-copy-assignment-signature.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-c-copy-assignment-signature.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-c-copy-assignment-signature.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-c-copy-assignment-signature.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - cppcoreguidelines-c-copy-assignment-signature
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-unconventional-assign-operator.html
+
+cppcoreguidelines-c-copy-assignment-signature
+=============================================
+
+The cppcoreguidelines-c-copy-assignment-signature check is an alias, please see
+`misc-unconventional-assign-operator <misc-unconventional-assign-operator.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - cppcoreguidelines-interfaces-global-init
+
+cppcoreguidelines-interfaces-global-init
+========================================
+
+This check flags initializers of globals that access extern objects,
+and therefore can lead to order-of-initialization problems.
+
+This rule is part of the "Interfaces" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Ri-global-init
+
+Note that currently this does not flag calls to non-constexpr functions, and
+therefore globals could still be accessed from functions themselves.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-macro-usage.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-macro-usage.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-macro-usage.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-macro-usage.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,33 @@
+.. title:: clang-tidy - cppcoreguidelines-macro-usage
+
+cppcoreguidelines-macro-usage
+=============================
+
+Finds macro usage that is considered problematic because better language
+constructs exist for the task.
+
+The relevant sections in the C++ Core Guidelines are 
+`Enum.1 <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#enum1-prefer-enumerations-over-macros>`_,
+`ES.30 <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es30-dont-use-macros-for-program-text-manipulation>`_,
+`ES.31 <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es31-dont-use-macros-for-constants-or-functions>`_ and
+`ES.33 <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es33-if-you-must-use-macros-give-them-unique-names>`_.
+
+Options
+-------
+
+.. option:: AllowedRegexp
+
+    A regular expression to filter allowed macros. For example 
+    `DEBUG*|LIBTORRENT*|TORRENT*|UNI*` could be applied to filter `libtorrent`.
+    Default value is `^DEBUG_*`.
+
+.. option:: CheckCapsOnly
+
+    Boolean flag to warn on all macros except those with CAPS_ONLY names.
+    This option is intended to ease introduction of this check into older
+    code bases. Default value is `0`/`false`.
+
+.. option:: IgnoreCommandLineMacros
+
+    Boolean flag to toggle ignoring command-line-defined macros.
+    Default value is `1`/`true`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,64 @@
+.. title:: clang-tidy - cppcoreguidelines-narrowing-conversions
+
+cppcoreguidelines-narrowing-conversions
+=======================================
+
+Checks for silent narrowing conversions, e.g: ``int i = 0; i += 0.1;``. While
+the issue is obvious in this former example, it might not be so in the
+following: ``void MyClass::f(double d) { int_member_ += d; }``.
+
+This rule is part of the "Expressions and statements" profile of the C++ Core
+Guidelines, corresponding to rule ES.46. See
+
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es46-avoid-lossy-narrowing-truncating-arithmetic-conversions.
+
+We enforce only part of the guideline, more specifically, we flag narrowing conversions from:
+ - an integer to a narrower integer (e.g. ``char`` to ``unsigned char``),
+ - an integer to a narrower floating-point (e.g. ``uint64_t`` to ``float``),
+ - a floating-point to an integer (e.g. ``double`` to ``int``),
+ - a floating-point to a narrower floating-point (e.g. ``double`` to ``float``)
+   if WarnOnFloatingPointNarrowingConversion Option is set.
+
+This check will flag:
+ - All narrowing conversions that are not marked by an explicit cast (c-style or
+   ``static_cast``). For example: ``int i = 0; i += 0.1;``,
+   ``void f(int); f(0.1);``,
+ - All applications of binary operators with a narrowing conversions.
+   For example: ``int i; i+= 0.1;``.
+
+
+Options
+-------
+
+.. option:: WarnOnFloatingPointNarrowingConversion
+
+    When non-zero, the check will warn on narrowing floating point conversion
+    (e.g. ``double`` to ``float``). `1` by default.
+
+.. option:: PedanticMode
+
+    When non-zero, the check will warn on assigning a floating point constant
+    to an integer value even if the floating point value is exactly
+    representable in the destination type (e.g. ``int i = 1.0;``).
+    `0` by default.
+
+FAQ
+---
+
+ - What does "narrowing conversion from 'int' to 'float'" mean?
+
+An IEEE754 Floating Point number can represent all integer values in the range
+[-2^PrecisionBits, 2^PrecisionBits] where PrecisionBits is the number of bits in
+the mantissa.
+
+For ``float`` this would be [-2^23, 2^23], where ``int`` can represent values in
+the range [-2^31, 2^31-1].
+
+ - What does "implementation-defined" mean?
+
+You may have encountered messages like "narrowing conversion from 'unsigned int'
+to signed type 'int' is implementation-defined".
+The C/C++ standard does not mandate two’s complement for signed integers, and so
+the compiler is free to define what the semantics are for converting an unsigned
+integer to signed integer. Clang's implementation uses the two’s complement
+format.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-no-malloc.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-no-malloc.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-no-malloc.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-no-malloc.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,46 @@
+.. title:: clang-tidy - cppcoreguidelines-no-malloc
+
+cppcoreguidelines-no-malloc
+===========================
+
+This check handles C-Style memory management using ``malloc()``, ``realloc()``,
+``calloc()`` and ``free()``. It warns about its use and tries to suggest the use
+of an appropriate RAII object.
+Furthermore, it can be configured to check against a user-specified list of functions 
+that are used for memory management (e.g. ``posix_memalign()``).
+See `C++ Core Guidelines <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Rr-mallocfree>`_.
+
+There is no attempt made to provide fix-it hints, since manual resource
+management isn't easily transformed automatically into RAII.
+
+.. code-block:: c++
+
+  // Warns each of the following lines.
+  // Containers like std::vector or std::string should be used.
+  char* some_string = (char*) malloc(sizeof(char) * 20);
+  char* some_string = (char*) realloc(sizeof(char) * 30);
+  free(some_string);
+
+  int* int_array = (int*) calloc(30, sizeof(int));
+
+  // Rather use a smartpointer or stack variable.
+  struct some_struct* s = (struct some_struct*) malloc(sizeof(struct some_struct));
+
+Options
+-------
+
+.. option:: Allocations
+
+   Semicolon-separated list of fully qualified names of memory allocation functions. 
+   Defaults to ``::malloc;::calloc``.
+
+.. option:: Deallocations
+
+   Semicolon-separated list of fully qualified names of memory allocation functions. 
+   Defaults to ``::free``.
+
+.. option:: Reallocations
+
+   Semicolon-separated list of fully qualified names of memory allocation functions. 
+   Defaults to ``::realloc``.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-non-private-member-variables-in-classes.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - cppcoreguidelines-non-private-member-variables-in-classes
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-non-private-member-variables-in-classes.html
+
+cppcoreguidelines-non-private-member-variables-in-classes
+=========================================================
+
+The cppcoreguidelines-non-private-member-variables-in-classes check is an alias,
+please see
+`misc-non-private-member-variables-in-classes <misc-non-private-member-variables-in-classes.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-owning-memory.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-owning-memory.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-owning-memory.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-owning-memory.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,176 @@
+.. title:: clang-tidy - cppcoreguidelines-owning-memory
+
+cppcoreguidelines-owning-memory
+===============================
+
+This check implements the type-based semantics of ``gsl::owner<T*>``, which allows 
+static analysis on code, that uses raw pointers to handle resources like 
+dynamic memory, but won't introduce RAII concepts.
+
+The relevant sections in the `C++ Core Guidelines <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md>`_ are I.11, C.33, R.3 and GSL.Views
+The definition of a ``gsl::owner<T*>`` is straight forward
+
+.. code-block:: c++
+
+  namespace gsl { template <typename T> owner = T; }
+
+It is therefore simple to introduce the owner even without using an implementation of
+the `Guideline Support Library <https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#gsl-guideline-support-library>`_.
+
+All checks are purely type based and not (yet) flow sensitive.
+
+The following examples will demonstrate the correct and incorrect initializations
+of owners, assignment is handled the same way. Note that both ``new`` and 
+``malloc()``-like resource functions are considered to produce resources.
+
+.. code-block:: c++
+
+  // Creating an owner with factory functions is checked.
+  gsl::owner<int*> function_that_returns_owner() { return gsl::owner<int*>(new int(42)); }
+
+  // Dynamic memory must be assigned to an owner
+  int* Something = new int(42); // BAD, will be caught
+  gsl::owner<int*> Owner = new int(42); // Good
+  gsl::owner<int*> Owner = new int[42]; // Good as well
+
+  // Returned owner must be assigned to an owner
+  int* Something = function_that_returns_owner(); // Bad, factory function
+  gsl::owner<int*> Owner = function_that_returns_owner(); // Good, result lands in owner
+
+  // Something not a resource or owner should not be assigned to owners
+  int Stack = 42;
+  gsl::owner<int*> Owned = &Stack; // Bad, not a resource assigned
+
+In the case of dynamic memory as resource, only ``gsl::owner<T*>`` variables are allowed
+to be deleted.
+
+.. code-block:: c++
+
+  // Example Bad, non-owner as resource handle, will be caught.
+  int* NonOwner = new int(42); // First warning here, since new must land in an owner
+  delete NonOwner; // Second warning here, since only owners are allowed to be deleted
+
+  // Example Good, Ownership correclty stated
+  gsl::owner<int*> Owner = new int(42); // Good
+  delete Owner; // Good as well, statically enforced, that only owners get deleted
+  
+The check will furthermore ensure, that functions, that expect a ``gsl::owner<T*>`` as
+argument get called with either a ``gsl::owner<T*>`` or a newly created resource.
+
+.. code-block:: c++
+
+  void expects_owner(gsl::owner<int*> o) { delete o; }
+
+  // Bad Code
+  int NonOwner = 42;
+  expects_owner(&NonOwner); // Bad, will get caught
+
+  // Good Code
+  gsl::owner<int*> Owner = new int(42);
+  expects_owner(Owner); // Good
+  expects_owner(new int(42)); // Good as well, recognized created resource
+
+  // Port legacy code for better resource-safety
+  gsl::owner<FILE*> File = fopen("my_file.txt", "rw+");
+  FILE* BadFile = fopen("another_file.txt", "w"); // Bad, warned
+
+  // ... use the file
+
+  fclose(File); // Ok, File is annotated as 'owner<>'
+  fclose(BadFile); // BadFile is not an 'owner<>', will be warned
+
+
+Options
+-------
+
+.. option:: LegacyResourceProducers
+
+   Semicolon-separated list of fully qualified names of legacy functions that create
+   resources but cannot introduce ``gsl::owner<>``.
+   Defaults to ``::malloc;::aligned_alloc;::realloc;::calloc;::fopen;::freopen;::tmpfile``.
+
+
+.. option:: LegacyResourceConsumers
+
+   Semicolon-separated list of fully qualified names of legacy functions expecting
+   resource owners as pointer arguments but cannot introduce ``gsl::owner<>``.
+   Defaults to ``::free;::realloc;::freopen;::fclose``.
+
+
+Limitations
+-----------
+
+Using ``gsl::owner<T*>`` in a typedef or alias is not handled correctly. 
+
+.. code-block:: c++
+
+  using heap_int = gsl::owner<int*>;
+  heap_int allocated = new int(42); // False positive!
+
+The ``gsl::owner<T*>`` is declared as a templated type alias.
+In template functions and classes, like in the example below, the information
+of the type aliases gets lost. Therefore using ``gsl::owner<T*>`` in a heavy templated
+code base might lead to false positives. 
+
+Known code constructs that do not get diagnosed correctly are:
+
+- ``std::exchange``
+- ``std::vector<gsl::owner<T*>>``
+
+.. code-block:: c++
+
+  // This template function works as expected. Type information doesn't get lost.
+  template <typename T>
+  void delete_owner(gsl::owner<T*> owned_object) {
+    delete owned_object; // Everything alright
+  }
+
+  gsl::owner<int*> function_that_returns_owner() { return gsl::owner<int*>(new int(42)); }
+
+  // Type deduction does not work for auto variables. 
+  // This is caught by the check and will be noted accordingly.
+  auto OwnedObject = function_that_returns_owner(); // Type of OwnedObject will be int*
+
+  // Problematic function template that looses the typeinformation on owner
+  template <typename T>
+  void bad_template_function(T some_object) {
+    // This line will trigger the warning, that a non-owner is assigned to an owner
+    gsl::owner<T*> new_owner = some_object;
+  }
+
+  // Calling the function with an owner still yields a false positive.
+  bad_template_function(gsl::owner<int*>(new int(42)));
+
+
+  // The same issue occurs with templated classes like the following.
+  template <typename T>
+  class OwnedValue {
+  public:
+    const T getValue() const { return _val; }
+  private:
+    T _val;
+  };
+
+  // Code, that yields a false positive.
+  OwnedValue<gsl::owner<int*>> Owner(new int(42)); // Type deduction yield T -> int * 
+  // False positive, getValue returns int* and not gsl::owner<int*>
+  gsl::owner<int*> OwnedInt = Owner.getValue(); 
+
+Another limitation of the current implementation is only the type based checking.
+Suppose you have code like the following:
+
+.. code-block:: c++
+
+  // Two owners with assigned resources
+  gsl::owner<int*> Owner1 = new int(42); 
+  gsl::owner<int*> Owner2 = new int(42);
+
+  Owner2 = Owner1; // Conceptual Leak of initial resource of Owner2!
+  Owner1 = nullptr;
+
+The semantic of a ``gsl::owner<T*>`` is mostly like a ``std::unique_ptr<T>``, therefore
+assignment of two ``gsl::owner<T*>`` is considered a move, which requires that the 
+resource ``Owner2`` must have been released before the assignment.
+This kind of condition could be catched in later improvements of this check with 
+flowsensitive analysis. Currently, the `Clang Static Analyzer` catches this bug
+for dynamic memory, but not for general types of resources.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-bounds-array-to-pointer-decay
+
+cppcoreguidelines-pro-bounds-array-to-pointer-decay
+===================================================
+
+This check flags all array to pointer decays.
+
+Pointers should not be used as arrays. ``span<T>`` is a bounds-checked, safe
+alternative to using pointers to access arrays.
+
+This rule is part of the "Bounds safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-bounds-decay.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,25 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-bounds-constant-array-index
+
+cppcoreguidelines-pro-bounds-constant-array-index
+=================================================
+
+This check flags all array subscript expressions on static arrays and
+``std::arrays`` that either do not have a constant integer expression index or
+are out of bounds (for ``std::array``). For out-of-bounds checking of static
+arrays, see the `-Warray-bounds` Clang diagnostic.
+
+This rule is part of the "Bounds safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-bounds-arrayindex.
+
+Options
+-------
+
+.. option:: GslHeader
+
+   The check can generate fixes after this option has been set to the name of
+   the include file that contains ``gsl::at()``, e.g. `"gsl/gsl.h"`.
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-bounds-pointer-arithmetic
+
+cppcoreguidelines-pro-bounds-pointer-arithmetic
+===============================================
+
+This check flags all usage of pointer arithmetic, because it could lead to an
+invalid pointer. Subtraction of two pointers is not flagged by this check.
+
+Pointers should only refer to single objects, and pointer arithmetic is fragile
+and easy to get wrong. ``span<T>`` is a bounds-checked, safe type for accessing
+arrays of data.
+
+This rule is part of the "Bounds safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-bounds-arithmetic.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-const-cast
+
+cppcoreguidelines-pro-type-const-cast
+=====================================
+
+This check flags all uses of ``const_cast`` in C++ code.
+
+Modifying a variable that was declared const is undefined behavior, even with
+``const_cast``.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-constcast.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-cstyle-cast
+
+cppcoreguidelines-pro-type-cstyle-cast
+======================================
+
+This check flags all use of C-style casts that perform a ``static_cast``
+downcast, ``const_cast``, or ``reinterpret_cast``.
+
+Use of these casts can violate type safety and cause the program to access a
+variable that is actually of type X to be accessed as if it were of an unrelated
+type Z. Note that a C-style ``(T)expression`` cast means to perform the first of
+the following that is possible: a ``const_cast``, a ``static_cast``, a
+``static_cast`` followed by a ``const_cast``, a ``reinterpret_cast``, or a
+``reinterpret_cast`` followed by a ``const_cast``. This rule bans
+``(T)expression`` only when used to perform an unsafe cast.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-cstylecast.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,38 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-member-init
+
+cppcoreguidelines-pro-type-member-init
+======================================
+
+The check flags user-defined constructor definitions that do not
+initialize all fields that would be left in an undefined state by
+default construction, e.g. builtins, pointers and record types without
+user-provided default constructors containing at least one such
+type. If these fields aren't initialized, the constructor will leave
+some of the memory in an undefined state.
+
+For C++11 it suggests fixes to add in-class field initializers. For
+older versions it inserts the field initializers into the constructor
+initializer list. It will also initialize any direct base classes that
+need to be zeroed in the constructor initializer list.
+
+The check takes assignment of fields in the constructor body into
+account but generates false positives for fields initialized in
+methods invoked in the constructor body.
+
+The check also flags variables with automatic storage duration that have record
+types without a user-provided constructor and are not initialized. The suggested
+fix is to zero initialize the variable via ``{}`` for C++11 and beyond or ``=
+{}`` for older language versions.
+
+Options
+-------
+
+.. option:: IgnoreArrays
+
+   If set to non-zero, the check will not warn about array members that are not
+   zero-initialized during construction. For performance critical code, it may
+   be important to not initialize fixed-size array members. Default is `0`.
+
+This rule is part of the "Type safety" profile of the C++ Core
+Guidelines, corresponding to rule Type.6. See
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-memberinit.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-reinterpret-cast
+
+cppcoreguidelines-pro-type-reinterpret-cast
+===========================================
+
+This check flags all uses of ``reinterpret_cast`` in C++ code.
+
+Use of these casts can violate type safety and cause the program to access a
+variable that is actually of type ``X`` to be accessed as if it were of an
+unrelated type ``Z``.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-reinterpretcast.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,15 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-static-cast-downcast
+
+cppcoreguidelines-pro-type-static-cast-downcast
+===============================================
+
+This check flags all usages of ``static_cast``, where a base class is casted to
+a derived class. In those cases, a fix-it is provided to convert the cast to a
+``dynamic_cast``.
+
+Use of these casts can violate type safety and cause the program to access a
+variable that is actually of type ``X`` to be accessed as if it were of an
+unrelated type ``Z``.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-downcast.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-union-access
+
+cppcoreguidelines-pro-type-union-access
+=======================================
+
+This check flags all access to members of unions. Passing unions as a whole is
+not flagged.
+
+Reading from a union member assumes that member was the last one written, and
+writing to a union member assumes another member with a nontrivial destructor
+had its destructor called. This is fragile because it cannot generally be
+enforced to be safe in the language and so relies on programmer discipline to
+get it right.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-unions.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - cppcoreguidelines-pro-type-vararg
+
+cppcoreguidelines-pro-type-vararg
+=================================
+
+This check flags all calls to c-style vararg functions and all use of
+``va_arg``.
+
+To allow for SFINAE use of vararg functions, a call is not flagged if a literal
+0 is passed as the only vararg argument.
+
+Passing to varargs assumes the correct type will be read. This is fragile
+because it cannot generally be enforced to be safe in the language and so relies
+on programmer discipline to get it right.
+
+This rule is part of the "Type safety" profile of the C++ Core Guidelines, see
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#Pro-type-varargs.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-slicing.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-slicing.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-slicing.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-slicing.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,25 @@
+.. title:: clang-tidy - cppcoreguidelines-slicing
+
+cppcoreguidelines-slicing
+=========================
+
+Flags slicing of member variables or vtable. Slicing happens when copying a
+derived object into a base object: the members of the derived object (both
+member variables and virtual member functions) will be discarded. This can be
+misleading especially for member function slicing, for example:
+
+.. code-block:: c++
+
+  struct B { int a; virtual int f(); };
+  struct D : B { int b; int f() override; };
+
+  void use(B b) {  // Missing reference, intended?
+    b.f();  // Calls B::f.
+  }
+
+  D d;
+  use(d);  // Slice.
+
+See the relevant C++ Core Guidelines sections for details:
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es63-dont-slice
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#c145-access-polymorphic-objects-through-pointers-and-references

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-special-member-functions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-special-member-functions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-special-member-functions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/cppcoreguidelines-special-member-functions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - cppcoreguidelines-special-member-functions
+
+cppcoreguidelines-special-member-functions
+==========================================
+
+The check finds classes where some but not all of the special member functions
+are defined.
+
+By default the compiler defines a copy constructor, copy assignment operator,
+move constructor, move assignment operator and destructor. The default can be
+suppressed by explicit user-definitions. The relationship between which
+functions will be suppressed by definitions of other functions is complicated
+and it is advised that all five are defaulted or explicitly defined.
+
+Note that defining a function with ``= delete`` is considered to be a
+definition.
+
+This rule is part of the "Constructors, assignments, and destructors" profile of the C++ Core
+Guidelines, corresponding to rule C.21. See
+
+https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#c21-if-you-define-or-delete-any-default-operation-define-or-delete-them-all.
+
+Options
+-------
+
+.. option:: AllowSoleDefaultDtor
+
+   When set to `1` (default is `0`), this check doesn't flag classes with a sole, explicitly
+   defaulted destructor. An example for such a class is:
+   
+   .. code-block:: c++
+   
+     struct A {
+       virtual ~A() = default;
+     };
+   
+.. option:: AllowMissingMoveFunctions
+
+   When set to `1` (default is `0`), this check doesn't flag classes which define no move
+   operations at all. It still flags classes which define only one of either
+   move constructor or move assignment operator. With this option enabled, the following class won't be flagged:
+   
+   .. code-block:: c++
+   
+     struct A {
+       A(const A&);
+       A& operator=(const A&);
+       ~A();
+     }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-default-arguments.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-default-arguments.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-default-arguments.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-default-arguments.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,24 @@
+.. title:: clang-tidy - fuchsia-default-arguments
+
+fuchsia-default-arguments
+=========================
+
+Warns if a function or method is declared or called with default arguments.
+
+For example, the declaration:
+
+.. code-block:: c++
+
+  int foo(int value = 5) { return value; }
+
+will cause a warning.
+
+A function call expression that uses a default argument will be diagnosed.
+Calling it without defaults will not cause a warning:
+
+.. code-block:: c++
+
+  foo();  // warning
+  foo(0); // no warning
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-header-anon-namespaces.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-header-anon-namespaces.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-header-anon-namespaces.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-header-anon-namespaces.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - fuchsia-header-anon-namespaces
+.. meta::
+   :http-equiv=refresh: 5;URL=google-build-namespaces.html
+
+fuchsia-header-anon-namespaces
+==============================
+
+The fuchsia-header-anon-namespaces check is an alias, please see
+`google-build-namespace <google-build-namespaces.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-multiple-inheritance.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-multiple-inheritance.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-multiple-inheritance.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-multiple-inheritance.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,46 @@
+.. title:: clang-tidy - fuchsia-multiple-inheritance
+
+fuchsia-multiple-inheritance
+============================
+
+Warns if a class inherits from multiple classes that are not pure virtual.
+
+For example, declaring a class that inherits from multiple concrete classes is
+disallowed:
+
+.. code-block:: c++
+
+  class Base_A {
+  public:
+    virtual int foo() { return 0; }
+  };
+
+  class Base_B {
+  public:
+    virtual int bar() { return 0; }
+  };
+
+  // Warning
+  class Bad_Child1 : public Base_A, Base_B {};
+
+A class that inherits from a pure virtual is allowed:
+
+.. code-block:: c++
+
+  class Interface_A {
+  public:
+    virtual int foo() = 0;
+  };
+
+  class Interface_B {
+  public:
+    virtual int bar() = 0;
+  };
+
+  // No warning
+  class Good_Child1 : public Interface_A, Interface_B {
+    virtual int foo() override { return 0; }
+    virtual int bar() override { return 0; }
+  };
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-overloaded-operator.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-overloaded-operator.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-overloaded-operator.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-overloaded-operator.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - fuchsia-overloaded-operator
+
+fuchsia-overloaded-operator
+===========================
+
+Warns if an operator is overloaded, except for the assignment (copy and move) 
+operators.
+
+For example:
+
+.. code-block:: c++
+
+  int operator+(int);     // Warning
+
+  B &operator=(const B &Other);  // No warning
+  B &operator=(B &&Other) // No warning
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-restrict-system-includes.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-restrict-system-includes.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-restrict-system-includes.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-restrict-system-includes.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,32 @@
+.. title:: clang-tidy - fuchsia-restrict-system-includes
+
+fuchsia-restrict-system-includes
+================================
+
+Checks for allowed system includes and suggests removal of any others.
+
+It is important to note that running this check with fixes may break code, as
+the fix removes headers. Fixes are applied to source and header files, but not
+to system headers.
+
+For example, given the allowed system includes 'a.h,b*':
+
+.. code-block:: c++
+
+  #include <a.h>
+  #include <b.h>
+  #include <bar.h>
+  #include <c.h>    // Warning, as c.h is not explicitly allowed
+  
+All system includes can be allowed with '*', and all can be disallowed with an
+empty string ('').
+  
+Options
+-------
+
+.. option:: Includes
+
+   A string containing a comma separated glob list of allowed include filenames.
+   Similar to the -checks glob list for running clang-tidy itself, the two
+   wildcard characters are '*' and '-', to include and exclude globs,
+   respectively.The default is '*', which allows all includes.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-statically-constructed-objects.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-statically-constructed-objects.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-statically-constructed-objects.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-statically-constructed-objects.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,43 @@
+.. title:: clang-tidy - fuchsia-statically-constructed-objects
+
+fuchsia-statically-constructed-objects
+======================================
+
+Warns if global, non-trivial objects with static storage are constructed, unless 
+the object is statically initialized with a ``constexpr`` constructor or has no 
+explicit constructor.
+
+For example:
+
+.. code-block:: c++
+
+  class A {};
+
+  class B {
+  public:
+    B(int Val) : Val(Val) {}
+  private:
+    int Val;
+  };
+
+  class C {
+  public:
+    C(int Val) : Val(Val) {}
+    constexpr C() : Val(0) {}
+
+  private:
+    int Val;
+  };
+
+  static A a;         // No warning, as there is no explicit constructor
+  static C c(0);      // No warning, as constructor is constexpr
+
+  static B b(0);      // Warning, as constructor is not constexpr
+  static C c2(0, 1);  // Warning, as constructor is not constexpr
+  
+  static int i;       // No warning, as it is trivial
+  
+  extern int get_i();
+  static C(get_i())   // Warning, as the constructor is dynamically initialized
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-trailing-return.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-trailing-return.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-trailing-return.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-trailing-return.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,35 @@
+.. title:: clang-tidy - fuchsia-trailing-return
+
+fuchsia-trailing-return
+=======================
+
+Functions that have trailing returns are disallowed, except for those using 
+``decltype`` specifiers and lambda with otherwise unutterable return types.
+
+For example:
+
+.. code-block:: c++
+
+  // No warning
+  int add_one(const int arg) { return arg; }
+
+  // Warning
+  auto get_add_one() -> int (*)(const int) {
+    return add_one;
+  }
+
+Exceptions are made for lambdas and ``decltype`` specifiers:
+
+.. code-block:: c++
+  
+  // No warning
+  auto lambda = [](double x, double y) -> double {return x + y;};
+  
+  // No warning
+  template <typename T1, typename T2>
+  auto fn(const T1 &lhs, const T2 &rhs) -> decltype(lhs + rhs) {
+    return lhs + rhs;
+  }
+
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-virtual-inheritance.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-virtual-inheritance.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-virtual-inheritance.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/fuchsia-virtual-inheritance.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - fuchsia-virtual-inheritance
+
+fuchsia-virtual-inheritance
+===========================
+
+Warns if classes are defined with virtual inheritance.
+
+For example, classes should not be defined with virtual inheritance:
+
+.. code-block:: c++
+
+  class B : public virtual A {};   // warning
+
+See the features disallowed in Fuchsia at https://fuchsia.googlesource.com/zircon/+/master/docs/cxx.md

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-explicit-make-pair.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-explicit-make-pair.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-explicit-make-pair.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-explicit-make-pair.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - google-build-explicit-make-pair
+
+google-build-explicit-make-pair
+===============================
+
+Check that ``make_pair``'s template arguments are deduced.
+
+G++ 4.6 in C++11 mode fails badly if ``make_pair``'s template arguments are
+specified explicitly, and such use isn't intended in any case.
+
+Corresponding cpplint.py check name: `build/explicit_make_pair`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-namespaces.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-namespaces.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-namespaces.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-namespaces.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,24 @@
+.. title:: clang-tidy - google-build-namespaces
+
+google-build-namespaces
+=======================
+
+`cert-dcl59-cpp` redirects here as an alias for this check.
+`fuchsia-header-anon-namespaces` redirects here as an alias for this check.
+
+Finds anonymous namespaces in headers.
+
+https://google.github.io/styleguide/cppguide.html#Namespaces
+
+Corresponding cpplint.py check name: `build/namespaces`.
+
+Options
+-------
+
+.. option:: HeaderFileExtensions
+
+   A comma-separated list of filename extensions of header files (the filename
+   extensions should not include "." prefix). Default is "h,hh,hpp,hxx".
+   For header files without an extension, use an empty string (if there are no
+   other desired extensions) or leave an empty element in the list. e.g.,
+   "h,hh,hpp,hxx," (note the trailing comma).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-using-namespace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-using-namespace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-using-namespace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-build-using-namespace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,19 @@
+.. title:: clang-tidy - google-build-using-namespace
+
+google-build-using-namespace
+============================
+
+Finds ``using namespace`` directives.
+
+The check implements the following rule of the
+`Google C++ Style Guide <https://google.github.io/styleguide/cppguide.html#Namespaces>`_:
+
+  You may not use a using-directive to make all names from a namespace
+  available.
+
+.. code-block:: c++
+
+    // Forbidden -- This pollutes the namespace.
+    using namespace foo;
+
+Corresponding cpplint.py check name: `build/namespaces`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-default-arguments.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-default-arguments.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-default-arguments.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-default-arguments.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,8 @@
+.. title:: clang-tidy - google-default-arguments
+
+google-default-arguments
+========================
+
+Checks that default arguments are not given for virtual methods.
+
+See https://google.github.io/styleguide/cppguide.html#Default_Arguments

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-explicit-constructor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-explicit-constructor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-explicit-constructor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-explicit-constructor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,56 @@
+.. title:: clang-tidy - google-explicit-constructor
+
+google-explicit-constructor
+===========================
+
+
+Checks that constructors callable with a single argument and conversion
+operators are marked explicit to avoid the risk of unintentional implicit
+conversions.
+
+Consider this example:
+
+.. code-block:: c++
+
+  struct S {
+    int x;
+    operator bool() const { return true; }
+  };
+
+  bool f() {
+    S a{1};
+    S b{2};
+    return a == b;
+  }
+
+The function will return ``true``, since the objects are implicitly converted to
+``bool`` before comparison, which is unlikely to be the intent.
+
+The check will suggest inserting ``explicit`` before the constructor or
+conversion operator declaration. However, copy and move constructors should not
+be explicit, as well as constructors taking a single ``initializer_list``
+argument.
+
+This code:
+
+.. code-block:: c++
+
+  struct S {
+    S(int a);
+    explicit S(const S&);
+    operator bool() const;
+    ...
+
+will become
+
+.. code-block:: c++
+
+  struct S {
+    explicit S(int a);
+    S(const S&);
+    explicit operator bool() const;
+    ...
+
+
+
+See https://google.github.io/styleguide/cppguide.html#Explicit_Constructors

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-global-names-in-headers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-global-names-in-headers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-global-names-in-headers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-global-names-in-headers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - google-global-names-in-headers
+
+google-global-names-in-headers
+==============================
+
+Flag global namespace pollution in header files. Right now it only triggers on
+``using`` declarations and directives.
+
+The relevant style guide section is
+https://google.github.io/styleguide/cppguide.html#Namespaces.
+
+Options
+-------
+
+.. option:: HeaderFileExtensions
+
+   A comma-separated list of filename extensions of header files (the filename
+   extensions should not contain "." prefix). Default is "h".
+   For header files without an extension, use an empty string (if there are no
+   other desired extensions) or leave an empty element in the list. e.g.,
+   "h,hh,hpp,hxx," (note the trailing comma).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-avoid-throwing-exception.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-avoid-throwing-exception.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-avoid-throwing-exception.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-avoid-throwing-exception.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,39 @@
+.. title:: clang-tidy - google-objc-avoid-throwing-exception
+
+google-objc-avoid-throwing-exception
+====================================
+
+Finds uses of throwing exceptions usages in Objective-C files.
+
+For the same reason as the Google C++ style guide, we prefer not throwing 
+exceptions from Objective-C code.
+
+The corresponding C++ style guide rule:
+https://google.github.io/styleguide/cppguide.html#Exceptions
+
+Instead, prefer passing in ``NSError **`` and return ``BOOL`` to indicate success or failure.
+
+A counterexample:
+
+.. code-block:: objc
+
+  - (void)readFile {
+    if ([self isError]) {
+      @throw [NSException exceptionWithName:...];
+    }
+  }
+
+Instead, returning an error via ``NSError **`` is preferred:
+
+.. code-block:: objc
+
+  - (BOOL)readFileWithError:(NSError **)error {
+    if ([self isError]) {
+      *error = [NSError errorWithDomain:...];
+      return NO;
+    }
+    return YES;
+  }
+
+The corresponding style guide rule:
+http://google.github.io/styleguide/objcguide.html#avoid-throwing-exceptions

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-function-naming.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-function-naming.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-function-naming.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-function-naming.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+.. title:: clang-tidy - google-objc-function-naming
+
+google-objc-function-naming
+===========================
+
+Finds function declarations in Objective-C files that do not follow the pattern
+described in the Google Objective-C Style Guide.
+
+The corresponding style guide rule can be found here:
+https://google.github.io/styleguide/objcguide.html#function-names
+
+All function names should be in Pascal case. Functions whose storage class is
+not static should have an appropriate prefix.
+
+The following code sample does not follow this pattern:
+
+.. code-block:: objc
+
+  static bool is_positive(int i) { return i > 0; }
+  bool IsNegative(int i) { return i < 0; }
+
+The sample above might be corrected to the following code:
+
+.. code-block:: objc
+
+  static bool IsPositive(int i) { return i > 0; }
+  bool *ABCIsNegative(int i) { return i < 0; }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-global-variable-declaration.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-global-variable-declaration.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-global-variable-declaration.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-objc-global-variable-declaration.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,47 @@
+.. title:: clang-tidy - google-objc-global-variable-declaration
+
+google-objc-global-variable-declaration
+=======================================
+
+Finds global variable declarations in Objective-C files that do not follow the
+pattern of variable names in Google's Objective-C Style Guide.
+
+The corresponding style guide rule:
+http://google.github.io/styleguide/objcguide.html#variable-names
+
+All the global variables should follow the pattern of `g[A-Z].*` (variables) or
+`k[A-Z].*` (constants). The check will suggest a variable name that follows the
+pattern if it can be inferred from the original name.
+
+For code:
+
+.. code-block:: objc
+
+  static NSString* myString = @"hello";
+
+The fix will be:
+
+.. code-block:: objc
+
+  static NSString* gMyString = @"hello";
+
+Another example of constant:
+
+.. code-block:: objc
+
+  static NSString* const myConstString = @"hello";
+
+The fix will be:
+
+.. code-block:: objc
+
+  static NSString* const kMyConstString = @"hello";
+
+However for code that prefixed with non-alphabetical characters like:
+
+.. code-block:: objc
+
+  static NSString* __anotherString = @"world";
+
+The check will give a warning message but will not be able to suggest a fix. The
+user need to fix it on his own.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-braces-around-statements.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-braces-around-statements.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-braces-around-statements.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-braces-around-statements.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - google-readability-braces-around-statements
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-braces-around-statements.html
+
+google-readability-braces-around-statements
+===========================================
+
+The google-readability-braces-around-statements check is an alias, please see
+`readability-braces-around-statements <readability-braces-around-statements.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-casting.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-casting.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-casting.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-casting.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - google-readability-casting
+
+google-readability-casting
+==========================
+
+Finds usages of C-style casts.
+
+https://google.github.io/styleguide/cppguide.html#Casting
+
+Corresponding cpplint.py check name: `readability/casting`.
+
+This check is similar to `-Wold-style-cast`, but it suggests automated fixes
+in some cases. The reported locations should not be different from the
+ones generated by `-Wold-style-cast`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-function-size.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-function-size.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-function-size.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-function-size.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - google-readability-function-size
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-function-size.html
+
+google-readability-function-size
+================================
+
+The google-readability-function-size check is an alias, please see
+`readability-function-size <readability-function-size.html>`_ for more
+information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-namespace-comments.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-namespace-comments.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-namespace-comments.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-namespace-comments.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - google-readability-namespace-comments
+.. meta::
+   :http-equiv=refresh: 5;URL=llvm-namespace-comment.html
+
+google-readability-namespace-comments
+=====================================
+
+The google-readability-namespace-comments check is an alias, please see
+`llvm-namespace-comment <llvm-namespace-comment.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-todo.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-todo.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-todo.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-readability-todo.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - google-readability-todo
+
+google-readability-todo
+=======================
+
+Finds TODO comments without a username or bug number.
+
+The relevant style guide section is
+https://google.github.io/styleguide/cppguide.html#TODO_Comments.
+
+Corresponding cpplint.py check: `readability/todo`

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-int.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-int.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-int.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-int.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+.. title:: clang-tidy - google-runtime-int
+
+google-runtime-int
+==================
+
+Finds uses of ``short``, ``long`` and ``long long`` and suggest replacing them
+with ``u?intXX(_t)?``.
+
+The corresponding style guide rule:
+https://google.github.io/styleguide/cppguide.html#Integer_Types.
+
+Correspondig cpplint.py check: `runtime/int`.
+
+Options
+-------
+
+.. option:: UnsignedTypePrefix
+
+   A string specifying the unsigned type prefix. Default is `uint`.
+
+.. option:: SignedTypePrefix
+
+   A string specifying the signed type prefix. Default is `int`.
+
+.. option:: TypeSuffix
+
+   A string specifying the type suffix. Default is an empty string.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-operator.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-operator.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-operator.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-operator.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - google-runtime-operator
+
+google-runtime-operator
+=======================
+
+Finds overloads of unary ``operator &``.
+
+https://google.github.io/styleguide/cppguide.html#Operator_Overloading
+
+Corresponding cpplint.py check name: `runtime/operator`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-references.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-references.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-references.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/google-runtime-references.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - google-runtime-references
+
+google-runtime-references
+=========================
+
+Checks the usage of non-constant references in function parameters.
+
+The corresponding style guide rule:
+https://google.github.io/styleguide/cppguide.html#Reference_Arguments
+
+
+Options
+-------
+
+.. option:: WhiteListTypes
+
+   A semicolon-separated list of names of whitelist types. Default is empty.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-c-arrays.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-c-arrays.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-c-arrays.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-c-arrays.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-avoid-c-arrays
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-avoid-c-arrays.html
+
+hicpp-avoid-c-arrays
+====================
+
+The hicpp-avoid-c-arrays check is an alias, please see
+`modernize-avoid-c-arrays <modernize-avoid-c-arrays.html>`_
+for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-goto.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-goto.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-goto.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-avoid-goto.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - hicpp-avoid-goto
+
+hicpp-avoid-goto
+================
+
+The `hicpp-avoid-goto` check is an alias to 
+`cppcoreguidelines-avoid-goto <cppcoreguidelines-avoid-goto.html>`_.
+Rule `6.3.1 High Integrity C++ <http://www.codingstandard.com/rule/6-3-1-ensure-that-the-labels-for-a-jump-statement-or-a-switch-condition-appear-later-in-the-same-or-an-enclosing-block/>`_
+requires that ``goto`` only skips parts of a block and is not used for other 
+reasons.
+
+Both coding guidelines implement the same exception to the usage of ``goto``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-braces-around-statements.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-braces-around-statements.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-braces-around-statements.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-braces-around-statements.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-braces-around-statements
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-braces-around-statements.html
+
+hicpp-braces-around-statements
+==============================
+
+The `hicpp-braces-around-statements` check is an alias, please see
+`readability-braces-around-statements <readability-braces-around-statements.html>`_
+for more information.
+It enforces the `rule 6.1.1 <http://www.codingstandard.com/rule/6-1-1-enclose-the-body-of-a-selection-or-an-iteration-statement-in-a-compound-statement/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-deprecated-headers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-deprecated-headers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-deprecated-headers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-deprecated-headers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-deprecated-headers
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-deprecated-headers.html
+
+hicpp-deprecated-headers
+========================
+
+The `hicpp-deprecated-headers` check is an alias, please see
+`modernize-deprecated-headers <modernize-deprecated-headers.html>`_
+for more information.
+It enforces the `rule 1.3.3 <http://www.codingstandard.com/rule/1-3-3-do-not-use-the-c-standard-library-h-headers/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-exception-baseclass.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-exception-baseclass.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-exception-baseclass.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-exception-baseclass.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,30 @@
+.. title:: clang-tidy - hicpp-exception-baseclass
+
+hicpp-exception-baseclass
+=========================
+
+Ensure that every value that in a ``throw`` expression is an instance of 
+``std::exception``.
+
+This enforces `rule 15.1 <http://www.codingstandard.com/section/15-1-throwing-an-exception/>`_
+of the High Integrity C++ Coding Standard.
+
+.. code-block:: c++
+
+  class custom_exception {};
+
+  void throwing() noexcept(false) {
+    // Problematic throw expressions.
+    throw int(42);
+    throw custom_exception();
+  }
+
+  class mathematical_error : public std::exception {};
+
+  void throwing2() noexcept(false) {
+    // These kind of throws are ok.
+    throw mathematical_error();
+    throw std::runtime_error();
+    throw std::exception();
+  }
+  

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-explicit-conversions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-explicit-conversions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-explicit-conversions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-explicit-conversions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - hicpp-explicit-conversions
+.. meta::
+   :http-equiv=refresh: 5;URL=google-explicit-constructor.html
+
+hicpp-explicit-conversions
+==========================
+
+This check is an alias for `google-explicit-constructor <google-explicit-constructor.html>`_.
+Used to enforce parts of `rule 5.4.1 <http://www.codingstandard.com/rule/5-4-1-only-use-casting-forms-static_cast-excl-void-dynamic_cast-or-explicit-constructor-call/>`_.
+This check will enforce that constructors and conversion operators are marked `explicit`.
+Other forms of casting checks are implemented in other places.
+The following checks can be used to check for more forms of casting:
+
+- `cppcoreguidelines-pro-type-static-cast-downcast <cppcoreguidelines-pro-type-static-cast-downcast.html>`_
+- `cppcoreguidelines-pro-type-reinterpret-cast <cppcoreguidelines-pro-type-reinterpret-cast.html>`_
+- `cppcoreguidelines-pro-type-const-cast <cppcoreguidelines-pro-type-const-cast.html>`_ 
+- `cppcoreguidelines-pro-type-cstyle-cast <cppcoreguidelines-pro-type-cstyle-cast.html>`_

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-function-size.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-function-size.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-function-size.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-function-size.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - hicpp-function-size
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-function-size.html
+
+hicpp-function-size
+===================
+
+This check is an alias for `readability-function-size <readability-function-size.html>`_.
+Useful to enforce multiple sections on function complexity.
+
+- `rule 8.2.2 <http://www.codingstandard.com/rule/8-2-2-do-not-declare-functions-with-an-excessive-number-of-parameters/>`_
+- `rule 8.3.1 <http://www.codingstandard.com/rule/8-3-1-do-not-write-functions-with-an-excessive-mccabe-cyclomatic-complexity/>`_
+- `rule 8.3.2 <http://www.codingstandard.com/rule/8-3-2-do-not-write-functions-with-a-high-static-program-path-count/>`_

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-invalid-access-moved.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-invalid-access-moved.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-invalid-access-moved.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-invalid-access-moved.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-invalid-access-moved
+.. meta::
+   :http-equiv=refresh: 5;URL=bugprone-use-after-move.html
+
+hicpp-invalid-access-moved
+==========================
+
+This check is an alias for `bugprone-use-after-move <bugprone-use-after-move.html>`_.
+
+Implements parts of the `rule 8.4.1 <http://www.codingstandard.com/rule/8-4-1-do-not-access-an-invalid-object-or-an-object-with-indeterminate-value/>`_ to check if moved-from objects are accessed.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-member-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-member-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-member-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-member-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-member-init
+.. meta::
+   :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-type-member-init.html
+
+hicpp-member-init
+=================
+
+This check is an alias for `cppcoreguidelines-pro-type-member-init <cppcoreguidelines-pro-type-member-init.html>`_.
+Implements the check for 
+`rule 12.4.2 <http://www.codingstandard.com/rule/12-4-2-ensure-that-a-constructor-initializes-explicitly-all-base-classes-and-non-static-data-members/>`_ 
+to initialize class members in the right order.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-move-const-arg.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-move-const-arg.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-move-const-arg.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-move-const-arg.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-move-const-arg
+.. meta::
+   :http-equiv=refresh: 5;URL=performance-move-const-arg.html
+
+hicpp-move-const-arg
+====================
+
+The `hicpp-move-const-arg` check is an alias, please see
+`performance-move-const-arg <performance-move-const-arg.html>`_ for more information.
+It enforces the `rule 17.3.1 <http://www.codingstandard.com/rule/17-3-1-do-not-use-stdmove-on-objects-declared-with-const-or-const-type/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-multiway-paths-covered.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-multiway-paths-covered.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-multiway-paths-covered.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-multiway-paths-covered.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,96 @@
+.. title:: clang-tidy - hicpp-multiway-paths-covered
+
+hicpp-multiway-paths-covered
+============================
+
+This check discovers situations where code paths are not fully-covered.
+It furthermore suggests using ``if`` instead of ``switch`` if the code will be more clear.
+The `rule 6.1.2 <http://www.codingstandard.com/rule/6-1-2-explicitly-cover-all-paths-through-multi-way-selection-statements/>`_
+and `rule 6.1.4 <http://www.codingstandard.com/rule/6-1-4-ensure-that-a-switch-statement-has-at-least-two-case-labels-distinct-from-the-default-label/>`_
+of the High Integrity C++ Coding Standard are enforced.
+
+``if-else if`` chains that miss a final ``else`` branch might lead to unexpected 
+program execution and be the result of a logical error.
+If the missing ``else`` branch is intended you can leave it empty with a clarifying
+comment.
+This warning can be noisy on some code bases, so it is disabled by default.
+
+.. code-block:: c++
+
+  void f1() {
+    int i = determineTheNumber();
+
+     if(i > 0) { 
+       // Some Calculation 
+     } else if (i < 0) { 
+       // Precondition violated or something else. 
+     }
+     // ...
+  }
+
+Similar arguments hold for ``switch`` statements which do not cover all possible code paths.
+
+.. code-block:: c++
+
+  // The missing default branch might be a logical error. It can be kept empty
+  // if there is nothing to do, making it explicit.
+  void f2(int i) {
+    switch (i) {
+    case 0: // something
+      break;
+    case 1: // something else
+      break;
+    }
+    // All other numbers?
+  }
+
+  // Violates this rule as well, but already emits a compiler warning (-Wswitch).
+  enum Color { Red, Green, Blue, Yellow };
+  void f3(enum Color c) {
+    switch (c) {
+    case Red: // We can't drive for now.
+      break;
+    case Green:  // We are allowed to drive.
+      break;
+    }
+    // Other cases missing
+  }
+
+
+The `rule 6.1.4 <http://www.codingstandard.com/rule/6-1-4-ensure-that-a-switch-statement-has-at-least-two-case-labels-distinct-from-the-default-label/>`_
+requires every ``switch`` statement to have at least two ``case`` labels other than a `default` label.
+Otherwise, the ``switch`` could be better expressed with an ``if`` statement.
+Degenerated ``switch`` statements without any labels are caught as well.
+
+.. code-block:: c++
+
+  // Degenerated switch that could be better written as `if`
+  int i = 42;
+  switch(i) {
+    case 1: // do something here
+    default: // do somethe else here
+  }
+
+  // Should rather be the following:
+  if (i == 1) { 
+    // do something here 
+  }
+  else { 
+    // do something here 
+  }
+
+
+.. code-block:: c++
+  
+  // A completly degenerated switch will be diagnosed.
+  int i = 42;
+  switch(i) {}
+
+
+Options
+-------
+
+.. option:: WarnOnMissingElse
+
+  Boolean flag that activates a warning for missing ``else`` branches.
+  Default is `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-named-parameter.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-named-parameter.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-named-parameter.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-named-parameter.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-named-parameter
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-named-parameter.html
+
+hicpp-named-parameter
+=====================
+
+This check is an alias for `readability-named-parameter <readability-named-parameter.html>`_.
+
+Implements `rule 8.2.1 <http://www.codingstandard.com/rule/8-2-1-make-parameter-names-absent-or-identical-in-all-declarations/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-new-delete-operators.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-new-delete-operators.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-new-delete-operators.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-new-delete-operators.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-new-delete-operators
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-new-delete-overloads.html
+
+hicpp-new-delete-operators
+==========================
+
+This check is an alias for `misc-new-delete-overloads <misc-new-delete-overloads.html>`_.
+Implements `rule 12.3.1 <http://www.codingstandard.com/section/12-3-free-store/>`_ to ensure
+the `new` and `delete` operators have the correct signature.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-array-decay.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-array-decay.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-array-decay.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-array-decay.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-no-array-decay
+.. meta::
+   :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-bounds-array-to-pointer-decay.html
+
+hicpp-no-array-decay
+====================
+
+The `hicpp-no-array-decay` check is an alias, please see
+`cppcoreguidelines-pro-bounds-array-to-pointer-decay <cppcoreguidelines-pro-bounds-array-to-pointer-decay.html>`_
+for more information.
+It enforces the `rule 4.1.1 <http://www.codingstandard.com/section/4-1-array-to-pointer-conversion/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-assembler.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-assembler.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-assembler.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-assembler.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-no-assembler
+
+hicpp-no-assembler
+===================
+
+Check for assembler statements. No fix is offered.
+
+Inline assembler is forbidden by the `High Intergrity C++ Coding Standard
+<http://www.codingstandard.com/section/7-5-the-asm-declaration/>`_ 
+as it restricts the portability of code.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-malloc.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-malloc.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-malloc.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-no-malloc.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-no-malloc
+.. meta::
+   :http-equiv=refresh: 5;URL=cppcoreguidelines-no-malloc.html
+
+hicpp-no-malloc
+===============
+
+The `hicpp-no-malloc` check is an alias, please see
+`cppcoreguidelines-no-malloc <cppcoreguidelines-no-malloc.html>`_
+for more information.
+It enforces the `rule 5.3.2 <http://www.codingstandard.com/rule/5-3-2-allocate-memory-using-new-and-release-it-using-delete/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-noexcept-move.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-noexcept-move.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-noexcept-move.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-noexcept-move.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - hicpp-noexcept-move
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-noexcept-moveconstructor.html
+
+hicpp-noexcept-move
+===================
+
+This check is an alias for `misc-noexcept-moveconstructor <misc-noexcept-moveconstructor.html>`_.
+Checks `rule 12.5.4 <http://www.codingstandard.com/rule/12-5-4-declare-noexcept-the-move-constructor-and-move-assignment-operator>`_ to mark move assignment and move construction `noexcept`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-signed-bitwise.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-signed-bitwise.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-signed-bitwise.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-signed-bitwise.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - hicpp-signed-bitwise
+
+hicpp-signed-bitwise
+====================
+
+Finds uses of bitwise operations on signed integer types, which may lead to 
+undefined or implementation defined behaviour.
+
+The according rule is defined in the `High Integrity C++ Standard, Section 5.6.1 <http://www.codingstandard.com/section/5-6-shift-operators/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-special-member-functions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-special-member-functions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-special-member-functions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-special-member-functions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - hicpp-special-member-functions
+.. meta::
+   :http-equiv=refresh: 5;URL=cppcoreguidelines-special-member-functions.html
+
+hicpp-special-member-functions
+==============================
+
+This check is an alias for `cppcoreguidelines-special-member-functions <cppcoreguidelines-special-member-functions.html>`_.
+Checks that special member functions have the correct signature, according to `rule 12.5.7 <http://www.codingstandard.com/rule/12-5-7-declare-assignment-operators-with-the-ref-qualifier/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-static-assert.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-static-assert.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-static-assert.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-static-assert.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-static-assert
+.. meta::
+   :http-equiv=refresh: 5;URL=misc-static-assert.html
+
+hicpp-static-assert
+===================
+
+The `hicpp-static-assert` check is an alias, please see
+`misc-static-assert <misc-static-assert.html>`_ for more information.
+It enforces the `rule 7.1.10 <http://www.codingstandard.com/rule/6-1-1-enclose-the-body-of-a-selection-or-an-iteration-statement-in-a-compound-statement/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-undelegated-constructor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-undelegated-constructor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-undelegated-constructor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-undelegated-constructor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,25 @@
+.. title:: clang-tidy - hicpp-undelegated-construtor
+.. meta::
+   :http-equiv=refresh: 5;URL=bugprone-undelegated-constructor.html
+
+hicpp-undelegated-constructor
+=============================
+
+This check is an alias for `bugprone-undelegated-constructor <bugprone-undelegated-constructor.html>`_.
+Partially implements `rule 12.4.5 <http://www.codingstandard.com/rule/12-4-5-use-delegating-constructors-to-reduce-code-duplication/>`_ 
+to find misplaced constructor calls inside a constructor.
+
+.. code-block:: c++
+
+  struct Ctor {
+    Ctor();
+    Ctor(int);
+    Ctor(int, int);
+    Ctor(Ctor *i) {
+      // All Ctor() calls result in a temporary object
+      Ctor(); // did you intend to call a delegated constructor? 
+      Ctor(0); // did you intend to call a delegated constructor?
+      Ctor(1, 2); // did you intend to call a delegated constructor?
+      foo();
+    }
+  };

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-uppercase-literal-suffix.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-uppercase-literal-suffix.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-uppercase-literal-suffix.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-uppercase-literal-suffix.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - hicpp-uppercase-literal-suffix
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-uppercase-literal-suffix.html
+
+hicpp-uppercase-literal-suffix
+==============================
+
+The hicpp-uppercase-literal-suffix check is an alias, please see
+`readability-uppercase-literal-suffix <readability-uppercase-literal-suffix.html>`_ for more information.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-auto.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-auto.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-auto.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-auto.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-auto
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-auto.html
+
+hicpp-use-auto
+==============
+
+The `hicpp-use-auto` check is an alias, please see
+`modernize-use-auto <modernize-use-auto.html>`_ for more information.
+It enforces the `rule 7.1.8 <http://www.codingstandard.com/rule/7-1-8-use-auto-id-expr-when-declaring-a-variable-to-have-the-same-type-as-its-initializer-function-call/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-emplace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-emplace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-emplace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-emplace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-emplace
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-emplace.html
+
+hicpp-use-emplace
+=================
+
+The `hicpp-use-emplace` check is an alias, please see
+`modernize-use-emplace <modernize-use-emplace.html>`_ for more information.
+It enforces the `rule 17.4.2 <http://www.codingstandard.com/rule/17-4-2-use-api-calls-that-construct-objects-in-place/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-default.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-default.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-default.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-default.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - hicpp-use-equals-defaults
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-equals-default.html
+
+hicpp-use-equals-default
+========================
+
+This check is an alias for `modernize-use-equals-default <modernize-use-equals-default.html>`_.
+Implements `rule 12.5.1 <http://www.codingstandard.com/rule/12-5-1-define-explicitly-default-or-delete-implicit-special-member-functions-of-concrete-classes/>`_ to explicitly default special member functions.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-delete.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-delete.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-delete.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-equals-delete.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-equals-delete
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-equals-delete.html
+
+hicpp-use-equals-delete
+=======================
+
+This check is an alias for `modernize-use-equals-delete <modernize-use-equals-delete.html>`_.
+Implements `rule 12.5.1 <http://www.codingstandard.com/rule/12-5-1-define-explicitly-default-or-delete-implicit-special-member-functions-of-concrete-classes/>`_ 
+to explicitly default or delete special member functions.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-noexcept.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-noexcept.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-noexcept.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-noexcept.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-noexcept
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-noexcept.html
+
+hicpp-use-noexcept
+==================
+
+The `hicpp-use-noexcept` check is an alias, please see
+`modernize-use-noexcept <modernize-use-noexcept.html>`_ for more information.
+It enforces the `rule 1.3.5 <http://www.codingstandard.com/rule/1-3-5-do-not-use-throw-exception-specifications/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-nullptr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-nullptr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-nullptr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-nullptr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-nullptr
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-nullptr.html
+
+hicpp-use-nullptr
+=================
+
+The `hicpp-use-nullptr` check is an alias, please see
+`modernize-use-nullptr <modernize-use-nullptr.html>`_ for more information.
+It enforces the `rule 2.5.3 <http://www.codingstandard.com/rule/2-5-3-use-nullptr-for-the-null-pointer-constant/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-override.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-override.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-override.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-use-override.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - hicpp-use-override
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-override.html
+
+hicpp-use-override
+==================
+
+This check is an alias for `modernize-use-override <modernize-use-override.html>`_.
+Implements `rule 10.2.1 <http://www.codingstandard.com/section/10-2-virtual-functions/>`_ to 
+declare a virtual function `override` when overriding.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-vararg.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-vararg.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-vararg.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/hicpp-vararg.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+.. title:: clang-tidy - hicpp-vararg
+.. meta::
+   :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-type-vararg.html
+
+hicpp-vararg
+============
+
+The `hicpp-vararg` check is an alias, please see
+`cppcoreguidelines-pro-type-vararg <cppcoreguidelines-pro-type-vararg.html>`_
+for more information.
+It enforces the `rule 14.1.1 <http://www.codingstandard.com/section/14-1-template-declarations/>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/list.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/list.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/list.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/list.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,268 @@
+.. title:: clang-tidy - Clang-Tidy Checks
+
+Clang-Tidy Checks
+=================
+
+.. toctree::
+   abseil-duration-comparison
+   abseil-duration-division
+   abseil-duration-factory-float
+   abseil-duration-factory-scale
+   abseil-duration-subtraction
+   abseil-faster-strsplit-delimiter
+   abseil-no-internal-dependencies
+   abseil-no-namespace
+   abseil-redundant-strcat-calls
+   abseil-str-cat-append
+   abseil-string-find-startswith
+   abseil-upgrade-duration-conversions
+   android-cloexec-accept
+   android-cloexec-accept4
+   android-cloexec-creat
+   android-cloexec-dup
+   android-cloexec-epoll-create
+   android-cloexec-epoll-create1
+   android-cloexec-fopen
+   android-cloexec-inotify-init
+   android-cloexec-inotify-init1
+   android-cloexec-memfd-create
+   android-cloexec-open
+   android-cloexec-socket
+   android-comparison-in-temp-failure-retry
+   boost-use-to-string
+   bugprone-argument-comment
+   bugprone-assert-side-effect
+   bugprone-bool-pointer-implicit-conversion
+   bugprone-copy-constructor-init
+   bugprone-dangling-handle
+   bugprone-exception-escape
+   bugprone-fold-init-type
+   bugprone-forward-declaration-namespace
+   bugprone-forwarding-reference-overload
+   bugprone-inaccurate-erase
+   bugprone-incorrect-roundings
+   bugprone-integer-division
+   bugprone-lambda-function-name
+   bugprone-macro-parentheses
+   bugprone-macro-repeated-side-effects
+   bugprone-misplaced-operator-in-strlen-in-alloc
+   bugprone-misplaced-widening-cast
+   bugprone-move-forwarding-reference
+   bugprone-multiple-statement-macro
+   bugprone-parent-virtual-call
+   bugprone-sizeof-container
+   bugprone-sizeof-expression
+   bugprone-string-constructor
+   bugprone-string-integer-assignment
+   bugprone-string-literal-with-embedded-nul
+   bugprone-suspicious-enum-usage
+   bugprone-suspicious-memset-usage
+   bugprone-suspicious-missing-comma
+   bugprone-suspicious-semicolon
+   bugprone-suspicious-string-compare
+   bugprone-swapped-arguments
+   bugprone-terminating-continue
+   bugprone-throw-keyword-missing
+   bugprone-too-small-loop-variable
+   bugprone-undefined-memory-manipulation
+   bugprone-undelegated-constructor
+   bugprone-unused-raii
+   bugprone-unused-return-value
+   bugprone-use-after-move
+   bugprone-virtual-near-miss
+   cert-dcl03-c (redirects to misc-static-assert) <cert-dcl03-c>
+   cert-dcl16-c (redirects to readability-uppercase-literal-suffix) <cert-dcl16-c>
+   cert-dcl21-cpp
+   cert-dcl50-cpp
+   cert-dcl54-cpp (redirects to misc-new-delete-overloads) <cert-dcl54-cpp>
+   cert-dcl58-cpp
+   cert-dcl59-cpp (redirects to google-build-namespaces) <cert-dcl59-cpp>
+   cert-env33-c
+   cert-err09-cpp (redirects to misc-throw-by-value-catch-by-reference) <cert-err09-cpp>
+   cert-err34-c
+   cert-err52-cpp
+   cert-err58-cpp
+   cert-err60-cpp
+   cert-err61-cpp (redirects to misc-throw-by-value-catch-by-reference) <cert-err61-cpp>
+   cert-fio38-c (redirects to misc-non-copyable-objects) <cert-fio38-c>
+   cert-flp30-c
+   cert-msc30-c (redirects to cert-msc50-cpp) <cert-msc30-c>
+   cert-msc32-c (redirects to cert-msc51-cpp) <cert-msc32-c>
+   cert-msc50-cpp
+   cert-msc51-cpp
+   cert-oop11-cpp (redirects to performance-move-constructor-init) <cert-oop11-cpp>
+   cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) <cppcoreguidelines-avoid-c-arrays>
+   cppcoreguidelines-avoid-goto
+   cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers) <cppcoreguidelines-avoid-magic-numbers>
+   cppcoreguidelines-c-copy-assignment-signature (redirects to misc-unconventional-assign-operator) <cppcoreguidelines-c-copy-assignment-signature>
+   cppcoreguidelines-interfaces-global-init
+   cppcoreguidelines-macro-usage
+   cppcoreguidelines-narrowing-conversions
+   cppcoreguidelines-no-malloc
+   cppcoreguidelines-non-private-member-variables-in-classes (redirects to misc-non-private-member-variables-in-classes) <cppcoreguidelines-non-private-member-variables-in-classes>
+   cppcoreguidelines-owning-memory
+   cppcoreguidelines-pro-bounds-array-to-pointer-decay
+   cppcoreguidelines-pro-bounds-constant-array-index
+   cppcoreguidelines-pro-bounds-pointer-arithmetic
+   cppcoreguidelines-pro-type-const-cast
+   cppcoreguidelines-pro-type-cstyle-cast
+   cppcoreguidelines-pro-type-member-init
+   cppcoreguidelines-pro-type-reinterpret-cast
+   cppcoreguidelines-pro-type-static-cast-downcast
+   cppcoreguidelines-pro-type-union-access
+   cppcoreguidelines-pro-type-vararg
+   cppcoreguidelines-slicing
+   cppcoreguidelines-special-member-functions
+   fuchsia-default-arguments
+   fuchsia-header-anon-namespaces (redirects to google-build-namespaces) <fuchsia-header-anon-namespaces>
+   fuchsia-multiple-inheritance
+   fuchsia-overloaded-operator
+   fuchsia-restrict-system-includes
+   fuchsia-statically-constructed-objects
+   fuchsia-trailing-return
+   fuchsia-virtual-inheritance
+   google-build-explicit-make-pair
+   google-build-namespaces
+   google-build-using-namespace
+   google-default-arguments
+   google-explicit-constructor
+   google-global-names-in-headers
+   google-objc-avoid-throwing-exception
+   google-objc-function-naming
+   google-objc-global-variable-declaration
+   google-readability-braces-around-statements (redirects to readability-braces-around-statements) <google-readability-braces-around-statements>
+   google-readability-casting
+   google-readability-function-size (redirects to readability-function-size) <google-readability-function-size>
+   google-readability-namespace-comments (redirects to llvm-namespace-comment) <google-readability-namespace-comments>
+   google-readability-todo
+   google-runtime-int
+   google-runtime-operator
+   google-runtime-references
+   hicpp-avoid-c-arrays (redirects to modernize-avoid-c-arrays) <hicpp-avoid-c-arrays>
+   hicpp-avoid-goto
+   hicpp-braces-around-statements (redirects to readability-braces-around-statements) <hicpp-braces-around-statements>
+   hicpp-deprecated-headers (redirects to modernize-deprecated-headers) <hicpp-deprecated-headers>
+   hicpp-exception-baseclass
+   hicpp-explicit-conversions (redirects to google-explicit-constructor) <hicpp-explicit-conversions>
+   hicpp-function-size (redirects to readability-function-size) <hicpp-function-size>
+   hicpp-invalid-access-moved (redirects to bugprone-use-after-move) <hicpp-invalid-access-moved>
+   hicpp-member-init (redirects to cppcoreguidelines-pro-type-member-init) <hicpp-member-init>
+   hicpp-move-const-arg (redirects to performance-move-const-arg) <hicpp-move-const-arg>
+   hicpp-multiway-paths-covered
+   hicpp-named-parameter (redirects to readability-named-parameter) <hicpp-named-parameter>
+   hicpp-new-delete-operators (redirects to misc-new-delete-overloads) <hicpp-new-delete-operators>
+   hicpp-no-array-decay (redirects to cppcoreguidelines-pro-bounds-array-to-pointer-decay) <hicpp-no-array-decay>
+   hicpp-no-assembler
+   hicpp-no-malloc (redirects to cppcoreguidelines-no-malloc) <hicpp-no-malloc>
+   hicpp-noexcept-move (redirects to misc-noexcept-moveconstructor) <hicpp-noexcept-move>
+   hicpp-signed-bitwise
+   hicpp-special-member-functions (redirects to cppcoreguidelines-special-member-functions) <hicpp-special-member-functions>
+   hicpp-static-assert (redirects to misc-static-assert) <hicpp-static-assert>
+   hicpp-undelegated-constructor (redirects to bugprone-undelegated-constructor) <hicpp-undelegated-constructor>
+   hicpp-uppercase-literal-suffix (redirects to readability-uppercase-literal-suffix) <hicpp-uppercase-literal-suffix>
+   hicpp-use-auto (redirects to modernize-use-auto) <hicpp-use-auto>
+   hicpp-use-emplace (redirects to modernize-use-emplace) <hicpp-use-emplace>
+   hicpp-use-equals-default (redirects to modernize-use-equals-default) <hicpp-use-equals-default>
+   hicpp-use-equals-delete (redirects to modernize-use-equals-delete) <hicpp-use-equals-delete>
+   hicpp-use-noexcept (redirects to modernize-use-noexcept) <hicpp-use-noexcept>
+   hicpp-use-nullptr (redirects to modernize-use-nullptr) <hicpp-use-nullptr>
+   hicpp-use-override (redirects to modernize-use-override) <hicpp-use-override>
+   hicpp-vararg (redirects to cppcoreguidelines-pro-type-vararg) <hicpp-vararg>
+   llvm-header-guard
+   llvm-include-order
+   llvm-namespace-comment
+   llvm-twine-local
+   misc-definitions-in-headers
+   misc-misplaced-const
+   misc-new-delete-overloads
+   misc-non-copyable-objects
+   misc-non-private-member-variables-in-classes
+   misc-redundant-expression
+   misc-static-assert
+   misc-throw-by-value-catch-by-reference
+   misc-unconventional-assign-operator
+   misc-uniqueptr-reset-release
+   misc-unused-alias-decls
+   misc-unused-parameters
+   misc-unused-using-decls
+   modernize-avoid-bind
+   modernize-avoid-c-arrays
+   modernize-concat-nested-namespaces
+   modernize-deprecated-headers
+   modernize-deprecated-ios-base-aliases
+   modernize-loop-convert
+   modernize-make-shared
+   modernize-make-unique
+   modernize-pass-by-value
+   modernize-raw-string-literal
+   modernize-redundant-void-arg
+   modernize-replace-auto-ptr
+   modernize-replace-random-shuffle
+   modernize-return-braced-init-list
+   modernize-shrink-to-fit
+   modernize-unary-static-assert
+   modernize-use-auto
+   modernize-use-bool-literals
+   modernize-use-default-member-init
+   modernize-use-emplace
+   modernize-use-equals-default
+   modernize-use-equals-delete
+   modernize-use-nodiscard
+   modernize-use-noexcept
+   modernize-use-nullptr
+   modernize-use-override
+   modernize-use-transparent-functors
+   modernize-use-uncaught-exceptions
+   modernize-use-using
+   mpi-buffer-deref
+   mpi-type-mismatch
+   objc-avoid-nserror-init
+   objc-avoid-spinlock
+   objc-forbidden-subclassing
+   objc-property-declaration
+   performance-faster-string-find
+   performance-for-range-copy
+   performance-implicit-conversion-in-loop
+   performance-inefficient-algorithm
+   performance-inefficient-string-concatenation
+   performance-inefficient-vector-operation
+   performance-move-const-arg
+   performance-move-constructor-init
+   performance-noexcept-move-constructor
+   performance-type-promotion-in-math-fn
+   performance-unnecessary-copy-initialization
+   performance-unnecessary-value-param
+   portability-simd-intrinsics
+   readability-avoid-const-params-in-decls
+   readability-braces-around-statements
+   readability-const-return-type
+   readability-container-size-empty
+   readability-delete-null-pointer
+   readability-deleted-default
+   readability-else-after-return
+   readability-function-size
+   readability-identifier-naming
+   readability-implicit-bool-conversion
+   readability-inconsistent-declaration-parameter-name
+   readability-isolate-declaration
+   readability-magic-numbers
+   readability-misleading-indentation
+   readability-misplaced-array-index
+   readability-named-parameter
+   readability-non-const-parameter
+   readability-redundant-control-flow
+   readability-redundant-declaration
+   readability-redundant-function-ptr-dereference
+   readability-redundant-member-init
+   readability-redundant-preprocessor
+   readability-redundant-smartptr-get
+   readability-redundant-string-cstr
+   readability-redundant-string-init
+   readability-simplify-boolean-expr
+   readability-simplify-subscript-expr
+   readability-static-accessed-through-instance
+   readability-static-definition-in-anonymous-namespace
+   readability-string-compare
+   readability-uniqueptr-delete-release
+   readability-uppercase-literal-suffix
+   zircon-temporary-objects

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-header-guard.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-header-guard.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-header-guard.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-header-guard.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - llvm-header-guard
+
+llvm-header-guard
+=================
+
+Finds and fixes header guards that do not adhere to LLVM style.
+
+Options
+-------
+
+.. option:: HeaderFileExtensions
+
+   A comma-separated list of filename extensions of header files (the filename
+   extensions should not include "." prefix). Default is "h,hh,hpp,hxx".
+   For header files without an extension, use an empty string (if there are no
+   other desired extensions) or leave an empty element in the list. e.g.,
+   "h,hh,hpp,hxx," (note the trailing comma).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-include-order.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-include-order.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-include-order.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-include-order.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - llvm-include-order
+
+llvm-include-order
+==================
+
+
+Checks the correct order of ``#includes``.
+
+See http://llvm.org/docs/CodingStandards.html#include-style

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-namespace-comment.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-namespace-comment.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-namespace-comment.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-namespace-comment.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,41 @@
+.. title:: clang-tidy - llvm-namespace-comment
+
+llvm-namespace-comment
+======================
+
+`google-readability-namespace-comments` redirects here as an alias for this
+check.
+
+Checks that long namespaces have a closing comment.
+
+http://llvm.org/docs/CodingStandards.html#namespace-indentation
+
+https://google.github.io/styleguide/cppguide.html#Namespaces
+
+.. code-block:: c++
+
+  namespace n1 {
+  void f();
+  }
+
+  // becomes
+
+  namespace n1 {
+  void f();
+  }  // namespace n1
+
+
+Options
+-------
+
+.. option:: ShortNamespaceLines
+
+   Requires the closing brace of the namespace definition to be followed by a
+   closing comment if the body of the namespace has more than
+   `ShortNamespaceLines` lines of code. The value is an unsigned integer that
+   defaults to `1U`.
+
+.. option:: SpacesBeforeComments
+
+   An unsigned integer specifying the number of spaces before the comment
+   closing a namespace definition. Default is `1U`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-twine-local.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-twine-local.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-twine-local.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/llvm-twine-local.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - llvm-twine-local
+
+llvm-twine-local
+================
+
+
+Looks for local ``Twine`` variables which are prone to use after frees and
+should be generally avoided.
+
+.. code-block:: c++
+
+  static Twine Moo = Twine("bark") + "bah";
+
+  // becomes
+
+  static std::string Moo = (Twine("bark") + "bah").str();

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-definitions-in-headers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-definitions-in-headers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-definitions-in-headers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-definitions-in-headers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,100 @@
+.. title:: clang-tidy - misc-definitions-in-headers
+
+misc-definitions-in-headers
+===========================
+
+Finds non-extern non-inline function and variable definitions in header files,
+which can lead to potential ODR violations in case these headers are included
+from multiple translation units.
+
+.. code-block:: c++
+
+   // Foo.h
+   int a = 1; // Warning: variable definition.
+   extern int d; // OK: extern variable.
+
+   namespace N {
+     int e = 2; // Warning: variable definition.
+   }
+
+   // Warning: variable definition.
+   const char* str = "foo";
+
+   // OK: internal linkage variable definitions are ignored for now.
+   // Although these might also cause ODR violations, we can be less certain and
+   // should try to keep the false-positive rate down.
+   static int b = 1;
+   const int c = 1;
+   const char* const str2 = "foo";
+   constexpr int k = 1;
+
+   // Warning: function definition.
+   int g() {
+     return 1;
+   }
+
+   // OK: inline function definition is allowed to be defined multiple times.
+   inline int e() {
+     return 1;
+   }
+
+   class A {
+   public:
+     int f1() { return 1; } // OK: implicitly inline member function definition is allowed.
+     int f2();
+
+     static int d;
+   };
+
+   // Warning: not an inline member function definition.
+   int A::f2() { return 1; }
+
+   // OK: class static data member declaration is allowed.
+   int A::d = 1;
+
+   // OK: function template is allowed.
+   template<typename T>
+   T f3() {
+     T a = 1;
+     return a;
+   }
+
+   // Warning: full specialization of a function template is not allowed.
+   template <>
+   int f3() {
+     int a = 1;
+     return a;
+   }
+
+   template <typename T>
+   struct B {
+     void f1();
+   };
+
+   // OK: member function definition of a class template is allowed.
+   template <typename T>
+   void B<T>::f1() {}
+
+   class CE {
+     constexpr static int i = 5; // OK: inline variable definition.
+   };
+
+   inline int i = 5; // OK: inline variable definition.
+
+   constexpr int f10() { return 0; } // OK: constexpr function implies inline.
+
+Options
+-------
+
+.. option:: HeaderFileExtensions
+
+   A comma-separated list of filename extensions of header files (the filename
+   extensions should not include "." prefix). Default is "h,hh,hpp,hxx".
+   For header files without an extension, use an empty string (if there are no
+   other desired extensions) or leave an empty element in the list. e.g.,
+   "h,hh,hpp,hxx," (note the trailing comma).
+
+.. option:: UseHeaderFileExtension
+
+   When non-zero, the check will use the file extension to distinguish header
+   files. Default is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-misplaced-const.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-misplaced-const.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-misplaced-const.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-misplaced-const.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,22 @@
+.. title:: clang-tidy - misc-misplaced-const
+
+misc-misplaced-const
+====================
+
+This check diagnoses when a ``const`` qualifier is applied to a ``typedef`` to a
+pointer type rather than to the pointee, because such constructs are often
+misleading to developers because the ``const`` applies to the pointer rather
+than the pointee.
+
+For instance, in the following code, the resulting type is ``int *`` ``const``
+rather than ``const int *``:
+
+.. code-block:: c++
+
+  typedef int *int_ptr;
+  void f(const int_ptr ptr);
+
+The check does not diagnose when the underlying ``typedef`` type is a pointer to
+a ``const`` type or a function pointer type. This is because the ``const``
+qualifier is less likely to be mistaken because it would be redundant (or
+disallowed) on the underlying pointee type.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-new-delete-overloads.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-new-delete-overloads.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-new-delete-overloads.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-new-delete-overloads.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,19 @@
+.. title:: clang-tidy - misc-new-delete-overloads
+
+misc-new-delete-overloads
+=========================
+
+`cert-dcl54-cpp` redirects here as an alias for this check.
+
+The check flags overloaded operator ``new()`` and operator ``delete()``
+functions that do not have a corresponding free store function defined within
+the same scope.
+For instance, the check will flag a class implementation of a non-placement
+operator ``new()`` when the class does not also define a non-placement operator
+``delete()`` function as well.
+
+The check does not flag implicitly-defined operators, deleted or private
+operators, or placement operators.
+
+This check corresponds to CERT C++ Coding Standard rule `DCL54-CPP. Overload allocation and deallocation functions as a pair in the same scope
+<https://www.securecoding.cert.org/confluence/display/cplusplus/DCL54-CPP.+Overload+allocation+and+deallocation+functions+as+a+pair+in+the+same+scope>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-copyable-objects.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-copyable-objects.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-copyable-objects.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-copyable-objects.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - misc-non-copyable-objects
+
+misc-non-copyable-objects
+=========================
+
+`cert-fio38-c` redirects here as an alias for this check.
+
+The check flags dereferences and non-pointer declarations of objects that are
+not meant to be passed by value, such as C FILE objects or POSIX
+``pthread_mutex_t`` objects.
+
+This check corresponds to CERT C++ Coding Standard rule `FIO38-C. Do not copy a FILE object
+<https://www.securecoding.cert.org/confluence/display/c/FIO38-C.+Do+not+copy+a+FILE+object>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-private-member-variables-in-classes.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-private-member-variables-in-classes.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-private-member-variables-in-classes.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-non-private-member-variables-in-classes.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - misc-non-private-member-variables-in-classes
+
+misc-non-private-member-variables-in-classes
+============================================
+
+`cppcoreguidelines-non-private-member-variables-in-classes` redirects here
+as an alias for this check.
+
+Finds classes that contain non-static data members in addition to user-declared
+non-static member functions and diagnose all data members declared with a
+non-``public`` access specifier. The data members should be declared as
+``private`` and accessed through member functions instead of exposed to derived
+classes or class consumers.
+
+Options
+-------
+
+.. option:: IgnoreClassesWithAllMemberVariablesBeingPublic
+
+   Allows to completely ignore classes if **all** the member variables in that
+   class a declared with a ``public`` access specifier.
+
+.. option:: IgnorePublicMemberVariables
+
+   Allows to ignore (not diagnose) **all** the member variables declared with
+   a ``public`` access specifier.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-redundant-expression.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-redundant-expression.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-redundant-expression.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-redundant-expression.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,25 @@
+.. title:: clang-tidy - misc-redundant-expression
+
+misc-redundant-expression
+=========================
+
+Detect redundant expressions which are typically errors due to copy-paste.
+
+Depending on the operator expressions may be
+
+- redundant,
+
+- always ``true``,
+
+- always ``false``,
+
+- always a constant (zero or one).
+
+Examples:
+
+.. code-block:: c++
+
+  ((x+1) | (x+1))             // (x+1) is redundant
+  (p->x == p->x)              // always true
+  (p->x < p->x)               // always false
+  (speed - speed + 1 == 12)   // speed - speed is always zero

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-static-assert.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-static-assert.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-static-assert.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-static-assert.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - misc-static-assert
+
+misc-static-assert
+==================
+
+`cert-dcl03-c` redirects here as an alias for this check.
+
+Replaces ``assert()`` with ``static_assert()`` if the condition is evaluatable
+at compile time.
+
+The condition of ``static_assert()`` is evaluated at compile time which is
+safer and more efficient.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-throw-by-value-catch-by-reference.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-throw-by-value-catch-by-reference.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-throw-by-value-catch-by-reference.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-throw-by-value-catch-by-reference.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,34 @@
+.. title:: clang-tidy - misc-throw-by-value-catch-by-reference
+
+misc-throw-by-value-catch-by-reference
+======================================
+
+"cert-err09-cpp" redirects here as an alias for this check.
+"cert-err61-cpp" redirects here as an alias for this check.
+
+Finds violations of the rule "Throw by value, catch by reference" presented for
+example in "C++ Coding Standards" by H. Sutter and A. Alexandrescu.
+
+Exceptions:
+  * Throwing string literals will not be flagged despite being a pointer. They
+    are not susceptible to slicing and the usage of string literals is idomatic.
+  * Catching character pointers (``char``, ``wchar_t``, unicode character types)
+    will not be flagged to allow catching sting literals.
+  * Moved named values will not be flagged as not throwing an anonymous
+    temporary. In this case we can be sure that the user knows that the object
+    can't be accessed outside catch blocks handling the error.
+  * Throwing function parameters will not be flagged as not throwing an
+    anonymous temporary. This allows helper functions for throwing.
+  * Re-throwing caught exception variables will not be flragged as not throwing
+    an anonymous temporary. Although this can usually be done by just writing
+    ``throw;`` it happens often enough in real code.
+
+Options
+-------
+
+.. option:: CheckThrowTemporaries
+
+   Triggers detection of violations of the rule `Throw anonymous temporaries
+   <https://www.securecoding.cert.org/confluence/display/cplusplus/ERR09-CPP.+Throw+anonymous+temporaries>`_.
+   Default is `1`.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unconventional-assign-operator.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unconventional-assign-operator.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unconventional-assign-operator.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unconventional-assign-operator.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - misc-unconventional-assign-operator
+
+misc-unconventional-assign-operator
+===================================
+
+
+Finds declarations of assign operators with the wrong return and/or argument
+types and definitions with good return type but wrong ``return`` statements.
+
+  * The return type must be ``Class&``.
+  * Works with move-assign and assign by value.
+  * Private and deleted operators are ignored.
+  * The operator must always return ``*this``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-uniqueptr-reset-release.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-uniqueptr-reset-release.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-uniqueptr-reset-release.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-uniqueptr-reset-release.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - misc-uniqueptr-reset-release
+
+misc-uniqueptr-reset-release
+============================
+
+Find and replace ``unique_ptr::reset(release())`` with ``std::move()``.
+
+Example:
+
+.. code-block:: c++
+
+  std::unique_ptr<Foo> x, y;
+  x.reset(y.release()); -> x = std::move(y);
+
+If ``y`` is already rvalue, ``std::move()`` is not added. ``x`` and ``y`` can
+also be ``std::unique_ptr<Foo>*``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-alias-decls.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-alias-decls.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-alias-decls.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-alias-decls.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,7 @@
+.. title:: clang-tidy - misc-unused-alias-decls
+
+misc-unused-alias-decls
+=======================
+
+
+Finds unused namespace alias declarations.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-parameters.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-parameters.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-parameters.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-parameters.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,42 @@
+.. title:: clang-tidy - misc-unused-parameters
+
+misc-unused-parameters
+======================
+
+Finds unused function parameters. Unused parameters may signify a bug in the
+code (e.g. when a different parameter is used instead). The suggested fixes
+either comment parameter name out or remove the parameter completely, if all
+callers of the function are in the same translation unit and can be updated.
+
+The check is similar to the `-Wunused-parameter` compiler diagnostic and can be
+used to prepare a codebase to enabling of that diagnostic. By default the check
+is more permissive (see :option:`StrictMode`).
+
+.. code-block:: c++
+
+  void a(int i) { /*some code that doesn't use `i`*/ }
+
+  // becomes
+
+  void a(int  /*i*/) { /*some code that doesn't use `i`*/ }
+
+.. code-block:: c++
+
+  static void staticFunctionA(int i);
+  static void staticFunctionA(int i) { /*some code that doesn't use `i`*/ }
+
+  // becomes
+
+  static void staticFunctionA()
+  static void staticFunctionA() { /*some code that doesn't use `i`*/ }
+
+Options
+-------
+
+.. option:: StrictMode
+
+   When zero (default value), the check will ignore trivially unused parameters,
+   i.e. when the corresponding function has an empty body (and in case of
+   constructors - no constructor initializers). When the function body is empty,
+   an unused parameter is unlikely to be unnoticed by a human reader, and
+   there's basically no place for a bug to hide.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-using-decls.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-using-decls.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-using-decls.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/misc-unused-using-decls.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - misc-unused-using-decls
+
+misc-unused-using-decls
+=======================
+
+Finds unused ``using`` declarations.
+
+Example:
+
+.. code-block:: c++
+
+  namespace n { class C; }
+  using n::C;  // Never actually used.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-bind.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-bind.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-bind.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-bind.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,37 @@
+.. title:: clang-tidy - modernize-avoid-bind
+
+modernize-avoid-bind
+====================
+
+The check finds uses of ``std::bind`` and replaces simple uses with lambdas.
+Lambdas will use value-capture where required.
+
+Right now it only handles free functions, not member functions.
+
+Given:
+
+.. code-block:: c++
+
+  int add(int x, int y) { return x + y; }
+
+Then:
+
+.. code-block:: c++
+
+  void f() {
+    int x = 2;
+    auto clj = std::bind(add, x, _1);
+  }
+
+is replaced by:
+
+.. code-block:: c++
+
+  void f() {
+    int x = 2;
+    auto clj = [=](auto && arg1) { return add(x, arg1); };
+  }
+
+``std::bind`` can be hard to read and can result in larger object files and
+binaries due to type information that will not be produced by equivalent
+lambdas.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-c-arrays.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-c-arrays.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-c-arrays.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-avoid-c-arrays.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,60 @@
+.. title:: clang-tidy - modernize-avoid-c-arrays
+
+modernize-avoid-c-arrays
+========================
+
+`cppcoreguidelines-avoid-c-arrays` redirects here as an alias for this check.
+
+`hicpp-avoid-c-arrays` redirects here as an alias for this check.
+
+Finds C-style array types and recommend to use ``std::array<>`` /
+``std::vector<>``. All types of C arrays are diagnosed.
+
+However, fix-it are potentially dangerous in header files and are therefore not
+emitted right now.
+
+.. code:: c++
+
+  int a[] = {1, 2}; // warning: do not declare C-style arrays, use std::array<> instead
+
+  int b[1]; // warning: do not declare C-style arrays, use std::array<> instead
+
+  void foo() {
+    int c[b[0]]; // warning: do not declare C VLA arrays, use std::vector<> instead
+  }
+
+  template <typename T, int Size>
+  class array {
+    T d[Size]; // warning: do not declare C-style arrays, use std::array<> instead
+
+    int e[1]; // warning: do not declare C-style arrays, use std::array<> instead
+  };
+
+  array<int[4], 2> d; // warning: do not declare C-style arrays, use std::array<> instead
+
+  using k = int[4]; // warning: do not declare C-style arrays, use std::array<> instead
+
+
+However, the ``extern "C"`` code is ignored, since it is common to share
+such headers between C code, and C++ code.
+
+.. code:: c++
+
+  // Some header
+  extern "C" {
+
+  int f[] = {1, 2}; // not diagnosed
+
+  int j[1]; // not diagnosed
+
+  inline void bar() {
+    {
+      int j[j[0]]; // not diagnosed
+    }
+  }
+
+  }
+
+Similarly, the ``main()`` function is ignored. Its second and third parameters
+can be either ``char* argv[]`` or ``char** argv``, but can not be
+``std::array<>``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-concat-nested-namespaces.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-concat-nested-namespaces.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-concat-nested-namespaces.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-concat-nested-namespaces.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - modernize-concat-nested-namespaces
+
+modernize-concat-nested-namespaces
+==================================
+
+Checks for use of nested namespaces such as ``namespace a { namespace b { ... } }``
+and suggests changing to the more concise syntax introduced in C++17: ``namespace a::b { ... }``.
+Inline namespaces are not modified.
+
+For example:
+
+.. code-block:: c++
+
+  namespace n1 {
+  namespace n2 {
+  void t();
+  }
+  }
+
+  namespace n3 {
+  namespace n4 {
+  namespace n5 {
+  void t();
+  }
+  }
+  namespace n6 {
+  namespace n7 {
+  void t();
+  }
+  }
+  }
+
+Will be modified to:
+
+.. code-block:: c++
+
+  namespace n1::n2 {
+  void t();
+  }
+
+  namespace n3 {
+  namespace n4::n5 {
+  void t();
+  }
+  namespace n6::n7 {
+  void t();
+  }
+  }
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-headers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-headers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-headers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-headers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - modernize-deprecated-headers
+
+modernize-deprecated-headers
+============================
+
+Some headers from C library were deprecated in C++ and are no longer welcome in
+C++ codebases. Some have no effect in C++. For more details refer to the C++ 14
+Standard [depr.c.headers] section.
+
+This check replaces C standard library headers with their C++ alternatives and
+removes redundant ones.
+
+Improtant note: the Standard doesn't guarantee that the C++ headers declare all
+the same functions in the global namespace. The check in its current form can
+break the code that uses library symbols from the global namespace.
+
+* `<assert.h>`
+* `<complex.h>`
+* `<ctype.h>`
+* `<errno.h>`
+* `<fenv.h>`     // deprecated since C++11
+* `<float.h>`
+* `<inttypes.h>`
+* `<limits.h>`
+* `<locale.h>`
+* `<math.h>`
+* `<setjmp.h>`
+* `<signal.h>`
+* `<stdarg.h>`
+* `<stddef.h>`
+* `<stdint.h>`
+* `<stdio.h>`
+* `<stdlib.h>`
+* `<string.h>`
+* `<tgmath.h>`   // deprecated since C++11
+* `<time.h>`
+* `<uchar.h>`    // deprecated since C++11
+* `<wchar.h>`
+* `<wctype.h>`
+
+If the specified standard is older than C++11 the check will only replace
+headers deprecated before C++11, otherwise -- every header that appeared in
+the previous list.
+
+These headers don't have effect in C++:
+
+* `<iso646.h>`
+* `<stdalign.h>`
+* `<stdbool.h>`

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-ios-base-aliases.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-ios-base-aliases.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-ios-base-aliases.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-deprecated-ios-base-aliases.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - modernize-deprecated-ios-base-aliases
+
+modernize-deprecated-ios-base-aliases
+=====================================
+
+Detects usage of the deprecated member types of ``std::ios_base`` and replaces
+those that have a non-deprecated equivalent.
+
+===================================  ===========================
+Deprecated member type               Replacement
+===================================  ===========================
+``std::ios_base::io_state``          ``std::ios_base::iostate``
+``std::ios_base::open_mode``         ``std::ios_base::openmode``
+``std::ios_base::seek_dir``          ``std::ios_base::seekdir``
+``std::ios_base::streamoff``          
+``std::ios_base::streampos``         
+===================================  ===========================

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-loop-convert.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-loop-convert.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-loop-convert.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-loop-convert.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,255 @@
+.. title:: clang-tidy - modernize-loop-convert
+
+modernize-loop-convert
+======================
+
+This check converts ``for(...; ...; ...)`` loops to use the new range-based
+loops in C++11.
+
+Three kinds of loops can be converted:
+
+-  Loops over statically allocated arrays.
+-  Loops over containers, using iterators.
+-  Loops over array-like containers, using ``operator[]`` and ``at()``.
+
+MinConfidence option
+--------------------
+
+risky
+^^^^^
+
+In loops where the container expression is more complex than just a
+reference to a declared expression (a variable, function, enum, etc.),
+and some part of it appears elsewhere in the loop, we lower our confidence
+in the transformation due to the increased risk of changing semantics.
+Transformations for these loops are marked as `risky`, and thus will only
+be converted if the minimum required confidence level is set to `risky`.
+
+.. code-block:: c++
+
+  int arr[10][20];
+  int l = 5;
+
+  for (int j = 0; j < 20; ++j)
+    int k = arr[l][j] + l; // using l outside arr[l] is considered risky
+
+  for (int i = 0; i < obj.getVector().size(); ++i)
+    obj.foo(10); // using 'obj' is considered risky
+
+See
+:ref:`Range-based loops evaluate end() only once<IncorrectRiskyTransformation>`
+for an example of an incorrect transformation when the minimum required confidence
+level is set to `risky`.
+
+reasonable (Default)
+^^^^^^^^^^^^^^^^^^^^
+
+If a loop calls ``.end()`` or ``.size()`` after each iteration, the
+transformation for that loop is marked as `reasonable`, and thus will
+be converted if the required confidence level is set to `reasonable`
+(default) or lower.
+
+.. code-block:: c++
+
+  // using size() is considered reasonable
+  for (int i = 0; i < container.size(); ++i)
+    cout << container[i];
+
+safe
+^^^^
+
+Any other loops that do not match the above criteria to be marked as
+`risky` or `reasonable` are marked `safe`, and thus will be converted
+if the required confidence level is set to `safe` or lower.
+
+.. code-block:: c++
+
+  int arr[] = {1,2,3};
+
+  for (int i = 0; i < 3; ++i)
+    cout << arr[i];
+
+Example
+-------
+
+Original:
+
+.. code-block:: c++
+
+  const int N = 5;
+  int arr[] = {1,2,3,4,5};
+  vector<int> v;
+  v.push_back(1);
+  v.push_back(2);
+  v.push_back(3);
+
+  // safe conversion
+  for (int i = 0; i < N; ++i)
+    cout << arr[i];
+
+  // reasonable conversion
+  for (vector<int>::iterator it = v.begin(); it != v.end(); ++it)
+    cout << *it;
+
+  // reasonable conversion
+  for (int i = 0; i < v.size(); ++i)
+    cout << v[i];
+
+After applying the check with minimum confidence level set to `reasonable` (default):
+
+.. code-block:: c++
+
+  const int N = 5;
+  int arr[] = {1,2,3,4,5};
+  vector<int> v;
+  v.push_back(1);
+  v.push_back(2);
+  v.push_back(3);
+
+  // safe conversion
+  for (auto & elem : arr)
+    cout << elem;
+
+  // reasonable conversion
+  for (auto & elem : v)
+    cout << elem;
+
+  // reasonable conversion
+  for (auto & elem : v)
+    cout << elem;
+
+Limitations
+-----------
+
+There are certain situations where the tool may erroneously perform
+transformations that remove information and change semantics. Users of the tool
+should be aware of the behaviour and limitations of the check outlined by
+the cases below.
+
+Comments inside loop headers
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+Comments inside the original loop header are ignored and deleted when
+transformed.
+
+.. code-block:: c++
+
+  for (int i = 0; i < N; /* This will be deleted */ ++i) { }
+
+Range-based loops evaluate end() only once
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+The C++11 range-based for loop calls ``.end()`` only once during the
+initialization of the loop. If in the original loop ``.end()`` is called after
+each iteration the semantics of the transformed loop may differ.
+
+.. code-block:: c++
+
+  // The following is semantically equivalent to the C++11 range-based for loop,
+  // therefore the semantics of the header will not change.
+  for (iterator it = container.begin(), e = container.end(); it != e; ++it) { }
+
+  // Instead of calling .end() after each iteration, this loop will be
+  // transformed to call .end() only once during the initialization of the loop,
+  // which may affect semantics.
+  for (iterator it = container.begin(); it != container.end(); ++it) { }
+
+.. _IncorrectRiskyTransformation:
+
+As explained above, calling member functions of the container in the body
+of the loop is considered `risky`. If the called member function modifies the
+container the semantics of the converted loop will differ due to ``.end()``
+being called only once.
+
+.. code-block:: c++
+
+  bool flag = false;
+  for (vector<T>::iterator it = vec.begin(); it != vec.end(); ++it) {
+    // Add a copy of the first element to the end of the vector.
+    if (!flag) {
+      // This line makes this transformation 'risky'.
+      vec.push_back(*it);
+      flag = true;
+    }
+    cout << *it;
+  }
+
+The original code above prints out the contents of the container including the
+newly added element while the converted loop, shown below, will only print the
+original contents and not the newly added element.
+
+.. code-block:: c++
+
+  bool flag = false;
+  for (auto & elem : vec) {
+    // Add a copy of the first element to the end of the vector.
+    if (!flag) {
+      // This line makes this transformation 'risky'
+      vec.push_back(elem);
+      flag = true;
+    }
+    cout << elem;
+  }
+
+Semantics will also be affected if ``.end()`` has side effects. For example, in
+the case where calls to ``.end()`` are logged the semantics will change in the
+transformed loop if ``.end()`` was originally called after each iteration.
+
+.. code-block:: c++
+
+  iterator end() {
+    num_of_end_calls++;
+    return container.end();
+  }
+
+Overloaded operator->() with side effects
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+Similarly, if ``operator->()`` was overloaded to have side effects, such as
+logging, the semantics will change. If the iterator's ``operator->()`` was used
+in the original loop it will be replaced with ``<container element>.<member>``
+instead due to the implicit dereference as part of the range-based for loop.
+Therefore any side effect of the overloaded ``operator->()`` will no longer be
+performed.
+
+.. code-block:: c++
+
+  for (iterator it = c.begin(); it != c.end(); ++it) {
+    it->func(); // Using operator->()
+  }
+  // Will be transformed to:
+  for (auto & elem : c) {
+    elem.func(); // No longer using operator->()
+  }
+
+Pointers and references to containers
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+While most of the check's risk analysis is dedicated to determining whether
+the iterator or container was modified within the loop, it is possible to
+circumvent the analysis by accessing and modifying the container through a
+pointer or reference.
+
+If the container were directly used instead of using the pointer or reference
+the following transformation would have only been applied at the `risky`
+level since calling a member function of the container is considered `risky`.
+The check cannot identify expressions associated with the container that are
+different than the one used in the loop header, therefore the transformation
+below ends up being performed at the `safe` level.
+
+.. code-block:: c++
+
+  vector<int> vec;
+
+  vector<int> *ptr = &vec;
+  vector<int> &ref = vec;
+
+  for (vector<int>::iterator it = vec.begin(), e = vec.end(); it != e; ++it) {
+    if (!flag) {
+      // Accessing and modifying the container is considered risky, but the risk
+      // level is not raised here.
+      ptr->push_back(*it);
+      ref.push_back(*it);
+      flag = true;
+    }
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-shared.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-shared.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-shared.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-shared.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,50 @@
+.. title:: clang-tidy - modernize-make-shared
+
+modernize-make-shared
+=====================
+
+This check finds the creation of ``std::shared_ptr`` objects by explicitly
+calling the constructor and a ``new`` expression, and replaces it with a call
+to ``std::make_shared``.
+
+.. code-block:: c++
+
+  auto my_ptr = std::shared_ptr<MyPair>(new MyPair(1, 2));
+
+  // becomes
+
+  auto my_ptr = std::make_shared<MyPair>(1, 2);
+
+This check also finds calls to ``std::shared_ptr::reset()`` with a ``new``
+expression, and replaces it with a call to ``std::make_shared``.
+
+.. code-block:: c++
+
+  my_ptr.reset(new MyPair(1, 2));
+
+  // becomes
+
+  my_ptr = std::make_shared<MyPair>(1, 2);
+
+Options
+-------
+
+.. option:: MakeSmartPtrFunction
+
+   A string specifying the name of make-shared-ptr function. Default is
+   `std::make_shared`.
+
+.. option:: MakeSmartPtrFunctionHeader
+
+   A string specifying the corresponding header of make-shared-ptr function.
+   Default is `memory`.
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-unique.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-unique.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-unique.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-make-unique.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,50 @@
+.. title:: clang-tidy - modernize-make-unique
+
+modernize-make-unique
+=====================
+
+This check finds the creation of ``std::unique_ptr`` objects by explicitly
+calling the constructor and a ``new`` expression, and replaces it with a call
+to ``std::make_unique``, introduced in C++14.
+
+.. code-block:: c++
+
+  auto my_ptr = std::unique_ptr<MyPair>(new MyPair(1, 2));
+
+  // becomes
+
+  auto my_ptr = std::make_unique<MyPair>(1, 2);
+
+This check also finds calls to ``std::unique_ptr::reset()`` with a ``new``
+expression, and replaces it with a call to ``std::make_unique``.
+
+.. code-block:: c++
+
+  my_ptr.reset(new MyPair(1, 2));
+
+  // becomes
+
+  my_ptr = std::make_unique<MyPair>(1, 2);
+
+Options
+-------
+
+.. option:: MakeSmartPtrFunction
+
+   A string specifying the name of make-unique-ptr function. Default is
+   `std::make_unique`.
+
+.. option:: MakeSmartPtrFunctionHeader
+
+   A string specifying the corresponding header of make-unique-ptr function.
+   Default is `memory`.
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-pass-by-value.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-pass-by-value.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-pass-by-value.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-pass-by-value.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,166 @@
+.. title:: clang-tidy - modernize-pass-by-value
+
+modernize-pass-by-value
+=======================
+
+With move semantics added to the language and the standard library updated with
+move constructors added for many types it is now interesting to take an
+argument directly by value, instead of by const-reference, and then copy. This
+check allows the compiler to take care of choosing the best way to construct
+the copy.
+
+The transformation is usually beneficial when the calling code passes an
+*rvalue* and assumes the move construction is a cheap operation. This short
+example illustrates how the construction of the value happens:
+
+.. code-block:: c++
+
+    void foo(std::string s);
+    std::string get_str();
+
+    void f(const std::string &str) {
+      foo(str);       // lvalue  -> copy construction
+      foo(get_str()); // prvalue -> move construction
+    }
+
+.. note::
+
+   Currently, only constructors are transformed to make use of pass-by-value.
+   Contributions that handle other situations are welcome!
+
+
+Pass-by-value in constructors
+-----------------------------
+
+Replaces the uses of const-references constructor parameters that are copied
+into class fields. The parameter is then moved with `std::move()`.
+
+Since ``std::move()`` is a library function declared in `<utility>` it may be
+necessary to add this include. The check will add the include directive when
+necessary.
+
+.. code-block:: c++
+
+     #include <string>
+
+     class Foo {
+     public:
+    -  Foo(const std::string &Copied, const std::string &ReadOnly)
+    -    : Copied(Copied), ReadOnly(ReadOnly)
+    +  Foo(std::string Copied, const std::string &ReadOnly)
+    +    : Copied(std::move(Copied)), ReadOnly(ReadOnly)
+       {}
+
+     private:
+       std::string Copied;
+       const std::string &ReadOnly;
+     };
+
+     std::string get_cwd();
+
+     void f(const std::string &Path) {
+       // The parameter corresponding to 'get_cwd()' is move-constructed. By
+       // using pass-by-value in the Foo constructor we managed to avoid a
+       // copy-construction.
+       Foo foo(get_cwd(), Path);
+     }
+
+
+If the parameter is used more than once no transformation is performed since
+moved objects have an undefined state. It means the following code will be left
+untouched:
+
+.. code-block:: c++
+
+  #include <string>
+
+  void pass(const std::string &S);
+
+  struct Foo {
+    Foo(const std::string &S) : Str(S) {
+      pass(S);
+    }
+
+    std::string Str;
+  };
+
+
+Known limitations
+^^^^^^^^^^^^^^^^^
+
+A situation where the generated code can be wrong is when the object referenced
+is modified before the assignment in the init-list through a "hidden" reference.
+
+Example:
+
+.. code-block:: c++
+
+   std::string s("foo");
+
+   struct Base {
+     Base() {
+       s = "bar";
+     }
+   };
+
+   struct Derived : Base {
+  -  Derived(const std::string &S) : Field(S)
+  +  Derived(std::string S) : Field(std::move(S))
+     { }
+
+     std::string Field;
+   };
+
+   void f() {
+  -  Derived d(s); // d.Field holds "bar"
+  +  Derived d(s); // d.Field holds "foo"
+   }
+
+
+Note about delayed template parsing
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+When delayed template parsing is enabled, constructors part of templated
+contexts; templated constructors, constructors in class templates, constructors
+of inner classes of template classes, etc., are not transformed. Delayed
+template parsing is enabled by default on Windows as a Microsoft extension:
+`Clang Compiler User’s Manual - Microsoft extensions`_.
+
+Delayed template parsing can be enabled using the `-fdelayed-template-parsing`
+flag and disabled using `-fno-delayed-template-parsing`.
+
+Example:
+
+.. code-block:: c++
+
+   template <typename T> class C {
+     std::string S;
+
+   public:
+ =  // using -fdelayed-template-parsing (default on Windows)
+ =  C(const std::string &S) : S(S) {}
+
+ +  // using -fno-delayed-template-parsing (default on non-Windows systems)
+ +  C(std::string S) : S(std::move(S)) {}
+   };
+
+.. _Clang Compiler User’s Manual - Microsoft extensions: http://clang.llvm.org/docs/UsersManual.html#microsoft-extensions
+
+.. seealso::
+
+  For more information about the pass-by-value idiom, read: `Want Speed? Pass by Value`_.
+
+  .. _Want Speed? Pass by Value: https://web.archive.org/web/20140205194657/http://cpp-next.com/archive/2009/08/want-speed-pass-by-value/
+
+Options
+-------
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.
+
+.. option:: ValuesOnly
+
+   When non-zero, the check only warns about copied parameters that are already
+   passed by value. Default is `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-raw-string-literal.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-raw-string-literal.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-raw-string-literal.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-raw-string-literal.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,46 @@
+.. title:: clang-tidy - modernize-raw-string-literal
+
+modernize-raw-string-literal
+============================
+
+This check selectively replaces string literals containing escaped characters
+with raw string literals.
+
+Example:
+
+.. code-blocK:: c++
+
+  const char *const Quotes{"embedded \"quotes\""};
+  const char *const Paragraph{"Line one.\nLine two.\nLine three.\n"};
+  const char *const SingleLine{"Single line.\n"};
+  const char *const TrailingSpace{"Look here -> \n"};
+  const char *const Tab{"One\tTwo\n"};
+  const char *const Bell{"Hello!\a  And welcome!"};
+  const char *const Path{"C:\\Program Files\\Vendor\\Application.exe"};
+  const char *const RegEx{"\\w\\([a-z]\\)"};
+
+becomes
+
+.. code-block:: c++
+
+  const char *const Quotes{R"(embedded "quotes")"};
+  const char *const Paragraph{"Line one.\nLine two.\nLine three.\n"};
+  const char *const SingleLine{"Single line.\n"};
+  const char *const TrailingSpace{"Look here -> \n"};
+  const char *const Tab{"One\tTwo\n"};
+  const char *const Bell{"Hello!\a  And welcome!"};
+  const char *const Path{R"(C:\Program Files\Vendor\Application.exe)"};
+  const char *const RegEx{R"(\w\([a-z]\))"};
+
+The presence of any of the following escapes can cause the string to be
+converted to a raw string literal: ``\\``, ``\'``, ``\"``, ``\?``,
+and octal or hexadecimal escapes for printable ASCII characters.
+
+A string literal containing only escaped newlines is a common way of
+writing lines of text output. Introducing physical newlines with raw
+string literals in this case is likely to impede readability. These
+string literals are left unchanged.
+
+An escaped horizontal tab, form feed, or vertical tab prevents the string
+literal from being converted. The presence of a horizontal tab, form feed or
+vertical tab in source code is not visually obvious.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-redundant-void-arg.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-redundant-void-arg.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-redundant-void-arg.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-redundant-void-arg.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - modernize-redundant-void-arg
+
+modernize-redundant-void-arg
+============================
+
+Find and remove redundant ``void`` argument lists.
+
+Examples:
+  ===================================  ===========================
+  Initial code                         Code with applied fixes
+  ===================================  ===========================
+  ``int f(void);``                     ``int f();``
+  ``int (*f(void))(void);``            ``int (*f())();``
+  ``typedef int (*f_t(void))(void);``  ``typedef int (*f_t())();``
+  ``void (C::*p)(void);``              ``void (C::*p)();``
+  ``C::C(void) {}``                    ``C::C() {}``
+  ``C::~C(void) {}``                   ``C::~C() {}``
+  ===================================  ===========================

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-auto-ptr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-auto-ptr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-auto-ptr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-auto-ptr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,79 @@
+.. title:: clang-tidy - modernize-replace-auto-ptr
+
+modernize-replace-auto-ptr
+==========================
+
+This check replaces the uses of the deprecated class ``std::auto_ptr`` by
+``std::unique_ptr`` (introduced in C++11). The transfer of ownership, done
+by the copy-constructor and the assignment operator, is changed to match
+``std::unique_ptr`` usage by using explicit calls to ``std::move()``.
+
+Migration example:
+
+.. code-block:: c++
+
+  -void take_ownership_fn(std::auto_ptr<int> int_ptr);
+  +void take_ownership_fn(std::unique_ptr<int> int_ptr);
+
+   void f(int x) {
+  -  std::auto_ptr<int> a(new int(x));
+  -  std::auto_ptr<int> b;
+  +  std::unique_ptr<int> a(new int(x));
+  +  std::unique_ptr<int> b;
+
+  -  b = a;
+  -  take_ownership_fn(b);
+  +  b = std::move(a);
+  +  take_ownership_fn(std::move(b));
+   }
+
+Since ``std::move()`` is a library function declared in ``<utility>`` it may be
+necessary to add this include. The check will add the include directive when
+necessary.
+
+Known Limitations
+-----------------
+* If headers modification is not activated or if a header is not allowed to be
+  changed this check will produce broken code (compilation error), where the
+  headers' code will stay unchanged while the code using them will be changed.
+
+* Client code that declares a reference to an ``std::auto_ptr`` coming from
+  code that can't be migrated (such as a header coming from a 3\ :sup:`rd`
+  party library) will produce a compilation error after migration. This is
+  because the type of the reference will be changed to ``std::unique_ptr`` but
+  the type returned by the library won't change, binding a reference to
+  ``std::unique_ptr`` from an ``std::auto_ptr``. This pattern doesn't make much
+  sense and usually ``std::auto_ptr`` are stored by value (otherwise what is
+  the point in using them instead of a reference or a pointer?).
+
+.. code-block:: c++
+
+     // <3rd-party header...>
+     std::auto_ptr<int> get_value();
+     const std::auto_ptr<int> & get_ref();
+
+     // <calling code (with migration)...>
+    -std::auto_ptr<int> a(get_value());
+    +std::unique_ptr<int> a(get_value()); // ok, unique_ptr constructed from auto_ptr
+
+    -const std::auto_ptr<int> & p = get_ptr();
+    +const std::unique_ptr<int> & p = get_ptr(); // won't compile
+
+* Non-instantiated templates aren't modified.
+
+.. code-block:: c++
+
+     template <typename X>
+     void f() {
+         std::auto_ptr<X> p;
+     }
+
+     // only 'f<int>()' (or similar) will trigger the replacement.
+
+Options
+-------
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-random-shuffle.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-random-shuffle.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-random-shuffle.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-replace-random-shuffle.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,41 @@
+.. title:: clang-tidy - modernize-replace-random-shuffle
+
+modernize-replace-random-shuffle
+================================
+
+This check will find occurrences of ``std::random_shuffle`` and replace it with ``std::shuffle``. In C++17 ``std::random_shuffle`` will no longer be available and thus we need to replace it.
+
+Below are two examples of what kind of occurrences will be found and two examples of what it will be replaced with.
+
+.. code-block:: c++
+
+  std::vector<int> v;
+
+  // First example
+  std::random_shuffle(vec.begin(), vec.end());
+
+  // Second example
+  std::random_shuffle(vec.begin(), vec.end(), randomFunc);
+
+Both of these examples will be replaced with:
+
+.. code-block:: c++
+
+  std::shuffle(vec.begin(), vec.end(), std::mt19937(std::random_device()()));
+
+The second example will also receive a warning that ``randomFunc`` is no longer supported in the same way as before so if the user wants the same functionality, the user will need to change the implementation of the ``randomFunc``.
+
+One thing to be aware of here is that ``std::random_device`` is quite expensive to initialize. So if you are using the code in a performance critical place, you probably want to initialize it elsewhere. 
+Another thing is that the seeding quality of the suggested fix is quite poor: ``std::mt19937`` has an internal state of 624 32-bit integers, but is only seeded with a single integer. So if you require
+higher quality randomness, you should consider seeding better, for example:
+
+.. code-block:: c++
+
+  std::shuffle(v.begin(), v.end(), []() {
+    std::mt19937::result_type seeds[std::mt19937::state_size];
+    std::random_device device;
+    std::uniform_int_distribution<typename std::mt19937::result_type> dist;
+    std::generate(std::begin(seeds), std::end(seeds), [&] { return dist(device); });
+    std::seed_seq seq(std::begin(seeds), std::end(seeds));
+    return std::mt19937(seq);
+  }());

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-return-braced-init-list.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-return-braced-init-list.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-return-braced-init-list.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-return-braced-init-list.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,22 @@
+.. title:: clang-tidy - modernize-return-braced-init-list
+
+modernize-return-braced-init-list
+=================================
+
+Replaces explicit calls to the constructor in a return with a braced
+initializer list. This way the return type is not needlessly duplicated in the
+function definition and the return statement.
+
+.. code:: c++
+
+  Foo bar() {
+    Baz baz;
+    return Foo(baz);
+  }
+
+  // transforms to:
+
+  Foo bar() {
+    Baz baz;
+    return {baz};
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-shrink-to-fit.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-shrink-to-fit.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-shrink-to-fit.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-shrink-to-fit.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+.. title:: clang-tidy - modernize-shrink-to-fit
+
+modernize-shrink-to-fit
+=======================
+
+
+Replace copy and swap tricks on shrinkable containers with the
+``shrink_to_fit()`` method call.
+
+The ``shrink_to_fit()`` method is more readable and more effective than
+the copy and swap trick to reduce the capacity of a shrinkable container.
+Note that, the ``shrink_to_fit()`` method is only available in C++11 and up.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-unary-static-assert.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-unary-static-assert.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-unary-static-assert.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-unary-static-assert.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,25 @@
+.. title:: clang-tidy - modernize-unary-static-assert
+
+modernize-unary-static-assert
+=============================
+
+The check diagnoses any ``static_assert`` declaration with an empty string literal
+and provides a fix-it to replace the declaration with a single-argument ``static_assert`` declaration.
+
+The check is only applicable for C++17 and later code.
+
+The following code:
+
+.. code-block:: c++
+
+  void f_textless(int a) {
+    static_assert(sizeof(a) <= 10, "");
+  }
+
+is replaced by:
+
+.. code-block:: c++
+
+  void f_textless(int a) {
+    static_assert(sizeof(a) <= 10);
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-auto.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-auto.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-auto.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-auto.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,233 @@
+.. title:: clang-tidy - modernize-use-auto
+
+modernize-use-auto
+==================
+
+This check is responsible for using the ``auto`` type specifier for variable
+declarations to *improve code readability and maintainability*. For example:
+
+.. code-block:: c++
+
+  std::vector<int>::iterator I = my_container.begin();
+
+  // transforms to:
+
+  auto I = my_container.begin();
+
+The ``auto`` type specifier will only be introduced in situations where the
+variable type matches the type of the initializer expression. In other words
+``auto`` should deduce the same type that was originally spelled in the source.
+However, not every situation should be transformed:
+
+.. code-block:: c++
+
+  int val = 42;
+  InfoStruct &I = SomeObject.getInfo();
+
+  // Should not become:
+
+  auto val = 42;
+  auto &I = SomeObject.getInfo();
+
+In this example using ``auto`` for builtins doesn't improve readability. In
+other situations it makes the code less self-documenting impairing readability
+and maintainability. As a result, ``auto`` is used only introduced in specific
+situations described below.
+
+Iterators
+---------
+
+Iterator type specifiers tend to be long and used frequently, especially in
+loop constructs. Since the functions generating iterators have a common format,
+the type specifier can be replaced without obscuring the meaning of code while
+improving readability and maintainability.
+
+.. code-block:: c++
+
+  for (std::vector<int>::iterator I = my_container.begin(),
+                                  E = my_container.end();
+       I != E; ++I) {
+  }
+
+  // becomes
+
+  for (auto I = my_container.begin(), E = my_container.end(); I != E; ++I) {
+  }
+
+The check will only replace iterator type-specifiers when all of the following
+conditions are satisfied:
+
+* The iterator is for one of the standard container in ``std`` namespace:
+
+  * ``array``
+  * ``deque``
+  * ``forward_list``
+  * ``list``
+  * ``vector``
+  * ``map``
+  * ``multimap``
+  * ``set``
+  * ``multiset``
+  * ``unordered_map``
+  * ``unordered_multimap``
+  * ``unordered_set``
+  * ``unordered_multiset``
+  * ``queue``
+  * ``priority_queue``
+  * ``stack``
+
+* The iterator is one of the possible iterator types for standard containers:
+
+  * ``iterator``
+  * ``reverse_iterator``
+  * ``const_iterator``
+  * ``const_reverse_iterator``
+
+* In addition to using iterator types directly, typedefs or other ways of
+  referring to those types are also allowed. However, implementation-specific
+  types for which a type like ``std::vector<int>::iterator`` is itself a
+  typedef will not be transformed. Consider the following examples:
+
+.. code-block:: c++
+
+  // The following direct uses of iterator types will be transformed.
+  std::vector<int>::iterator I = MyVec.begin();
+  {
+    using namespace std;
+    list<int>::iterator I = MyList.begin();
+  }
+
+  // The type specifier for J would transform to auto since it's a typedef
+  // to a standard iterator type.
+  typedef std::map<int, std::string>::const_iterator map_iterator;
+  map_iterator J = MyMap.begin();
+
+  // The following implementation-specific iterator type for which
+  // std::vector<int>::iterator could be a typedef would not be transformed.
+  __gnu_cxx::__normal_iterator<int*, std::vector> K = MyVec.begin();
+
+* The initializer for the variable being declared is not a braced initializer
+  list. Otherwise, use of ``auto`` would cause the type of the variable to be
+  deduced as ``std::initializer_list``.
+
+New expressions
+---------------
+
+Frequently, when a pointer is declared and initialized with ``new``, the
+pointee type is written twice: in the declaration type and in the
+``new`` expression. In this cases, the declaration type can be replaced with
+``auto`` improving readability and maintainability.
+
+.. code-block:: c++
+
+  TypeName *my_pointer = new TypeName(my_param);
+
+  // becomes
+
+  auto *my_pointer = new TypeName(my_param);
+
+The check will also replace the declaration type in multiple declarations, if
+the following conditions are satisfied:
+
+* All declared variables have the same type (i.e. all of them are pointers to
+  the same type).
+* All declared variables are initialized with a ``new`` expression.
+* The types of all the new expressions are the same than the pointee of the
+  declaration type.
+
+.. code-block:: c++
+
+  TypeName *my_first_pointer = new TypeName, *my_second_pointer = new TypeName;
+
+  // becomes
+
+  auto *my_first_pointer = new TypeName, *my_second_pointer = new TypeName;
+
+Cast expressions
+----------------
+
+Frequently, when a variable is declared and initialized with a cast, the
+variable type is written twice: in the declaration type and in the
+cast expression. In this cases, the declaration type can be replaced with
+``auto`` improving readability and maintainability.
+
+.. code-block:: c++
+
+  TypeName *my_pointer = static_cast<TypeName>(my_param);
+
+  // becomes
+
+  auto *my_pointer = static_cast<TypeName>(my_param);
+
+The check handles ``static_cast``, ``dynamic_cast``, ``const_cast``,
+``reinterpret_cast``, functional casts, C-style casts and function templates
+that behave as casts, such as ``llvm::dyn_cast``, ``boost::lexical_cast`` and
+``gsl::narrow_cast``.  Calls to function templates are considered to behave as
+casts if the first template argument is explicit and is a type, and the function
+returns that type, or a pointer or reference to it.
+
+Known Limitations
+-----------------
+
+* If the initializer is an explicit conversion constructor, the check will not
+  replace the type specifier even though it would be safe to do so.
+
+* User-defined iterators are not handled at this time.
+
+Options
+-------
+
+.. option:: MinTypeNameLength
+
+   If the option is set to non-zero (default `5`), the check will ignore type
+   names having a length less than the option value. The option affects
+   expressions only, not iterators.
+   Spaces between multi-lexeme type names (``long int``) are considered as one.
+   If ``RemoveStars`` option (see below) is set to non-zero, then ``*s`` in
+   the type are also counted as a part of the type name.
+
+.. code-block:: c++
+
+  // MinTypeNameLength = 0, RemoveStars=0
+
+  int a = static_cast<int>(foo());            // ---> auto a = ...
+  // length(bool *) = 4
+  bool *b = new bool;                         // ---> auto *b = ...
+  unsigned c = static_cast<unsigned>(foo());  // ---> auto c = ...
+
+  // MinTypeNameLength = 5, RemoveStars=0
+
+  int a = static_cast<int>(foo());                 // ---> int  a = ...
+  bool b = static_cast<bool>(foo());               // ---> bool b = ...
+  bool *pb = static_cast<bool*>(foo());            // ---> bool *pb = ...
+  unsigned c = static_cast<unsigned>(foo());       // ---> auto c = ...
+  // length(long <on-or-more-spaces> int) = 8
+  long int d = static_cast<long int>(foo());       // ---> auto d = ...
+
+  // MinTypeNameLength = 5, RemoveStars=1
+
+  int a = static_cast<int>(foo());                 // ---> int  a = ...
+  // length(int * * ) = 5
+  int **pa = static_cast<int**>(foo());            // ---> auto pa = ...
+  bool b = static_cast<bool>(foo());               // ---> bool b = ...
+  bool *pb = static_cast<bool*>(foo());            // ---> auto pb = ...
+  unsigned c = static_cast<unsigned>(foo());       // ---> auto c = ...
+  long int d = static_cast<long int>(foo());       // ---> auto d = ...
+
+.. option:: RemoveStars
+
+   If the option is set to non-zero (default is `0`), the check will remove
+   stars from the non-typedef pointer types when replacing type names with
+   ``auto``. Otherwise, the check will leave stars. For example:
+
+.. code-block:: c++
+
+  TypeName *my_first_pointer = new TypeName, *my_second_pointer = new TypeName;
+
+  // RemoveStars = 0
+
+  auto *my_first_pointer = new TypeName, *my_second_pointer = new TypeName;
+
+  // RemoveStars = 1
+
+  auto my_first_pointer = new TypeName, my_second_pointer = new TypeName;

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-bool-literals.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-bool-literals.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-bool-literals.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-bool-literals.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,28 @@
+.. title:: clang-tidy - modernize-use-bool-literals
+
+modernize-use-bool-literals
+===========================
+
+Finds integer literals which are cast to ``bool``.
+
+.. code-block:: c++
+
+  bool p = 1;
+  bool f = static_cast<bool>(1);
+  std::ios_base::sync_with_stdio(0);
+  bool x = p ? 1 : 0;
+
+  // transforms to
+
+  bool p = true;
+  bool f = true;
+  std::ios_base::sync_with_stdio(false);
+  bool x = p ? true : false;
+
+Options
+-------
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default-member-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default-member-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default-member-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default-member-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,54 @@
+.. title:: clang-tidy - modernize-use-default-member-init
+
+modernize-use-default-member-init
+=================================
+
+This check converts a default constructor's member initializers into the new
+default member initializers in C++11. Other member initializers that match the
+default member initializer are removed. This can reduce repeated code or allow
+use of '= default'.
+
+.. code-block:: c++
+
+  struct A {
+    A() : i(5), j(10.0) {}
+    A(int i) : i(i), j(10.0) {}
+    int i;
+    double j;
+  };
+
+  // becomes
+
+  struct A {
+    A() {}
+    A(int i) : i(i) {}
+    int i{5};
+    double j{10.0};
+  };
+
+.. note::
+  Only converts member initializers for built-in types, enums, and pointers.
+  The `readability-redundant-member-init` check will remove redundant member
+  initializers for classes.
+
+Options
+-------
+
+.. option:: UseAssignment
+
+   If this option is set to non-zero (default is `0`), the check will initialise
+   members with an assignment. For example:
+
+.. code-block:: c++
+
+  struct A {
+    A() {}
+    A(int i) : i(i) {}
+    int i = 5;
+    double j = 10.0;
+  };
+
+.. option:: IgnoreMacros
+
+   If this option is set to non-zero (default is `1`), the check will not warn
+   about members declared inside macros.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-default.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+:orphan:
+
+.. title:: clang-tidy - modernize-use-default
+.. meta::
+   :http-equiv=refresh: 5;URL=modernize-use-equals-default.html
+
+modernize-use-default
+=====================
+
+This check has been renamed to
+`modernize-use-equals-default <modernize-use-equals-default.html>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-emplace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-emplace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-emplace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-emplace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,147 @@
+.. title:: clang-tidy - modernize-use-emplace
+
+modernize-use-emplace
+=====================
+
+The check flags insertions to an STL-style container done by calling the
+``push_back`` method with an explicitly-constructed temporary of the container
+element type. In this case, the corresponding ``emplace_back`` method
+results in less verbose and potentially more efficient code.
+Right now the check doesn't support ``push_front`` and ``insert``.
+It also doesn't support ``insert`` functions for associative containers
+because replacing ``insert`` with ``emplace`` may result in
+`speed regression <http://htmlpreview.github.io/?https://github.com/HowardHinnant/papers/blob/master/insert_vs_emplace.html>`_, but it might get support with some addition flag in the future.
+
+By default only ``std::vector``, ``std::deque``, ``std::list`` are considered.
+This list can be modified using the :option:`ContainersWithPushBack` option.
+
+Before:
+
+.. code-block:: c++
+
+    std::vector<MyClass> v;
+    v.push_back(MyClass(21, 37));
+
+    std::vector<std::pair<int, int>> w;
+
+    w.push_back(std::pair<int, int>(21, 37));
+    w.push_back(std::make_pair(21L, 37L));
+
+After:
+
+.. code-block:: c++
+
+    std::vector<MyClass> v;
+    v.emplace_back(21, 37);
+
+    std::vector<std::pair<int, int>> w;
+    w.emplace_back(21, 37);
+    w.emplace_back(21L, 37L);
+
+By default, the check is able to remove unnecessary ``std::make_pair`` and
+``std::make_tuple`` calls from ``push_back`` calls on containers of
+``std::pair`` and ``std::tuple``. Custom tuple-like types can be modified by
+the :option:`TupleTypes` option; custom make functions can be modified by the
+:option:`TupleMakeFunctions` option.
+
+The other situation is when we pass arguments that will be converted to a type
+inside a container.
+
+Before:
+
+.. code-block:: c++
+
+    std::vector<boost::optional<std::string> > v;
+    v.push_back("abc");
+
+After:
+
+.. code-block:: c++
+
+    std::vector<boost::optional<std::string> > v;
+    v.emplace_back("abc");
+
+
+In some cases the transformation would be valid, but the code wouldn't be
+exception safe. In this case the calls of ``push_back`` won't be replaced.
+
+.. code-block:: c++
+
+    std::vector<std::unique_ptr<int>> v;
+    v.push_back(std::unique_ptr<int>(new int(0)));
+    auto *ptr = new int(1);
+    v.push_back(std::unique_ptr<int>(ptr));
+
+This is because replacing it with ``emplace_back`` could cause a leak of this
+pointer if ``emplace_back`` would throw exception before emplacement (e.g. not
+enough memory to add a new element).
+
+For more info read item 42 - "Consider emplacement instead of insertion." of
+Scott Meyers "Effective Modern C++".
+
+The default smart pointers that are considered are ``std::unique_ptr``,
+``std::shared_ptr``, ``std::auto_ptr``. To specify other smart pointers or
+other classes use the :option:`SmartPointers` option.
+
+
+Check also doesn't fire if any argument of the constructor call would be:
+
+  - a bit-field (bit-fields can't bind to rvalue/universal reference)
+
+  - a ``new`` expression (to avoid leak)
+
+  - if the argument would be converted via derived-to-base cast.
+
+This check requires C++11 or higher to run.
+
+Options
+-------
+
+.. option:: ContainersWithPushBack
+
+   Semicolon-separated list of class names of custom containers that support
+   ``push_back``.
+
+.. option:: IgnoreImplicitConstructors
+
+    When non-zero, the check will ignore implicitly constructed arguments of
+    ``push_back``, e.g.
+
+    .. code-block:: c++
+
+        std::vector<std::string> v;
+        v.push_back("a"); // Ignored when IgnoreImplicitConstructors is ``1``.
+
+    Default is ``0``.
+
+.. option:: SmartPointers
+
+   Semicolon-separated list of class names of custom smart pointers.
+
+.. option:: TupleTypes
+
+    Semicolon-separated list of ``std::tuple``-like class names.
+
+.. option:: TupleMakeFunctions
+
+    Semicolon-separated list of ``std::make_tuple``-like function names. Those
+    function calls will be removed from ``push_back`` calls and turned into
+    ``emplace_back``.
+
+Example
+^^^^^^^
+
+.. code-block:: c++
+
+  std::vector<MyTuple<int, bool, char>> x;
+  x.push_back(MakeMyTuple(1, false, 'x'));
+
+transforms to:
+
+.. code-block:: c++
+
+  std::vector<MyTuple<int, bool, char>> x;
+  x.emplace_back(1, false, 'x');
+
+when :option:`TupleTypes` is set to ``MyTuple`` and :option:`TupleMakeFunctions`
+is set to ``MakeMyTuple``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-default.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-default.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-default.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-default.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,36 @@
+.. title:: clang-tidy - modernize-use-equals-default
+
+modernize-use-equals-default
+============================
+
+This check replaces default bodies of special member functions with ``=
+default;``. The explicitly defaulted function declarations enable more
+opportunities in optimization, because the compiler might treat explicitly
+defaulted functions as trivial.
+
+.. code-block:: c++
+
+  struct A {
+    A() {}
+    ~A();
+  };
+  A::~A() {}
+
+  // becomes
+
+  struct A {
+    A() = default;
+    ~A();
+  };
+  A::~A() = default;
+
+.. note::
+  Move-constructor and move-assignment operator are not supported yet.
+
+Options
+-------
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-delete.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-delete.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-delete.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-equals-delete.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,30 @@
+.. title:: clang-tidy - modernize-use-equals-delete
+
+modernize-use-equals-delete
+===========================
+
+This check marks unimplemented private special member functions with ``= delete``.
+To avoid false-positives, this check only applies in a translation unit that has
+all other member functions implemented.
+
+.. code-block:: c++
+
+  struct A {
+  private:
+    A(const A&);
+    A& operator=(const A&);
+  };
+
+  // becomes
+
+  struct A {
+  private:
+    A(const A&) = delete;
+    A& operator=(const A&) = delete;
+  };
+
+
+.. option:: IgnoreMacros
+
+   If this option is set to non-zero (default is `1`), the check will not warn
+   about functions declared inside macros.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nodiscard.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nodiscard.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nodiscard.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nodiscard.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,82 @@
+.. title:: clang-tidy - modernize-use-nodiscard
+
+modernize-use-nodiscard
+=======================
+
+Adds ``[[nodiscard]]`` attributes (introduced in C++17) to member functions in
+order to highlight at compile time which return values should not be ignored.
+
+Member functions need to satisfy the following conditions to be considered by
+this check:
+
+ - no ``[[nodiscard]]``, ``[[noreturn]]``,
+   ``__attribute__((warn_unused_result))``,
+   ``[[clang::warn_unused_result]]`` nor ``[[gcc::warn_unused_result]]``
+   attribute,
+ - non-void return type,
+ - non-template return types,
+ - const member function,
+ - non-variadic functions,
+ - no non-const reference parameters,
+ - no pointer parameters,
+ - no template parameters,
+ - no template function parameters,
+ - not be a member of a class with mutable member variables,
+ - no Lambdas,
+ - no conversion functions.
+
+Such functions have no means of altering any state or passing values other than
+via the return type. Unless the member functions are altering state via some
+external call (e.g. I/O).
+
+Example
+-------
+
+.. code-block:: c++
+
+    bool empty() const;
+    bool empty(int i) const;
+
+transforms to:
+
+.. code-block:: c++
+
+    [[nodiscard] bool empty() const;
+    [[nodiscard] bool empty(int i) const;
+
+Options
+-------
+
+.. option:: ReplacementString
+
+    Specifies a macro to use instead of ``[[nodiscard]]``. This is useful when
+    maintaining source code that needs to compile with a pre-C++17 compiler.
+
+Example
+^^^^^^^
+
+.. code-block:: c++
+
+    bool empty() const;
+    bool empty(int i) const;
+
+transforms to:
+
+.. code-block:: c++
+
+    NO_DISCARD bool empty() const;
+    NO_DISCARD bool empty(int i) const;
+
+if the :option:`ReplacementString` option is set to `NO_DISCARD`.
+
+.. note::
+
+    If the :option:`ReplacementString` is not a C++ attribute, but instead a 
+    macro, then that macro must be defined in scope or the fix-it will not be 
+    applied.
+
+.. note::
+
+    For alternative ``__attribute__`` syntax options to mark functions as
+    ``[[nodiscard]]`` in non-c++17 source code.
+    See https://clang.llvm.org/docs/AttributeReference.html#nodiscard-warn-unused-result

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-noexcept.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-noexcept.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-noexcept.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-noexcept.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,90 @@
+.. title:: clang-tidy - modernize-use-noexcept
+
+modernize-use-noexcept
+======================
+
+This check replaces deprecated dynamic exception specifications with
+the appropriate noexcept specification (introduced in C++11).  By
+default this check will replace ``throw()`` with ``noexcept``,
+and ``throw(<exception>[,...])`` or ``throw(...)`` with
+``noexcept(false)``.
+
+Example
+-------
+
+.. code-block:: c++
+
+  void foo() throw();
+	void bar() throw(int) {}
+
+transforms to:
+
+.. code-block:: c++
+
+  void foo() noexcept;
+	void bar() noexcept(false) {}
+
+Options
+-------
+
+.. option:: ReplacementString
+
+Users can use :option:`ReplacementString` to specify a macro to use
+instead of ``noexcept``.  This is useful when maintaining source code
+that uses custom exception specification marking other than
+``noexcept``.  Fix-it hints will only be generated for non-throwing
+specifications.
+
+Example
+^^^^^^^
+
+.. code-block:: c++
+
+  void bar() throw(int);
+  void foo() throw();
+
+transforms to:
+
+.. code-block:: c++
+
+  void bar() throw(int);  // No fix-it generated.
+  void foo() NOEXCEPT;
+
+if the :option:`ReplacementString` option is set to `NOEXCEPT`.
+
+.. option:: UseNoexceptFalse
+
+Enabled by default, disabling will generate fix-it hints that remove
+throwing dynamic exception specs, e.g., ``throw(<something>)``,
+completely without providing a replacement text, except for
+destructors and delete operators that are ``noexcept(true)`` by
+default.
+
+Example
+^^^^^^^
+
+.. code-block:: c++
+
+  void foo() throw(int) {}
+
+  struct bar {
+    void foobar() throw(int);
+    void operator delete(void *ptr) throw(int);
+    void operator delete[](void *ptr) throw(int);
+    ~bar() throw(int);
+  }
+
+transforms to:
+
+.. code-block:: c++
+
+  void foo() {}
+
+  struct bar {
+    void foobar();
+    void operator delete(void *ptr) noexcept(false);
+    void operator delete[](void *ptr) noexcept(false);
+    ~bar() noexcept(false);
+  }
+
+if the :option:`UseNoexceptFalse` option is set to `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nullptr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nullptr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nullptr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-nullptr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,67 @@
+.. title:: clang-tidy - modernize-use-nullptr
+
+modernize-use-nullptr
+=====================
+
+The check converts the usage of null pointer constants (eg. ``NULL``, ``0``)
+to use the new C++11 ``nullptr`` keyword.
+
+Example
+-------
+
+.. code-block:: c++
+
+  void assignment() {
+    char *a = NULL;
+    char *b = 0;
+    char c = 0;
+  }
+
+  int *ret_ptr() {
+    return 0;
+  }
+
+
+transforms to:
+
+.. code-block:: c++
+
+  void assignment() {
+    char *a = nullptr;
+    char *b = nullptr;
+    char c = 0;
+  }
+
+  int *ret_ptr() {
+    return nullptr;
+  }
+
+Options
+-------
+
+.. option:: NullMacros
+
+   Comma-separated list of macro names that will be transformed along with
+   ``NULL``. By default this check will only replace the ``NULL`` macro and will
+   skip any similar user-defined macros.
+
+Example
+^^^^^^^
+
+.. code-block:: c++
+
+  #define MY_NULL (void*)0
+  void assignment() {
+    void *p = MY_NULL;
+  }
+
+transforms to:
+
+.. code-block:: c++
+
+  #define MY_NULL NULL
+  void assignment() {
+    int *p = nullptr;
+  }
+
+if the :option:`NullMacros` option is set to ``MY_NULL``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-override.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-override.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-override.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-override.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,7 @@
+.. title:: clang-tidy - modernize-use-override
+
+modernize-use-override
+======================
+
+
+Use C++11's ``override`` and remove ``virtual`` where applicable.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-transparent-functors.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-transparent-functors.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-transparent-functors.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-transparent-functors.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,39 @@
+.. title:: clang-tidy - modernize-use-transparent-functors
+
+modernize-use-transparent-functors
+==================================
+
+Prefer transparent functors to non-transparent ones. When using transparent
+functors, the type does not need to be repeated. The code is easier to read,
+maintain and less prone to errors. It is not possible to introduce unwanted
+conversions.
+
+.. code-block:: c++
+
+    // Non-transparent functor
+    std::map<int, std::string, std::greater<int>> s;
+
+    // Transparent functor.
+    std::map<int, std::string, std::greater<>> s;
+
+    // Non-transparent functor
+    using MyFunctor = std::less<MyType>;
+
+It is not always a safe transformation though. The following case will be
+untouched to preserve the semantics.
+
+.. code-block:: c++
+
+    // Non-transparent functor
+    std::map<const char *, std::string, std::greater<std::string>> s;
+
+Options
+-------
+
+.. option:: SafeMode
+
+  If the option is set to non-zero, the check will not diagnose cases where
+  using a transparent functor cannot be guaranteed to produce identical results
+  as the original code. The default value for this option is `0`.
+
+This check requires using C++14 or higher to run.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-uncaught-exceptions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-uncaught-exceptions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-uncaught-exceptions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-uncaught-exceptions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,64 @@
+.. title:: clang-tidy - modernize-use-uncaught-exceptions
+
+modernize-use-uncaught-exceptions
+====================================
+
+This check will warn on calls to ``std::uncaught_exception`` and replace them
+with calls to ``std::uncaught_exceptions``, since ``std::uncaught_exception``
+was deprecated in C++17.
+
+Below are a few examples of what kind of occurrences will be found and what
+they will be replaced with.
+
+.. code-block:: c++
+
+	#define MACRO1 std::uncaught_exception
+	#define MACRO2 std::uncaught_exception
+
+	int uncaught_exception() {
+		return 0;
+	}
+
+	int main() {
+		int res;
+
+	  res = uncaught_exception();
+	  // No warning, since it is not the deprecated function from namespace std
+	  
+	  res = MACRO2();
+	  // Warning, but will not be replaced
+	  
+	  res = std::uncaught_exception();
+	  // Warning and replaced
+	  
+	  using std::uncaught_exception;
+	  // Warning and replaced
+	  
+	  res = uncaught_exception();
+	  // Warning and replaced
+	}
+
+After applying the fixes the code will look like the following:
+
+.. code-block:: c++
+
+	#define MACRO1 std::uncaught_exception
+	#define MACRO2 std::uncaught_exception
+
+	int uncaught_exception() {
+		return 0;
+	}
+
+	int main() {
+	  int res;
+	  
+	  res = uncaught_exception();
+	  
+	  res = MACRO2();
+	  
+	  res = std::uncaught_exceptions();
+	  
+	  using std::uncaught_exceptions;
+	  
+	  res = uncaught_exceptions();
+	}

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-using.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-using.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-using.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/modernize-use-using.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,34 @@
+.. title:: clang-tidy - modernize-use-using
+
+modernize-use-using
+===================
+
+The check converts the usage of ``typedef`` with ``using`` keyword.
+
+Before:
+
+.. code-block:: c++
+
+  typedef int variable;
+
+  class Class{};
+  typedef void (Class::* MyPtrType)() const;
+
+After:
+
+.. code-block:: c++
+
+  using variable = int;
+
+  class Class{};
+  using MyPtrType = void (Class::*)() const;
+
+This check requires using C++11 or higher to run.
+
+Options
+-------
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-buffer-deref.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-buffer-deref.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-buffer-deref.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-buffer-deref.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - mpi-buffer-deref
+
+mpi-buffer-deref
+================
+
+This check verifies if a buffer passed to an MPI (Message Passing Interface)
+function is sufficiently dereferenced. Buffers should be passed as a single
+pointer or array. As MPI function signatures specify ``void *`` for their buffer
+types, insufficiently dereferenced buffers can be passed, like for example as
+double pointers or multidimensional arrays, without a compiler warning emitted.
+
+Examples:
+
+.. code-block:: c++
+
+   // A double pointer is passed to the MPI function.
+   char *buf;
+   MPI_Send(&buf, 1, MPI_CHAR, 0, 0, MPI_COMM_WORLD);
+
+   // A multidimensional array is passed to the MPI function.
+   short buf[1][1];
+   MPI_Send(buf, 1, MPI_SHORT, 0, 0, MPI_COMM_WORLD);
+
+   // A pointer to an array is passed to the MPI function.
+   short *buf[1];
+   MPI_Send(buf, 1, MPI_SHORT, 0, 0, MPI_COMM_WORLD);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-type-mismatch.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-type-mismatch.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-type-mismatch.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/mpi-type-mismatch.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - mpi-type-mismatch
+
+mpi-type-mismatch
+=================
+
+This check verifies if buffer type and MPI (Message Passing Interface) datatype
+pairs match for used MPI functions. All MPI datatypes defined by the MPI
+standard (3.1) are verified by this check. User defined typedefs, custom MPI
+datatypes and null pointer constants are skipped, in the course of verification.
+
+Example:
+
+.. code-block:: c++
+
+  // In this case, the buffer type matches MPI datatype.
+  char buf;
+  MPI_Send(&buf, 1, MPI_CHAR, 0, 0, MPI_COMM_WORLD);
+
+  // In the following case, the buffer type does not match MPI datatype.
+  int buf;
+  MPI_Send(&buf, 1, MPI_CHAR, 0, 0, MPI_COMM_WORLD);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-nserror-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-nserror-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-nserror-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-nserror-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - objc-avoid-nserror-init
+
+objc-avoid-nserror-init
+=======================
+
+Finds improper initialization of ``NSError`` objects.
+
+According to Apple developer document, we should always use factory method 
+``errorWithDomain:code:userInfo:`` to create new NSError objects instead
+of ``[NSError alloc] init]``. Otherwise it will lead to a warning message
+during runtime.
+
+The corresponding information about ``NSError`` creation: https://developer.apple.com/library/content/documentation/Cocoa/Conceptual/ErrorHandlingCocoa/CreateCustomizeNSError/CreateCustomizeNSError.html

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-spinlock.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-spinlock.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-spinlock.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-avoid-spinlock.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,15 @@
+.. title:: clang-tidy - objc-avoid-spinlock
+
+objc-avoid-spinlock
+===================
+
+Finds usages of ``OSSpinlock``, which is deprecated due to potential livelock
+problems. 
+
+This check will detect following function invocations:
+
+- ``OSSpinlockLock``
+- ``OSSpinlockTry``
+- ``OSSpinlockUnlock``
+
+The corresponding information about the problem of ``OSSpinlock``: https://blog.postmates.com/why-spinlocks-are-bad-on-ios-b69fc5221058

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-forbidden-subclassing.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-forbidden-subclassing.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-forbidden-subclassing.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-forbidden-subclassing.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,28 @@
+.. title:: clang-tidy - objc-forbidden-subclassing
+
+objc-forbidden-subclassing
+==========================
+
+Finds Objective-C classes which are subclasses of classes which are not designed
+to be subclassed.
+
+By default, includes a list of Objective-C classes which are publicly documented
+as not supporting subclassing.
+
+.. note::
+
+   Instead of using this check, for code under your control, you should add
+   ``__attribute__((objc_subclassing_restricted))`` before your ``@interface``
+   declarations to ensure the compiler prevents others from subclassing your
+   Objective-C classes.
+   See https://clang.llvm.org/docs/AttributeReference.html#objc-subclassing-restricted
+
+Options
+-------
+
+.. option:: ForbiddenSuperClassNames
+
+   Semicolon-separated list of names of Objective-C classes which
+   do not support subclassing.
+
+   Defaults to `ABNewPersonViewController;ABPeoplePickerNavigationController;ABPersonViewController;ABUnknownPersonViewController;NSHashTable;NSMapTable;NSPointerArray;NSPointerFunctions;NSTimer;UIActionSheet;UIAlertView;UIImagePickerController;UITextInputMode;UIWebView`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-property-declaration.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-property-declaration.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-property-declaration.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/objc-property-declaration.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,54 @@
+.. title:: clang-tidy - objc-property-declaration
+
+objc-property-declaration
+=========================
+
+Finds property declarations in Objective-C files that do not follow the pattern
+of property names in Apple's programming guide. The property name should be
+in the format of Lower Camel Case.
+
+For code:
+
+.. code-block:: objc
+
+   @property(nonatomic, assign) int LowerCamelCase;
+
+The fix will be:
+
+.. code-block:: objc
+
+   @property(nonatomic, assign) int lowerCamelCase;
+
+The check will only fix 'CamelCase' to 'camelCase'. In some other cases we will
+only provide warning messages since the property name could be complicated.
+Users will need to come up with a proper name by their own.
+
+This check also accepts special acronyms as prefixes or suffixes. Such prefixes or suffixes
+will suppress the Lower Camel Case check according to the guide:
+https://developer.apple.com/library/content/documentation/Cocoa/Conceptual/CodingGuidelines/Articles/NamingBasics.html#//apple_ref/doc/uid/20001281-1002931-BBCFHEAB
+
+For a full list of well-known acronyms:
+https://developer.apple.com/library/content/documentation/Cocoa/Conceptual/CodingGuidelines/Articles/APIAbbreviations.html#//apple_ref/doc/uid/20001285-BCIHCGAE
+
+The corresponding style rule: https://developer.apple.com/library/content/documentation/Cocoa/Conceptual/CodingGuidelines/Articles/NamingIvarsAndTypes.html#//apple_ref/doc/uid/20001284-1001757
+
+The check will also accept property declared in category with a prefix of
+lowercase letters followed by a '_' to avoid naming conflict. For example:
+
+.. code-block:: objc
+
+   @property(nonatomic, assign) int abc_lowerCamelCase;
+
+The corresponding style rule: https://developer.apple.com/library/content/qa/qa1908/_index.html
+
+
+Options
+-------
+
+.. option:: Acronyms
+
+   This option is deprecated and ignored.
+
+.. option:: IncludeDefaultAcronyms
+
+   This option is deprecated and ignored.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-faster-string-find.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-faster-string-find.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-faster-string-find.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-faster-string-find.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,28 @@
+.. title:: clang-tidy - performance-faster-string-find
+
+performance-faster-string-find
+==============================
+
+Optimize calls to ``std::string::find()`` and friends when the needle passed is
+a single character string literal. The character literal overload is more
+efficient.
+
+Examples:
+
+.. code-block:: c++
+
+  str.find("A");
+
+  // becomes
+
+  str.find('A');
+
+Options
+-------
+
+.. option:: StringLikeClasses
+
+   Semicolon-separated list of names of string-like classes. By default only
+   ``std::basic_string`` is considered. The list of methods to consired is
+   fixed.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-for-range-copy.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-for-range-copy.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-for-range-copy.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-for-range-copy.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,34 @@
+.. title:: clang-tidy - performance-for-range-copy
+
+performance-for-range-copy
+==========================
+
+Finds C++11 for ranges where the loop variable is copied in each iteration but
+it would suffice to obtain it by const reference.
+
+The check is only applied to loop variables of types that are expensive to copy
+which means they are not trivially copyable or have a non-trivial copy
+constructor or destructor.
+
+To ensure that it is safe to replace the copy with a const reference the
+following heuristic is employed:
+
+1. The loop variable is const qualified.
+2. The loop variable is not const, but only const methods or operators are
+   invoked on it, or it is used as const reference or value argument in
+   constructors or function calls.
+
+Options
+-------
+
+.. option:: WarnOnAllAutoCopies
+
+   When non-zero, warns on any use of `auto` as the type of the range-based for
+   loop variable. Default is `0`.
+
+.. option:: AllowedTypes
+
+   A semicolon-separated list of names of types allowed to be copied in each
+   iteration. Regular expressions are accepted, e.g. `[Rr]ef(erence)?$` matches
+   every type with suffix `Ref`, `ref`, `Reference` and `reference`. The default
+   is empty.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-cast-in-loop.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-cast-in-loop.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-cast-in-loop.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-cast-in-loop.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,12 @@
+:orphan:
+
+.. title:: clang-tidy - performance-implicit-cast-in-loop
+.. meta::
+   :http-equiv=refresh: 5;URL=performance-implicit-conversion-in-loop.html
+
+performance-implicit-cast-in-loop
+=================================
+
+This check has been renamed to `performance-implicit-conversion-in-loop
+<performance-implicit-conversion-in-loop.html>`_.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-conversion-in-loop.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-conversion-in-loop.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-conversion-in-loop.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-implicit-conversion-in-loop.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - performance-implicit-conversion-in-loop
+
+performance-implicit-conversion-in-loop
+=======================================
+
+This warning appears in a range-based loop with a loop variable of const ref
+type where the type of the variable does not match the one returned by the
+iterator. This means that an implicit conversion happens, which can for example
+result in expensive deep copies.
+
+Example:
+
+.. code-block:: c++
+
+  map<int, vector<string>> my_map;
+  for (const pair<int, vector<string>>& p : my_map) {}
+  // The iterator type is in fact pair<const int, vector<string>>, which means
+  // that the compiler added a conversion, resulting in a copy of the vectors.
+
+The easiest solution is usually to use ``const auto&`` instead of writing the
+type manually.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-algorithm.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-algorithm.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-algorithm.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-algorithm.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+.. title:: clang-tidy - performance-inefficient-algorithm
+
+performance-inefficient-algorithm
+=================================
+
+
+Warns on inefficient use of STL algorithms on associative containers.
+
+Associative containers implements some of the algorithms as methods which
+should be preferred to the algorithms in the algorithm header. The methods
+can take advanatage of the order of the elements.
+
+.. code-block:: c++
+
+  std::set<int> s;
+  auto it = std::find(s.begin(), s.end(), 43);
+
+  // becomes
+
+  auto it = s.find(43);
+
+.. code-block:: c++
+
+  std::set<int> s;
+  auto c = std::count(s.begin(), s.end(), 43);
+
+  // becomes
+
+  auto c = s.count(43);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-string-concatenation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-string-concatenation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-string-concatenation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-string-concatenation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,59 @@
+.. title:: clang-tidy - performance-inefficient-string-concatenation
+
+performance-inefficient-string-concatenation
+============================================
+
+This check warns about the performance overhead arising from concatenating
+strings using the ``operator+``, for instance:
+
+.. code-block:: c++
+
+    std::string a("Foo"), b("Bar");
+    a = a + b;
+
+Instead of this structure you should use ``operator+=`` or ``std::string``'s
+(``std::basic_string``) class member function ``append()``. For instance:
+
+.. code-block:: c++
+
+   std::string a("Foo"), b("Baz");
+   for (int i = 0; i < 20000; ++i) {
+       a = a + "Bar" + b;
+   }
+
+Could be rewritten in a greatly more efficient way like:
+
+.. code-block:: c++
+
+   std::string a("Foo"), b("Baz");
+   for (int i = 0; i < 20000; ++i) {
+       a.append("Bar").append(b);
+   }
+
+And this can be rewritten too:
+
+.. code-block:: c++
+
+   void f(const std::string&) {}
+   std::string a("Foo"), b("Baz");
+   void g() {
+       f(a + "Bar" + b);
+   }
+
+In a slightly more efficient way like:
+
+.. code-block:: c++
+
+   void f(const std::string&) {}
+   std::string a("Foo"), b("Baz");
+   void g() {
+       f(std::string(a).append("Bar").append(b));
+   }
+
+Options
+-------
+
+.. option:: StrictMode
+
+   When zero, the check will only check the string usage in ``while``, ``for``
+   and ``for-range`` statements. Default is `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-vector-operation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-vector-operation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-vector-operation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-inefficient-vector-operation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - performance-inefficient-vector-operation
+
+performance-inefficient-vector-operation
+========================================
+
+Finds possible inefficient ``std::vector`` operations (e.g. ``push_back``,
+``emplace_back``) that may cause unnecessary memory reallocations.
+
+Currently, the check only detects following kinds of loops with a single
+statement body:
+
+* Counter-based for loops start with 0:
+
+.. code-block:: c++
+
+  std::vector<int> v;
+  for (int i = 0; i < n; ++i) {
+    v.push_back(n);
+    // This will trigger the warning since the push_back may cause multiple
+    // memory reallocations in v. This can be avoid by inserting a 'reserve(n)'
+    // statement before the for statement.
+  }
+
+
+* For-range loops like ``for (range-declaration : range_expression)``, the type
+  of ``range_expression`` can be ``std::vector``, ``std::array``,
+  ``std::deque``, ``std::set``, ``std::unordered_set``, ``std::map``,
+  ``std::unordered_set``:
+
+.. code-block:: c++
+
+  std::vector<int> data;
+  std::vector<int> v;
+
+  for (auto element : data) {
+    v.push_back(element);
+    // This will trigger the warning since the 'push_back' may cause multiple
+    // memory reallocations in v. This can be avoid by inserting a
+    // 'reserve(data.size())' statement before the for statement.
+  }
+
+
+Options
+-------
+
+.. option:: VectorLikeClasses
+
+   Semicolon-separated list of names of vector-like classes. By default only
+   ``::std::vector`` is considered.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-const-arg.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-const-arg.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-const-arg.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-const-arg.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,37 @@
+.. title:: clang-tidy - performance-move-const-arg
+
+performance-move-const-arg
+==========================
+
+The check warns
+
+- if ``std::move()`` is called with a constant argument,
+
+- if ``std::move()`` is called with an argument of a trivially-copyable type,
+
+- if the result of ``std::move()`` is passed as a const reference argument.
+
+In all three cases, the check will suggest a fix that removes the
+``std::move()``.
+
+Here are examples of each of the three cases:
+
+.. code-block:: c++
+
+  const string s;
+  return std::move(s);  // Warning: std::move of the const variable has no effect
+
+  int x;
+  return std::move(x);  // Warning: std::move of the variable of a trivially-copyable type has no effect
+
+  void f(const string &s);
+  string s;
+  f(std::move(s));  // Warning: passing result of std::move as a const reference argument; no move will actually happen
+
+Options
+-------
+
+.. option:: CheckTriviallyCopyableMove
+
+   If non-zero, enables detection of trivially copyable types that do not
+   have a move constructor. Default is non-zero.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-constructor-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-constructor-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-constructor-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-move-constructor-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - performance-move-constructor-init
+
+performance-move-constructor-init
+=================================
+
+"cert-oop11-cpp" redirects here as an alias for this check.
+
+The check flags user-defined move constructors that have a ctor-initializer
+initializing a member or base class through a copy constructor instead of a
+move constructor.
+
+Options
+-------
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-noexcept-move-constructor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-noexcept-move-constructor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-noexcept-move-constructor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-noexcept-move-constructor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - performance-noexcept-move-constructor
+
+performance-noexcept-move-constructor
+=====================================
+
+
+The check flags user-defined move constructors and assignment operators not
+marked with ``noexcept`` or marked with ``noexcept(expr)`` where ``expr``
+evaluates to ``false`` (but is not a ``false`` literal itself).
+
+Move constructors of all the types used with STL containers, for example,
+need to be declared ``noexcept``. Otherwise STL will choose copy constructors
+instead. The same is valid for move assignment operations.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-type-promotion-in-math-fn.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-type-promotion-in-math-fn.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-type-promotion-in-math-fn.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-type-promotion-in-math-fn.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - performance-type-promotion-in-math-fn
+
+performance-type-promotion-in-math-fn
+=====================================
+
+Finds calls to C math library functions (from ``math.h`` or, in C++, ``cmath``)
+with implicit ``float`` to ``double`` promotions.
+
+For example, warns on ``::sin(0.f)``, because this funciton's parameter is a
+double. You probably meant to call ``std::sin(0.f)`` (in C++), or ``sinf(0.f)``
+(in C).
+
+.. code-block:: c++
+
+  float a;
+  asin(a);
+
+  // becomes
+
+  float a;
+  std::asin(a);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-copy-initialization.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-copy-initialization.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-copy-initialization.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-copy-initialization.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,47 @@
+.. title:: clang-tidy - performance-unnecessary-copy-initialization
+
+performance-unnecessary-copy-initialization
+===========================================
+
+Finds local variable declarations that are initialized using the copy
+constructor of a non-trivially-copyable type but it would suffice to obtain a
+const reference.
+
+The check is only applied if it is safe to replace the copy by a const
+reference. This is the case when the variable is const qualified or when it is
+only used as a const, i.e. only const methods or operators are invoked on it, or
+it is used as const reference or value argument in constructors or function
+calls.
+
+Example:
+
+.. code-block:: c++
+
+  const string& constReference();
+  void Function() {
+    // The warning will suggest making this a const reference.
+    const string UnnecessaryCopy = constReference();
+  }
+
+  struct Foo {
+    const string& name() const;
+  };
+  void Function(const Foo& foo) {
+    // The warning will suggest making this a const reference.
+    string UnnecessaryCopy1 = foo.name();
+    UnnecessaryCopy1.find("bar");
+
+    // The warning will suggest making this a const reference.
+    string UnnecessaryCopy2 = UnnecessaryCopy1;
+    UnnecessaryCopy2.find("bar");
+  }
+
+Options
+-------
+
+.. option:: AllowedTypes
+
+   A semicolon-separated list of names of types allowed to be initialized by
+   copying. Regular expressions are accepted, e.g. `[Rr]ef(erence)?$` matches
+   every type with suffix `Ref`, `ref`, `Reference` and `reference`. The
+   default is empty.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-value-param.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-value-param.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-value-param.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/performance-unnecessary-value-param.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,69 @@
+.. title:: clang-tidy - performance-unnecessary-value-param
+
+performance-unnecessary-value-param
+===================================
+
+Flags value parameter declarations of expensive to copy types that are copied
+for each invocation but it would suffice to pass them by const reference.
+
+The check is only applied to parameters of types that are expensive to copy
+which means they are not trivially copyable or have a non-trivial copy
+constructor or destructor.
+
+To ensure that it is safe to replace the value parameter with a const reference
+the following heuristic is employed:
+
+1. the parameter is const qualified;
+2. the parameter is not const, but only const methods or operators are invoked
+   on it, or it is used as const reference or value argument in constructors or
+   function calls.
+
+Example:
+
+.. code-block:: c++
+
+  void f(const string Value) {
+    // The warning will suggest making Value a reference.
+  }
+
+  void g(ExpensiveToCopy Value) {
+    // The warning will suggest making Value a const reference.
+    Value.ConstMethd();
+    ExpensiveToCopy Copy(Value);
+  }
+
+If the parameter is not const, only copied or assigned once and has a
+non-trivial move-constructor or move-assignment operator respectively the check
+will suggest to move it.
+
+Example:
+
+.. code-block:: c++
+
+  void setValue(string Value) {
+    Field = Value;
+  }
+
+Will become:
+
+.. code-block:: c++
+
+  #include <utility>
+
+  void setValue(string Value) {
+    Field = std::move(Value);
+  }
+
+Options
+-------
+
+.. option:: IncludeStyle
+
+   A string specifying which include-style is used, `llvm` or `google`. Default
+   is `llvm`.
+
+.. option:: AllowedTypes
+
+   A semicolon-separated list of names of types allowed to be passed by value.
+   Regular expressions are accepted, e.g. `[Rr]ef(erence)?$` matches every type
+   with suffix `Ref`, `ref`, `Reference` and `reference`. The default is empty.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/portability-simd-intrinsics.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/portability-simd-intrinsics.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/portability-simd-intrinsics.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/portability-simd-intrinsics.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,49 @@
+.. title:: clang-tidy - portability-simd-intrinsics
+
+portability-simd-intrinsics
+===========================
+
+Finds SIMD intrinsics calls and suggests ``std::experimental::simd`` (`P0214`_)
+alternatives.
+
+If the option ``Suggest`` is set to non-zero, for
+
+.. code-block:: c++
+
+  _mm_add_epi32(a, b); // x86
+  vec_add(a, b);       // Power
+
+the check suggests an alternative: ``operator+`` on ``std::experimental::simd``
+objects.
+
+Otherwise, it just complains the intrinsics are non-portable (and there are
+`P0214`_ alternatives).
+
+Many architectures provide SIMD operations (e.g. x86 SSE/AVX, Power AltiVec/VSX,
+ARM NEON). It is common that SIMD code implementing the same algorithm, is
+written in multiple target-dispatching pieces to optimize for different
+architectures or micro-architectures.
+
+The C++ standard proposal `P0214`_ and its extensions cover many common SIMD
+operations. By migrating from target-dependent intrinsics to `P0214`_
+operations, the SIMD code can be simplified and pieces for different targets can
+be unified.
+
+Refer to `P0214`_ for introduction and motivation for the data-parallel standard
+library.
+
+Options
+-------
+
+.. option:: Suggest
+
+   If this option is set to non-zero (default is `0`), the check will suggest
+   `P0214`_ alternatives, otherwise it only points out the intrinsic function is
+   non-portable.
+
+.. option:: Std
+
+   The namespace used to suggest `P0214`_ alternatives. If not specified, `std::`
+   for `-std=c++2a` and `std::experimental::` for `-std=c++11`.
+
+.. _P0214: http://wg21.link/p0214

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-avoid-const-params-in-decls.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-avoid-const-params-in-decls.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-avoid-const-params-in-decls.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-avoid-const-params-in-decls.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - readability-avoid-const-params-in-decls
+
+readability-avoid-const-params-in-decls
+=======================================
+
+Checks whether a function declaration has parameters that are top level
+``const``.
+
+``const`` values in declarations do not affect the signature of a function, so
+they should not be put there.
+
+Examples:
+
+.. code-block:: c++
+
+  void f(const string);   // Bad: const is top level.
+  void f(const string&);  // Good: const is not top level.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-braces-around-statements.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-braces-around-statements.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-braces-around-statements.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-braces-around-statements.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,38 @@
+.. title:: clang-tidy - readability-braces-around-statements
+
+readability-braces-around-statements
+====================================
+
+`google-readability-braces-around-statements` redirects here as an alias for
+this check.
+
+Checks that bodies of ``if`` statements and loops (``for``, ``do while``, and
+``while``) are inside braces.
+
+Before:
+
+.. code-block:: c++
+
+  if (condition)
+    statement;
+
+After:
+
+.. code-block:: c++
+
+  if (condition) {
+    statement;
+  }
+
+Options
+-------
+
+.. option:: ShortStatementLines
+
+   Defines the minimal number of lines that the statement should have in order
+   to trigger this check.
+
+   The number of lines is counted from the end of condition or initial keyword
+   (``do``/``else``) until the last line of the inner statement. Default value
+   `0` means that braces will be added to all statements (not having them
+   already).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-const-return-type.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-const-return-type.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-const-return-type.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-const-return-type.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - readability-const-return-type
+
+readability-const-return-type
+=============================
+
+Checks for functions with a ``const``-qualified return type and recommends
+removal of the ``const`` keyword. Such use of `const` is usually superfluous,
+and can prevent valuable compiler optimizations.  Does not (yet) fix trailing
+return types.
+
+Examples:
+
+.. code-block:: c++
+		
+  const int foo();
+  const Clazz foo();
+  Clazz *const foo();
+
+Note that this applies strictly to top-level qualification, which excludes
+pointers or references to const values. For example, these are fine:
+
+.. code-block:: c++
+
+   const int* foo();
+   const int& foo();
+   const Clazz* foo();

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-container-size-empty.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-container-size-empty.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-container-size-empty.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-container-size-empty.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,26 @@
+.. title:: clang-tidy - readability-container-size-empty
+
+readability-container-size-empty
+================================
+
+
+Checks whether a call to the ``size()`` method can be replaced with a call to
+``empty()``.
+
+The emptiness of a container should be checked using the ``empty()`` method
+instead of the ``size()`` method. It is not guaranteed that ``size()`` is a
+constant-time function, and it is generally more efficient and also shows
+clearer intent to use ``empty()``. Furthermore some containers may implement
+the ``empty()`` method but not implement the ``size()`` method. Using
+``empty()`` whenever possible makes it easier to switch to another container in
+the future.
+
+The check issues warning if a container has ``size()`` and ``empty()`` methods
+matching following signatures:
+
+.. code-block:: c++
+
+  size_type size() const;
+  bool empty() const;
+
+`size_type` can be any kind of integer type.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-delete-null-pointer.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-delete-null-pointer.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-delete-null-pointer.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-delete-null-pointer.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - readability-delete-null-pointer
+
+readability-delete-null-pointer
+===============================
+
+Checks the ``if`` statements where a pointer's existence is checked and then deletes the pointer.
+The check is unnecessary as deleting a null pointer has no effect.
+
+.. code:: c++
+
+  int *p;
+  if (p)
+    delete p;

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-deleted-default.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-deleted-default.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-deleted-default.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-deleted-default.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,22 @@
+.. title:: clang-tidy - readability-deleted-default
+
+readability-deleted-default
+===========================
+
+Checks that constructors and assignment operators marked as ``= default`` are
+not actually deleted by the compiler.
+
+.. code-block:: c++
+
+  class Example {
+  public:
+    // This constructor is deleted because I is missing a default value.
+    Example() = default;
+    // This is fine.
+    Example(const Example& Other) = default;
+    // This operator is deleted because I cannot be assigned (it is const).
+    Example& operator=(const Example& Other) = default;
+
+  private:
+    const int I;
+  };

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-else-after-return.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-else-after-return.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-else-after-return.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-else-after-return.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,64 @@
+.. title:: clang-tidy - readability-else-after-return
+
+readability-else-after-return
+=============================
+
+`LLVM Coding Standards <http://llvm.org/docs/CodingStandards.html>`_ advises to
+reduce indentation where possible and where it makes understanding code easier.
+Early exit is one of the suggested enforcements of that. Please do not use
+``else`` or ``else if`` after something that interrupts control flow - like
+``return``, ``break``, ``continue``, ``throw``.
+
+The following piece of code illustrates how the check works. This piece of code:
+
+.. code-block:: c++
+
+    void foo(int Value) {
+      int Local = 0;
+      for (int i = 0; i < 42; i++) {
+        if (Value == 1) {
+          return;
+        } else {
+          Local++;
+        }
+
+        if (Value == 2)
+          continue;
+        else
+          Local++;
+
+        if (Value == 3) {
+          throw 42;
+        } else {
+          Local++;
+        }
+      }
+    }
+
+
+Would be transformed into:
+
+.. code-block:: c++
+
+    void foo(int Value) {
+      int Local = 0;
+      for (int i = 0; i < 42; i++) {
+        if (Value == 1) {
+          return;
+        }
+        Local++;
+
+        if (Value == 2)
+          continue;
+        Local++;
+
+        if (Value == 3) {
+          throw 42;
+        }
+        Local++;
+      }
+    }
+
+
+This check helps to enforce this `LLVM Coding Standards recommendation
+<http://llvm.org/docs/CodingStandards.html#don-t-use-else-after-a-return>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-function-size.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-function-size.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-function-size.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-function-size.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,45 @@
+.. title:: clang-tidy - readability-function-size
+
+readability-function-size
+=========================
+
+`google-readability-function-size` redirects here as an alias for this check.
+
+Checks for large functions based on various metrics.
+
+Options
+-------
+
+.. option:: LineThreshold
+
+   Flag functions exceeding this number of lines. The default is `-1` (ignore
+   the number of lines).
+
+.. option:: StatementThreshold
+
+   Flag functions exceeding this number of statements. This may differ
+   significantly from the number of lines for macro-heavy code. The default is
+   `800`.
+
+.. option:: BranchThreshold
+
+   Flag functions exceeding this number of control statements. The default is
+   `-1` (ignore the number of branches).
+
+.. option:: ParameterThreshold
+
+   Flag functions that exceed a specified number of parameters. The default
+   is `-1` (ignore the number of parameters).
+
+.. option:: NestingThreshold
+
+    Flag compound statements which create next nesting level after
+    `NestingThreshold`. This may differ significantly from the expected value
+    for macro-heavy code. The default is `-1` (ignore the nesting level).
+
+.. option:: VariableThreshold
+
+   Flag functions exceeding this number of variables declared in the body.
+   The default is `-1` (ignore the number of variables).
+   Please note that function parameters and variables declared in lambdas,
+   GNU Statement Expressions, and nested class inline functions are not counted.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-identifier-naming.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-identifier-naming.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-identifier-naming.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-identifier-naming.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,1923 @@
+.. title:: clang-tidy - readability-identifier-naming
+
+readability-identifier-naming
+=============================
+
+Checks for identifiers naming style mismatch.
+
+This check will try to enforce coding guidelines on the identifiers naming. It
+supports one of the following casing types and tries to convert from one to
+another if a mismatch is detected
+
+Casing types inclde:
+
+ - ``lower_case``,
+ - ``UPPER_CASE``,
+ - ``camelBack``,
+ - ``CamelCase``,
+ - ``camel_Snake_Back``,
+ - ``Camel_Snake_Case``,
+ - ``aNy_CasE``.
+
+It also supports a fixed prefix and suffix that will be prepended or appended
+to the identifiers, regardless of the casing.
+
+Many configuration options are available, in order to be able to create
+different rules for different kinds of identifiers. In general, the rules are
+falling back to a more generic rule if the specific case is not configured.
+
+Options
+-------
+
+The following options are describe below:
+
+ - :option:`AbstractClassCase`, :option:`AbstractClassPrefix`, :option:`AbstractClassSuffix`
+ - :option:`ClassCase`, :option:`ClassPrefix`, :option:`ClassSuffix`
+ - :option:`ClassConstantCase`, :option:`ClassConstantPrefix`, :option:`ClassConstantSuffix`
+ - :option:`ClassMemberCase`, :option:`ClassMemberPrefix`, :option:`ClassMemberSuffix`
+ - :option:`ClassMethodCase`, :option:`ClassMethodPrefix`, :option:`ClassMethodSuffix`
+ - :option:`ConstantCase`, :option:`ConstantPrefix`, :option:`ConstantSuffix`
+ - :option:`ConstantMemberCase`, :option:`ConstantMemberPrefix`, :option:`ConstantMemberSuffix`
+ - :option:`ConstantParameterCase`, :option:`ConstantParameterPrefix`, :option:`ConstantParameterSuffix`
+ - :option:`ConstantPointerParameterCase`, :option:`ConstantPointerParameterPrefix`, :option:`ConstantPointerParameterSuffix`
+ - :option:`ConstexprFunctionCase`, :option:`ConstexprFunctionPrefix`, :option:`ConstexprFunctionSuffix`
+ - :option:`ConstexprMethodCase`, :option:`ConstexprMethodPrefix`, :option:`ConstexprMethodSuffix`
+ - :option:`ConstexprVariableCase`, :option:`ConstexprVariablePrefix`, :option:`ConstexprVariableSuffix`
+ - :option:`EnumCase`, :option:`EnumPrefix`, :option:`EnumSuffix`
+ - :option:`EnumConstantCase`, :option:`EnumConstantPrefix`, :option:`EnumConstantSuffix`
+ - :option:`FunctionCase`, :option:`FunctionPrefix`, :option:`FunctionSuffix`
+ - :option:`GlobalConstantCase`, :option:`GlobalConstantPrefix`, :option:`GlobalConstantSuffix`
+ - :option:`GlobalConstantPointerCase`, :option:`GlobalConstantPointerPrefix`, :option:`GlobalConstantPointerSuffix`
+ - :option:`GlobalFunctionCase`, :option:`GlobalFunctionPrefix`, :option:`GlobalFunctionSuffix`
+ - :option:`GlobalPointerCase`, :option:`GlobalPointerPrefix`, :option:`GlobalPointerSuffix`
+ - :option:`GlobalVariableCase`, :option:`GlobalVariablePrefix`, :option:`GlobalVariableSuffix`
+ - :option:`InlineNamespaceCase`, :option:`InlineNamespacePrefix`, :option:`InlineNamespaceSuffix`
+ - :option:`LocalConstantCase`, :option:`LocalConstantPrefix`, :option:`LocalConstantSuffix`
+ - :option:`LocalConstantPointerCase`, :option:`LocalConstantPointerPrefix`, :option:`LocalConstantPointerSuffix`
+ - :option:`LocalPointerCase`, :option:`LocalPointerPrefix`, :option:`LocalPointerSuffix`
+ - :option:`LocalVariableCase`, :option:`LocalVariablePrefix`, :option:`LocalVariableSuffix`
+ - :option:`MemberCase`, :option:`MemberPrefix`, :option:`MemberSuffix`
+ - :option:`MethodCase`, :option:`MethodPrefix`, :option:`MethodSuffix`
+ - :option:`NamespaceCase`, :option:`NamespacePrefix`, :option:`NamespaceSuffix`
+ - :option:`ParameterCase`, :option:`ParameterPrefix`, :option:`ParameterSuffix`
+ - :option:`ParameterPackCase`, :option:`ParameterPackPrefix`, :option:`ParameterPackSuffix`
+ - :option:`PointerParameterCase`, :option:`PointerParameterPrefix`, :option:`PointerParameterSuffix`
+ - :option:`PrivateMemberCase`, :option:`PrivateMemberPrefix`, :option:`PrivateMemberSuffix`
+ - :option:`PrivateMethodCase`, :option:`PrivateMethodPrefix`, :option:`PrivateMethodSuffix`
+ - :option:`ProtectedMemberCase`, :option:`ProtectedMemberPrefix`, :option:`ProtectedMemberSuffix`
+ - :option:`ProtectedMethodCase`, :option:`ProtectedMethodPrefix`, :option:`ProtectedMethodSuffix`
+ - :option:`PublicMemberCase`, :option:`PublicMemberPrefix`, :option:`PublicMemberSuffix`
+ - :option:`PublicMethodCase`, :option:`PublicMethodPrefix`, :option:`PublicMethodSuffix`
+ - :option:`StaticConstantCase`, :option:`StaticConstantPrefix`, :option:`StaticConstantSuffix`
+ - :option:`StaticVariableCase`, :option:`StaticVariablePrefix`, :option:`StaticVariableSuffix`
+ - :option:`StructCase`, :option:`StructPrefix`, :option:`StructSuffix`
+ - :option:`TemplateParameterCase`, :option:`TemplateParameterPrefix`, :option:`TemplateParameterSuffix`
+ - :option:`TemplateTemplateParameterCase`, :option:`TemplateTemplateParameterPrefix`, :option:`TemplateTemplateParameterSuffix`
+ - :option:`TypeAliasCase`, :option:`TypeAliasPrefix`, :option:`TypeAliasSuffix`
+ - :option:`TypedefCase`, :option:`TypedefPrefix`, :option:`TypedefSuffix`
+ - :option:`TypeTemplateParameterCase`, :option:`TypeTemplateParameterPrefix`, :option:`TypeTemplateParameterSuffix`
+ - :option:`UnionCase`, :option:`UnionPrefix`, :option:`UnionSuffix`
+ - :option:`ValueTemplateParameterCase`, :option:`ValueTemplateParameterPrefix`, :option:`ValueTemplateParameterSuffix`
+ - :option:`VariableCase`, :option:`VariablePrefix`, :option:`VariableSuffix`
+ - :option:`VirtualMethodCase`, :option:`VirtualMethodPrefix`, :option:`VirtualMethodSuffix`
+
+.. option:: AbstractClassCase
+
+    When defined, the check will ensure abstract class names conform to the
+    selected casing.
+
+.. option:: AbstractClassPrefix
+
+    When defined, the check will ensure abstract class names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: AbstractClassSuffix
+
+    When defined, the check will ensure abstract class names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - AbstractClassCase of ``lower_case``
+   - AbstractClassPrefix of ``pre_``
+   - AbstractClassSuffix of ``_post``
+
+Identifies and/or transforms abstract class names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class ABSTRACT_CLASS {
+    public:
+      ABSTRACT_CLASS();
+    };
+
+After:
+
+.. code-block:: c++
+
+    class pre_abstract_class_post {
+    public:
+      pre_abstract_class_post();
+    };
+
+.. option:: ClassCase
+
+    When defined, the check will ensure class names conform to the
+    selected casing.
+
+.. option:: ClassPrefix
+
+    When defined, the check will ensure class names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ClassSuffix
+
+    When defined, the check will ensure class names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ClassCase of ``lower_case``
+   - ClassPrefix of ``pre_``
+   - ClassSuffix of ``_post``
+
+Identifies and/or transforms class names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      FOO();
+      ~FOO();
+    };
+
+After:
+
+.. code-block:: c++
+
+    class pre_foo_post {
+    public:
+      pre_foo_post();
+      ~pre_foo_post();
+    };
+
+.. option:: ClassConstantCase
+
+    When defined, the check will ensure class constant names conform to the
+    selected casing.
+
+.. option:: ClassConstantPrefix
+
+    When defined, the check will ensure class constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ClassConstantSuffix
+
+    When defined, the check will ensure class constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ClassConstantCase of ``lower_case``
+   - ClassConstantPrefix of ``pre_``
+   - ClassConstantSuffix of ``_post``
+
+Identifies and/or transforms class constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      static const int CLASS_CONSTANT;
+    };
+
+After:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      static const int pre_class_constant_post;
+    };
+
+.. option:: ClassMemberCase
+
+    When defined, the check will ensure class member names conform to the
+    selected casing.
+
+.. option:: ClassMemberPrefix
+
+    When defined, the check will ensure class member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ClassMemberSuffix
+
+    When defined, the check will ensure class member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ClassMemberCase of ``lower_case``
+   - ClassMemberPrefix of ``pre_``
+   - ClassMemberSuffix of ``_post``
+
+Identifies and/or transforms class member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      static int CLASS_CONSTANT;
+    };
+
+After:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      static int pre_class_constant_post;
+    };
+
+.. option:: ClassMethodCase
+
+    When defined, the check will ensure class method names conform to the
+    selected casing.
+
+.. option:: ClassMethodPrefix
+
+    When defined, the check will ensure class method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ClassMethodSuffix
+
+    When defined, the check will ensure class method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ClassMethodCase of ``lower_case``
+   - ClassMethodPrefix of ``pre_``
+   - ClassMethodSuffix of ``_post``
+
+Identifies and/or transforms class method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      int CLASS_MEMBER();
+    };
+
+After:
+
+.. code-block:: c++
+
+    class FOO {
+    public:
+      int pre_class_member_post();
+    };
+
+.. option:: ConstantCase
+
+    When defined, the check will ensure constant names conform to the
+    selected casing.
+
+.. option:: ConstantPrefix
+
+    When defined, the check will ensure constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstantSuffix
+
+    When defined, the check will ensure constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstantCase of ``lower_case``
+   - ConstantPrefix of ``pre_``
+   - ConstantSuffix of ``_post``
+
+Identifies and/or transforms constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void function() { unsigned const MyConst_array[] = {1, 2, 3}; }
+
+After:
+
+.. code-block:: c++
+
+    void function() { unsigned const pre_myconst_array_post[] = {1, 2, 3}; }
+
+.. option:: ConstantMemberCase
+
+    When defined, the check will ensure constant member names conform to the
+    selected casing.
+
+.. option:: ConstantMemberPrefix
+
+    When defined, the check will ensure constant member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstantMemberSuffix
+
+    When defined, the check will ensure constant member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstantMemberCase of ``lower_case``
+   - ConstantMemberPrefix of ``pre_``
+   - ConstantMemberSuffix of ``_post``
+
+Identifies and/or transforms constant member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+      char const MY_ConstMember_string[4] = "123";
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+      char const pre_my_constmember_string_post[4] = "123";
+    }
+
+.. option:: ConstantParameterCase
+
+    When defined, the check will ensure constant parameter names conform to the
+    selected casing.
+
+.. option:: ConstantParameterPrefix
+
+    When defined, the check will ensure constant parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstantParameterSuffix
+
+    When defined, the check will ensure constant parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstantParameterCase of ``lower_case``
+   - ConstantParameterPrefix of ``pre_``
+   - ConstantParameterSuffix of ``_post``
+
+Identifies and/or transforms constant parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int PARAMETER_1, int const CONST_parameter);
+
+After:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int PARAMETER_1, int const pre_const_parameter_post);
+
+.. option:: ConstantPointerParameterCase
+
+    When defined, the check will ensure constant pointer parameter names conform to the
+    selected casing.
+
+.. option:: ConstantPointerParameterPrefix
+
+    When defined, the check will ensure constant pointer parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstantPointerParameterSuffix
+
+    When defined, the check will ensure constant pointer parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstantPointerParameterCase of ``lower_case``
+   - ConstantPointerParameterPrefix of ``pre_``
+   - ConstantPointerParameterSuffix of ``_post``
+
+Identifies and/or transforms constant pointer parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int const *CONST_parameter);
+
+After:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int const *pre_const_parameter_post);
+
+.. option:: ConstexprFunctionCase
+
+    When defined, the check will ensure constexpr function names conform to the
+    selected casing.
+
+.. option:: ConstexprFunctionPrefix
+
+    When defined, the check will ensure constexpr function names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstexprFunctionSuffix
+
+    When defined, the check will ensure constexpr function names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstexprFunctionCase of ``lower_case``
+   - ConstexprFunctionPrefix of ``pre_``
+   - ConstexprFunctionSuffix of ``_post``
+
+Identifies and/or transforms constexpr function names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    constexpr int CE_function() { return 3; }
+
+After:
+
+.. code-block:: c++
+
+    constexpr int pre_ce_function_post() { return 3; }
+
+.. option:: ConstexprMethodCase
+
+    When defined, the check will ensure constexpr method names conform to the
+    selected casing.
+
+.. option:: ConstexprMethodPrefix
+
+    When defined, the check will ensure constexpr method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstexprMethodSuffix
+
+    When defined, the check will ensure constexpr method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstexprMethodCase of ``lower_case``
+   - ConstexprMethodPrefix of ``pre_``
+   - ConstexprMethodSuffix of ``_post``
+
+Identifies and/or transforms constexpr method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      constexpr int CST_expr_Method() { return 2; }
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      constexpr int pre_cst_expr_method_post() { return 2; }
+    }
+
+.. option:: ConstexprVariableCase
+
+    When defined, the check will ensure constexpr variable names conform to the
+    selected casing.
+
+.. option:: ConstexprVariablePrefix
+
+    When defined, the check will ensure constexpr variable names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ConstexprVariableSuffix
+
+    When defined, the check will ensure constexpr variable names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ConstexprVariableCase of ``lower_case``
+   - ConstexprVariablePrefix of ``pre_``
+   - ConstexprVariableSuffix of ``_post``
+
+Identifies and/or transforms constexpr variable names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    constexpr int ConstExpr_variable = MyConstant;
+
+After:
+
+.. code-block:: c++
+
+    constexpr int pre_constexpr_variable_post = MyConstant;
+
+.. option:: EnumCase
+
+    When defined, the check will ensure enumeration names conform to the
+    selected casing.
+
+.. option:: EnumPrefix
+
+    When defined, the check will ensure enumeration names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: EnumSuffix
+
+    When defined, the check will ensure enumeration names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - EnumCase of ``lower_case``
+   - EnumPrefix of ``pre_``
+   - EnumSuffix of ``_post``
+
+Identifies and/or transforms enumeration names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    enum FOO { One, Two, Three };
+
+After:
+
+.. code-block:: c++
+
+    enum pre_foo_post { One, Two, Three };
+
+.. option:: EnumConstantCase
+
+    When defined, the check will ensure enumeration constant names conform to the
+    selected casing.
+
+.. option:: EnumConstantPrefix
+
+    When defined, the check will ensure enumeration constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: EnumConstantSuffix
+
+    When defined, the check will ensure enumeration constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - EnumConstantCase of ``lower_case``
+   - EnumConstantPrefix of ``pre_``
+   - EnumConstantSuffix of ``_post``
+
+Identifies and/or transforms enumeration constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    enum FOO { One, Two, Three };
+
+After:
+
+.. code-block:: c++
+
+    enum FOO { pre_One_post, pre_Two_post, pre_Three_post };
+
+.. option:: FunctionCase
+
+    When defined, the check will ensure function names conform to the
+    selected casing.
+
+.. option:: FunctionPrefix
+
+    When defined, the check will ensure function names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: FunctionSuffix
+
+    When defined, the check will ensure function names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - FunctionCase of ``lower_case``
+   - FunctionPrefix of ``pre_``
+   - FunctionSuffix of ``_post``
+
+Identifies and/or transforms function names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    char MY_Function_string();
+
+After:
+
+.. code-block:: c++
+
+    char pre_my_function_string_post();
+
+.. option:: GlobalConstantCase
+
+    When defined, the check will ensure global constant names conform to the
+    selected casing.
+
+.. option:: GlobalConstantPrefix
+
+    When defined, the check will ensure global constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: GlobalConstantSuffix
+
+    When defined, the check will ensure global constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - GlobalConstantCase of ``lower_case``
+   - GlobalConstantPrefix of ``pre_``
+   - GlobalConstantSuffix of ``_post``
+
+Identifies and/or transforms global constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    unsigned const MyConstGlobal_array[] = {1, 2, 3};
+
+After:
+
+.. code-block:: c++
+
+    unsigned const pre_myconstglobal_array_post[] = {1, 2, 3};
+
+.. option:: GlobalConstantPointerCase
+
+    When defined, the check will ensure global constant pointer names conform to the
+    selected casing.
+
+.. option:: GlobalConstantPointerPrefix
+
+    When defined, the check will ensure global constant pointer names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: GlobalConstantPointerSuffix
+
+    When defined, the check will ensure global constant pointer names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - GlobalConstantPointerCase of ``lower_case``
+   - GlobalConstantPointerPrefix of ``pre_``
+   - GlobalConstantPointerSuffix of ``_post``
+
+Identifies and/or transforms global constant pointer names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    int *const MyConstantGlobalPointer = nullptr;
+
+After:
+
+.. code-block:: c++
+
+    int *const pre_myconstantglobalpointer_post = nullptr;
+
+.. option:: GlobalFunctionCase
+
+    When defined, the check will ensure global function names conform to the
+    selected casing.
+
+.. option:: GlobalFunctionPrefix
+
+    When defined, the check will ensure global function names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: GlobalFunctionSuffix
+
+    When defined, the check will ensure global function names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - GlobalFunctionCase of ``lower_case``
+   - GlobalFunctionPrefix of ``pre_``
+   - GlobalFunctionSuffix of ``_post``
+
+Identifies and/or transforms global function names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int PARAMETER_1, int const CONST_parameter);
+
+After:
+
+.. code-block:: c++
+
+    void pre_global_function_post(int PARAMETER_1, int const CONST_parameter);
+
+.. option:: GlobalPointerCase
+
+    When defined, the check will ensure global pointer names conform to the
+    selected casing.
+
+.. option:: GlobalPointerPrefix
+
+    When defined, the check will ensure global pointer names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: GlobalPointerSuffix
+
+    When defined, the check will ensure global pointer names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - GlobalPointerCase of ``lower_case``
+   - GlobalPointerPrefix of ``pre_``
+   - GlobalPointerSuffix of ``_post``
+
+Identifies and/or transforms global pointer names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    int *GLOBAL3;
+
+After:
+
+.. code-block:: c++
+
+    int *pre_global3_post;
+
+.. option:: GlobalVariableCase
+
+    When defined, the check will ensure global variable names conform to the
+    selected casing.
+
+.. option:: GlobalVariablePrefix
+
+    When defined, the check will ensure global variable names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: GlobalVariableSuffix
+
+    When defined, the check will ensure global variable names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - GlobalVariableCase of ``lower_case``
+   - GlobalVariablePrefix of ``pre_``
+   - GlobalVariableSuffix of ``_post``
+
+Identifies and/or transforms global variable names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    int GLOBAL3;
+
+After:
+
+.. code-block:: c++
+
+    int pre_global3_post;
+
+.. option:: InlineNamespaceCase
+
+    When defined, the check will ensure inline namespaces names conform to the
+    selected casing.
+
+.. option:: InlineNamespacePrefix
+
+    When defined, the check will ensure inline namespaces names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: InlineNamespaceSuffix
+
+    When defined, the check will ensure inline namespaces names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - InlineNamespaceCase of ``lower_case``
+   - InlineNamespacePrefix of ``pre_``
+   - InlineNamespaceSuffix of ``_post``
+
+Identifies and/or transforms inline namespaces names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    namespace FOO_NS {
+    inline namespace InlineNamespace {
+    ...
+    }
+    } // namespace FOO_NS
+
+After:
+
+.. code-block:: c++
+
+    namespace FOO_NS {
+    inline namespace pre_inlinenamespace_post {
+    ...
+    }
+    } // namespace FOO_NS
+
+.. option:: LocalConstantCase
+
+    When defined, the check will ensure local constant names conform to the
+    selected casing.
+
+.. option:: LocalConstantPrefix
+
+    When defined, the check will ensure local constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: LocalConstantSuffix
+
+    When defined, the check will ensure local constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - LocalConstantCase of ``lower_case``
+   - LocalConstantPrefix of ``pre_``
+   - LocalConstantSuffix of ``_post``
+
+Identifies and/or transforms local constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void foo() { int const local_Constant = 3; }
+
+After:
+
+.. code-block:: c++
+
+    void foo() { int const pre_local_constant_post = 3; }
+
+.. option:: LocalConstantPointerCase
+
+    When defined, the check will ensure local constant pointer names conform to the
+    selected casing.
+
+.. option:: LocalConstantPointerPrefix
+
+    When defined, the check will ensure local constant pointer names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: LocalConstantPointerSuffix
+
+    When defined, the check will ensure local constant pointer names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - LocalConstantPointerCase of ``lower_case``
+   - LocalConstantPointerPrefix of ``pre_``
+   - LocalConstantPointerSuffix of ``_post``
+
+Identifies and/or transforms local constant pointer names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void foo() { int const *local_Constant = 3; }
+
+After:
+
+.. code-block:: c++
+
+    void foo() { int const *pre_local_constant_post = 3; }
+
+.. option:: LocalPointerCase
+
+    When defined, the check will ensure local pointer names conform to the
+    selected casing.
+
+.. option:: LocalPointerPrefix
+
+    When defined, the check will ensure local pointer names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: LocalPointerSuffix
+
+    When defined, the check will ensure local pointer names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - LocalPointerCase of ``lower_case``
+   - LocalPointerPrefix of ``pre_``
+   - LocalPointerSuffix of ``_post``
+
+Identifies and/or transforms local pointer names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void foo() { int *local_Constant; }
+
+After:
+
+.. code-block:: c++
+
+    void foo() { int *pre_local_constant_post; }
+
+.. option:: LocalVariableCase
+
+    When defined, the check will ensure local variable names conform to the
+    selected casing.
+
+.. option:: LocalVariablePrefix
+
+    When defined, the check will ensure local variable names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: LocalVariableSuffix
+
+    When defined, the check will ensure local variable names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - LocalVariableCase of ``lower_case``
+   - LocalVariablePrefix of ``pre_``
+   - LocalVariableSuffix of ``_post``
+
+Identifies and/or transforms local variable names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void foo() { int local_Constant; }
+
+After:
+
+.. code-block:: c++
+
+    void foo() { int pre_local_constant_post; }
+
+.. option:: MemberCase
+
+    When defined, the check will ensure member names conform to the
+    selected casing.
+
+.. option:: MemberPrefix
+
+    When defined, the check will ensure member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: MemberSuffix
+
+    When defined, the check will ensure member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - MemberCase of ``lower_case``
+   - MemberPrefix of ``pre_``
+   - MemberSuffix of ``_post``
+
+Identifies and/or transforms member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+      char MY_ConstMember_string[4];
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+      char pre_my_constmember_string_post[4];
+    }
+
+.. option:: MethodCase
+
+    When defined, the check will ensure method names conform to the
+    selected casing.
+
+.. option:: MethodPrefix
+
+    When defined, the check will ensure method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: MethodSuffix
+
+    When defined, the check will ensure method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - MethodCase of ``lower_case``
+   - MethodPrefix of ``pre_``
+   - MethodSuffix of ``_post``
+
+Identifies and/or transforms method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+      char MY_Method_string();
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+      char pre_my_method_string_post();
+    }
+
+.. option:: NamespaceCase
+
+    When defined, the check will ensure namespace names conform to the
+    selected casing.
+
+.. option:: NamespacePrefix
+
+    When defined, the check will ensure namespace names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: NamespaceSuffix
+
+    When defined, the check will ensure namespace names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - NamespaceCase of ``lower_case``
+   - NamespacePrefix of ``pre_``
+   - NamespaceSuffix of ``_post``
+
+Identifies and/or transforms namespace names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    namespace FOO_NS {
+    ...
+    }
+
+After:
+
+.. code-block:: c++
+
+    namespace pre_foo_ns_post {
+    ...
+    }
+
+.. option:: ParameterCase
+
+    When defined, the check will ensure parameter names conform to the
+    selected casing.
+
+.. option:: ParameterPrefix
+
+    When defined, the check will ensure parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ParameterSuffix
+
+    When defined, the check will ensure parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ParameterCase of ``lower_case``
+   - ParameterPrefix of ``pre_``
+   - ParameterSuffix of ``_post``
+
+Identifies and/or transforms parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int PARAMETER_1, int const CONST_parameter);
+
+After:
+
+.. code-block:: c++
+
+    void GLOBAL_FUNCTION(int pre_parameter_post, int const CONST_parameter);
+
+.. option:: ParameterPackCase
+
+    When defined, the check will ensure parameter pack names conform to the
+    selected casing.
+
+.. option:: ParameterPackPrefix
+
+    When defined, the check will ensure parameter pack names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ParameterPackSuffix
+
+    When defined, the check will ensure parameter pack names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ParameterPackCase of ``lower_case``
+   - ParameterPackPrefix of ``pre_``
+   - ParameterPackSuffix of ``_post``
+
+Identifies and/or transforms parameter pack names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    template <typename... TYPE_parameters> {
+      void FUNCTION(int... TYPE_parameters);
+    }
+
+After:
+
+.. code-block:: c++
+
+    template <typename... TYPE_parameters> {
+      void FUNCTION(int... pre_type_parameters_post);
+    }
+
+.. option:: PointerParameterCase
+
+    When defined, the check will ensure pointer parameter names conform to the
+    selected casing.
+
+.. option:: PointerParameterPrefix
+
+    When defined, the check will ensure pointer parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: PointerParameterSuffix
+
+    When defined, the check will ensure pointer parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - PointerParameterCase of ``lower_case``
+   - PointerParameterPrefix of ``pre_``
+   - PointerParameterSuffix of ``_post``
+
+Identifies and/or transforms pointer parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    void FUNCTION(int *PARAMETER);
+
+After:
+
+.. code-block:: c++
+
+    void FUNCTION(int *pre_parameter_post);
+
+.. option:: PrivateMemberCase
+
+    When defined, the check will ensure private member names conform to the
+    selected casing.
+
+.. option:: PrivateMemberPrefix
+
+    When defined, the check will ensure private member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: PrivateMemberSuffix
+
+    When defined, the check will ensure private member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - PrivateMemberCase of ``lower_case``
+   - PrivateMemberPrefix of ``pre_``
+   - PrivateMemberSuffix of ``_post``
+
+Identifies and/or transforms private member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    private:
+      int Member_Variable;
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    private:
+      int pre_member_variable_post;
+    }
+
+.. option:: PrivateMethodCase
+
+    When defined, the check will ensure private method names conform to the
+    selected casing.
+
+.. option:: PrivateMethodPrefix
+
+    When defined, the check will ensure private method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: PrivateMethodSuffix
+
+    When defined, the check will ensure private method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - PrivateMethodCase of ``lower_case``
+   - PrivateMethodPrefix of ``pre_``
+   - PrivateMethodSuffix of ``_post``
+
+Identifies and/or transforms private method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    private:
+      int Member_Method();
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    private:
+      int pre_member_method_post();
+    }
+
+.. option:: ProtectedMemberCase
+
+    When defined, the check will ensure protected member names conform to the
+    selected casing.
+
+.. option:: ProtectedMemberPrefix
+
+    When defined, the check will ensure protected member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ProtectedMemberSuffix
+
+    When defined, the check will ensure protected member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ProtectedMemberCase of ``lower_case``
+   - ProtectedMemberPrefix of ``pre_``
+   - ProtectedMemberSuffix of ``_post``
+
+Identifies and/or transforms protected member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    protected:
+      int Member_Variable;
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    protected:
+      int pre_member_variable_post;
+    }
+
+.. option:: ProtectedMethodCase
+
+    When defined, the check will ensure protect method names conform to the
+    selected casing.
+
+.. option:: ProtectedMethodPrefix
+
+    When defined, the check will ensure protect method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ProtectedMethodSuffix
+
+    When defined, the check will ensure protect method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ProtectedMethodCase of ``lower_case``
+   - ProtectedMethodPrefix of ``pre_``
+   - ProtectedMethodSuffix of ``_post``
+
+Identifies and/or transforms protect method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    protected:
+      int Member_Method();
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    protected:
+      int pre_member_method_post();
+    }
+
+.. option:: PublicMemberCase
+
+    When defined, the check will ensure public member names conform to the
+    selected casing.
+
+.. option:: PublicMemberPrefix
+
+    When defined, the check will ensure public member names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: PublicMemberSuffix
+
+    When defined, the check will ensure public member names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - PublicMemberCase of ``lower_case``
+   - PublicMemberPrefix of ``pre_``
+   - PublicMemberSuffix of ``_post``
+
+Identifies and/or transforms public member names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      int Member_Variable;
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      int pre_member_variable_post;
+    }
+
+.. option:: PublicMethodCase
+
+    When defined, the check will ensure public method names conform to the
+    selected casing.
+
+.. option:: PublicMethodPrefix
+
+    When defined, the check will ensure public method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: PublicMethodSuffix
+
+    When defined, the check will ensure public method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - PublicMethodCase of ``lower_case``
+   - PublicMethodPrefix of ``pre_``
+   - PublicMethodSuffix of ``_post``
+
+Identifies and/or transforms public method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      int Member_Method();
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      int pre_member_method_post();
+    }
+
+.. option:: StaticConstantCase
+
+    When defined, the check will ensure static constant names conform to the
+    selected casing.
+
+.. option:: StaticConstantPrefix
+
+    When defined, the check will ensure static constant names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: StaticConstantSuffix
+
+    When defined, the check will ensure static constant names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - StaticConstantCase of ``lower_case``
+   - StaticConstantPrefix of ``pre_``
+   - StaticConstantSuffix of ``_post``
+
+Identifies and/or transforms static constant names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    static unsigned const MyConstStatic_array[] = {1, 2, 3};
+
+After:
+
+.. code-block:: c++
+
+    static unsigned const pre_myconststatic_array_post[] = {1, 2, 3};
+
+.. option:: StaticVariableCase
+
+    When defined, the check will ensure static variable names conform to the
+    selected casing.
+
+.. option:: StaticVariablePrefix
+
+    When defined, the check will ensure static variable names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: StaticVariableSuffix
+
+    When defined, the check will ensure static variable names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - StaticVariableCase of ``lower_case``
+   - StaticVariablePrefix of ``pre_``
+   - StaticVariableSuffix of ``_post``
+
+Identifies and/or transforms static variable names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    static unsigned MyStatic_array[] = {1, 2, 3};
+
+After:
+
+.. code-block:: c++
+
+    static unsigned pre_mystatic_array_post[] = {1, 2, 3};
+
+.. option:: StructCase
+
+    When defined, the check will ensure struct names conform to the
+    selected casing.
+
+.. option:: StructPrefix
+
+    When defined, the check will ensure struct names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: StructSuffix
+
+    When defined, the check will ensure struct names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - StructCase of ``lower_case``
+   - StructPrefix of ``pre_``
+   - StructSuffix of ``_post``
+
+Identifies and/or transforms struct names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    struct FOO {
+      FOO();
+      ~FOO();
+    };
+
+After:
+
+.. code-block:: c++
+
+    struct pre_foo_post {
+      pre_foo_post();
+      ~pre_foo_post();
+    };
+
+.. option:: TemplateParameterCase
+
+    When defined, the check will ensure template parameter names conform to the
+    selected casing.
+
+.. option:: TemplateParameterPrefix
+
+    When defined, the check will ensure template parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: TemplateParameterSuffix
+
+    When defined, the check will ensure template parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - TemplateParameterCase of ``lower_case``
+   - TemplateParameterPrefix of ``pre_``
+   - TemplateParameterSuffix of ``_post``
+
+Identifies and/or transforms template parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    template <typename T> class Foo {};
+
+After:
+
+.. code-block:: c++
+
+    template <typename pre_t_post> class Foo {};
+
+.. option:: TemplateTemplateParameterCase
+
+    When defined, the check will ensure template template parameter names conform to the
+    selected casing.
+
+.. option:: TemplateTemplateParameterPrefix
+
+    When defined, the check will ensure template template parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: TemplateTemplateParameterSuffix
+
+    When defined, the check will ensure template template parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - TemplateTemplateParameterCase of ``lower_case``
+   - TemplateTemplateParameterPrefix of ``pre_``
+   - TemplateTemplateParameterSuffix of ``_post``
+
+Identifies and/or transforms template template parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    template <template <typename> class TPL_parameter, int COUNT_params,
+              typename... TYPE_parameters>
+
+After:
+
+.. code-block:: c++
+
+    template <template <typename> class pre_tpl_parameter_post, int COUNT_params,
+              typename... TYPE_parameters>
+
+.. option:: TypeAliasCase
+
+    When defined, the check will ensure type alias names conform to the
+    selected casing.
+
+.. option:: TypeAliasPrefix
+
+    When defined, the check will ensure type alias names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: TypeAliasSuffix
+
+    When defined, the check will ensure type alias names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - TypeAliasCase of ``lower_case``
+   - TypeAliasPrefix of ``pre_``
+   - TypeAliasSuffix of ``_post``
+
+Identifies and/or transforms type alias names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    using MY_STRUCT_TYPE = my_structure;
+
+After:
+
+.. code-block:: c++
+
+    using pre_my_struct_type_post = my_structure;
+
+.. option:: TypedefCase
+
+    When defined, the check will ensure typedef names conform to the
+    selected casing.
+
+.. option:: TypedefPrefix
+
+    When defined, the check will ensure typedef names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: TypedefSuffix
+
+    When defined, the check will ensure typedef names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - TypedefCase of ``lower_case``
+   - TypedefPrefix of ``pre_``
+   - TypedefSuffix of ``_post``
+
+Identifies and/or transforms typedef names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    typedef int MYINT;
+
+After:
+
+.. code-block:: c++
+
+    typedef int pre_myint_post;
+
+.. option:: TypeTemplateParameterCase
+
+    When defined, the check will ensure type template parameter names conform to the
+    selected casing.
+
+.. option:: TypeTemplateParameterPrefix
+
+    When defined, the check will ensure type template parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: TypeTemplateParameterSuffix
+
+    When defined, the check will ensure type template parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - TypeTemplateParameterCase of ``lower_case``
+   - TypeTemplateParameterPrefix of ``pre_``
+   - TypeTemplateParameterSuffix of ``_post``
+
+Identifies and/or transforms type template parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    template <template <typename> class TPL_parameter, int COUNT_params,
+              typename... TYPE_parameters>
+
+After:
+
+.. code-block:: c++
+
+    template <template <typename> class TPL_parameter, int COUNT_params,
+              typename... pre_type_parameters_post>
+
+.. option:: UnionCase
+
+    When defined, the check will ensure union names conform to the
+    selected casing.
+
+.. option:: UnionPrefix
+
+    When defined, the check will ensure union names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: UnionSuffix
+
+    When defined, the check will ensure union names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - UnionCase of ``lower_case``
+   - UnionPrefix of ``pre_``
+   - UnionSuffix of ``_post``
+
+Identifies and/or transforms union names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    union FOO {
+      int a;
+      char b;
+    };
+
+After:
+
+.. code-block:: c++
+
+    union pre_foo_post {
+      int a;
+      char b;
+    };
+
+.. option:: ValueTemplateParameterCase
+
+    When defined, the check will ensure value template parameter names conform to the
+    selected casing.
+
+.. option:: ValueTemplateParameterPrefix
+
+    When defined, the check will ensure value template parameter names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: ValueTemplateParameterSuffix
+
+    When defined, the check will ensure value template parameter names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - ValueTemplateParameterCase of ``lower_case``
+   - ValueTemplateParameterPrefix of ``pre_``
+   - ValueTemplateParameterSuffix of ``_post``
+
+Identifies and/or transforms value template parameter names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    template <template <typename> class TPL_parameter, int COUNT_params,
+              typename... TYPE_parameters>
+
+After:
+
+.. code-block:: c++
+
+    template <template <typename> class TPL_parameter, int pre_count_params_post,
+              typename... TYPE_parameters>
+
+.. option:: VariableCase
+
+    When defined, the check will ensure variable names conform to the
+    selected casing.
+
+.. option:: VariablePrefix
+
+    When defined, the check will ensure variable names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: VariableSuffix
+
+    When defined, the check will ensure variable names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - VariableCase of ``lower_case``
+   - VariablePrefix of ``pre_``
+   - VariableSuffix of ``_post``
+
+Identifies and/or transforms variable names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    unsigned MyVariable;
+
+After:
+
+.. code-block:: c++
+
+    unsigned pre_myvariable_post;
+
+.. option:: VirtualMethodCase
+
+    When defined, the check will ensure virtual method names conform to the
+    selected casing.
+
+.. option:: VirtualMethodPrefix
+
+    When defined, the check will ensure virtual method names will add the
+    prefixed with the given value (regardless of casing).
+
+.. option:: VirtualMethodSuffix
+
+    When defined, the check will ensure virtual method names will add the
+    suffix with the given value (regardless of casing).
+
+For example using values of:
+
+   - VirtualMethodCase of ``lower_case``
+   - VirtualMethodPrefix of ``pre_``
+   - VirtualMethodSuffix of ``_post``
+
+Identifies and/or transforms virtual method names as follows:
+
+Before:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      virtual int MemberFunction();
+    }
+
+After:
+
+.. code-block:: c++
+
+    class Foo {
+    public:
+      virtual int pre_member_function_post();
+    }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-cast.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-cast.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-cast.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-cast.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,11 @@
+:orphan:
+
+.. title:: clang-tidy - readability-implicit-bool-cast
+.. meta::
+   :http-equiv=refresh: 5;URL=readability-implicit-bool-conversion.html
+
+readability-implicit-bool-cast
+==============================
+
+This check has been renamed to `readability-implicit-bool-conversion
+<readability-implicit-bool-conversion.html>`_.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-conversion.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-conversion.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-conversion.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-implicit-bool-conversion.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,135 @@
+.. title:: clang-tidy - readability-implicit-bool-conversion
+
+readability-implicit-bool-conversion
+====================================
+
+This check can be used to find implicit conversions between built-in types and
+booleans. Depending on use case, it may simply help with readability of the code,
+or in some cases, point to potential bugs which remain unnoticed due to implicit
+conversions.
+
+The following is a real-world example of bug which was hiding behind implicit
+``bool`` conversion:
+
+.. code-block:: c++
+
+  class Foo {
+    int m_foo;
+
+  public:
+    void setFoo(bool foo) { m_foo = foo; } // warning: implicit conversion bool -> int
+    int getFoo() { return m_foo; }
+  };
+
+  void use(Foo& foo) {
+    bool value = foo.getFoo(); // warning: implicit conversion int -> bool
+  }
+
+This code is the result of unsuccessful refactoring, where type of ``m_foo``
+changed from ``bool`` to ``int``. The programmer forgot to change all
+occurrences of ``bool``, and the remaining code is no longer correct, yet it
+still compiles without any visible warnings.
+
+In addition to issuing warnings, fix-it hints are provided to help solve the
+reported issues. This can be used for improving readability of code, for
+example:
+
+.. code-block:: c++
+
+  void conversionsToBool() {
+    float floating;
+    bool boolean = floating;
+    // ^ propose replacement: bool boolean = floating != 0.0f;
+
+    int integer;
+    if (integer) {}
+    // ^ propose replacement: if (integer != 0) {}
+
+    int* pointer;
+    if (!pointer) {}
+    // ^ propose replacement: if (pointer == nullptr) {}
+
+    while (1) {}
+    // ^ propose replacement: while (true) {}
+  }
+
+  void functionTakingInt(int param);
+
+  void conversionsFromBool() {
+    bool boolean;
+    functionTakingInt(boolean);
+    // ^ propose replacement: functionTakingInt(static_cast<int>(boolean));
+
+    functionTakingInt(true);
+    // ^ propose replacement: functionTakingInt(1);
+  }
+
+In general, the following conversion types are checked:
+
+- integer expression/literal to boolean (conversion from a single bit bitfield
+  to boolean is explicitly allowed, since there's no ambiguity / information
+  loss in this case),
+
+- floating expression/literal to boolean,
+
+- pointer/pointer to member/``nullptr``/``NULL`` to boolean,
+
+- boolean expression/literal to integer (conversion from boolean to a single
+  bit bitfield is explicitly allowed),
+
+- boolean expression/literal to floating.
+
+The rules for generating fix-it hints are:
+
+- in case of conversions from other built-in type to bool, an explicit
+  comparison is proposed to make it clear what exaclty is being compared:
+
+  - ``bool boolean = floating;`` is changed to
+    ``bool boolean = floating == 0.0f;``,
+
+  - for other types, appropriate literals are used (``0``, ``0u``, ``0.0f``,
+    ``0.0``, ``nullptr``),
+
+- in case of negated expressions conversion to bool, the proposed replacement
+  with comparison is simplified:
+
+  - ``if (!pointer)`` is changed to ``if (pointer == nullptr)``,
+
+- in case of conversions from bool to other built-in types, an explicit
+  ``static_cast`` is proposed to make it clear that a conversion is taking
+  place:
+
+  - ``int integer = boolean;`` is changed to
+    ``int integer = static_cast<int>(boolean);``,
+
+- if the conversion is performed on type literals, an equivalent literal is
+  proposed, according to what type is actually expected, for example:
+
+  - ``functionTakingBool(0);`` is changed to ``functionTakingBool(false);``,
+
+  - ``functionTakingInt(true);`` is changed to ``functionTakingInt(1);``,
+
+  - for other types, appropriate literals are used (``false``, ``true``, ``0``,
+    ``1``, ``0u``, ``1u``, ``0.0f``, ``1.0f``, ``0.0``, ``1.0f``).
+
+Some additional accommodations are made for pre-C++11 dialects:
+
+- ``false`` literal conversion to pointer is detected,
+
+- instead of ``nullptr`` literal, ``0`` is proposed as replacement.
+
+Occurrences of implicit conversions inside macros and template instantiations
+are deliberately ignored, as it is not clear how to deal with such cases.
+
+Options
+-------
+
+.. option::  AllowIntegerConditions
+
+   When non-zero, the check will allow conditional integer conversions. Default
+   is `0`.
+
+.. option::  AllowPointerConditions
+
+   When non-zero, the check will allow conditional pointer conversions. Default
+   is `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,63 @@
+.. title:: clang-tidy - readability-inconsistent-declaration-parameter-name
+
+readability-inconsistent-declaration-parameter-name
+===================================================
+
+Find function declarations which differ in parameter names.
+
+Example:
+
+.. code-block:: c++
+
+  // in foo.hpp:
+  void foo(int a, int b, int c);
+
+  // in foo.cpp:
+  void foo(int d, int e, int f); // warning
+
+This check should help to enforce consistency in large projects, where it often
+happens that a definition of function is refactored, changing the parameter
+names, but its declaration in header file is not updated. With this check, we
+can easily find and correct such inconsistencies, keeping declaration and
+definition always in sync.
+
+Unnamed parameters are allowed and are not taken into account when comparing
+function declarations, for example:
+
+.. code-block:: c++
+
+  void foo(int a);
+  void foo(int); // no warning
+
+One name is also allowed to be a case-insensitive prefix/suffix of the other:
+
+.. code-block:: c++
+
+  void foo(int count);
+  void foo(int count_input) { // no warning
+    int count = adjustCount(count_input);
+  }
+
+To help with refactoring, in some cases fix-it hints are generated to align
+parameter names to a single naming convention. This works with the assumption
+that the function definition is the most up-to-date version, as it directly
+references parameter names in its body. Example:
+
+.. code-block:: c++
+
+  void foo(int a); // warning and fix-it hint (replace "a" to "b")
+  int foo(int b) { return b + 2; } // definition with use of "b"
+
+In the case of multiple redeclarations or function template specializations,
+a warning is issued for every redeclaration or specialization inconsistent with
+the definition or the first declaration seen in a translation unit.
+
+.. option:: IgnoreMacros
+
+   If this option is set to non-zero (default is `1`), the check will not warn
+   about names declared inside macros.
+
+.. option:: Strict
+
+   If this option is set to non-zero (default is `0`), then names must match
+   exactly (or be absent).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-isolate-declaration.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-isolate-declaration.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-isolate-declaration.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-isolate-declaration.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,100 @@
+.. title:: clang-tidy - readability-isolate-declaration
+
+readability-isolate-declaration
+===============================
+
+Detects local variable declarations declaring more than one variable and
+tries to refactor the code to one statement per declaration.
+
+The automatic code-transformation will use the same indentation as the original
+for every created statement and add a line break after each statement.
+It keeps the order of the variable declarations consistent, too.
+
+.. code-block:: c++
+
+  void f() {
+    int * pointer = nullptr, value = 42, * const const_ptr = &value;
+    // This declaration will be diagnosed and transformed into:
+    // int * pointer = nullptr;
+    // int value = 42;
+    // int * const const_ptr = &value;
+  }
+
+
+The check excludes places where it is necessary or common to declare
+multiple variables in one statement and there is no other way supported in the
+language. Please note that structured bindings are not considered.
+
+.. code-block:: c++
+
+  // It is not possible to transform this declaration and doing the declaration
+  // before the loop will increase the scope of the variable 'Begin' and 'End'
+  // which is undesirable.
+  for (int Begin = 0, End = 100; Begin < End; ++Begin);
+  if (int Begin = 42, Result = some_function(Begin); Begin == Result);
+
+  // It is not possible to transform this declaration because the result is
+  // not functionality preserving as 'j' and 'k' would not be part of the
+  // 'if' statement anymore.
+  if (SomeCondition())
+    int i = 42, j = 43, k = function(i,j);
+
+
+Limitations
+-----------
+
+Global variables and member variables are excluded.
+
+The check currently does not support the automatic transformation of
+member-pointer-types.
+
+.. code-block:: c++
+
+  struct S {
+    int a;
+    const int b;
+    void f() {}
+  };
+
+  void f() {
+    // Only a diagnostic message is emitted
+    int S::*p = &S::a, S::*const q = &S::a;
+  }
+
+Furthermore, the transformation is very cautious when it detects various kinds
+of macros or preprocessor directives in the range of the statement. In this
+case the transformation will not happen to avoid unexpected side-effects due to
+macros.
+
+.. code-block:: c++
+
+  #define NULL 0
+  #define MY_NICE_TYPE int **
+  #define VAR_NAME(name) name##__LINE__
+  #define A_BUNCH_OF_VARIABLES int m1 = 42, m2 = 43, m3 = 44;
+
+  void macros() {
+    int *p1 = NULL, *p2 = NULL;
+    // Will be transformed to
+    // int *p1 = NULL;
+    // int *p2 = NULL;
+
+    MY_NICE_TYPE p3, v1, v2;
+    // Won't be transformed, but a diagnostic is emitted.
+
+    int VAR_NAME(v3),
+        VAR_NAME(v4),
+        VAR_NAME(v5);
+    // Won't be transformed, but a diagnostic is emitted.
+
+    A_BUNCH_OF_VARIABLES
+    // Won't be transformed, but a diagnostic is emitted.
+
+    int Unconditional,
+  #if CONFIGURATION
+        IfConfigured = 42,
+  #else
+        IfConfigured = 0;
+  #endif
+    // Won't be transformed, but a diagnostic is emitted.
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-magic-numbers.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-magic-numbers.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-magic-numbers.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-magic-numbers.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,113 @@
+.. title:: clang-tidy - readability-magic-numbers
+
+readability-magic-numbers
+=========================
+
+Detects magic numbers, integer or floating point literals that are embedded in
+code and not introduced via constants or symbols.
+
+Many coding guidelines advise replacing the magic values with symbolic
+constants to improve readability. Here are a few references:
+
+   * `Rule ES.45: Avoid “magic constants”; use symbolic constants in C++ Core Guidelines <http://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines#Res-magic>`_
+   * `Rule 5.1.1 Use symbolic names instead of literal values in code in High Integrity C++ <http://www.codingstandard.com/rule/5-1-1-use-symbolic-names-instead-of-literal-values-in-code/>`_
+   * Item 17 in "C++ Coding Standards: 101 Rules, Guidelines and Best
+     Practices" by Herb Sutter and Andrei Alexandrescu
+   * Chapter 17 in "Clean Code - A handbook of agile software craftsmanship."
+     by Robert C. Martin
+   * Rule 20701 in "TRAIN REAL TIME DATA PROTOCOL Coding Rules" by Armin-Hagen
+     Weiss, Bombardier
+   * http://wiki.c2.com/?MagicNumber
+
+
+Examples of magic values:
+
+.. code-block:: c++
+
+   double circleArea = 3.1415926535 * radius * radius;
+
+   double totalCharge = 1.08 * itemPrice;
+
+   int getAnswer() {
+      return -3; // FILENOTFOUND
+   }
+
+   for (int mm = 1; mm <= 12; ++mm) {
+      std::cout << month[mm] << '\n';
+   }
+
+Example with magic values refactored:
+
+.. code-block:: c++
+
+   double circleArea = M_PI * radius * radius;
+
+   const double TAX_RATE = 0.08;  // or make it variable and read from a file
+
+   double totalCharge = (1.0 + TAX_RATE) * itemPrice;
+
+   int getAnswer() {
+      return E_FILE_NOT_FOUND;
+   }
+
+   for (int mm = 1; mm <= MONTHS_IN_A_YEAR; ++mm) {
+      std::cout << month[mm] << '\n';
+   }
+
+For integral literals by default only `0` and `1` (and `-1`) integer values
+are accepted without a warning. This can be overridden with the
+:option:`IgnoredIntegerValues` option. Negative values are accepted if their
+absolute value is present in the :option:`IgnoredIntegerValues` list.
+
+As a special case for integral values, all powers of two can be accepted
+without warning by enabling the :option:`IgnorePowersOf2IntegerValues` option.
+
+For floating point literals by default the `0.0` floating point value is
+accepted without a warning. The set of ignored floating point literals can
+be configured using the :option:`IgnoredFloatingPointValues` option.
+For each value in that set, the given string value is converted to a
+floating-point value representation used by the target architecture. If a
+floating-point literal value compares equal to one of the converted values,
+then that literal is not diagnosed by this check. Because floating-point
+equality is used to determine whether to diagnose or not, the user needs to
+be aware of the details of floating-point representations for any values that
+cannot be precisely represented for their target architecture.
+
+For each value in the :option:`IgnoredFloatingPointValues` set, both the
+single-precision form and double-precision form are accepted (for example, if
+3.14 is in the set, neither 3.14f nor 3.14 will produce a warning).
+
+Scientific notation is supported for both source code input and option.
+Alternatively, the check for the floating point numbers can be disabled for
+all floating point values by enabling the
+:option:`IgnoreAllFloatingPointValues` option.
+
+Since values `0` and `0.0` are so common as the base counter of loops,
+or initialization values for sums, they are always accepted without warning,
+even if not present in the respective ignored values list.
+
+Options
+-------
+
+.. option:: IgnoredIntegerValues
+
+   Semicolon-separated list of magic positive integers that will be accepted
+   without a warning. Default values are `{1, 2, 3, 4}`, and `0` is accepted
+   unconditionally.
+
+.. option:: IgnorePowersOf2IntegerValues
+
+   Boolean value indicating whether to accept all powers-of-two integer values
+   without warning. Default value is `false`.
+
+.. option:: IgnoredFloatingPointValues
+
+   Semicolon-separated list of magic positive floating point values that will
+   be accepted without a warning. Default values are `{1.0, 100.0}` and `0.0`
+   is accepted unconditionally.
+
+.. option:: IgnoreAllFloatingPointValues
+
+   Boolean value indicating whether to accept all floating point values without
+   warning. Default value is `false`.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misleading-indentation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misleading-indentation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misleading-indentation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misleading-indentation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,38 @@
+.. title:: clang-tidy - readability-misleading-indentation
+
+readability-misleading-indentation
+==================================
+
+Correct indentation helps to understand code. Mismatch of the syntactical
+structure and the indentation of the code may hide serious problems.
+Missing braces can also make it significantly harder to read the code,
+therefore it is important to use braces. 
+
+The way to avoid dangling else is to always check that an ``else`` belongs
+to the ``if`` that begins in the same column.
+
+You can omit braces when your inner part of e.g. an ``if`` statement has only
+one statement in it. Although in that case you should begin the next statement
+in the same column with the ``if``.
+
+Examples:
+
+.. code-block:: c++
+
+  // Dangling else:
+  if (cond1)
+    if (cond2)
+      foo1();
+  else
+    foo2();  // Wrong indentation: else belongs to if(cond2) statement.
+
+  // Missing braces:
+  if (cond1)
+    foo1();
+    foo2();  // Not guarded by if(cond1).
+
+Limitations
+-----------
+
+Note that this check only works as expected when the tabs or spaces are used
+consistently and not mixed.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misplaced-array-index.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misplaced-array-index.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misplaced-array-index.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-misplaced-array-index.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+.. title:: clang-tidy - readability-misplaced-array-index
+
+readability-misplaced-array-index
+=================================
+
+This check warns for unusual array index syntax.
+
+The following code has unusual array index syntax:
+
+.. code-block:: c++
+
+  void f(int *X, int Y) {
+    Y[X] = 0;
+  }
+
+becomes
+
+.. code-block:: c++
+
+  void f(int *X, int Y) {
+    X[Y] = 0;
+  }
+
+The check warns about such unusual syntax for readability reasons:
+ * There are programmers that are not familiar with this unusual syntax.
+ * It is possible that variables are mixed up.
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-named-parameter.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-named-parameter.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-named-parameter.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-named-parameter.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,16 @@
+.. title:: clang-tidy - readability-named-parameter
+
+readability-named-parameter
+===========================
+
+Find functions with unnamed arguments.
+
+The check implements the following rule originating in the Google C++ Style
+Guide:
+
+https://google.github.io/styleguide/cppguide.html#Function_Declarations_and_Definitions
+
+All parameters should be named, with identical names in the declaration and
+implementation.
+
+Corresponding cpplint.py check name: `readability/function`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-non-const-parameter.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-non-const-parameter.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-non-const-parameter.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-non-const-parameter.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,46 @@
+.. title:: clang-tidy - readability-non-const-parameter
+
+readability-non-const-parameter
+===============================
+
+The check finds function parameters of a pointer type that could be changed to
+point to a constant type instead.
+
+When ``const`` is used properly, many mistakes can be avoided. Advantages when
+using ``const`` properly:
+
+- prevent unintentional modification of data;
+
+- get additional warnings such as using uninitialized data;
+
+- make it easier for developers to see possible side effects.
+
+This check is not strict about constness, it only warns when the constness will
+make the function interface safer.
+
+.. code-block:: c++
+
+  // warning here; the declaration "const char *p" would make the function
+  // interface safer.
+  char f1(char *p) {
+    return *p;
+  }
+
+  // no warning; the declaration could be more const "const int * const p" but
+  // that does not make the function interface safer.
+  int f2(const int *p) {
+    return *p;
+  }
+
+  // no warning; making x const does not make the function interface safer
+  int f3(int x) {
+    return x;
+  }
+
+  // no warning; Technically, *p can be const ("const struct S *p"). But making
+  // *p const could be misleading. People might think that it's safe to pass
+  // const data to this function.
+  struct S { int *a; int *b; };
+  int f3(struct S *p) {
+    *(p->a) = 0;
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-control-flow.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-control-flow.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-control-flow.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-control-flow.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,50 @@
+.. title:: clang-tidy - readability-redundant-control-flow
+
+readability-redundant-control-flow
+==================================
+
+This check looks for procedures (functions returning no value) with ``return``
+statements at the end of the function. Such ``return`` statements are redundant.
+
+Loop statements (``for``, ``while``, ``do while``) are checked for redundant
+``continue`` statements at the end of the loop body.
+
+Examples:
+
+The following function `f` contains a redundant ``return`` statement:
+
+.. code-block:: c++
+
+  extern void g();
+  void f() {
+    g();
+    return;
+  }
+
+becomes
+
+.. code-block:: c++
+
+  extern void g();
+  void f() {
+    g();
+  }
+
+The following function `k` contains a redundant ``continue`` statement:
+
+.. code-block:: c++
+
+  void k() {
+    for (int i = 0; i < 10; ++i) {
+      continue;
+    }
+  }
+
+becomes
+
+.. code-block:: c++
+
+  void k() {
+    for (int i = 0; i < 10; ++i) {
+    }
+  }

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-declaration.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-declaration.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-declaration.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-declaration.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,37 @@
+.. title:: clang-tidy - readability-redundant-declaration
+
+readability-redundant-declaration
+=================================
+
+Finds redundant variable and function declarations.
+
+.. code-block:: c++
+
+  extern int X;
+  extern int X;
+
+becomes
+
+.. code-block:: c++
+
+  extern int X;
+
+Such redundant declarations can be removed without changing program behaviour.
+They can for instance be unintentional left overs from previous refactorings
+when code has been moved around. Having redundant declarations could in worst
+case mean that there are typos in the code that cause bugs.
+
+Normally the code can be automatically fixed, :program:`clang-tidy` can remove
+the second declaration. However there are 2 cases when you need to fix the code
+manually:
+
+* When the declarations are in different header files;
+* When multiple variables are declared together.
+
+Options
+-------
+
+.. option:: IgnoreMacros
+
+   If set to non-zero, the check will not give warnings inside macros. Default
+   is `1`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-function-ptr-dereference.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-function-ptr-dereference.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-function-ptr-dereference.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-function-ptr-dereference.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,24 @@
+.. title:: clang-tidy - readability-redundant-function-ptr-dereference
+
+readability-redundant-function-ptr-dereference
+==============================================
+
+Finds redundant dereferences of a function pointer.
+
+Before:
+
+.. code-block:: c++
+
+  int f(int,int);
+  int (*p)(int, int) = &f;
+
+  int i = (**p)(10, 50);
+
+After:
+
+.. code-block:: c++
+
+  int f(int,int);
+  int (*p)(int, int) = &f;
+
+  int i = (*p)(10, 50);

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-member-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-member-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-member-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-member-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,20 @@
+.. title:: clang-tidy - readability-redundant-member-init
+
+readability-redundant-member-init
+=================================
+
+Finds member initializations that are unnecessary because the same default
+constructor would be called if they were not present.
+
+Example:
+
+.. code-block:: c++
+
+  // Explicitly initializing the member s is unnecessary.
+  class Foo {
+  public:
+    Foo() : s() {}
+
+  private:
+    std::string s;
+  };

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-preprocessor.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-preprocessor.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-preprocessor.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-preprocessor.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,61 @@
+.. title:: clang-tidy - readability-redundant-preprocessor
+
+readability-redundant-preprocessor
+==================================
+
+Finds potentially redundant preprocessor directives. At the moment the
+following cases are detected:
+
+* `#ifdef` .. `#endif` pairs which are nested inside an outer pair with the
+  same condition. For example:
+
+.. code-block:: c++
+
+  #ifdef FOO
+  #ifdef FOO // inner ifdef is considered redundant
+  void f();
+  #endif
+  #endif
+
+* Same for `#ifndef` .. `#endif` pairs. For example:
+
+.. code-block:: c++
+
+  #ifndef FOO
+  #ifndef FOO // inner ifndef is considered redundant
+  void f();
+  #endif
+  #endif
+
+* `#ifndef` inside an `#ifdef` with the same condition:
+
+.. code-block:: c++
+
+  #ifdef FOO
+  #ifndef FOO // inner ifndef is considered redundant
+  void f();
+  #endif
+  #endif
+
+* `#ifdef` inside an `#ifndef` with the same condition:
+
+.. code-block:: c++
+
+  #ifndef FOO
+  #ifdef FOO // inner ifdef is considered redundant
+  void f();
+  #endif
+  #endif
+
+* `#if` .. `#endif` pairs which are nested inside an outer pair with the same
+  condition. For example:
+
+.. code-block:: c++
+
+  #define FOO 4
+  #if FOO == 4
+  #if FOO == 4 // inner if is considered redundant
+  void f();
+  #endif
+  #endif
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-smartptr-get.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-smartptr-get.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-smartptr-get.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-smartptr-get.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,21 @@
+.. title:: clang-tidy - readability-redundant-smartptr-get
+
+readability-redundant-smartptr-get
+==================================
+
+Find and remove redundant calls to smart pointer's ``.get()`` method.
+
+Examples:
+
+.. code-block:: c++
+
+  ptr.get()->Foo()  ==>  ptr->Foo()
+  *ptr.get()  ==>  *ptr
+  *ptr->get()  ==>  **ptr
+  if (ptr.get() == nullptr) ... => if (ptr == nullptr) ...
+
+
+.. option:: IgnoreMacros
+
+   If this option is set to non-zero (default is `1`), the check will not warn
+   about calls inside macros.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-cstr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-cstr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-cstr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-cstr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,7 @@
+.. title:: clang-tidy - readability-redundant-string-cstr
+
+readability-redundant-string-cstr
+=================================
+
+
+Finds unnecessary calls to ``std::string::c_str()`` and ``std::string::data()``.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-init.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-init.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-init.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-redundant-string-init.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,19 @@
+.. title:: clang-tidy - readability-redundant-string-init
+
+readability-redundant-string-init
+=================================
+
+Finds unnecessary string initializations.
+
+Examples:
+
+.. code-block:: c++
+
+  // Initializing string with empty string literal is unnecessary.
+  std::string a = "";
+  std::string b("");
+
+  // becomes
+
+  std::string a;
+  std::string b;

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-boolean-expr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-boolean-expr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-boolean-expr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-boolean-expr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,86 @@
+.. title:: clang-tidy - readability-simplify-boolean-expr
+
+readability-simplify-boolean-expr
+=================================
+
+Looks for boolean expressions involving boolean constants and simplifies
+them to use the appropriate boolean expression directly.
+
+Examples:
+
+===========================================  ================
+Initial expression                           Result
+-------------------------------------------  ----------------
+``if (b == true)``                             ``if (b)``
+``if (b == false)``                            ``if (!b)``
+``if (b && true)``                             ``if (b)``
+``if (b && false)``                            ``if (false)``
+``if (b || true)``                             ``if (true)``
+``if (b || false)``                            ``if (b)``
+``e ? true : false``                           ``e``
+``e ? false : true``                           ``!e``
+``if (true) t(); else f();``                   ``t();``
+``if (false) t(); else f();``                  ``f();``
+``if (e) return true; else return false;``     ``return e;``
+``if (e) return false; else return true;``     ``return !e;``
+``if (e) b = true; else b = false;``           ``b = e;``
+``if (e) b = false; else b = true;``           ``b = !e;``
+``if (e) return true; return false;``          ``return e;``
+``if (e) return false; return true;``          ``return !e;``
+===========================================  ================
+
+The resulting expression ``e`` is modified as follows:
+  1. Unnecessary parentheses around the expression are removed.
+  2. Negated applications of ``!`` are eliminated.
+  3. Negated applications of comparison operators are changed to use the
+     opposite condition.
+  4. Implicit conversions of pointers, including pointers to members, to
+     ``bool`` are replaced with explicit comparisons to ``nullptr`` in C++11
+     or ``NULL`` in C++98/03.
+  5. Implicit casts to ``bool`` are replaced with explicit casts to ``bool``.
+  6. Object expressions with ``explicit operator bool`` conversion operators
+     are replaced with explicit casts to ``bool``.
+  7. Implicit conversions of integral types to ``bool`` are replaced with
+     explicit comparisons to ``0``.
+
+Examples:
+  1. The ternary assignment ``bool b = (i < 0) ? true : false;`` has redundant
+     parentheses and becomes ``bool b = i < 0;``.
+
+  2. The conditional return ``if (!b) return false; return true;`` has an
+     implied double negation and becomes ``return b;``.
+
+  3. The conditional return ``if (i < 0) return false; return true;`` becomes
+     ``return i >= 0;``.
+
+     The conditional return ``if (i != 0) return false; return true;`` becomes
+     ``return i == 0;``.
+
+  4. The conditional return ``if (p) return true; return false;`` has an
+     implicit conversion of a pointer to ``bool`` and becomes
+     ``return p != nullptr;``.
+
+     The ternary assignment ``bool b = (i & 1) ? true : false;`` has an
+     implicit conversion of ``i & 1`` to ``bool`` and becomes
+     ``bool b = (i & 1) != 0;``.
+
+  5. The conditional return ``if (i & 1) return true; else return false;`` has
+     an implicit conversion of an integer quantity ``i & 1`` to ``bool`` and
+     becomes ``return (i & 1) != 0;``
+
+  6. Given ``struct X { explicit operator bool(); };``, and an instance ``x`` of
+     ``struct X``, the conditional return ``if (x) return true; return false;``
+     becomes ``return static_cast<bool>(x);``
+
+Options
+-------
+
+.. option:: ChainedConditionalReturn
+
+   If non-zero, conditional boolean return statements at the end of an
+   ``if/else if`` chain will be transformed. Default is `0`.
+
+.. option:: ChainedConditionalAssignment
+
+   If non-zero, conditional boolean assignments at the end of an ``if/else
+   if`` chain will be transformed. Default is `0`.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-subscript-expr.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-subscript-expr.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-subscript-expr.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-simplify-subscript-expr.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,23 @@
+.. title:: clang-tidy - readability-simplify-subscript-expr
+
+readability-simplify-subscript-expr
+===================================
+
+This check simplifies subscript expressions. Currently this covers calling
+``.data()`` and immediately doing an array subscript operation to obtain a
+single element, in which case simply calling ``operator[]`` suffice.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string s = ...;
+  char c = s.data()[i];  // char c = s[i];
+
+Options
+-------
+
+.. option:: Types
+
+   The list of type(s) that triggers this check. Default is
+   `::std::basic_string;::std::basic_string_view;::std::vector;::std::array`

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-accessed-through-instance.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-accessed-through-instance.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-accessed-through-instance.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-accessed-through-instance.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,31 @@
+.. title:: clang-tidy - readability-static-accessed-through-instance
+
+readability-static-accessed-through-instance
+============================================
+
+Checks for member expressions that access static members through instances, and
+replaces them with uses of the appropriate qualified-id.
+
+Example:
+
+The following code:
+
+.. code-block:: c++
+
+  struct C {
+    static void foo();
+    static int x;
+  };
+
+  C *c1 = new C();
+  c1->foo();
+  c1->x;
+
+is changed to:
+
+.. code-block:: c++
+
+  C *c1 = new C();
+  C::foo();
+  C::x;
+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,18 @@
+.. title:: clang-tidy - readability-static-definition-in-anonymous-namespace
+
+readability-static-definition-in-anonymous-namespace
+====================================================
+
+Finds static function and variable definitions in anonymous namespace.
+
+In this case, ``static`` is redundant, because anonymous namespace limits the
+visibility of definitions to a single translation unit.
+
+.. code-block:: c++
+
+  namespace {
+    static int a = 1; // Warning.
+    static const b = 1; // Warning.
+  }
+
+The check will apply a fix by removing the redundant ``static`` qualifier.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-string-compare.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-string-compare.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-string-compare.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-string-compare.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,54 @@
+.. title:: clang-tidy - readability-string-compare
+
+readability-string-compare
+==========================
+
+Finds string comparisons using the compare method.
+
+A common mistake is to use the string's ``compare`` method instead of using the 
+equality or inequality operators. The compare method is intended for sorting
+functions and thus returns a negative number, a positive number or 
+zero depending on the lexicographical relationship between the strings compared. 
+If an equality or inequality check can suffice, that is recommended. This is 
+recommended to avoid the risk of incorrect interpretation of the return value
+and to simplify the code. The string equality and inequality operators can
+also be faster than the ``compare`` method due to early termination.
+
+Examples:
+
+.. code-block:: c++
+
+  std::string str1{"a"};
+  std::string str2{"b"};
+
+  // use str1 != str2 instead.
+  if (str1.compare(str2)) {
+  }
+
+  // use str1 == str2 instead.
+  if (!str1.compare(str2)) {
+  }
+
+  // use str1 == str2 instead.
+  if (str1.compare(str2) == 0) {
+  }
+
+  // use str1 != str2 instead.
+  if (str1.compare(str2) != 0) {
+  }
+
+  // use str1 == str2 instead.
+  if (0 == str1.compare(str2)) {
+  }
+
+  // use str1 != str2 instead.
+  if (0 != str1.compare(str2)) {
+  }
+
+  // Use str1 == "foo" instead.
+  if (str1.compare("foo") == 0) {
+  }
+
+The above code examples shows the list of if-statements that this check will
+give a warning for. All of them uses ``compare`` to check if equality or 
+inequality of two strings instead of using the correct operators.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uniqueptr-delete-release.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uniqueptr-delete-release.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uniqueptr-delete-release.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uniqueptr-delete-release.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,17 @@
+.. title:: clang-tidy - readability-uniqueptr-delete-release
+
+readability-uniqueptr-delete-release
+====================================
+
+Replace ``delete <unique_ptr>.release()`` with ``<unique_ptr> = nullptr``.
+The latter is shorter, simpler and does not require use of raw pointer APIs.
+
+.. code-block:: c++
+
+  std::unique_ptr<int> P;
+  delete P.release();
+
+  // becomes
+
+  std::unique_ptr<int> P;
+  P = nullptr;

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uppercase-literal-suffix.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uppercase-literal-suffix.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uppercase-literal-suffix.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/readability-uppercase-literal-suffix.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,56 @@
+.. title:: clang-tidy - readability-uppercase-literal-suffix
+
+readability-uppercase-literal-suffix
+====================================
+
+`cert-dcl16-c` redirects here as an alias for this check.
+By default, only the suffixes that begin with ``l`` (``l``, ``ll``, ``lu``,
+``llu``, but not ``u``, ``ul``, ``ull``) are diagnosed by that alias.
+
+`hicpp-uppercase-literal-suffix` redirects here as an alias for this check.
+
+Detects when the integral literal or floating point (decimal or hexadecimal)
+literal has a non-uppercase suffix and provides a fix-it hint with the uppercase
+suffix.
+
+All valid combinations of suffixes are supported.
+
+.. code:: c
+
+  auto x = 1;  // OK, no suffix.
+
+  auto x = 1u; // warning: integer literal suffix 'u' is not upper-case
+
+  auto x = 1U; // OK, suffix is uppercase.
+
+  ...
+
+Options
+-------
+
+.. option:: NewSuffixes
+
+  Optionally, a list of the destination suffixes can be provided. When the
+  suffix is found, a case-insensitive lookup in that list is made, and if a
+  replacement is found that is different from the current suffix, then the
+  diagnostic is issued. This allows for fine-grained control of what suffixes to
+  consider and what their replacements should be.
+
+Example
+^^^^^^^
+
+Given a list `L;uL`:
+
+* ``l`` -> ``L``
+* ``L`` will be kept as is.
+* ``ul`` -> ``uL``
+* ``Ul`` -> ``uL``
+* ``UL`` -> ``uL``
+* ``uL`` will be kept as is.
+* ``ull`` will be kept as is, since it is not in the list
+* and so on.
+
+.. option:: IgnoreMacros
+
+   If this option is set to non-zero (default is `1`), the check will not warn
+   about literal suffixes inside macros.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/zircon-temporary-objects.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/zircon-temporary-objects.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/zircon-temporary-objects.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/checks/zircon-temporary-objects.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,53 @@
+.. title:: clang-tidy - zircon-temporary-objects
+
+zircon-temporary-objects
+========================
+
+Warns on construction of specific temporary objects in the Zircon kernel. 
+If the object should be flagged, If the object should be flagged, the fully 
+qualified type name must be explicitly passed to the check.
+
+For example, given the list of classes "Foo" and "NS::Bar", all of the 
+following will trigger the warning: 
+
+.. code-block:: c++
+
+  Foo();
+  Foo F = Foo();
+  func(Foo());
+
+  namespace NS {
+
+  Bar();
+
+  }
+
+With the same list, the following will not trigger the warning:
+
+.. code-block:: c++
+
+  Foo F;				         // Non-temporary construction okay
+  Foo F(param);			     // Non-temporary construction okay
+  Foo *F = new Foo();	   // New construction okay
+
+  Bar(); 				         // Not NS::Bar, so okay
+  NS::Bar B;			       // Non-temporary construction okay
+
+Note that objects must be explicitly specified in order to be flagged, 
+and so objects that inherit a specified object will not be flagged.
+
+This check matches temporary objects without regard for inheritance and so a
+prohibited base class type does not similarly prohibit derived class types.
+
+.. code-block:: c++
+
+  class Derived : Foo {} // Derived is not explicitly disallowed
+  Derived();             // and so temporary construction is okay
+
+Options
+-------
+
+.. option:: Names
+
+   A semi-colon-separated list of fully-qualified names of C++ classes that 
+   should not be constructed as temporaries. Default is empty.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/index.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/index.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/index.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clang-tidy/index.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,314 @@
+==========
+Clang-Tidy
+==========
+
+.. contents::
+
+See also:
+
+.. toctree::
+   :maxdepth: 1
+
+   The list of clang-tidy checks <checks/list>
+   Clang-tidy IDE/Editor Integrations <Integrations>
+   Getting Involved <Contributing>
+
+:program:`clang-tidy` is a clang-based C++ "linter" tool. Its purpose is to
+provide an extensible framework for diagnosing and fixing typical programming
+errors, like style violations, interface misuse, or bugs that can be deduced via
+static analysis. :program:`clang-tidy` is modular and provides a convenient
+interface for writing new checks.
+
+
+Using clang-tidy
+================
+
+:program:`clang-tidy` is a `LibTooling`_-based tool, and it's easier to work
+with if you set up a compile command database for your project (for an example
+of how to do this see `How To Setup Tooling For LLVM`_). You can also specify
+compilation options on the command line after ``--``:
+
+.. code-block:: console
+
+  $ clang-tidy test.cpp -- -Imy_project/include -DMY_DEFINES ...
+
+:program:`clang-tidy` has its own checks and can also run Clang static analyzer
+checks. Each check has a name and the checks to run can be chosen using the
+``-checks=`` option, which specifies a comma-separated list of positive and
+negative (prefixed with ``-``) globs. Positive globs add subsets of checks,
+negative globs remove them. For example,
+
+.. code-block:: console
+
+  $ clang-tidy test.cpp -checks=-*,clang-analyzer-*,-clang-analyzer-cplusplus*
+
+will disable all default checks (``-*``) and enable all ``clang-analyzer-*``
+checks except for ``clang-analyzer-cplusplus*`` ones.
+
+The ``-list-checks`` option lists all the enabled checks. When used without
+``-checks=``, it shows checks enabled by default. Use ``-checks=*`` to see all
+available checks or with any other value of ``-checks=`` to see which checks are
+enabled by this value.
+
+.. _checks-groups-table:
+
+There are currently the following groups of checks:
+
+====================== =========================================================
+Name prefix            Description
+====================== =========================================================
+``abseil-``            Checks related to Abseil library.
+``android-``           Checks related to Android.
+``boost-``             Checks related to Boost library.
+``bugprone-``          Checks that target bugprone code constructs.
+``cert-``              Checks related to CERT Secure Coding Guidelines.
+``cppcoreguidelines-`` Checks related to C++ Core Guidelines.
+``clang-analyzer-``    Clang Static Analyzer checks.
+``fuchsia-``           Checks related to Fuchsia coding conventions.
+``google-``            Checks related to Google coding conventions.
+``hicpp-``             Checks related to High Integrity C++ Coding Standard.
+``llvm-``              Checks related to the LLVM coding conventions.
+``misc-``              Checks that we didn't have a better category for.
+``modernize-``         Checks that advocate usage of modern (currently "modern"
+                       means "C++11") language constructs.
+``mpi-``               Checks related to MPI (Message Passing Interface).
+``objc-``              Checks related to Objective-C coding conventions.
+``performance-``       Checks that target performance-related issues.
+``portability-``       Checks that target portability-related issues that don't
+                       relate to any particular coding style.
+``readability-``       Checks that target readability-related issues that don't
+                       relate to any particular coding style.
+``zircon-``            Checks related to Zircon kernel coding conventions.
+====================== =========================================================
+
+Clang diagnostics are treated in a similar way as check diagnostics. Clang
+diagnostics are displayed by :program:`clang-tidy` and can be filtered out using
+``-checks=`` option. However, the ``-checks=`` option does not affect
+compilation arguments, so it can not turn on Clang warnings which are not
+already turned on in build configuration. The ``-warnings-as-errors=`` option
+upgrades any warnings emitted under the ``-checks=`` flag to errors (but it
+does not enable any checks itself).
+
+Clang diagnostics have check names starting with ``clang-diagnostic-``.
+Diagnostics which have a corresponding warning option, are named
+``clang-diagnostic-<warning-option>``, e.g. Clang warning controlled by
+``-Wliteral-conversion`` will be reported with check name
+``clang-diagnostic-literal-conversion``.
+
+The ``-fix`` flag instructs :program:`clang-tidy` to fix found errors if
+supported by corresponding checks.
+
+An overview of all the command-line options:
+
+.. code-block:: console
+
+  $ clang-tidy --help
+  USAGE: clang-tidy [options] <source0> [... <sourceN>]
+
+  OPTIONS:
+
+  Generic Options:
+
+    -help                         - Display available options (-help-hidden for more)
+    -help-list                    - Display list of available options (-help-list-hidden for more)
+    -version                      - Display the version of this program
+
+  clang-tidy options:
+
+    -checks=<string>              -
+                                    Comma-separated list of globs with optional '-'
+                                    prefix. Globs are processed in order of
+                                    appearance in the list. Globs without '-'
+                                    prefix add checks with matching names to the
+                                    set, globs with the '-' prefix remove checks
+                                    with matching names from the set of enabled
+                                    checks. This option's value is appended to the
+                                    value of the 'Checks' option in .clang-tidy
+                                    file, if any.
+    -config=<string>              -
+                                    Specifies a configuration in YAML/JSON format:
+                                      -config="{Checks: '*',
+                                                CheckOptions: [{key: x,
+                                                                value: y}]}"
+                                    When the value is empty, clang-tidy will
+                                    attempt to find a file named .clang-tidy for
+                                    each source file in its parent directories.
+    -dump-config                  -
+                                    Dumps configuration in the YAML format to
+                                    stdout. This option can be used along with a
+                                    file name (and '--' if the file is outside of a
+                                    project with configured compilation database).
+                                    The configuration used for this file will be
+                                    printed.
+                                    Use along with -checks=* to include
+                                    configuration of all checks.
+    -enable-check-profile         -
+                                    Enable per-check timing profiles, and print a
+                                    report to stderr.
+    -explain-config               -
+                                    For each enabled check explains, where it is
+                                    enabled, i.e. in clang-tidy binary, command
+                                    line or a specific configuration file.
+    -export-fixes=<filename>      -
+                                    YAML file to store suggested fixes in. The
+                                    stored fixes can be applied to the input source
+                                    code with clang-apply-replacements.
+    -extra-arg=<string>           - Additional argument to append to the compiler command line
+    -extra-arg-before=<string>    - Additional argument to prepend to the compiler command line
+    -fix                          -
+                                    Apply suggested fixes. Without -fix-errors
+                                    clang-tidy will bail out if any compilation
+                                    errors were found.
+    -fix-errors                   -
+                                    Apply suggested fixes even if compilation
+                                    errors were found. If compiler errors have
+                                    attached fix-its, clang-tidy will apply them as
+                                    well.
+    -format-style=<string>        -
+                                    Style for formatting code around applied fixes:
+                                      - 'none' (default) turns off formatting
+                                      - 'file' (literally 'file', not a placeholder)
+                                        uses .clang-format file in the closest parent
+                                        directory
+                                      - '{ <json> }' specifies options inline, e.g.
+                                        -format-style='{BasedOnStyle: llvm, IndentWidth: 8}'
+                                      - 'llvm', 'google', 'webkit', 'mozilla'
+                                    See clang-format documentation for the up-to-date
+                                    information about formatting styles and options.
+                                    This option overrides the 'FormatStyle` option in
+                                    .clang-tidy file, if any.
+    -header-filter=<string>       -
+                                    Regular expression matching the names of the
+                                    headers to output diagnostics from. Diagnostics
+                                    from the main file of each translation unit are
+                                    always displayed.
+                                    Can be used together with -line-filter.
+                                    This option overrides the 'HeaderFilter' option
+                                    in .clang-tidy file, if any.
+    -line-filter=<string>         -
+                                    List of files with line ranges to filter the
+                                    warnings. Can be used together with
+                                    -header-filter. The format of the list is a
+                                    JSON array of objects:
+                                      [
+                                        {"name":"file1.cpp","lines":[[1,3],[5,7]]},
+                                        {"name":"file2.h"}
+                                      ]
+    -list-checks                  -
+                                    List all enabled checks and exit. Use with
+                                    -checks=* to list all available checks.
+    -p=<string>                   - Build path
+    -quiet                        -
+                                    Run clang-tidy in quiet mode. This suppresses
+                                    printing statistics about ignored warnings and
+                                    warnings treated as errors if the respective
+                                    options are specified.
+    -store-check-profile=<prefix> -
+                                    By default reports are printed in tabulated
+                                    format to stderr. When this option is passed,
+                                    these per-TU profiles are instead stored as JSON.
+    -system-headers               - Display the errors from system headers.
+    -vfsoverlay=<filename>        -
+                                    Overlay the virtual filesystem described by file
+                                    over the real file system.
+    -warnings-as-errors=<string>  -
+                                    Upgrades warnings to errors. Same format as
+                                    '-checks'.
+                                    This option's value is appended to the value of
+                                    the 'WarningsAsErrors' option in .clang-tidy
+                                    file, if any.
+
+  -p <build-path> is used to read a compile command database.
+
+          For example, it can be a CMake build directory in which a file named
+          compile_commands.json exists (use -DCMAKE_EXPORT_COMPILE_COMMANDS=ON
+          CMake option to get this output). When no build path is specified,
+          a search for compile_commands.json will be attempted through all
+          parent paths of the first input file . See:
+          http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html for an
+          example of setting up Clang Tooling on a source tree.
+
+  <source0> ... specify the paths of source files. These paths are
+          looked up in the compile command database. If the path of a file is
+          absolute, it needs to point into CMake's source tree. If the path is
+          relative, the current working directory needs to be in the CMake
+          source tree and the file must be in a subdirectory of the current
+          working directory. "./" prefixes in the relative files will be
+          automatically removed, but the rest of a relative path must be a
+          suffix of a path in the compile command database.
+
+
+  Configuration files:
+    clang-tidy attempts to read configuration for each source file from a
+    .clang-tidy file located in the closest parent directory of the source
+    file. If any configuration options have a corresponding command-line
+    option, command-line option takes precedence. The effective
+    configuration can be inspected using -dump-config:
+
+      $ clang-tidy -dump-config
+      ---
+      Checks:          '-*,some-check'
+      WarningsAsErrors: ''
+      HeaderFilterRegex: ''
+      FormatStyle:     none
+      User:            user
+      CheckOptions:
+        - key:             some-check.SomeOption
+          value:           'some value'
+      ...
+
+Suppressing Undesired Diagnostics
+=================================
+
+:program:`clang-tidy` diagnostics are intended to call out code that does
+not adhere to a coding standard, or is otherwise problematic in some way.
+However, if it is known that the code is correct, the check-specific ways
+to silence the diagnostics could be used, if they are available (e.g.
+bugprone-use-after-move can be silenced by re-initializing the variable after it
+has been moved out, bugprone-string-integer-assignment can be suppressed by
+explicitly casting the integer to char, readability-implicit-bool-conversion can
+also be suppressed by using explicit casts, etc.). If they are not available or
+if changing the semantics of the code is not desired, the ``NOLINT`` or
+``NOLINTNEXTLINE`` comments can be used instead. For example:
+
+.. code-block:: c++
+
+  class Foo
+  {
+    // Silent all the diagnostics for the line
+    Foo(int param); // NOLINT
+
+    // Silent only the specified checks for the line
+    Foo(double param); // NOLINT(google-explicit-constructor, google-runtime-int)
+
+    // Silent only the specified diagnostics for the next line
+    // NOLINTNEXTLINE(google-explicit-constructor, google-runtime-int)
+    Foo(bool param); 
+  };
+
+The formal syntax of ``NOLINT``/``NOLINTNEXTLINE`` is the following:
+
+.. parsed-literal::
+
+  lint-comment:
+    lint-command
+    lint-command lint-args
+
+  lint-args:
+    **(** check-name-list **)**
+
+  check-name-list:
+    *check-name*
+    check-name-list **,** *check-name*
+
+  lint-command:
+    **NOLINT**
+    **NOLINTNEXTLINE**
+
+Note that whitespaces between ``NOLINT``/``NOLINTNEXTLINE`` and the opening
+parenthesis are not allowed (in this case the comment will be treated just as
+``NOLINT``/``NOLINTNEXTLINE``), whereas in check names list (inside
+the parenthesis) whitespaces can be used and will be ignored.
+
+.. _LibTooling: http://clang.llvm.org/docs/LibTooling.html
+.. _How To Setup Tooling For LLVM: http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1 @@
+:orphan:

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/DeveloperDocumentation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/DeveloperDocumentation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/DeveloperDocumentation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/DeveloperDocumentation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,29 @@
+==================================
+Developer documentation for clangd
+==================================
+
+.. toctree::
+   :maxdepth: 1
+
+   Extensions
+
+Compiling clangd
+================
+
+To build clangd from source, please follow the instructions for `building Clang
+<https://clang.llvm.org/get_started.html>`_ and include LLVM, Clang, and the
+"extra Clang tools" in your build.
+
+Contributing to clangd
+======================
+
+A good place for interested contributors is the `Clangd developer mailing list
+<https://lists.llvm.org/mailman/listinfo/clangd-dev>`_. For discussions with
+the broader community on topics not only related to Clangd, use `Clang
+developer mailing list <https://lists.llvm.org/mailman/listinfo/cfe-dev>`_.  If
+you're also interested in contributing patches to clangd, take a look at the
+`LLVM Developer Policy <https://llvm.org/docs/DeveloperPolicy.html>`_ and `Code
+Reviews <https://llvm.org/docs/Phabricator.html>`_ page. Contributions of new
+features to the `Language Server Protocol
+<https://github.com/Microsoft/language-server-protocol>`_ itself would also be
+very useful, so that clangd can eventually implement them in a conforming way.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Extensions.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Extensions.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Extensions.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Extensions.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,181 @@
+===================
+Protocol extensions
+===================
+
+clangd supports some features that are not in the official
+`Language Server Protocol specification
+<https://microsoft.github.io/language-server-protocol/specification>`__.
+
+We cautious about adding extensions. The most important considerations are:
+
+- **Editor support**: How many users will the feature be available to?
+- **Standardization**: Is the feature stable? Is it likely to be adopted by more
+  editors over time?
+- **Utility**: Does the feature provide a lot of value?
+- **Complexity**: Is this hard to implement in clangd, or constrain future work?
+  Is the protocol complicated?
+
+These extensions may evolve or disappear over time. If you use them, try to
+recover gracefully if the structures aren't what's expected.
+
+Switch between the implementation file and the header
+=====================================================
+
+*This extension is supported in clangd 6 and newer.*
+
+Switching between the implementation file and the header is an important
+feature for C++.  A language server that understands C++ can do a better job
+than the editor.
+
+**New client->server request**: ``textDocument/switchSourceHeader``.
+
+Lets editors switch between the main source file (``*.cpp``) and header (``*.h``).
+
+Parameter: ``TextDocumentIdentifier``: an open file.
+
+Result: ``string``: the URI of the corresponding header (if a source file was
+provided) or source file (if a header was provided).
+
+If the corresponding file can't be determined, ``""`` is returned.
+
+.. _lsp-extension-file-status:
+
+File status
+===========
+
+*This extension is supported in clangd 8 and newer.*
+
+It is important to provide feedback to the user when the UI is not responsive.
+
+This extension provides information about activity on clangd's per-file worker
+thread.  This information can be displayed to users to let them know that the
+language server is busy with something.  For example, in clangd, building the
+AST blocks many other operations.
+
+**New server->client notification**: ``textDocument/clangd.fileStatus``
+
+Sent when the current activity for a file changes. Replaces previous activity
+for that file.
+
+Parameter: ``FileStatus`` object with properties:
+
+- ``uri : string``: the document whose status is being updated.
+- ``state : string``: human-readable information about current activity.
+
+**New initialization option**: ``initializationOptions.clangdFileStatus : bool``
+
+Enables receiving ``textDocument/clangd.fileStatus`` notifications.
+
+.. _lsp-extension-compilation-commands:
+
+Compilation commands
+====================
+
+*This extension is supported in clangd 8 and newer.*
+
+clangd relies on knowing accurate compilation options to correctly interpret a
+file. Typically they are found in a ``compile_commands.json`` file in a
+directory that contains the file, or an ancestor directory. The following
+extensions allow editors to supply the commands over LSP instead.
+
+**New initialization option**: ``initializationOptions.compilationDatabasePath : string``
+
+Specifies the directory containing the compilation database (e.g.,
+``compile_commands.json``). This path will be used for all files, instead of
+searching their ancestor directories.
+
+**New initialization option**: ``initializationOptions.fallbackFlags : string[]``
+
+Controls the flags used when no specific compile command is found.  The compile
+command will be approximately ``clang $FILE $fallbackFlags`` in this case.
+
+**New configuration setting**: ``settings.compilationDatabaseChanges : {string: CompileCommand}``
+
+Provides compile commands for files. This can also be provided on startup as
+``initializationOptions.compilationDatabaseChanges``.
+
+Keys are file paths (Not URIs!)
+
+Values are ``{workingDirectory: string, compilationCommand: string[]}``.
+
+Force diagnostics generation
+============================
+
+*This extension is supported in clangd 7 and newer.*
+
+Clangd does not regenerate diagnostics for every version of a file (e.g., after
+every keystroke), as that would be too slow. Its heuristics ensure:
+
+- diagnostics do not get too stale,
+- if you stop editing, diagnostics will catch up.
+
+This extension allows editors to force diagnostics to be generated or not
+generated at a particular revision.
+
+**New property of** ``textDocument/didChange`` **request**: ``wantDiagnostics : bool``
+
+- if true, diagnostics will be produced for exactly this version.
+- if false, diagnostics will not be produced for this version, even if there
+  are no further edits.
+- if unset, diagnostics will be produced for this version or some subsequent
+  one in a bounded amount of time.
+
+Diagnostic categories
+=====================
+
+*This extension is supported in clangd 8 and newer.*
+
+Clang compiler groups diagnostics into categories (e.g., "Inline Assembly
+Issue").  Clangd can emit these categories for interested editors.
+
+**New property of** ``Diagnostic`` **object**: ``category : string``:
+
+A human-readable name for a group of related diagnostics.  Diagnostics with the
+same code will always have the same category.
+
+**New client capability**: ``textDocument.publishDiagnostics.categorySupport``:
+
+Requests that clangd send ``Diagnostic.category``.
+
+.. _lsp-extension-code-actions-in-diagnostics:
+
+Inline fixes for diagnostics
+============================
+
+*This extension is supported in clangd 8 and newer.*
+
+LSP specifies that code actions for diagnostics (fixes) are retrieved
+asynchronously using ``textDocument/codeAction``. clangd always computes fixes
+eagerly.  Providing them alongside diagnostics can improve the UX in editors.
+
+**New property of** ``Diagnostic`` **object**: ``codeActions : CodeAction[]``:
+
+All the code actions that address this diagnostic.
+
+**New client capability**: ``textDocument.publishDiagnostics.codeActionsInline : bool``
+
+Requests clangd to send ``Diagnostic.codeActions``.
+
+.. _lsp-extension-symbol-info:
+
+Symbol info request
+===================
+
+*This extension is supported in clangd 8 and newer.*
+
+**New client->server request**: ``textDocument/symbolInfo``:
+
+This request attempts to resolve the symbol under the cursor, without
+retrieving further information (like definition location, which may require
+consulting an index).  This request was added to support integration with
+indexes outside clangd.
+
+Parameter: ``TextDocumentPositionParams``
+
+Response: ``SymbolDetails``, an object with properties:
+
+- ``name : string`` the unqualified name of the symbol
+- ``containerName : string`` the enclosing namespace, class etc (without
+  trailing ``::``)
+- ``usr : string``: the clang-specific "unified symbol resolution" identifier
+- ``id : string?``: the clangd-specific opaque symbol ID

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Features.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Features.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Features.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Features.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,231 @@
+========
+Features
+========
+
+.. role:: raw-html(raw)
+   :format: html
+
+Here is what clangd can do for you.  Screenshots below show `VSCode
+<https://code.visualstudio.com/>`__; the available features and UI depend on
+the editor.
+
+Errors and warnings
+===================
+
+clangd runs the clang compiler on your code as you type, and shows errors and
+warnings in-place.  Some errors are suppressed: diagnostics that require
+expanding templates in headers are disabled for performance reasons.
+
+:raw-html:`<details><summary markdown="span">Screenshot</summary>`
+
+.. image:: ErrorsInVSCode.png
+   :align: center
+   :alt: Demonstration of errors
+
+:raw-html:`</details>`
+
+Fixes in errors and warnings
+----------------------------
+
+The compiler can suggest fixes for many common problems automatically, and
+clangd can update the code for you.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: ApplyFixInVSCode.gif
+   :align: center
+   :alt: Applying a fix suggested by the compiler
+
+:raw-html:`</details>`
+
+Code completion
+===============
+
+You'll see suggestions as you type based on what methods, variables, etc are
+available in this context.
+
+:raw-html:`<details><summary markdown="span">Screenshot</summary>`
+
+.. image:: CodeCompletionInVSCode.png
+   :align: center
+   :alt: Code completion demonstration
+
+:raw-html:`</details>`
+
+Abbreviating words may help you find the right result faster. If you type in
+``camelCase`` but the function you're looking for is ``snake_case``, that's OK.
+
+Insertion of namespace qualifiers and includes
+----------------------------------------------
+
+**(New in v8)**
+clangd will sometimes suggest results from other files and namespaces. In this
+case the correct qualifier and ``#include`` directive will be inserted.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: CodeCompletionInsertsNamespaceQualifiersInVSCode.gif
+   :align: center
+   :alt: Code completion inserts namespace qualifiers
+
+:raw-html:`</details>`
+
+Signature help
+--------------
+
+Some editors will show you the parameters of the function you're calling, as
+you fill them in.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: SignatureHelpInVSCode.gif
+   :align: center
+   :alt: Demonstration of the signature help feature
+
+:raw-html:`</details>`
+
+Cross-references
+================
+
+The following features let you navigate your codebase.
+
+If there is no project-wide index, cross-references work across the files
+you have opened.
+
+Find definition/declaration
+---------------------------
+
+Jump to the definition or declaration of a symbol under the cursor.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: GoToDefinitionInVSCode.gif
+   :align: center
+   :alt: Demonstration of the "Go to definition" feature
+
+:raw-html:`</details>`
+
+Find references
+---------------
+
+Show all references to a symbol under the cursor.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: FindAllReferencesInVSCode.gif
+   :align: center
+   :alt: Demonstration of the "Find all references" feature
+
+:raw-html:`</details>`
+
+Some editors will automatically highlight local references to the selected
+symbol as you move around a file.
+
+Navigation
+==========
+
+clangd informs the editor of the code structure in the current file.
+Some editors use this to present an outline view:
+
+:raw-html:`<details><summary markdown="span">Screenshot</summary>`
+
+.. image:: OutlineInVSCode.png
+   :align: center
+   :alt: Outline of a file
+
+:raw-html:`</details>`
+
+In VSCode, the outline is also presented as breadcrumbs that allow jumping to a
+symbol within the current file.  Searching for symbols within the scope of the
+whole project is also possible.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: NavigationWithBreadcrumbsInVSCode.gif
+   :align: center
+   :alt: Navigation with breadcrumbs
+
+:raw-html:`</details>`
+
+Formatting
+==========
+
+clangd embeds `clang-format <https://clang.llvm.org/docs/ClangFormat.html>`__,
+which can reformat your code: fixing indentation, breaking lines, and reflowing
+comments.
+
+:raw-html:`<details><summary markdown="span">Animated demo</summary>`
+
+.. image:: FormatSelectionInVSCode.gif
+   :align: center
+   :alt: Formatting selected code
+
+:raw-html:`</details>`
+
+clangd respects your project's ``.clang-format`` file which controls styling
+options.
+
+Format-as-you-type is experimental and doesn't work well yet.
+
+Complete list of features
+=========================
+
+Here is a list of features that could be useful for editors, together with the
+implementation status in clangd, and specification in the Language Server
+Protocol.
+
+It is not clear whether or not some of the features mentioned below should be a
+part of the Language Server Protocol; those features might be eventually
+developed outside clangd or become clangd extensions to LSP.
+
++-------------------------------------+------------+----------+
+| C/C++ Editor feature                |  LSP       |  Clangd  |
++=====================================+============+==========+
+| Formatting                          | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Completion                          | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Diagnostics                         | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Fix-its                             | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Go to Definition                    | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Signature Help                      | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Document Highlights                 | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Rename                              | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Source hover                        | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Find References                     | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Document Symbols                    | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Workspace Symbols                   | Yes        |   Yes    |
++-------------------------------------+------------+----------+
+| Code Lens                           | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Code folding                        | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Extract Local Variable              | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Extract Function/Method             | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Quick Assist                        | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Hide Method                         | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Implement Method                    | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Gen. Getters/Setters                | Yes        |   No     |
++-------------------------------------+------------+----------+
+| Syntax and Semantic Coloring        | No         |   No     |
++-------------------------------------+------------+----------+
+| Call hierarchy                      | No         |   No     |
++-------------------------------------+------------+----------+
+| Type hierarchy                      | No         |   No     |
++-------------------------------------+------------+----------+
+| Organize Includes                   | No         |   No     |
++-------------------------------------+------------+----------+

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Installation.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Installation.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Installation.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/Installation.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,371 @@
+===========================
+Getting started with clangd
+===========================
+
+.. role:: raw-html(raw)
+   :format: html
+
+To use clangd, you need to:
+
+- install clangd,
+- install a plugin for your editor,
+- tell clangd how your project is built.
+
+Installing clangd
+=================
+
+You need a **recent** version of clangd: 7.0 was the first usable release, and
+8.0 is much better.
+
+After installing, ``clangd --version`` should print ``clangd version 7.0.0`` or
+later.
+
+:raw-html:`<details><summary markdown="span">macOS</summary>`
+
+`Homebrew <https://brew.sh>`__ can install clangd along with LLVM:
+
+.. code-block:: console
+
+  $ brew install llvm
+
+If you don't want to use Homebrew, you can download the a binary release of
+LLVM from `releases.llvm.org <http://releases.llvm.org/download.html>`__.
+Alongside ``bin/clangd`` you will need at least ``lib/clang/*/include``:
+
+.. code-block:: console
+
+  $ cp clang+llvm-7.0.0/bin/clangd /usr/local/bin/clangd
+  $ cp -r clang+llvm-7.0.0/lib/clang/ /usr/local/lib/
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Windows</summary>`
+
+Download and run the LLVM installer from `releases.llvm.org
+<http://releases.llvm.org/download.html>`__.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Debian/Ubuntu</summary>`
+
+The ``clang-tools`` package usually contains an old version of clangd.
+
+Try to install the latest release (8.0):
+
+.. code-block:: console
+
+  $ sudo apt-get install clang-tools-8
+
+If that is not found, at least ``clang-tools-7`` should be available.
+
+The ``clangd`` executable will be installed as ``/usr/bin/clangd-8``. Make it
+the default ``clangd``:
+
+.. code-block:: console
+
+  $ sudo update-alternatives --install /usr/bin/clangd clangd /usr/bin/clangd-8 100
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Other systems</summary>`
+
+Most distributions include clangd in a ``clang-tools`` package, or in the full
+``llvm`` distribution.
+
+For some platforms, binaries are also avaliable at `releases.llvm.org
+<http://releases.llvm.org/download.html>`__.
+
+:raw-html:`</details>`
+
+Editor plugins
+==============
+
+Language Server plugins are available for many editors. In principle, clangd
+should work with any of them, though the feature set and UI may vary.
+
+Here are some plugins we know work well with clangd.
+
+:raw-html:`<details><summary markdown="span">YouCompleteMe for Vim</summary>`
+
+`YouCompleteMe <https://valloric.github.io/YouCompleteMe/>`__ supports clangd.
+However, clangd support is not turned on by default, so you must install
+YouCompleteMe with ``install.py --clangd-completer``.
+
+We recommend changing a couple of YCM's default settings. In ``.vimrc`` add:
+
+::
+
+  " Let clangd fully control code completion
+  let g:ycm_clangd_uses_ycmd_caching = 0
+  " Use installed clangd, not YCM-bundled clangd which doesn't get updates.
+  let g:ycm_clangd_binary_path = exepath("clangd")
+
+You should see errors highlighted and code completions as you type.
+
+.. image:: CodeCompletionInYCM.png
+   :align: center
+   :alt: Code completion in YouCompleteMe
+
+YouCompleteMe supports many of clangd's features:
+
+- code completion,
+- diagnostics and fixes (``:YcmCompleter FixIt``),
+- find declarations, references, and definitions (``:YcmCompleter GoTo`` etc),
+- rename symbol (``:YcmCompleter RefactorRename``).
+
+**Under the hood**
+
+- **Debug logs**: run ``:YcmDebugInfo`` to see clangd status, and ``:YcmToggleLogs``
+  to view clangd's debug logs.
+- **Command-line flags**: Set ``g:ycm_clangd_args`` in ``.vimrc``, e.g.:
+
+  ::
+
+    let g:ycm_clangd_args = ['-log=verbose', '-pretty']
+
+- **Alternate clangd binary**: set ``g:ycm_clangd_binary_path`` in ``.vimrc``.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">LanguageClient for Vim and Neovim</summary>`
+
+`LanguageClient-neovim <https://github.com/autozimu/LanguageClient-neovim>`__
+has `instructions for using clangd
+<https://github.com/autozimu/LanguageClient-neovim/wiki/Clangd>`__, and **may**
+be easier to install than YouCompleteMe.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Eglot for Emacs</summary>`
+
+`eglot <https://github.com/joaotavora/eglot>`__ can be configured to work with
+clangd.
+
+Install eglot with ``M-x package-install RET eglot RET``.
+
+Add the following to ``~/.emacs`` to enable clangd:
+
+::
+
+  (require 'eglot)
+  (add-to-list 'eglot-server-programs '((c++-mode c-mode) "clangd"))
+  (add-hook 'c-mode-hook 'eglot-ensure)
+  (add-hook 'c++-mode-hook 'eglot-ensure)
+
+After restarting you should see diagnostics for errors in your code, and ``M-x
+completion-at-point`` should work.
+
+.. image:: DiagnosticsInEmacsEglot.png
+   :align: center
+   :alt: Diagnostics in Emacs
+
+eglot supports many of clangd's features, with caveats:
+
+- code completion, though the interaction is quite poor (even with
+  ``company-mode``, see below),
+- diagnostics and fixes,
+- find definitions and references (``M-x xref-find-definitions`` etc),
+- hover and highlights,
+- code actions (``M-x eglot-code-actions``).
+
+**company-mode**
+
+eglot does have basic integration with company-mode, which provides a more
+fluent completion UI.
+
+You can install it with ``M-x package-install RET company RET``, and enable it
+with ``M-x company-mode``.
+
+**company-clang is enabled by default**, and will interfere with clangd.
+Disable it in ``M-x customize-variable RET company-backends RET``.
+
+Completion still has some major limitations:
+
+- completions are alphabetically sorted, not ranked.
+- only pure-prefix completions are shown - no fuzzy matches.
+- completion triggering seems to be a bit hit-and-miss.
+
+.. image:: CodeCompletionInEmacsCompanyMode.png
+   :align: center
+   :alt: Completion in company-mode
+
+**Under the hood**
+
+- **Debug logs**: available in the ``EGLOT stderr`` buffer.
+- **Command-line flags and alternate binary**: instead of adding ``"clangd"``
+  to ``eglot-server-programs``, add ``("/path/to/clangd" "-log=verbose")`` etc.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Visual Studio Code</summary>`
+
+The official extension is `vscode-clangd
+<https://marketplace.visualstudio.com/items?itemName=llvm-vs-code-extensions.vscode-clangd>`__
+and can be installed from within VSCode.
+
+Choose **View** --> **Extensions**, then search for "clangd". (Make sure the
+Microsoft C/C++ extension is **not** installed).
+
+After restarting, you should see red underlines underneath errors, and you
+should get rich code completions including e.g. function parameters.
+
+.. image:: CodeCompletionInVSCode.png
+   :align: center
+   :alt: Code completion in VSCode
+
+vscode-clangd has excellent support for all clangd features, including:
+
+- code completion
+- diagnostics and fixes
+- find declarations, references, and definitions
+- find symbol in file (``Ctrl-P @foo``) or workspace (``Ctrl-P #foo``)
+- hover and highlights
+- code actions
+
+**Under the hood**
+
+- **Debug logs**: when clangd is running, you should see "Clang Language
+  Server" in the dropdown of the Output panel (**View** -> **Output**).
+
+- **Command-line flags**: these can be passed in the ``clangd.arguments`` array
+  in your ``settings.json``. (**File** -> **Preferences** -> **Settings**).
+
+- **Alternate clangd binary**: set the ``clangd.path`` string in
+  ``settings.json``.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Sublime Text</summary>`
+
+`tomv564/LSP <https://github.com/tomv564/LSP>`__ works with clangd out of the box.
+
+Select **Tools** --> **Install Package Control** (if you haven't installed it
+yet).
+
+Press ``Ctrl-Shift-P`` and select **Package Control: Install Package**. Select
+**LSP**.
+
+Press ``Ctrl-Shift-P`` and select **LSP: Enable Language Server Globally**.
+Select **clangd**.
+
+Open a C++ file, and you should see diagnostics and completion:
+
+.. image:: CodeCompletionInSublimeText.png
+   :align: center
+   :alt: Code completion in Sublime Text
+
+
+The LSP package has excellent support for all most clangd features, including:
+
+- code completion (a bit noisy due to how snippets are presented)
+- diagnostics and fixes
+- find definition and references
+- hover and highlights
+- code actions
+
+**Under the hood**
+
+Settings can be tweaked under **Preferences** --> **Package Settings** -->
+**LSP**.
+
+- **Debug logs**: add ``"log_stderr": true``
+- **Command-line flags and alternate clangd binary**: inside the ``"clients":
+  {"clangd": { ... } }`` section, add ``"command": ["/path/to/clangd",
+  "-log=verbose"]`` etc.
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Other editors</summary>`
+
+There is a directory of LSP clients at `langserver.org
+<http://langserver.org>`__.
+
+A generic client should be configured to run the command ``clangd``, and
+communicate via the language server protocol on standard input/output.
+
+If you don't have strong feelings about an editor, we suggest you try out
+`VSCode <https://code.visualstudio.com/>`__, it has excellent language server
+support and most faithfully demonstrates what clangd can do.
+
+:raw-html:`</details>`
+
+Project setup
+=============
+
+To understand source code in your project, clangd needs to know the build
+flags.  (This is just a fact of life in C++, source files are not
+self-contained.)
+
+By default, clangd will assume that source code is built as ``clang
+some_file.cc``, and you'll probably get spurious errors about missing
+``#include``\ d files, etc.  There are a couple of ways to fix this.
+
+``compile_commands.json``
+-------------------------
+
+``compile_commands.json`` file provides compile commands for all source files
+in the project.  This file is usually generated by the build system, or tools
+integrated with the build system.  Clangd will look for this file in the parent
+directories of the files you edit.
+
+:raw-html:`<details><summary markdown="span">CMake-based projects</summary>`
+
+If your project builds with CMake, it can generate ``compile_commands.json``.
+You should enable it with:
+
+::
+
+  $ cmake -DCMAKE_EXPORT_COMPILE_COMMANDS=1
+
+``compile_commands.json`` will be written to your build directory.  You should
+symlink it (or copy it) to the root of your source tree, if they are different.
+
+::
+
+  $ ln -s ~/myproject/compile_commands.json ~/myproject-build/
+
+:raw-html:`</details>`
+
+:raw-html:`<details><summary markdown="span">Other build systems, using Bear</summary>`
+
+`Bear <https://github.com/rizsotto/Bear>`__ is a tool that generates a
+``compile_commands.json`` file by recording a complete build.
+
+For a ``make``-based build, you can run ``make clean; bear make`` to generate the
+file (and run a clean build!)
+
+:raw-html:`</details>`
+
+Other tools can also generate this file. See `the compile_commands.json
+specification <https://clang.llvm.org/docs/JSONCompilationDatabase.html>`__.
+
+``compile_flags.txt``
+---------------------
+
+If all files in a project use the same build flags, you can put those flags,
+one flag per line, in ``compile_flags.txt`` in your source root.
+
+Clangd will assume the compile command is ``clang $FLAGS some_file.cc``.
+
+Creating this file by hand is a reasonable place to start if your project is
+quite simple.
+
+.. _project-wide-index:
+
+Project-wide Index
+==================
+
+By default clangd only has a view on symbols coming from files you are
+currently editing. You can extend this view to whole project by providing a
+project-wide index to clangd.  There are two ways to do this.
+
+- Pass an experimental `-background-index` command line argument.  With
+  this feature enabled, clangd incrementally builds an index of projects
+  that you work on and uses the just-built index automatically.
+
+- Generate an index file using `clangd-indexer
+  <https://github.com/llvm/llvm-project/blob/master/clang-tools-extra/clangd/indexer/IndexerMain.cpp>`__
+  Then you can pass generated index file to clangd using
+  `-index-file=/path/to/index_file`.  *Note that clangd-indexer isn't
+  included alongside clangd in the Debian clang-tools package. You will
+  likely have to build clangd from source to use this option.*

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/index.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/index.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/index.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/clangd/index.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,27 @@
+======
+clangd
+======
+
+.. toctree::
+   :maxdepth: 1
+
+   Installation
+   Features
+
+What is clangd?
+===============
+
+clangd understands your C++ code and adds smart features to your editor: code
+completion, compile errors, go-to-definition and more.
+
+clangd is a language server that implements the `Language Server Protocol
+<https://github.com/Microsoft/language-server-protocol>`__; it can work with
+many editors through a plugin.  Here's Visual Studio Code with the clangd
+plugin, demonstrating code completion:
+
+.. image:: CodeCompletionInVSCode.png
+   :align: center
+   :alt: Code completion in VSCode
+
+clangd is based on the `Clang <https://clang.llvm.org>`__ C++ compiler, and is
+part of the `LLVM <https://llvm.org>`__ project.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/cpp11-migrate.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/cpp11-migrate.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/cpp11-migrate.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/cpp11-migrate.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,4 @@
+:orphan:
+
+All :program:`clang-modernize` transforms have moved to :doc:`clang-tidy/index`
+(see the ``modernize`` module).

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/include-fixer.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/include-fixer.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/include-fixer.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/include-fixer.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,155 @@
+===================
+Clang-Include-Fixer
+===================
+
+.. contents::
+
+One of the major nuisances of C++ compared to other languages is the manual
+management of ``#include`` directives in any file.
+:program:`clang-include-fixer` addresses one aspect of this problem by providing
+an automated way of adding ``#include`` directives for missing symbols in one
+translation unit.
+
+While inserting missing ``#include``, :program:`clang-include-fixer` adds
+missing namespace qualifiers to all instances of an unidentified symbol if
+the symbol is missing some prefix namespace qualifiers.
+
+Setup
+=====
+
+To use :program:`clang-include-fixer` two databases are required. Both can be
+generated with existing tools.
+
+- Compilation database. Contains the compiler commands for any given file in a
+  project and can be generated by CMake, see `How To Setup Tooling For LLVM`_.
+- Symbol index. Contains all symbol information in a project to match a given
+  identifier to a header file.
+
+Ideally both databases (``compile_commands.json`` and
+``find_all_symbols_db.yaml``) are linked into the root of the source tree they
+correspond to. Then the :program:`clang-include-fixer` can automatically pick
+them up if called with a source file from that tree. Note that by default
+``compile_commands.json`` as generated by CMake does not include header files,
+so only implementation files can be handled by tools.
+
+.. _How To Setup Tooling For LLVM: http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
+
+Creating a Symbol Index From a Compilation Database
+---------------------------------------------------
+
+The include fixer contains :program:`find-all-symbols`, a tool to create a
+symbol database in YAML format from a compilation database by parsing all
+source files listed in it. The following list of commands shows how to set up a
+database for LLVM, any project built by CMake should follow similar steps.
+
+.. code-block:: console
+
+  $ cd path/to/llvm-build
+  $ ninja find-all-symbols // build find-all-symbols tool.
+  $ ninja clang-include-fixer // build clang-include-fixer tool.
+  $ ls compile_commands.json # Make sure compile_commands.json exists.
+    compile_commands.json
+  $ path/to/llvm/source/tools/clang/tools/extra/include-fixer/find-all-symbols/tool/run-find-all-symbols.py
+    ... wait as clang indexes the code base ...
+  $ ln -s $PWD/find_all_symbols_db.yaml path/to/llvm/source/ # Link database into the source tree.
+  $ ln -s $PWD/compile_commands.json path/to/llvm/source/ # Also link compilation database if it's not there already.
+  $ cd path/to/llvm/source
+  $ /path/to/clang-include-fixer -db=yaml path/to/file/with/missing/include.cpp
+    Added #include "foo.h"
+
+Integrate with Vim
+------------------
+To run `clang-include-fixer` on a potentially unsaved buffer in Vim. Add the
+following key binding to your ``.vimrc``:
+
+.. code-block:: console
+
+  noremap <leader>cf :pyf path/to/llvm/source/tools/clang/tools/extra/include-fixer/tool/clang-include-fixer.py<cr>
+
+This enables `clang-include-fixer` for NORMAL and VISUAL mode. Change
+`<leader>cf` to another binding if you need clang-include-fixer on a different
+key. The `<leader> key
+<http://vim.wikia.com/wiki/Mapping_keys_in_Vim_-_Tutorial_(Part_3)#Map_leader>`_
+is a reference to a specific key defined by the mapleader variable and is bound
+to backslash by default.
+
+Make sure vim can find :program:`clang-include-fixer`:
+
+- Add the path to :program:`clang-include-fixer` to the PATH environment variable.
+- Or set ``g:clang_include_fixer_path`` in vimrc: ``let g:clang_include_fixer_path=path/to/clang-include-fixer``
+
+You can customize the number of headers being shown by setting
+``let g:clang_include_fixer_maximum_suggested_headers=5``
+
+Customized settings in `.vimrc`:
+
+- ``let g:clang_include_fixer_path = "clang-include-fixer"``
+
+  Set clang-include-fixer binary file path.
+
+- ``let g:clang_include_fixer_maximum_suggested_headers = 3``
+
+  Set the maximum number of ``#includes`` to show. Default is 3.
+
+- ``let g:clang_include_fixer_increment_num = 5``
+
+  Set the increment number of #includes to show every time when pressing ``m``.
+  Default is 5.
+
+- ``let g:clang_include_fixer_jump_to_include = 0``
+
+  Set to 1 if you want to jump to the new inserted ``#include`` line. Default is
+  0.
+
+- ``let g:clang_include_fixer_query_mode = 0``
+
+  Set to 1 if you want to insert ``#include`` for the symbol under the cursor.
+  Default is 0. Compared to normal mode, this mode won't parse the source file
+  and only search the sysmbol from database, which is faster than normal mode.
+
+See ``clang-include-fixer.py`` for more details.
+
+Integrate with Emacs
+--------------------
+To run `clang-include-fixer` on a potentially unsaved buffer in Emacs.
+Ensure that Emacs finds ``clang-include-fixer.el`` by adding the directory
+containing the file to the ``load-path`` and requiring the `clang-include-fixer`
+in your ``.emacs``:
+
+.. code-block:: console
+
+ (add-to-list 'load-path "path/to/llvm/source/tools/clang/tools/extra/include-fixer/tool/"
+ (require 'clang-include-fixer)
+
+Within Emacs the tool can be invoked with the command
+``M-x clang-include-fixer``. This will insert the header that defines the
+first undefined symbol; if there is more than one header that would define the
+symbol, the user is prompted to select one.
+
+To include the header that defines the symbol at point, run
+``M-x clang-include-fixer-at-point``.
+
+Make sure Emacs can find :program:`clang-include-fixer`:
+
+- Either add the parent directory of :program:`clang-include-fixer` to the PATH
+  environment variable, or customize the Emacs user option
+  ``clang-include-fixer-executable`` to point to the file name of the program.
+
+How it Works
+============
+
+To get the most information out of Clang at parse time,
+:program:`clang-include-fixer` runs in tandem with the parse and receives
+callbacks from Clang's semantic analysis. In particular it reuses the existing
+support for typo corrections. Whenever Clang tries to correct a potential typo
+it emits a callback to the include fixer which then looks for a corresponding
+file. At this point rich lookup information is still available, which is not
+available in the AST at a later stage.
+
+The identifier that should be typo corrected is then sent to the database, if a
+header file is returned it is added as an include directive at the top of the
+file.
+
+Currently :program:`clang-include-fixer` only inserts a single include at a
+time to avoid getting caught in follow-up errors. If multiple `#include`
+additions are desired the program can be rerun until a fix-point is reached.

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/index.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/index.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/index.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/index.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,32 @@
+.. title:: Welcome to Extra Clang Tools's documentation!
+
+Introduction
+============
+Welcome to the clang-tools-extra project which contains extra tools built using
+Clang's tooling APIs.
+
+.. toctree::
+   :maxdepth: 1
+
+   ReleaseNotes
+
+Contents
+========
+.. toctree::
+   :maxdepth: 2
+
+   clang-tidy/index
+   include-fixer
+   modularize
+   pp-trace
+   clang-rename
+   clangd/index
+   clangd/DeveloperDocumentation
+   clang-doc
+
+
+Indices and tables
+==================
+
+* :ref:`genindex`
+* :ref:`search`

Added: www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/modularize.rst.txt
URL: http://llvm.org/viewvc/llvm-project/www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/modularize.rst.txt?rev=356539&view=auto
==============================================================================
--- www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/modularize.rst.txt (added)
+++ www-releases/trunk/8.0.0/tools/clang/tools/extra/docs/_sources/modularize.rst.txt Wed Mar 20 02:13:27 2019
@@ -0,0 +1,265 @@
+.. index:: modularize
+
+==================================
+Modularize User's Manual
+==================================
+
+.. toctree::
+   :hidden:
+
+   ModularizeUsage
+
+:program:`modularize` is a standalone tool that checks whether a set of headers
+provides the consistent definitions required to use modules. For example, it
+detects whether the same entity (say, a NULL macro or size_t typedef) is
+defined in multiple headers or whether a header produces different definitions
+under different circumstances. These conditions cause modules built from the
+headers to behave poorly, and should be fixed before introducing a module
+map.
+
+:program:`modularize` also has an assistant mode option for generating
+a module map file based on the provided header list. The generated file
+is a functional module map that can be used as a starting point for a
+module.map file.
+
+Getting Started
+===============
+
+To build from source:
+
+1. Read `Getting Started with the LLVM System`_ and `Clang Tools
+   Documentation`_ for information on getting sources for LLVM, Clang, and
+   Clang Extra Tools.
+
+2. `Getting Started with the LLVM System`_ and `Building LLVM with CMake`_ give
+   directions for how to build. With sources all checked out into the
+   right place the LLVM build will build Clang Extra Tools and their
+   dependencies automatically.
+
+   * If using CMake, you can also use the ``modularize`` target to build
+     just the modularize tool and its dependencies.
+
+Before continuing, take a look at :doc:`ModularizeUsage` to see how to invoke
+modularize.
+
+.. _Getting Started with the LLVM System: http://llvm.org/docs/GettingStarted.html
+.. _Building LLVM with CMake: http://llvm.org/docs/CMake.html
+.. _Clang Tools Documentation: http://clang.llvm.org/docs/ClangTools.html
+
+What Modularize Checks
+======================
+
+Modularize will check for the following:
+
+* Duplicate global type and variable definitions
+* Duplicate macro definitions
+* Macro instances, 'defined(macro)', or #if, #elif, #ifdef, #ifndef conditions
+  that evaluate differently in a header
+* #include directives inside 'extern "C/C++" {}' or 'namespace (name) {}' blocks
+* Module map header coverage completeness (in the case of a module map input
+  only)
+
+Modularize will do normal C/C++ parsing, reporting normal errors and warnings,
+but will also report special error messages like the following::
+
+  error: '(symbol)' defined at multiple locations:
+     (file):(row):(column)
+     (file):(row):(column)
+
+  error: header '(file)' has different contents depending on how it was included
+
+The latter might be followed by messages like the following::
+
+  note: '(symbol)' in (file) at (row):(column) not always provided
+
+Checks will also be performed for macro expansions, defined(macro)
+expressions, and preprocessor conditional directives that evaluate
+inconsistently, and can produce error messages like the following::
+
+   (...)/SubHeader.h:11:5:
+  #if SYMBOL == 1
+      ^
+  error: Macro instance 'SYMBOL' has different values in this header,
+         depending on how it was included.
+    'SYMBOL' expanded to: '1' with respect to these inclusion paths:
+      (...)/Header1.h
+        (...)/SubHeader.h
+  (...)/SubHeader.h:3:9:
+  #define SYMBOL 1
+          ^
+  Macro defined here.
+    'SYMBOL' expanded to: '2' with respect to these inclusion paths:
+      (...)/Header2.h
+          (...)/SubHeader.h
+  (...)/SubHeader.h:7:9:
+  #define SYMBOL 2
+          ^
+  Macro defined here.
+
+Checks will also be performed for '#include' directives that are
+nested inside 'extern "C/C++" {}' or 'namespace (name) {}' blocks,
+and can produce error message like the following::
+
+  IncludeInExtern.h:2:3:
+  #include "Empty.h"
+  ^
+  error: Include directive within extern "C" {}.
+  IncludeInExtern.h:1:1:
+  extern "C" {
+  ^
+  The "extern "C" {}" block is here.
+
+.. _module-map-coverage:
+
+Module Map Coverage Check
+=========================
+
+The coverage check uses the Clang library to read and parse the
+module map file. Starting at the module map file directory, or just the
+include paths, if specified, it will collect the names of all the files it
+considers headers (no extension, .h, or .inc--if you need more, modify the
+isHeader function). It then compares the headers against those referenced
+in the module map, either explicitly named, or implicitly named via an
+umbrella directory or umbrella file, as parsed by the ModuleMap object.
+If headers are found which are not referenced or covered by an umbrella
+directory or file, warning messages will be produced, and this program
+will return an error code of 1. If no problems are found, an error code of
+0 is returned.
+
+Note that in the case of umbrella headers, this tool invokes the compiler
+to preprocess the file, and uses a callback to collect the header files
+included by the umbrella header or any of its nested includes. If any
+front end options are needed for these compiler invocations, these
+can be included on the command line after the module map file argument.
+
+Warning message have the form:
+
+  warning: module.modulemap does not account for file: Level3A.h
+
+Note that for the case of the module map referencing a file that does
+not exist, the module map parser in Clang will (at the time of this
+writing) display an error message.
+
+To limit the checks :program:`modularize` does to just the module
+map coverage check, use the ``-coverage-check-only option``.
+
+For example::
+
+  modularize -coverage-check-only module.modulemap
+
+.. _module-map-generation:
+
+Module Map Generation
+=====================
+
+If you specify the ``-module-map-path=<module map file>``,
+:program:`modularize` will output a module map based on the input header list.
+A module will be created for each header. Also, if the header in the header
+list is a partial path, a nested module hierarchy will be created in which a
+module will be created for each subdirectory component in the header path,
+with the header itself represented by the innermost module. If other headers
+use the same subdirectories, they will be enclosed in these same modules also.
+
+For example, for the header list::
+
+  SomeTypes.h
+  SomeDecls.h
+  SubModule1/Header1.h
+  SubModule1/Header2.h
+  SubModule2/Header3.h
+  SubModule2/Header4.h
+  SubModule2.h
+
+The following module map will be generated::
+
+  // Output/NoProblemsAssistant.txt
+  // Generated by: modularize -module-map-path=Output/NoProblemsAssistant.txt \
+       -root-module=Root NoProblemsAssistant.modularize
+  
+  module SomeTypes {
+    header "SomeTypes.h"
+    export *
+  }
+  module SomeDecls {
+    header "SomeDecls.h"
+    export *
+  }
+  module SubModule1 {
+    module Header1 {
+      header "SubModule1/Header1.h"
+      export *
+    }
+    module Header2 {
+      header "SubModule1/Header2.h"
+      export *
+    }
+  }
+  module SubModule2 {
+    module Header3 {
+      header "SubModule2/Header3.h"
+      export *
+    }
+    module Header4 {
+      header "SubModule2/Header4.h"
+      export *
+    }
+    header "SubModule2.h"
+    export *
+  }
+
+An optional ``-root-module=<root-name>`` option can be used to cause a root module
+to be created which encloses all the modules.
+
+An optional ``-problem-files-list=<problem-file-name>`` can be used to input
+a list of files to be excluded, perhaps as a temporary stop-gap measure until
+problem headers can be fixed.
+
+For example, with the same header list from above::
+
+  // Output/NoProblemsAssistant.txt
+  // Generated by: modularize -module-map-path=Output/NoProblemsAssistant.txt \
+       -root-module=Root NoProblemsAssistant.modularize
+  
+  module Root {
+    module SomeTypes {
+      header "SomeTypes.h"
+      export *
+    }
+    module SomeDecls {
+      header "SomeDecls.h"
+      export *
+    }
+    module SubModule1 {
+      module Header1 {
+        header "SubModule1/Header1.h"
+        export *
+      }
+      module Header2 {
+        header "SubModule1/Header2.h"
+        export *
+      }
+    }
+    module SubModule2 {
+      module Header3 {
+        header "SubModule2/Header3.h"
+        export *
+      }
+      module Header4 {
+        header "SubModule2/Header4.h"
+        export *
+      }
+      header "SubModule2.h"
+      export *
+    }
+  }
+
+Note that headers with dependents will be ignored with a warning, as the
+Clang module mechanism doesn't support headers the rely on other headers
+to be included first.
+
+The module map format defines some keywords which can't be used in module
+names. If a header has one of these names, an underscore ('_') will be
+prepended to the name. For example, if the header name is ``header.h``,
+because ``header`` is a keyword, the module name will be ``_header``.
+For a list of the module map keywords, please see:
+`Lexical structure <http://clang.llvm.org/docs/Modules.html#lexical-structure>`_




More information about the llvm-commits mailing list