Index: clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h +++ clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h @@ -20,7 +20,7 @@ /// deduction (CTAD), in C++17 and higher. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-cleanup-ctad.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html class CleanupCtadCheck : public utils::TransformerClangTidyCheck { public: CleanupCtadCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h @@ -19,7 +19,7 @@ /// ``absl::Time`` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-addition.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html class DurationAdditionCheck : public ClangTidyCheck { public: DurationAdditionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h @@ -19,7 +19,7 @@ /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-comparison.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html class DurationComparisonCheck : public ClangTidyCheck { public: DurationComparisonCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h @@ -19,7 +19,7 @@ /// the right conversion function instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-conversion-cast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html class DurationConversionCastCheck : public ClangTidyCheck { public: DurationConversionCastCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h @@ -18,7 +18,7 @@ // Find potential incorrect uses of integer division of absl::Duration objects. // // For the user-facing documentation see: -// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-division.html +// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html class DurationDivisionCheck : public ClangTidyCheck { public: Index: clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h @@ -21,7 +21,7 @@ /// component. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-float.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html class DurationFactoryFloatCheck : public ClangTidyCheck { public: DurationFactoryFloatCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h @@ -21,7 +21,7 @@ /// case of zero and suggests `ZeroDuration()`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-factory-scale.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html class DurationFactoryScaleCheck : public ClangTidyCheck { public: DurationFactoryScaleCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h @@ -19,7 +19,7 @@ /// `absl::Duration` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-subtraction.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html class DurationSubtractionCheck : public ClangTidyCheck { public: DurationSubtractionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h +++ clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h @@ -19,7 +19,7 @@ /// to numeric types and back again. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-duration-unnecessary-conversion.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html class DurationUnnecessaryConversionCheck : public ClangTidyCheck { public: DurationUnnecessaryConversionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h +++ clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h @@ -19,7 +19,7 @@ /// is a single character string literal and replaces it with a character. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-faster-strsplit-delimiter.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html class FasterStrsplitDelimiterCheck : public ClangTidyCheck { public: FasterStrsplitDelimiterCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h +++ clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h @@ -19,7 +19,7 @@ /// against doing so. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-no-internal-dependencies.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html class NoInternalDependenciesCheck : public ClangTidyCheck { public: NoInternalDependenciesCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h +++ clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h @@ -19,7 +19,7 @@ /// Abseil's compatibility guidelines. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-no-namespace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html class NoNamespaceCheck : public ClangTidyCheck { public: NoNamespaceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h +++ clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h @@ -22,7 +22,7 @@ /// StrCat(1, StrCat(2, 3)) ==> StrCat(1, 2, 3) /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-redundant-strcat-calls.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html class RedundantStrcatCallsCheck : public ClangTidyCheck { public: RedundantStrcatCallsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h +++ clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h @@ -19,7 +19,7 @@ /// should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-str-cat-append.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html class StrCatAppendCheck : public ClangTidyCheck { public: StrCatAppendCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h +++ clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h @@ -20,7 +20,7 @@ /// types) and suggests replacing with absl::StrContains. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-string-find-str-contains.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html class StringFindStrContainsCheck : public utils::TransformerClangTidyCheck { public: StringFindStrContainsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h +++ clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h @@ -19,7 +19,7 @@ /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-time-comparison.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html class TimeComparisonCheck : public ClangTidyCheck { public: TimeComparisonCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h +++ clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h @@ -19,7 +19,7 @@ /// in the time domain instead of the numeric domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-time-subtraction.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html class TimeSubtractionCheck : public ClangTidyCheck { public: TimeSubtractionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h +++ clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h @@ -21,7 +21,7 @@ /// Finds deprecated uses of `absl::Duration` arithmetic operators and factories. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil-upgrade-duration-conversions.html +/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html class UpgradeDurationConversionsCheck : public ClangTidyCheck { public: UpgradeDurationConversionsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/add_new_check.py =================================================================== --- clang-tools-extra/clang-tidy/add_new_check.py +++ clang-tools-extra/clang-tidy/add_new_check.py @@ -54,7 +54,6 @@ # Adds a header for the new check. def write_header(module_path, module, namespace, check_name, check_name_camel): - check_name_dashes = module + '-' + check_name filename = os.path.join(module_path, check_name_camel) + '.h' print('Creating %s...' % filename) with io.open(filename, 'w', encoding='utf8', newline='\n') as f: @@ -85,10 +84,10 @@ /// FIXME: Write a short description. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/%(check_name_dashes)s.html -class %(check_name)s : public ClangTidyCheck { +/// http://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html +class %(check_name_camel)s : public ClangTidyCheck { public: - %(check_name)s(StringRef Name, ClangTidyContext *Context) + %(check_name_camel)s(StringRef Name, ClangTidyContext *Context) : ClangTidyCheck(Name, Context) {} void registerMatchers(ast_matchers::MatchFinder *Finder) override; void check(const ast_matchers::MatchFinder::MatchResult &Result) override; @@ -100,8 +99,8 @@ #endif // %(header_guard)s """ % {'header_guard': header_guard, - 'check_name': check_name_camel, - 'check_name_dashes': check_name_dashes, + 'check_name_camel': check_name_camel, + 'check_name': check_name, 'module': module, 'namespace': namespace}) @@ -266,11 +265,11 @@ if header_found and add_note_here: if not line.startswith('^^^^'): f.write("""- New :doc:`%s - ` check. + ` check. FIXME: add release notes. -""" % (check_name_dashes, check_name_dashes)) +""" % (check_name_dashes, module, check_name)) note_added = True f.write(line) @@ -321,8 +320,11 @@ with io.open(filename, 'r', encoding='utf8') as f: lines = f.readlines() # Get all existing docs - doc_files = list(filter(lambda s: s.endswith('.rst') and s != 'list.rst', - os.listdir(docs_dir))) + doc_files = [] + for subdir in list(filter(lambda s: not s.endswith('.rst') and not s.endswith('.py'), + os.listdir(docs_dir))): + for file in filter(lambda s: s.endswith('.rst'), os.listdir(os.path.join(docs_dir, subdir))): + doc_files.append([subdir, file]) doc_files.sort() # We couldn't find the source file from the check name, so try to find the @@ -422,9 +424,9 @@ return '' def process_doc(doc_file): - check_name = doc_file.replace('.rst', '') + check_name = doc_file[0] + '-' + doc_file[1].replace('.rst', '') - with io.open(os.path.join(docs_dir, doc_file), 'r', encoding='utf8') as doc: + with io.open(os.path.join(docs_dir, *doc_file), 'r', encoding='utf8') as doc: content = doc.read() match = re.search('.*:orphan:.*', content) @@ -432,7 +434,7 @@ # Orphan page, don't list it. return '', '' - match = re.search('.*:http-equiv=refresh: \d+;URL=(.*).html.*', + match = re.search('.*:http-equiv=refresh: \d+;URL=(.*).html(.*)', content) # Is it a redirect? return check_name, match @@ -440,8 +442,10 @@ def format_link(doc_file): check_name, match = process_doc(doc_file) if not match and check_name: - return ' `%(check)s <%(check)s.html>`_,%(autofix)s\n' % { - 'check': check_name, + return ' `%(check_name)s <%(module)s/%(check)s.html>`_,%(autofix)s\n' % { + 'check_name': check_name, + 'module': doc_file[0], + 'check': doc_file[1].replace('.rst', ''), 'autofix': has_auto_fix(check_name) } else: @@ -450,16 +454,27 @@ def format_link_alias(doc_file): check_name, match = process_doc(doc_file) if match and check_name: + module = doc_file[0] + check_file = doc_file[1].replace('.rst', '') if match.group(1) == 'https://clang.llvm.org/docs/analyzer/checkers': - title_redirect = 'Clang Static Analyzer' + title = 'Clang Static Analyzer ' + check_file + # Preserve the anchor in checkers.html from group 2. + target = match.group(1) + '.html' + match.group(2) + autofix = '' else: - title_redirect = match.group(1) + redirect_parts = re.search('^\.\./([^/]*)/([^/]*)$', match.group(1)) + title = redirect_parts[1] + '-' + redirect_parts[2] + target = redirect_parts[1] + '/' + redirect_parts[2] + '.html' + autofix = has_auto_fix(title) + # The checker is just a redirect. - return ' `%(check)s <%(check)s.html>`_, `%(title)s <%(target)s.html>`_,%(autofix)s\n' % { - 'check': check_name, - 'target': match.group(1), - 'title': title_redirect, - 'autofix': has_auto_fix(match.group(1)) + return ' `%(check_name)s <%(module)s/%(check_file)s.html>`_, `%(title)s <%(target)s>`_,%(autofix)s\n' % { + 'check_name': check_name, + 'module': module, + 'check_file': check_file, + 'target': target, + 'title': title, + 'autofix': autofix } return '' @@ -486,7 +501,7 @@ def write_docs(module_path, module, check_name): check_name_dashes = module + '-' + check_name filename = os.path.normpath(os.path.join( - module_path, '../../docs/clang-tidy/checks/', check_name_dashes + '.rst')) + module_path, '../../docs/clang-tidy/checks/', module, check_name + '.rst')) print('Creating %s...' % filename) with io.open(filename, 'w', encoding='utf8', newline='\n') as f: f.write(""".. title:: clang-tidy - %(check_name_dashes)s Index: clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h =================================================================== --- clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h +++ clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h @@ -20,7 +20,7 @@ /// degradation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-id-dependent-backward-branch.html +/// http://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html class IdDependentBackwardBranchCheck : public ClangTidyCheck { private: enum LoopType { UnknownLoop = -1, DoLoop = 0, WhileLoop = 1, ForLoop = 2 }; Index: clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h +++ clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h @@ -19,7 +19,7 @@ /// `Verilog.cl`, or `VHDL.cl`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-kernel-name-restriction.html +/// http://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html class KernelNameRestrictionCheck : public ClangTidyCheck { public: KernelNameRestrictionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h =================================================================== --- clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h +++ clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h @@ -20,7 +20,7 @@ /// kernels, which may be inefficient or cause an error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/opencl-single-work-item-barrier.html +/// http://clang.llvm.org/extra/clang-tidy/checks/opencl/single-work-item-barrier.html class SingleWorkItemBarrierCheck : public ClangTidyCheck { const unsigned AOCVersion; Index: clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h =================================================================== --- clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h +++ clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h @@ -19,7 +19,7 @@ /// packing and/or aligning of said structs as needed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-struct-pack-align.html +/// http://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html class StructPackAlignCheck : public ClangTidyCheck { public: StructPackAlignCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h +++ clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h @@ -23,7 +23,7 @@ /// they cannot be fully unrolled, and should be partially unrolled. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera-unroll-loops.html +/// http://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html class UnrollLoopsCheck : public ClangTidyCheck { public: UnrollLoopsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h +++ clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h @@ -18,7 +18,7 @@ /// Finds code that uses accept4() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept4.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html class CloexecAccept4Check : public CloexecCheck { public: CloexecAccept4Check(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h @@ -18,7 +18,7 @@ /// accept() is better to be replaced by accept4(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html class CloexecAcceptCheck : public CloexecCheck { public: CloexecAcceptCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h @@ -18,7 +18,7 @@ /// creat() is better to be replaced by open(). /// Find the usage of creat() and redirect user to use open(). -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-creat.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html class CloexecCreatCheck : public CloexecCheck { public: CloexecCreatCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecDupCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecDupCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecDupCheck.h @@ -19,7 +19,7 @@ /// Find the usage of dup() and redirect user to use fcntl(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-dup.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html class CloexecDupCheck : public CloexecCheck { public: CloexecDupCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h +++ clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h @@ -18,7 +18,7 @@ /// Finds code that uses epoll_create1() without using the EPOLL_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create1.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html class CloexecEpollCreate1Check : public CloexecCheck { public: CloexecEpollCreate1Check(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h @@ -18,7 +18,7 @@ /// epoll_create() is better to be replaced by epoll_create1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-epoll-create.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html class CloexecEpollCreateCheck : public CloexecCheck { public: CloexecEpollCreateCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h @@ -21,7 +21,7 @@ /// This check only works when corresponding argument is StringLiteral. No /// constant propagation. /// -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-fopen.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html class CloexecFopenCheck : public CloexecCheck { public: CloexecFopenCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h +++ clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h @@ -18,7 +18,7 @@ /// Finds code that uses inotify_init1() without using the IN_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init1.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html class CloexecInotifyInit1Check : public CloexecCheck { public: CloexecInotifyInit1Check(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h @@ -18,7 +18,7 @@ /// inotify_init() is better to be replaced by inotify_init1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-inotify-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html class CloexecInotifyInitCheck : public CloexecCheck { public: CloexecInotifyInitCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h @@ -18,7 +18,7 @@ /// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd-create.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html class CloexecMemfdCreateCheck : public CloexecCheck { public: CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h +++ clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h @@ -18,7 +18,7 @@ /// Finds code that uses pipe2() without using the O_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe2.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html class CloexecPipe2Check : public CloexecCheck { public: CloexecPipe2Check(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h @@ -18,7 +18,7 @@ /// Suggests to replace calls to pipe() with calls to pipe2(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html class CloexecPipeCheck : public CloexecCheck { public: CloexecPipeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h =================================================================== --- clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h +++ clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h @@ -18,7 +18,7 @@ /// Finds code that uses socket() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-socket.html +/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html class CloexecSocketCheck : public CloexecCheck { public: CloexecSocketCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/boost/UseToStringCheck.h =================================================================== --- clang-tools-extra/clang-tidy/boost/UseToStringCheck.h +++ clang-tools-extra/clang-tidy/boost/UseToStringCheck.h @@ -20,7 +20,7 @@ /// ``std::to_string`` and ``std::to_wstring`` calls. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/boost-use-to-string.html +/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html class UseToStringCheck : public ClangTidyCheck { public: UseToStringCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h +++ clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h @@ -18,7 +18,7 @@ /// Finds ``pthread_kill`` function calls when thread is terminated by /// ``SIGTERM`` signal. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-bad-signal-to-kill-thread.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html class BadSignalToKillThreadCheck : public ClangTidyCheck { public: BadSignalToKillThreadCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h +++ clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h @@ -22,7 +22,7 @@ /// the true and false expressions are Type I clones of each other. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-branch-clone.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html class BranchCloneCheck : public ClangTidyCheck { public: BranchCloneCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h +++ clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h @@ -19,7 +19,7 @@ /// the base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-copy-constructor-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/copy-constructor-init.html class CopyConstructorInitCheck : public ClangTidyCheck { public: CopyConstructorInitCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h +++ clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h @@ -19,7 +19,7 @@ /// std::experimental::string_view. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-dangling-handle.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html class DanglingHandleCheck : public ClangTidyCheck { public: DanglingHandleCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h +++ clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h @@ -20,7 +20,7 @@ /// swapped (or badly ordered) arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-easily-swappable-parameters.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html class EasilySwappableParametersCheck : public ClangTidyCheck { public: EasilySwappableParametersCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h @@ -23,7 +23,7 @@ /// given as option to the checker. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-exception-escape.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h +++ clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h @@ -23,7 +23,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-fold-init-type.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html class FoldInitTypeCheck : public ClangTidyCheck { public: FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h @@ -36,7 +36,7 @@ /// point. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forward-declaration-namespace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html class ForwardDeclarationNamespaceCheck : public ClangTidyCheck { public: ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h @@ -25,7 +25,7 @@ /// C++ Design, item 26. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-forwarding-reference-overload.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html class ForwardingReferenceOverloadCheck : public ClangTidyCheck { public: ForwardingReferenceOverloadCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h @@ -19,7 +19,7 @@ /// Diagnoses instances of an implicit widening of multiplication result. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-implicit-widening-of-multiplication-result.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html class ImplicitWideningOfMultiplicationResultCheck : public ClangTidyCheck { const ast_matchers::MatchFinder::MatchResult *Result; bool ShouldUseCXXStaticCast; Index: clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h +++ clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h @@ -19,7 +19,7 @@ /// not changed at all). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-infinite-loop.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html class InfiniteLoopCheck : public ClangTidyCheck { public: InfiniteLoopCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h +++ clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h @@ -19,7 +19,7 @@ /// cause unintended loss of precision. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-integer-division.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html class IntegerDivisionCheck : public ClangTidyCheck { public: IntegerDivisionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h +++ clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h @@ -20,7 +20,7 @@ /// (i.e., `operator()`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-lambda-function-name.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html class LambdaFunctionNameCheck : public ClangTidyCheck { public: struct SourceRangeLessThan { Index: clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h +++ clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h @@ -20,7 +20,7 @@ /// argument to a memory allocation function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html class MisplacedOperatorInStrlenInAllocCheck : public ClangTidyCheck { public: MisplacedOperatorInStrlenInAllocCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h +++ clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h @@ -19,7 +19,7 @@ /// memory allocation function instead of its argument. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-operator-in-alloc.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-alloc.html class MisplacedPointerArithmeticInAllocCheck : public ClangTidyCheck { public: MisplacedPointerArithmeticInAllocCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h +++ clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h @@ -26,7 +26,7 @@ // be the most common case. Enabled by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-misplaced-widening-cast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html class MisplacedWideningCastCheck : public ClangTidyCheck { public: MisplacedWideningCastCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h +++ clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h @@ -32,7 +32,7 @@ /// The check suggests replacing the std::move with a std::forward. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-move-forwarding-reference.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html class MoveForwardingReferenceCheck : public ClangTidyCheck { public: MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h +++ clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h @@ -20,7 +20,7 @@ /// other ones will be executed unconditionally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-multiple-statement-macro.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html class MultipleStatementMacroCheck : public ClangTidyCheck { public: MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h +++ clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h @@ -20,7 +20,7 @@ /// attribute, then we warn the user of their error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-no-escape.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html class NoEscapeCheck : public ClangTidyCheck { public: NoEscapeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h +++ clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h @@ -22,7 +22,7 @@ /// when the string is read. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-not-null-terminated-result.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html class NotNullTerminatedResultCheck : public ClangTidyCheck { public: NotNullTerminatedResultCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h @@ -18,7 +18,7 @@ /// Finds calls to grand..-parent virtual methods instead of parent's. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-parent-virtual-call.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html class ParentVirtualCallCheck : public ClangTidyCheck { public: ParentVirtualCallCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h +++ clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h @@ -19,7 +19,7 @@ /// in the outer `if` statement and were not changed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-redundant-branch-condition.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html class RedundantBranchConditionCheck : public ClangTidyCheck { public: RedundantBranchConditionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h @@ -29,7 +29,7 @@ /// double underscore occurring anywhere. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-reserved-identifier.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html class ReservedIdentifierCheck final : public RenamerClangTidyCheck { const bool Invert; const std::vector AllowedIdentifiers; Index: clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h @@ -21,7 +21,7 @@ /// Checker for signal handler functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-signal-handler-check.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler-check.html class SignalHandlerCheck : public ClangTidyCheck { public: enum class AsyncSafeFunctionSetKind { Minimal, POSIX }; Index: clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h @@ -22,7 +22,7 @@ /// implicit conversion happens. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-signed-char-misuse.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html class SignedCharMisuseCheck : public ClangTidyCheck { public: SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h @@ -19,7 +19,7 @@ /// user wanted to use `.size()` instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-container.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html class SizeofContainerCheck : public ClangTidyCheck { public: SizeofContainerCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h @@ -18,7 +18,7 @@ /// Find suspicious usages of sizeof expression. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-sizeof-expression.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html class SizeofExpressionCheck : public ClangTidyCheck { public: SizeofExpressionCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h @@ -21,7 +21,7 @@ /// condition parameter. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-spuriously-wake-up-functions.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html class SpuriouslyWakeUpFunctionsCheck : public ClangTidyCheck { public: SpuriouslyWakeUpFunctionsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h +++ clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h @@ -18,7 +18,7 @@ /// Finds suspicious string constructor and check their parameters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-constructor.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html class StringConstructorCheck : public ClangTidyCheck { public: StringConstructorCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h +++ clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h @@ -18,7 +18,7 @@ /// Finds instances where an integer is assigned to a string. /// /// For more details see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-string-assignment.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/string-assignment.html class StringIntegerAssignmentCheck : public ClangTidyCheck { public: StringIntegerAssignmentCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h +++ clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h @@ -18,7 +18,7 @@ /// Find suspicious string literals with embedded NUL characters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-string-literal-with-embedded-nul.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck { public: StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h +++ clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h @@ -32,7 +32,7 @@ /// to `nullptr`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-stringview-nullptr.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html class StringviewNullptrCheck : public utils::TransformerClangTidyCheck { public: StringviewNullptrCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h @@ -18,7 +18,7 @@ /// The checker detects various cases when an enum is probably misused (as a /// bitmask). /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-enum-usage.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html class SuspiciousEnumUsageCheck : public ClangTidyCheck { public: SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h @@ -34,7 +34,7 @@ /// filename extensions of implementation files. "c;cc;cpp;cxx" by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-include.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html class SuspiciousIncludeCheck : public ClangTidyCheck { public: SuspiciousIncludeCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h @@ -19,7 +19,7 @@ /// arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memory-comparison.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html class SuspiciousMemoryComparisonCheck : public ClangTidyCheck { public: SuspiciousMemoryComparisonCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h @@ -18,7 +18,7 @@ /// Finds memset calls with potential mistakes in their arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-memset-usage.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html class SuspiciousMemsetUsageCheck : public ClangTidyCheck { public: SuspiciousMemsetUsageCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h @@ -19,7 +19,7 @@ /// accidentally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-missing-comma.html class SuspiciousMissingCommaCheck : public ClangTidyCheck { public: SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h @@ -19,7 +19,7 @@ /// unintendedly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-semicolon.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-semicolon.html class SuspiciousSemicolonCheck : public ClangTidyCheck { public: SuspiciousSemicolonCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h +++ clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h @@ -18,7 +18,7 @@ /// Find suspicious calls to string compare functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-string-compare.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-string-compare.html class SuspiciousStringCompareCheck : public ClangTidyCheck { public: SuspiciousStringCompareCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h +++ clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h @@ -19,7 +19,7 @@ /// a condition which always evaluates to false). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-terminating-continue.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/terminating-continue.html class TerminatingContinueCheck : public ClangTidyCheck { public: TerminatingContinueCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h +++ clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h @@ -19,7 +19,7 @@ /// class that has 'EXCEPTION', 'Exception' or 'exception' in its name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-throw-keyword-missing.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html class ThrowKeywordMissingCheck : public ClangTidyCheck { public: ThrowKeywordMissingCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h +++ clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h @@ -26,7 +26,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-too-small-loop-variable.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/too-small-loop-variable.html class TooSmallLoopVariableCheck : public ClangTidyCheck { public: TooSmallLoopVariableCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h @@ -20,7 +20,7 @@ /// or `base::Optional` object without assuring that it contains a value. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unchecked-optional-access.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unchecked-optional-access.html class UncheckedOptionalAccessCheck : public ClangTidyCheck { public: UncheckedOptionalAccessCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h @@ -20,7 +20,7 @@ /// behavior. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-undefined-memory-manipulation.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/undefined-memory-manipulation.html class UndefinedMemoryManipulationCheck : public ClangTidyCheck { public: UndefinedMemoryManipulationCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h @@ -19,7 +19,7 @@ /// failure. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-exception-at-new.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-exception-at-new.html class UnhandledExceptionAtNewCheck : public ClangTidyCheck { public: UnhandledExceptionAtNewCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h @@ -20,7 +20,7 @@ /// using the copy-and-swap or the copy-and-move method. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unhandled-self-assignment.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-self-assignment.html class UnhandledSelfAssignmentCheck : public ClangTidyCheck { public: UnhandledSelfAssignmentCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h @@ -18,7 +18,7 @@ /// Finds temporaries that look like RAII objects. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-raii.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-raii.html class UnusedRaiiCheck : public ClangTidyCheck { public: UnusedRaiiCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h @@ -19,7 +19,7 @@ /// Detects function calls where the return value is unused. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-unused-return-value.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-return-value.html class UnusedReturnValueCheck : public ClangTidyCheck { public: UnusedReturnValueCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h +++ clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h @@ -19,7 +19,7 @@ /// intervening reinitialization. /// /// For details, see the user-facing documentation: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-use-after-move.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/use-after-move.html class UseAfterMoveCheck : public ClangTidyCheck { public: UseAfterMoveCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h =================================================================== --- clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h +++ clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h @@ -22,7 +22,7 @@ /// very similar name and an identical signature defined in a base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-virtual-near-miss.html +/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/virtual-near-miss.html class VirtualNearMissCheck : public ClangTidyCheck { public: VirtualNearMissCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h +++ clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h @@ -21,7 +21,7 @@ /// actually launched. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-env33-c.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/env33-c.html class CommandProcessorCheck : public ClangTidyCheck { public: CommandProcessorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h +++ clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h @@ -19,7 +19,7 @@ /// the default operator new. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-mem57-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/mem57-cpp.html class DefaultOperatorNewAlignmentCheck : public ClangTidyCheck { public: DefaultOperatorNewAlignmentCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h =================================================================== --- clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h +++ clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h @@ -20,7 +20,7 @@ /// https://www.securecoding.cert.org/confluence/display/c/FLP30-C.+Do+not+use+floating-point+variables+as+loop+counters /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-flp30-c.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/flp30-c.html class FloatLoopCounter : public ClangTidyCheck { public: FloatLoopCounter(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h +++ clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h @@ -21,7 +21,7 @@ /// This check warns for the usage of std::rand() function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-msc50-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/msc50-cpp.html class LimitedRandomnessCheck : public ClangTidyCheck { public: LimitedRandomnessCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h +++ clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h @@ -19,7 +19,7 @@ /// in copy constructors and copy assignment operators. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-oop58-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/oop58-cpp.html class MutatingCopyCheck : public ClangTidyCheck { public: MutatingCopyCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h +++ clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h @@ -19,7 +19,7 @@ /// 'memcmp' and similar derivatives on non-trivial types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-oop57-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/oop57-cpp.html class NonTrivialTypesLibcMemoryCallsCheck : public ClangTidyCheck { public: NonTrivialTypesLibcMemoryCallsCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h +++ clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h @@ -22,7 +22,7 @@ /// constant expression is a security vulnerability. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-properly-seeded-random-generator.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/properly-seeded-random-generator.html class ProperlySeededRandomGeneratorCheck : public ClangTidyCheck { public: ProperlySeededRandomGeneratorCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h +++ clang-tools-extra/clang-tidy/cert/SetLongJmpCheck.h @@ -18,7 +18,7 @@ /// Guards against use of setjmp/longjmp in C++ code /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err52-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/err52-cpp.html class SetLongJmpCheck : public ClangTidyCheck { public: SetLongJmpCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h +++ clang-tools-extra/clang-tidy/cert/StaticObjectExceptionCheck.h @@ -19,7 +19,7 @@ /// throw. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err58-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/err58-cpp.html class StaticObjectExceptionCheck : public ClangTidyCheck { public: StaticObjectExceptionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/StrToNumCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/StrToNumCheck.h +++ clang-tools-extra/clang-tidy/cert/StrToNumCheck.h @@ -19,7 +19,7 @@ /// reasonable error handling for conversion errors. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err34-c.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/err34-c.html class StrToNumCheck : public ClangTidyCheck { public: StrToNumCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h +++ clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h @@ -18,7 +18,7 @@ /// Checks whether a thrown object is nothrow copy constructible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-err60-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/err60-cpp.html class ThrownExceptionTypeCheck : public ClangTidyCheck { public: ThrownExceptionTypeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h +++ clang-tools-extra/clang-tidy/cert/VariadicFunctionDefCheck.h @@ -18,7 +18,7 @@ /// Guards against any C-style variadic function definitions (not declarations). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert-dcl50-cpp.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cert/dcl50-cpp.html class VariadicFunctionDefCheck : public ClangTidyCheck { public: VariadicFunctionDefCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h =================================================================== --- clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h +++ clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h @@ -18,7 +18,7 @@ /// Finds ``pthread_setcanceltype`` function calls where a thread's /// cancellation type is set to asynchronous. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/concurrency-thread-canceltype-asynchronous.html +/// http://clang.llvm.org/extra/clang-tidy/checks/concurrency/thread-canceltype-asynchronous.html class ThreadCanceltypeAsynchronousCheck : public ClangTidyCheck { public: ThreadCanceltypeAsynchronousCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h @@ -19,7 +19,7 @@ /// with looping constructs. Only forward jumps in nested loops are accepted. // /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-goto.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-goto.html class AvoidGotoCheck : public ClangTidyCheck { public: AvoidGotoCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h @@ -19,7 +19,7 @@ /// subject to unpredictable changes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-avoid-non-const-global-variables.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-non-const-global-variables.html class AvoidNonConstGlobalVariablesCheck : public ClangTidyCheck { public: AvoidNonConstGlobalVariablesCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h @@ -20,7 +20,7 @@ /// Find uninitialized local variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-init-variables.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/init-variables.html class InitVariablesCheck : public ClangTidyCheck { public: InitVariablesCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h @@ -18,7 +18,7 @@ /// Flags possible initialization order issues of static variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-interfaces-global-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/interfaces-global-init.html class InterfacesGlobalInitCheck : public ClangTidyCheck { public: InterfacesGlobalInitCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h @@ -22,7 +22,7 @@ /// constructs exist for the task. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-macro-usage.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/macro-usage.html class MacroUsageCheck : public ClangTidyCheck { public: MacroUsageCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/NarrowingConversionsCheck.h @@ -20,7 +20,7 @@ /// i += 0.1; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-narrowing-conversions.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/narrowing-conversions.html class NarrowingConversionsCheck : public ClangTidyCheck { public: NarrowingConversionsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h @@ -21,7 +21,7 @@ /// Static Analyzer - unix.Malloc. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-no-malloc.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/no-malloc.html class NoMallocCheck : public ClangTidyCheck { public: /// Construct Checker and read in configuration for function names. Index: clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h @@ -19,7 +19,7 @@ /// nature of it whenever possible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-owning-memory.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/owning-memory.html class OwningMemoryCheck : public ClangTidyCheck { public: OwningMemoryCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h @@ -19,7 +19,7 @@ /// into the initialization list instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-prefer-member-initializer.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.html class PreferMemberInitializerCheck : public ClangTidyCheck { public: PreferMemberInitializerCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h @@ -18,7 +18,7 @@ /// This check flags all array to pointer decays /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-array-to-pointer-decay.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-array-to-pointer-decay.html class ProBoundsArrayToPointerDecayCheck : public ClangTidyCheck { public: ProBoundsArrayToPointerDecayCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h @@ -20,7 +20,7 @@ /// have a constant index and are within bounds /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-constant-array-index.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-constant-array-index.html class ProBoundsConstantArrayIndexCheck : public ClangTidyCheck { const StringRef GslHeader; utils::IncludeInserter Inserter; Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h @@ -20,7 +20,7 @@ /// arrays) is flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-bounds-pointer-arithmetic.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-pointer-arithmetic.html class ProBoundsPointerArithmeticCheck : public ClangTidyCheck { public: ProBoundsPointerArithmeticCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h @@ -18,7 +18,7 @@ /// This check flags all instances of const_cast /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-const-cast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-const-cast.html class ProTypeConstCastCheck : public ClangTidyCheck { public: ProTypeConstCastCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h @@ -19,7 +19,7 @@ /// downcast, const_cast, or reinterpret_cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-cstyle-cast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-cstyle-cast.html class ProTypeCstyleCastCheck : public ClangTidyCheck { public: ProTypeCstyleCastCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h @@ -27,7 +27,7 @@ /// will result in false positives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-member-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-member-init.html /// TODO: See if 'fixes' for false positives are optimized away by the compiler. /// TODO: For classes with multiple constructors, make sure that we don't offer /// multiple in-class initializer fixits for the same member. Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h @@ -18,7 +18,7 @@ /// Flags all occurrences of reinterpret_cast /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-reinterpret-cast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-reinterpret-cast.html class ProTypeReinterpretCastCheck : public ClangTidyCheck { public: ProTypeReinterpretCastCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h @@ -19,7 +19,7 @@ /// derived class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-static-cast-downcast.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-static-cast-downcast.html class ProTypeStaticCastDowncastCheck : public ClangTidyCheck { public: ProTypeStaticCastDowncastCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h @@ -19,7 +19,7 @@ /// Access to a union as a whole (e.g. passing to a function) is not flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-union-access.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-union-access.html class ProTypeUnionAccessCheck : public ClangTidyCheck { public: ProTypeUnionAccessCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h @@ -19,7 +19,7 @@ /// of va_arg. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-pro-type-vararg.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-vararg.html class ProTypeVarargCheck : public ClangTidyCheck { public: ProTypeVarargCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h @@ -23,7 +23,7 @@ /// for the latter /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-slicing.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/slicing.html class SlicingCheck : public ClangTidyCheck { public: SlicingCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h @@ -21,7 +21,7 @@ /// are defined. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-special-member-functions.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/special-member-functions.html class SpecialMemberFunctionsCheck : public ClangTidyCheck { public: SpecialMemberFunctionsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h +++ clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h @@ -20,7 +20,7 @@ /// nor protected and non-virtual. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines-virtual-class-destructor.html +/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/virtual-class-destructor.html class VirtualClassDestructorCheck : public ClangTidyCheck { public: VirtualClassDestructorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h =================================================================== --- clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h +++ clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h @@ -19,7 +19,7 @@ /// problems. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin-avoid-spinlock.html +/// http://clang.llvm.org/extra/clang-tidy/checks/darwin/avoid-spinlock.html class AvoidSpinlockCheck : public ClangTidyCheck { public: AvoidSpinlockCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h =================================================================== --- clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h +++ clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h @@ -19,7 +19,7 @@ /// storage duration, as required by the libdispatch documentation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin-dispatch-once-nonstatic.html +/// http://clang.llvm.org/extra/clang-tidy/checks/darwin/dispatch-once-nonstatic.html class DispatchOnceNonstaticCheck : public ClangTidyCheck { public: DispatchOnceNonstaticCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h @@ -18,7 +18,7 @@ /// Default arguments are not allowed in called functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-arguments-calls.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-arguments-calls.html class DefaultArgumentsCallsCheck : public ClangTidyCheck { public: DefaultArgumentsCallsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h @@ -18,7 +18,7 @@ /// Default parameters are not allowed in declared functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-default-parameters.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-parameters.html class DefaultArgumentsDeclarationsCheck : public ClangTidyCheck { public: DefaultArgumentsDeclarationsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h @@ -18,7 +18,7 @@ /// Multiple implementation inheritance is discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-multiple-inheritance.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/multiple-inheritance.html class MultipleInheritanceCheck : public ClangTidyCheck { public: MultipleInheritanceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h @@ -18,7 +18,7 @@ /// Overloading operators is disallowed by the Fuchsia coding standard. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-overloaded-operator.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/overloaded-operator.html class OverloadedOperatorCheck : public ClangTidyCheck { public: OverloadedOperatorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h @@ -20,7 +20,7 @@ /// constructor or has no explicit constructor. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-statically-constructed-objects.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/statically-constructed-objects.html class StaticallyConstructedObjectsCheck : public ClangTidyCheck { public: StaticallyConstructedObjectsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h @@ -20,7 +20,7 @@ /// return types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-trailing-return.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/trailing-return.html class TrailingReturnCheck : public ClangTidyCheck { public: TrailingReturnCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h +++ clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h @@ -18,7 +18,7 @@ /// Defining classes with virtual inheritance is disallowed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia-virtual-inheritance.html +/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/virtual-inheritance.html class VirtualInheritanceCheck : public ClangTidyCheck { public: VirtualInheritanceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h +++ clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h @@ -27,7 +27,7 @@ /// ones generated by `-Wold-style-cast`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-casting.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-casting.html class AvoidCStyleCastsCheck : public ClangTidyCheck { public: AvoidCStyleCastsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h +++ clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h @@ -21,7 +21,7 @@ /// style guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-avoid-nsobject-new.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/avoid-nsobject-new.html class AvoidNSObjectNewCheck : public ClangTidyCheck { public: AvoidNSObjectNewCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h +++ clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h @@ -21,7 +21,7 @@ /// the Google Objective-C Style Guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-avoid-throwing-exception.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-avoid-throwing-exception.html class AvoidThrowingObjCExceptionCheck : public ClangTidyCheck { public: AvoidThrowingObjCExceptionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h +++ clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h @@ -20,7 +20,7 @@ // https://github.com/google/googletest/blob/master/docs/faq.md#why-should-test-suite-names-and-test-names-not-contain-underscore /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-avoid-underscore-in-googletest-name.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-avoid-underscore-in-googletest-name.html class AvoidUnderscoreInGoogletestNameCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; Index: clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h +++ clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h @@ -20,7 +20,7 @@ /// See https://google.github.io/styleguide/cppguide.html#Default_Arguments /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-default-arguments.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/default-arguments.html class DefaultArgumentsCheck : public ClangTidyCheck { public: DefaultArgumentsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h +++ clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h @@ -20,7 +20,7 @@ /// See https://google.github.io/styleguide/cppguide.html#Explicit_Constructors /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-explicit-constructor.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/explicit-constructor.html class ExplicitConstructorCheck : public ClangTidyCheck { public: ExplicitConstructorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h +++ clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h @@ -24,7 +24,7 @@ /// Corresponding cpplint.py check name: 'build/explicit_make_pair'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-build-explicit-make-pair.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/build-explicit-make-pair.html class ExplicitMakePairCheck : public ClangTidyCheck { public: ExplicitMakePairCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h +++ clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h @@ -25,7 +25,7 @@ /// method or property declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-function-naming.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-function-naming.html class FunctionNamingCheck : public ClangTidyCheck { public: FunctionNamingCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h +++ clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h @@ -29,7 +29,7 @@ /// empty string between ";" if there are other filename extensions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-global-names-in-headers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/global-names-in-headers.html class GlobalNamesInHeadersCheck : public ClangTidyCheck { public: GlobalNamesInHeadersCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h +++ clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h @@ -21,7 +21,7 @@ /// 'g[A-Z].*' (variables). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-objc-global-variable-declaration.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-global-variable-declaration.html class GlobalVariableDeclarationCheck : public ClangTidyCheck { public: GlobalVariableDeclarationCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h +++ clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h @@ -27,7 +27,7 @@ /// Corresponding cpplint.py check: 'runtime/int'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-runtime-int.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/runtime-int.html class IntegerTypesCheck : public ClangTidyCheck { public: IntegerTypesCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h +++ clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h @@ -23,7 +23,7 @@ /// Corresponding cpplint.py check name: 'runtime/operator'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-runtime-operator.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/runtime-operator.html class OverloadedUnaryAndCheck : public ClangTidyCheck { public: OverloadedUnaryAndCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/google/TodoCommentCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/TodoCommentCheck.h +++ clang-tools-extra/clang-tidy/google/TodoCommentCheck.h @@ -21,7 +21,7 @@ /// Corresponding cpplint.py check: 'readability/todo' /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-readability-todo.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-todo.html class TodoCommentCheck : public ClangTidyCheck { public: TodoCommentCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h =================================================================== --- clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h +++ clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h @@ -32,7 +32,7 @@ /// Corresponding cpplint.py check name: 'build/namespaces'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google-build-namespaces.html +/// http://clang.llvm.org/extra/clang-tidy/checks/google/build-namespaces.html class UnnamedNamespaceInHeaderCheck : public ClangTidyCheck { public: UnnamedNamespaceInHeaderCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h +++ clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h @@ -27,7 +27,7 @@ /// this warning enabled for clang. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/linuxkernel-must-use-errs.html +/// http://clang.llvm.org/extra/clang-tidy/checks/linuxkernel/must-use-errs.html class MustCheckErrsCheck : public ClangTidyCheck { public: MustCheckErrsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h +++ clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h @@ -17,7 +17,7 @@ /// Finds and fixes header guards that do not adhere to LLVM style. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-header-guard.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/header-guard.html /// The check supports these options: /// - `HeaderFileExtensions`: a semicolon-separated list of filename /// extensions of header files (The filename extension should not contain Index: clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h +++ clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h @@ -47,7 +47,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-isa-or-dyn-cast-in-conditionals.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-isa-or-dyn-cast-in-conditionals.html class PreferIsaOrDynCastInConditionalsCheck : public ClangTidyCheck { public: PreferIsaOrDynCastInConditionalsCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h +++ clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h @@ -20,7 +20,7 @@ /// the code more explicit. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm-prefer-register-over-unsigned.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-register-over-unsigned.html class PreferRegisterOverUnsignedCheck : public ClangTidyCheck { public: PreferRegisterOverUnsignedCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h +++ clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h @@ -18,7 +18,7 @@ /// Checks all calls resolve to functions within __llvm_libc namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-callee-namespace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/callee-namespace.html class CalleeNamespaceCheck : public ClangTidyCheck { public: CalleeNamespaceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h +++ clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h @@ -18,7 +18,7 @@ /// Checks all llvm-libc implementation is within the correct namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-implementation-in-namespace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/implementation-in-namespace.html class ImplementationInNamespaceCheck : public ClangTidyCheck { public: ImplementationInNamespaceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h +++ clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h @@ -20,7 +20,7 @@ /// compiler provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc-restrict-system-libc-headers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.html class RestrictSystemLibcHeadersCheck : public portability::RestrictSystemIncludesCheck { public: Index: clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h +++ clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h @@ -30,7 +30,7 @@ /// empty string between ";" if there are other filename extensions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-definitions-in-headers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/definitions-in-headers.html class DefinitionsInHeadersCheck : public ClangTidyCheck { public: DefinitionsInHeadersCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h +++ clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h @@ -19,7 +19,7 @@ /// pointer type rather than to the pointee. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-misplaced-const.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/misplaced-const.html class MisplacedConstCheck : public ClangTidyCheck { public: MisplacedConstCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h +++ clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h @@ -23,7 +23,7 @@ /// and displays one example of possible call graph loop (recursion). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-no-recursion.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/no-recursion.html class NoRecursionCheck : public ClangTidyCheck { public: NoRecursionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h +++ clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h @@ -25,7 +25,7 @@ /// ignored and optionally all `public` member variables could be ignored. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-non-private-member-variables-in-classes.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/non-private-member-variables-in-classes.html class NonPrivateMemberVariablesInClassesCheck : public ClangTidyCheck { public: NonPrivateMemberVariablesInClassesCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h +++ clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h @@ -19,7 +19,7 @@ /// ineffective, useless parts. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-redundant-expression.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/redundant-expression.html class RedundantExpressionCheck : public ClangTidyCheck { public: RedundantExpressionCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h +++ clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h @@ -25,7 +25,7 @@ /// * The operator must always return ``*this``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-unconventional-assign-operator.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/unconventional-assign-operator.html class UnconventionalAssignOperatorCheck : public ClangTidyCheck { public: UnconventionalAssignOperatorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h +++ clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h @@ -20,7 +20,7 @@ /// Finds unused using declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc-unused-using-decls.html +/// http://clang.llvm.org/extra/clang-tidy/checks/misc/unused-using-decls.html class UnusedUsingDeclsCheck : public ClangTidyCheck { public: UnusedUsingDeclsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h +++ clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h @@ -20,7 +20,7 @@ /// FIXME: Add support for function references and member function references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-std-bind.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-std-bind.html class AvoidBindCheck : public ClangTidyCheck { public: AvoidBindCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h +++ clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h @@ -18,7 +18,7 @@ /// Find C-style array types and recommend to use std::array<> / std::vector<>. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-avoid-c-arrays.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-c-arrays.html class AvoidCArraysCheck : public ClangTidyCheck { public: AvoidCArraysCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h +++ clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h @@ -31,7 +31,7 @@ /// Example: `` => `` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-headers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-headers.html class DeprecatedHeadersCheck : public ClangTidyCheck { public: DeprecatedHeadersCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h +++ clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h @@ -19,7 +19,7 @@ /// and replaces those that have a non-deprecated equivalent. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-deprecated-ios-base-aliases.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-ios-base-aliases.html class DeprecatedIosBaseAliasesCheck : public ClangTidyCheck { public: DeprecatedIosBaseAliasesCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h +++ clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h @@ -20,7 +20,7 @@ /// Replaces groups of related macros with an unscoped anonymous enum. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-macro-to-enum.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/macro-to-enum.html class MacroToEnumCheck : public ClangTidyCheck { public: MacroToEnumCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h +++ clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h @@ -26,7 +26,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-make-shared.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/make-shared.html class MakeSharedCheck : public MakeSmartPtrCheck { public: MakeSharedCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h +++ clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h @@ -22,7 +22,7 @@ /// raw string literals. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-raw-string-literal.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/raw-string-literal.html class RawStringLiteralCheck : public ClangTidyCheck { public: RawStringLiteralCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h +++ clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h @@ -37,7 +37,7 @@ /// ~~~ /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-disallow-copy-and-assign-macro.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.html class ReplaceDisallowCopyAndAssignMacroCheck : public ClangTidyCheck { public: ReplaceDisallowCopyAndAssignMacroCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h +++ clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h @@ -20,7 +20,7 @@ /// replace all occurrences of std::random_shuffle with std::shuffle. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-replace-random-shuffle.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-random-shuffle.html class ReplaceRandomShuffleCheck : public ClangTidyCheck { public: ReplaceRandomShuffleCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h +++ clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h @@ -19,7 +19,7 @@ /// repeating the return type name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-return-braced-init-list.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/return-braced-init-list.html class ReturnBracedInitListCheck : public ClangTidyCheck { public: ReturnBracedInitListCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h +++ clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h @@ -19,7 +19,7 @@ /// with the unary version. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-unary-static-assert.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/unary-static-assert.html class UnaryStaticAssertCheck : public ClangTidyCheck { public: UnaryStaticAssertCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h @@ -18,7 +18,7 @@ /// Finds integer literals which are cast to bool. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-bool-literals.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-bool-literals.html class UseBoolLiteralsCheck : public ClangTidyCheck { public: UseBoolLiteralsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h @@ -20,7 +20,7 @@ /// member initializer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-default-member-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-default-member-init.html class UseDefaultMemberInitCheck : public ClangTidyCheck { public: UseDefaultMemberInitCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h @@ -23,7 +23,7 @@ /// constructor of temporary object. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-emplace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-emplace.html class UseEmplaceCheck : public ClangTidyCheck { public: UseEmplaceCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h @@ -33,7 +33,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-default.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-default.html class UseEqualsDefaultCheck : public ClangTidyCheck { public: UseEqualsDefaultCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h @@ -33,7 +33,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-equals-delete.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-delete.html class UseEqualsDeleteCheck : public ClangTidyCheck { public: UseEqualsDeleteCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h @@ -30,7 +30,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-nodiscard.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-nodiscard.html class UseNodiscardCheck : public ClangTidyCheck { public: UseNodiscardCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h @@ -28,7 +28,7 @@ /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-noexcept.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-noexcept.html class UseNoexceptCheck : public ClangTidyCheck { public: UseNoexceptCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h @@ -25,7 +25,7 @@ /// Rewrites function signatures to use a trailing return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-trailing-type-return.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-trailing-type-return.html class UseTrailingReturnTypeCheck : public ClangTidyCheck { public: UseTrailingReturnTypeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h @@ -18,7 +18,7 @@ /// Prefer using transparent functors to non-transparent ones. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-transparent-functors.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-transparent-functors.html class UseTransparentFunctorsCheck : public ClangTidyCheck { public: UseTransparentFunctorsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h @@ -20,7 +20,7 @@ /// macro ID there will be only a warning without fixits. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-uncaught-exceptions.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-uncaught-exceptions.html class UseUncaughtExceptionsCheck : public ClangTidyCheck { public: UseUncaughtExceptionsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h =================================================================== --- clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h +++ clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h @@ -18,7 +18,7 @@ /// Check finds typedefs and replaces it with usings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-using.html +/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-using.html class UseUsingCheck : public ClangTidyCheck { const bool IgnoreMacros; Index: clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h =================================================================== --- clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h +++ clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h @@ -24,7 +24,7 @@ /// emitted. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi-buffer-deref.html +/// http://clang.llvm.org/extra/clang-tidy/checks/mpi/buffer-deref.html class BufferDerefCheck : public ClangTidyCheck { public: BufferDerefCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h =================================================================== --- clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h +++ clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h @@ -23,7 +23,7 @@ /// null pointer constants are skipped, in the course of verification. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi-type-mismatch.html +/// http://clang.llvm.org/extra/clang-tidy/checks/mpi/type-mismatch.html class TypeMismatchCheck : public ClangTidyCheck { public: TypeMismatchCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/AssertEquals.h =================================================================== --- clang-tools-extra/clang-tidy/objc/AssertEquals.h +++ clang-tools-extra/clang-tidy/objc/AssertEquals.h @@ -20,7 +20,7 @@ /// operands of type NSString*. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-assert-equals.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/assert-equals.html class AssertEquals final : public ClangTidyCheck { public: AssertEquals(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h +++ clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h @@ -19,7 +19,7 @@ /// NSError. errorWithDomain:code:userInfo: should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-avoid-nserror-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/avoid-nserror-init.html class AvoidNSErrorInitCheck : public ClangTidyCheck { public: AvoidNSErrorInitCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h +++ clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h @@ -20,7 +20,7 @@ /// potentially causing issues. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-dealloc-in-category.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/dealloc-in-category.html class DeallocInCategoryCheck final : public ClangTidyCheck { public: DeallocInCategoryCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h +++ clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h @@ -21,7 +21,7 @@ /// documented to not support subclassing. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-forbidden-subclassing.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/forbidden-subclassing.html class ForbiddenSubclassingCheck : public ClangTidyCheck { public: ForbiddenSubclassingCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/objc/MissingHashCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/MissingHashCheck.h +++ clang-tools-extra/clang-tidy/objc/MissingHashCheck.h @@ -19,7 +19,7 @@ /// appropriately implementing -hash. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-missing-hash.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/missing-hash.html class MissingHashCheck : public ClangTidyCheck { public: MissingHashCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h +++ clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h @@ -20,7 +20,7 @@ /// argument object lifetimes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-nsinvocation-argument-lifetime.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/nsinvocation-argument-lifetime.html class NSInvocationArgumentLifetimeCheck : public ClangTidyCheck { public: NSInvocationArgumentLifetimeCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h +++ clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h @@ -22,7 +22,7 @@ /// @property(nonatomic) NSString *lowerCamelCase; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-property-declaration.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/property-declaration.html class PropertyDeclarationCheck : public ClangTidyCheck { public: PropertyDeclarationCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h =================================================================== --- clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h +++ clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h @@ -19,7 +19,7 @@ /// of NSObject and recommends calling a superclass initializer instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc-super-self.html +/// http://clang.llvm.org/extra/clang-tidy/checks/objc/super-self.html class SuperSelfCheck : public ClangTidyCheck { public: SuperSelfCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h +++ clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h @@ -20,7 +20,7 @@ /// out of the Structured Block it was thrown in. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp-exception-escape.html +/// http://clang.llvm.org/extra/clang-tidy/checks/openmp/exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h =================================================================== --- clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h +++ clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h @@ -20,7 +20,7 @@ /// other than ``none``, and suggests to use the ``default(none)`` clause. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp-use-default-none.html +/// http://clang.llvm.org/extra/clang-tidy/checks/openmp/use-default-none.html class UseDefaultNoneCheck : public ClangTidyCheck { public: UseDefaultNoneCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h +++ clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h @@ -23,7 +23,7 @@ /// The character literal overload is more efficient. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-faster-string-find.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/faster-string-find.html class FasterStringFindCheck : public ClangTidyCheck { public: FasterStringFindCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h +++ clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h @@ -18,7 +18,7 @@ /// A check that detects copied loop variables and suggests using const /// references. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-for-range-copy.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/for-range-copy.html class ForRangeCopyCheck : public ClangTidyCheck { public: ForRangeCopyCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h +++ clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h @@ -20,7 +20,7 @@ /// concatenating strings, using the operator+, instead of operator+=. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-string-concatenation.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-string-concatenation.html class InefficientStringConcatenationCheck : public ClangTidyCheck { public: InefficientStringConcatenationCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h +++ clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h @@ -22,7 +22,7 @@ /// field without calling Reserve() first. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-inefficient-vector-operation.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-vector-operation.html class InefficientVectorOperationCheck : public ClangTidyCheck { public: InefficientVectorOperationCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h +++ clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h @@ -19,7 +19,7 @@ /// initializing a member or base class through a copy constructor instead of a /// move constructor. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-move-constructor-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/move-constructor-init.html class MoveConstructorInitCheck : public ClangTidyCheck { public: MoveConstructorInitCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h +++ clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h @@ -17,7 +17,7 @@ /// Finds local variables that cannot be automatically moved due to constness. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-no-automatic-move.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/no-automatic-move.html class NoAutomaticMoveCheck : public ClangTidyCheck { public: NoAutomaticMoveCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h +++ clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h @@ -18,7 +18,7 @@ /// Diagnoses every integer to pointer cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-no-int-to-ptr.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/no-int-to-ptr.html class NoIntToPtrCheck : public ClangTidyCheck { public: NoIntToPtrCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h +++ clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h @@ -24,7 +24,7 @@ /// A::~A() = default; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-trivially-destructible.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/trivially-destructible.html class TriviallyDestructibleCheck : public ClangTidyCheck { public: TriviallyDestructibleCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h +++ clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h @@ -24,7 +24,7 @@ /// C). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-type-promotion-in-math-fn.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/type-promotion-in-math-fn.html class TypePromotionInMathFnCheck : public ClangTidyCheck { public: TypePromotionInMathFnCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h =================================================================== --- clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h +++ clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h @@ -21,7 +21,7 @@ /// can safely be converted to const references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance-unnecessary-value-param.html +/// http://clang.llvm.org/extra/clang-tidy/checks/performance/unnecessary-value-param.html class UnnecessaryValueParamCheck : public ClangTidyCheck { public: UnnecessaryValueParamCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h =================================================================== --- clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h +++ clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h @@ -21,7 +21,7 @@ /// includes are specified, the check will exit without issuing any warnings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-restrict-system-includes.html +/// http://clang.llvm.org/extra/clang-tidy/checks/portability/restrict-system-includes.html class RestrictSystemIncludesCheck : public ClangTidyCheck { public: RestrictSystemIncludesCheck(StringRef Name, ClangTidyContext *Context, Index: clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h +++ clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h @@ -20,7 +20,7 @@ /// Find SIMD intrinsics calls and suggest std::experimental::simd alternatives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-simd-intrinsics.html +/// http://clang.llvm.org/extra/clang-tidy/checks/portability/simd-intrinsics.html class SIMDIntrinsicsCheck : public ClangTidyCheck { public: SIMDIntrinsicsCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h =================================================================== --- clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h +++ clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h @@ -20,7 +20,7 @@ /// ``std::allocator``. They do not compile with libstdc++ or MSVC. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability-std-allocator-const.html +/// http://clang.llvm.org/extra/clang-tidy/checks/portability/std-allocator-const.html class StdAllocatorConstCheck : public ClangTidyCheck { public: StdAllocatorConstCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h +++ clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h @@ -19,7 +19,7 @@ /// the `const` qualifier from that return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-const-return-type.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/const-return-type.html class ConstReturnTypeCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; Index: clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h +++ clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h @@ -19,7 +19,7 @@ /// replaced by a call to the `container.contains()` method introduced in C++20. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-container-contains.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/container-contains.html class ContainerContainsCheck : public ClangTidyCheck { public: ContainerContainsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h +++ clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h @@ -19,7 +19,7 @@ /// pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-delete-null-pointer.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/delete-null-pointer.html class DeleteNullPointerCheck : public ClangTidyCheck { public: DeleteNullPointerCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h +++ clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h @@ -30,7 +30,7 @@ /// macros. Default is `false`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-function-cognitive-complexity.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/function-cognitive-complexity.html class FunctionCognitiveComplexityCheck : public ClangTidyCheck { public: FunctionCognitiveComplexityCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h +++ clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h @@ -20,7 +20,7 @@ /// Warns about identifiers names whose length is too short. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-identifier-length.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/identifier-length.html class IdentifierLengthCheck : public ClangTidyCheck { public: IdentifierLengthCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h +++ clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h @@ -18,7 +18,7 @@ /// Checks for use of implicit bool conversions in expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-implicit-bool-conversion.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/implicit-bool-conversion.html class ImplicitBoolConversionCheck : public ClangTidyCheck { public: ImplicitBoolConversionCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h +++ clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h @@ -20,7 +20,7 @@ /// Checks for declarations of functions which differ in parameter names. /// /// For detailed documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-inconsistent-declaration-parameter-name.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/inconsistent-declaration-parameter-name.html /// class InconsistentDeclarationParameterNameCheck : public ClangTidyCheck { public: Index: clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h +++ clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h @@ -19,7 +19,7 @@ /// tries to refactor the code to one statement per declaration. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-isolate-declaration.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/isolate-declaration.html class IsolateDeclarationCheck : public ClangTidyCheck { public: IsolateDeclarationCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h +++ clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h @@ -21,7 +21,7 @@ /// Detects magic numbers, integer and floating point literals embedded in code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-magic-numbers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/magic-numbers.html class MagicNumbersCheck : public ClangTidyCheck { public: MagicNumbersCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h +++ clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h @@ -18,7 +18,7 @@ /// Finds non-static member functions that can be made 'const'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-make-member-function-const.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/make-member-function-const.html class MakeMemberFunctionConstCheck : public ClangTidyCheck { public: MakeMemberFunctionConstCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h +++ clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h @@ -20,7 +20,7 @@ /// or spaces are used consistently and not mixed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-misleading-indentation.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/misleading-indentation.html class MisleadingIndentationCheck : public ClangTidyCheck { public: MisleadingIndentationCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h +++ clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h @@ -19,7 +19,7 @@ /// `array[index]`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-misplaced-array-index.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/misplaced-array-index.html class MisplacedArrayIndexCheck : public ClangTidyCheck { public: MisplacedArrayIndexCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h +++ clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h @@ -18,7 +18,7 @@ /// Warn when a pointer function parameter can be const. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-non-const-parameter.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/non-const-parameter.html class NonConstParameterCheck : public ClangTidyCheck { public: NonConstParameterCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h +++ clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h @@ -20,7 +20,7 @@ /// 'const auto &'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-qualified-auto.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/qualified-auto.html class QualifiedAutoCheck : public ClangTidyCheck { public: QualifiedAutoCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h @@ -18,7 +18,7 @@ /// Detects redundant access specifiers inside classes, structs, and unions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-access-specifiers.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-access-specifiers.html class RedundantAccessSpecifiersCheck : public ClangTidyCheck { public: RedundantAccessSpecifiersCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h @@ -21,7 +21,7 @@ /// Eliminates redundant `continue` statements at the end of a loop body. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-control-flow.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-control-flow.html class RedundantControlFlowCheck : public ClangTidyCheck { public: RedundantControlFlowCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h @@ -18,7 +18,7 @@ /// Find redundant variable declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-declaration.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-declaration.html class RedundantDeclarationCheck : public ClangTidyCheck { public: RedundantDeclarationCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h @@ -18,7 +18,7 @@ /// Eliminate redundant dereferences of a function pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-function-ptr-dereference.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-function-ptr-dereference.html class RedundantFunctionPtrDereferenceCheck : public ClangTidyCheck { public: RedundantFunctionPtrDereferenceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h @@ -19,7 +19,7 @@ /// constructor would be called if they were not present. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-member-init.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-member-init.html class RedundantMemberInitCheck : public ClangTidyCheck { public: RedundantMemberInitCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h +++ clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h @@ -19,7 +19,7 @@ /// the same condition. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-redundant-preprocessor.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-preprocessor.html class RedundantPreprocessorCheck : public ClangTidyCheck { public: RedundantPreprocessorCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h +++ clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h @@ -19,7 +19,7 @@ /// them to use the appropriate boolean expression directly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-boolean-expr.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-boolean-expr.html class SimplifyBooleanExprCheck : public ClangTidyCheck { public: SimplifyBooleanExprCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h +++ clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h @@ -18,7 +18,7 @@ /// Simplifies subscript expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-simplify-subscript-expr.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-subscript-expr.html class SimplifySubscriptExprCheck : public ClangTidyCheck { public: SimplifySubscriptExprCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h +++ clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h @@ -19,7 +19,7 @@ /// instances and replaces them with uses of the appropriate qualified-id. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-static-accessed-through-instance.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/static-accessed-through-instance.html class StaticAccessedThroughInstanceCheck : public ClangTidyCheck { public: StaticAccessedThroughInstanceCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h +++ clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h @@ -18,7 +18,7 @@ /// Finds static function and variable definitions in anonymous namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-static-definition-in-anonymous-namespace.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/static-definition-in-anonymous-namespace.html class StaticDefinitionInAnonymousNamespaceCheck : public ClangTidyCheck { public: StaticDefinitionInAnonymousNamespaceCheck(StringRef Name, Index: clang-tools-extra/clang-tidy/readability/StringCompareCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/StringCompareCheck.h +++ clang-tools-extra/clang-tidy/readability/StringCompareCheck.h @@ -19,7 +19,7 @@ /// equality or inequality. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-string-compare.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/string-compare.html class StringCompareCheck : public ClangTidyCheck { public: StringCompareCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h +++ clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h @@ -21,7 +21,7 @@ /// of the function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-suspicious-call-argument.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/suspicious-call-argument.html class SuspiciousCallArgumentCheck : public ClangTidyCheck { enum class Heuristic { Equality, Index: clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h +++ clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h @@ -19,7 +19,7 @@ /// replaces them with: `` = nullptr;`` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-uniqueptr-delete-release.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/uniqueptr-delete-release.html class UniqueptrDeleteReleaseCheck : public ClangTidyCheck { public: UniqueptrDeleteReleaseCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h +++ clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h @@ -21,7 +21,7 @@ /// Alternatively, a list of destination suffixes can be provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-uppercase-literal-suffix.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/uppercase-literal-suffix.html class UppercaseLiteralSuffixCheck : public ClangTidyCheck { public: UppercaseLiteralSuffixCheck(StringRef Name, ClangTidyContext *Context); Index: clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h =================================================================== --- clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h +++ clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h @@ -20,7 +20,7 @@ /// or std::all_of. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability-use-anyofallof.html +/// http://clang.llvm.org/extra/clang-tidy/checks/readability/use-anyofallof.html class UseAnyOfAllOfCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; Index: clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h =================================================================== --- clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h +++ clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h @@ -20,7 +20,7 @@ /// discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/zircon-temporary-objects.html +/// http://clang.llvm.org/extra/clang-tidy/checks/zircon/temporary-objects.html class TemporaryObjectsCheck : public ClangTidyCheck { public: TemporaryObjectsCheck(StringRef Name, ClangTidyContext *Context) Index: clang-tools-extra/docs/ReleaseNotes.rst =================================================================== --- clang-tools-extra/docs/ReleaseNotes.rst +++ clang-tools-extra/docs/ReleaseNotes.rst @@ -113,22 +113,22 @@ New checks ^^^^^^^^^^ -- New :doc:`bugprone-shared-ptr-array-mismatch ` check. +- New :doc:`bugprone-shared-ptr-array-mismatch ` check. Finds initializations of C++ shared pointers to non-array type that are initialized with an array. - New :doc:`bugprone-unchecked-optional-access - ` check. + ` check. Warns when the code is unwrapping a `std::optional`, `absl::optional`, or `base::Optional` object without assuring that it contains a value. - New :doc:`modernize-macro-to-enum - ` check. + ` check. Replaces groups of adjacent macros with an unscoped anonymous enum. -- New :doc:`portability-std-allocator-const ` check. +- New :doc:`portability-std-allocator-const ` check. Report use of ``std::vector`` (and similar containers of const elements). These are not allowed in standard C++ due to undefined @@ -140,45 +140,45 @@ ^^^^^^^^^^^^^^^^^ - New alias :doc:`cppcoreguidelines-macro-to-enum - ` to :doc:`modernize-macro-to-enum - ` was added. + ` to :doc:`modernize-macro-to-enum + ` was added. Changes in existing checks ^^^^^^^^^^^^^^^^^^^^^^^^^^ - Fixed nonsensical suggestion of :doc:`altera-struct-pack-align - ` check for empty structs. + ` check for empty structs. - Fixed some false positives in :doc:`bugprone-infinite-loop - ` involving dependent expressions. + ` involving dependent expressions. - Fixed a crash in :doc:`bugprone-sizeof-expression - ` when `sizeof(...)` is + ` when `sizeof(...)` is compared against a `__int128_t`. -- Made :doc:`cert-oop57-cpp ` more sensitive +- Made :doc:`cert-oop57-cpp ` more sensitive by checking for an arbitrary expression in the second argument of ``memset``. - Improved :doc:`cppcoreguidelines-prefer-member-initializer - ` check. + ` check. Fixed an issue when there was already an initializer in the constructor and the check would try to create another initializer for the same member. - Fixed a crash in :doc:`llvmlibc-callee-namespace - ` when executing for C++ code + ` when executing for C++ code that contain calls to advanced constructs, e.g. overloaded operators. - Fixed a false positive in :doc:`misc-redundant-expression - ` involving overloaded + ` involving overloaded comparison operators. - Fixed a false positive in :doc:`misc-redundant-expression - ` involving assignments in + ` involving assignments in conditions. This fixes `Issue 35853 `_. - Fixed a false positive in :doc:`modernize-deprecated-headers - ` involving including + ` involving including C header files from C++ files wrapped by ``extern "C" { ... }`` blocks. Such includes will be ignored by now. By default now it doesn't warn for including deprecated headers from header @@ -187,30 +187,30 @@ included by C++ source files. - Improved :doc:`performance-inefficient-vector-operation - ` to work when + ` to work when the vector is a member of a structure. - Fixed a crash in :doc:`readability-const-return-type - ` when a pure virtual function + ` when a pure virtual function overrided has a const return type. Removed the fix for a virtual function. - Fixed incorrect suggestions for :doc:`readability-container-size-empty - ` when smart pointers are involved. + ` when smart pointers are involved. - Fixed a false positive in :doc:`readability-non-const-parameter - ` when the parameter is + ` when the parameter is referenced by an lvalue. - Expanded :doc:`readability-simplify-boolean-expr - ` to simplify expressions + ` to simplify expressions using DeMorgan's Theorem. - Fixed a crash in :doc:`performance-unnecessary-value-param - ` when the specialization + ` when the specialization template has an unnecessary value parameter. Removed the fix for a template. - Fixed bugs in :doc:`bugprone-use-after-move - `: + `: - Treat a move in a lambda capture as happening in the function that defines the lambda, not within the body of the lambda (as we were previously doing Index: clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst +++ clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - bugprone-narrowing-conversions .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-narrowing-conversions.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/narrowing-conversions.html bugprone-narrowing-conversions ============================== The bugprone-narrowing-conversions check is an alias, please see -`cppcoreguidelines-narrowing-conversions `_ +`cppcoreguidelines-narrowing-conversions <../cppcoreguidelines/narrowing-conversions.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst +++ clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst @@ -46,5 +46,5 @@ return value often indicates that the programmer confused the function with ``clear()``. -`cert-err33-c `_ is an alias of this check that checks a +`cert-err33-c <../cert/err33-c.html>`_ is an alias of this check that checks a fixed and large set of standard library functions. Index: clang-tools-extra/docs/clang-tidy/checks/cert-con36-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-con36-c.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-con36-c -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-spuriously-wake-up-functions.html - -cert-con36-c -============ - -The cert-con36-c check is an alias, please see -`bugprone-spuriously-wake-up-functions `_ -for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-con54-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-con54-cpp.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-con54-cpp -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-spuriously-wake-up-functions.html - -cert-con54-cpp -============== - -The cert-con54-cpp check is an alias, please see -`bugprone-spuriously-wake-up-functions `_ -for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-dcl03-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-dcl03-c.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. title:: clang-tidy - cert-dcl03-c -.. meta:: - :http-equiv=refresh: 5;URL=misc-static-assert.html - -cert-dcl03-c -============ - -The cert-dcl03-c check is an alias, please see -`misc-static-assert `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-dcl16-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-dcl16-c.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. title:: clang-tidy - cert-dcl16-c -.. meta:: - :http-equiv=refresh: 5;URL=readability-uppercase-literal-suffix.html - -cert-dcl16-c -============ - -The cert-dcl16-c check is an alias, please see -`readability-uppercase-literal-suffix `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-dcl37-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-dcl37-c.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-dcl37-c -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-reserved-identifier.html - -cert-dcl37-c -============ - -The cert-dcl37-c check is an alias, please see -`bugprone-reserved-identifier `_ for more -information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-dcl51-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-dcl51-cpp.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-dcl51-cpp -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-reserved-identifier.html - -cert-dcl51-cpp -============== - -The cert-dcl51-cpp check is an alias, please see -`bugprone-reserved-identifier `_ for more -information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-dcl59-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-dcl59-cpp.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. title:: clang-tidy - cert-dcl59-cpp -.. meta:: - :http-equiv=refresh: 5;URL=google-build-namespaces.html - -cert-dcl59-cpp -============== - -The cert-dcl59-cpp check is an alias, please see -`google-build-namespaces `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-err61-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-err61-cpp.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-err61-cpp -.. meta:: - :http-equiv=refresh: 5;URL=misc-throw-by-value-catch-by-reference.html - -cert-err61-cpp -============== - -The cert-err61-cpp check is an alias, please see -`misc-throw-by-value-catch-by-reference `_ -for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-exp42-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-exp42-c.rst +++ /dev/null @@ -1,8 +0,0 @@ -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-suspicious-memory-comparison.html - -cert-exp42-c -============ - -The cert-exp42-c check is an alias, please see -`bugprone-suspicious-memory-comparison `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-fio38-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-fio38-c.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-fio38-c -.. meta:: - :http-equiv=refresh: 5;URL=misc-non-copyable-objects.html - -cert-fio38-c -============ - -The cert-fio38-c check is an alias, please see -`misc-non-copyable-objects `_ for more -information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-flp37-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-flp37-c.rst +++ /dev/null @@ -1,8 +0,0 @@ -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-suspicious-memory-comparison.html - -cert-flp37-c -============ - -The cert-flp37-c check is an alias, please see -`bugprone-suspicious-memory-comparison `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-oop54-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-oop54-cpp.rst +++ /dev/null @@ -1,10 +0,0 @@ -.. title:: clang-tidy - cert-oop54-cpp -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-unhandled-self-assignment.html - -cert-oop54-cpp -============== - -The cert-oop54-cpp check is an alias, please see -`bugprone-unhandled-self-assignment `_ -for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-pos44-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-pos44-c.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. title:: clang-tidy - cert-pos44-c -.. meta:: - :http-equiv=refresh: 5;URL=bugprone-bad-signal-to-kill-thread.html - -cert-pos44-c -============ - -The cert-pos44-c check is an alias, please see -`bugprone-bad-signal-to-kill-thread `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert-pos47-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert-pos47-c.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. title:: clang-tidy - cert-pos47-c -.. meta:: - :http-equiv=refresh: 5;URL=concurrency-thread-canceltype-asynchronous.html - -cert-pos47-c -============ - -The cert-pos47-c check is an alias, please see -`concurrency-thread-canceltype-asynchronous `_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-con36-c +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/spuriously-wake-up-functions.html + +cert-con36-c +============ + +The cert-con36-c check is an alias, please see +`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions.html>`_ +for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-con54-cpp +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/spuriously-wake-up-functions.html + +cert-con54-cpp +============== + +The cert-con54-cpp check is an alias, please see +`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions.html>`_ +for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst @@ -0,0 +1,9 @@ +.. title:: clang-tidy - cert-dcl03-c +.. meta:: + :http-equiv=refresh: 5;URL=../misc/static-assert.html + +cert-dcl03-c +============ + +The cert-dcl03-c check is an alias, please see +`misc-static-assert <../misc/static-assert.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst @@ -0,0 +1,9 @@ +.. title:: clang-tidy - cert-dcl16-c +.. meta:: + :http-equiv=refresh: 5;URL=../readability/uppercase-literal-suffix.html + +cert-dcl16-c +============ + +The cert-dcl16-c check is an alias, please see +`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-dcl37-c +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/reserved-identifier.html + +cert-dcl37-c +============ + +The cert-dcl37-c check is an alias, please see +`bugprone-reserved-identifier <../bugprone/reserved-identifier.html>`_ for more +information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-dcl51-cpp +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/reserved-identifier.html + +cert-dcl51-cpp +============== + +The cert-dcl51-cpp check is an alias, please see +`bugprone-reserved-identifier <../bugprone/reserved-identifier.html>`_ for more +information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cert-dcl54-cpp .. meta:: - :http-equiv=refresh: 5;URL=misc-new-delete-overloads.html + :http-equiv=refresh: 5;URL=../misc/new-delete-overloads.html cert-dcl54-cpp ============== The cert-dcl54-cpp check is an alias, please see -`misc-new-delete-overloads `_ for more +`misc-new-delete-overloads <../misc/new-delete-overloads.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst @@ -0,0 +1,9 @@ +.. title:: clang-tidy - cert-dcl59-cpp +.. meta:: + :http-equiv=refresh: 5;URL=../google/build-namespaces.html + +cert-dcl59-cpp +============== + +The cert-dcl59-cpp check is an alias, please see +`google-build-namespaces <../google/build-namespaces.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst @@ -1,12 +1,12 @@ .. title:: clang-tidy - cert-err09-cpp .. meta:: - :http-equiv=refresh: 5;URL=misc-throw-by-value-catch-by-reference.html + :http-equiv=refresh: 5;URL=../misc/throw-by-value-catch-by-reference.html cert-err09-cpp ============== The cert-err09-cpp check is an alias, please see -`misc-throw-by-value-catch-by-reference `_ +`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference.html>`_ for more information. This check corresponds to the CERT C++ Coding Standard recommendation Index: clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst @@ -186,7 +186,7 @@ * wscanf() * wscanf_s() -This check is an alias of check `bugprone-unused-return-value `_ +This check is an alias of check `bugprone-unused-return-value <../bugprone/unused-return-value.html>`_ with a fixed set of functions. The check corresponds to a part of CERT C Coding Standard rule `ERR33-C. Index: clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-err61-cpp +.. meta:: + :http-equiv=refresh: 5;URL=../misc/throw-by-value-catch-by-reference.html + +cert-err61-cpp +============== + +The cert-err61-cpp check is an alias, please see +`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference.html>`_ +for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst @@ -0,0 +1,8 @@ +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/suspicious-memory-comparison.html + +cert-exp42-c +============ + +The cert-exp42-c check is an alias, please see +`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-fio38-c +.. meta:: + :http-equiv=refresh: 5;URL=../misc/non-copyable-objects.html + +cert-fio38-c +============ + +The cert-fio38-c check is an alias, please see +`misc-non-copyable-objects <../misc/non-copyable-objects.html>`_ for more +information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst @@ -0,0 +1,8 @@ +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/suspicious-memory-comparison.html + +cert-flp37-c +============ + +The cert-flp37-c check is an alias, please see +`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - cert-msc30-c .. meta:: - :http-equiv=refresh: 5;URL=cert-msc50-cpp.html + :http-equiv=refresh: 5;URL=../cert/msc50-cpp.html cert-msc30-c ============ The cert-msc30-c check is an alias, please see -`cert-msc50-cpp `_ for more information. +`cert-msc50-cpp <../cert/msc50-cpp.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - cert-msc32-c .. meta:: - :http-equiv=refresh: 5;URL=cert-msc51-cpp.html + :http-equiv=refresh: 5;URL=../cert/msc51-cpp.html cert-msc32-c ============ The cert-msc32-c check is an alias, please see -`cert-msc51-cpp `_ for more information. +`cert-msc51-cpp <../cert/msc51-cpp.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst @@ -1,12 +1,12 @@ .. title:: clang-tidy - cert-oop11-cpp .. meta:: - :http-equiv=refresh: 5;URL=performance-move-constructor-init.html + :http-equiv=refresh: 5;URL=../performance/move-constructor-init.html cert-oop11-cpp ============== The cert-oop11-cpp check is an alias, please see -`performance-move-constructor-init `_ +`performance-move-constructor-init <../performance/move-constructor-init.html>`_ for more information. This check corresponds to the CERT C++ Coding Standard recommendation Index: clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - cert-oop54-cpp +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/unhandled-self-assignment.html + +cert-oop54-cpp +============== + +The cert-oop54-cpp check is an alias, please see +`bugprone-unhandled-self-assignment <../bugprone/unhandled-self-assignment.html>`_ +for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst @@ -0,0 +1,9 @@ +.. title:: clang-tidy - cert-pos44-c +.. meta:: + :http-equiv=refresh: 5;URL=../bugprone/bad-signal-to-kill-thread.html + +cert-pos44-c +============ + +The cert-pos44-c check is an alias, please see +`bugprone-bad-signal-to-kill-thread <../bugprone/bad-signal-to-kill-thread.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst @@ -0,0 +1,9 @@ +.. title:: clang-tidy - cert-pos47-c +.. meta:: + :http-equiv=refresh: 5;URL=../concurrency/thread-canceltype-asynchronous.html + +cert-pos47-c +============ + +The cert-pos47-c check is an alias, please see +`concurrency-thread-canceltype-asynchronous <../concurrency/thread-canceltype-asynchronous.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cert-sig30-c .. meta:: - :http-equiv=refresh: 5;URL=bugprone-signal-handler.html + :http-equiv=refresh: 5;URL=../bugprone/signal-handler.html cert-sig30-c ============ The cert-sig30-c check is an alias, please see -`bugprone-signal-handler `_ +`bugprone-signal-handler <../bugprone/signal-handler.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst +++ clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cert-str34-c .. meta:: - :http-equiv=refresh: 5;URL=bugprone-signed-char-misuse.html + :http-equiv=refresh: 5;URL=../bugprone/signed-char-misuse.html cert-str34-c ============ The cert-str34-c check is an alias, please see -`bugprone-signed-char-misuse `_ +`bugprone-signed-char-misuse <../bugprone/signed-char-misuse.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cppcoreguidelines-avoid-c-arrays .. meta:: - :http-equiv=refresh: 5;URL=modernize-avoid-c-arrays.html + :http-equiv=refresh: 5;URL=../modernize/avoid-c-arrays.html cppcoreguidelines-avoid-c-arrays ================================ The cppcoreguidelines-avoid-c-arrays check is an alias, please see -`modernize-avoid-c-arrays `_ +`modernize-avoid-c-arrays <../modernize/avoid-c-arrays.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cppcoreguidelines-avoid-magic-numbers .. meta:: - :http-equiv=refresh: 5;URL=readability-magic-numbers.html + :http-equiv=refresh: 5;URL=../readability/magic-numbers.html cppcoreguidelines-avoid-magic-numbers ===================================== The cppcoreguidelines-avoid-magic-numbers check is an alias, please see -`readability-magic-numbers `_ +`readability-magic-numbers <../readability/magic-numbers.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cppcoreguidelines-c-copy-assignment-signature .. meta:: - :http-equiv=refresh: 5;URL=misc-unconventional-assign-operator.html + :http-equiv=refresh: 5;URL=../misc/unconventional-assign-operator.html cppcoreguidelines-c-copy-assignment-signature ============================================= The cppcoreguidelines-c-copy-assignment-signature check is an alias, please see -`misc-unconventional-assign-operator `_ +`misc-unconventional-assign-operator <../misc/unconventional-assign-operator.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - cppcoreguidelines-explicit-virtual-functions .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-override.html + :http-equiv=refresh: 5;URL=../modernize/use-override.html cppcoreguidelines-explicit-virtual-functions ============================================ The cppcoreguidelines-explicit-virtual-functions check is an alias, please see -`modernize-use-override `_ +`modernize-use-override <../modernize/use-override.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/macro-to-enum.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/macro-to-enum.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/macro-to-enum.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - cppcoreguidelines-macro-to-enum .. meta:: - :http-equiv=refresh: 5;URL=modernize-macro-to-enum.html + :http-equiv=refresh: 5;URL=../modernize/macro-to-enum.html cppcoreguidelines-macro-to-enum =============================== The cppcoreguidelines-macro-to-enum check is an alias, please see -:doc:`modernize-macro-to-enum ` for more information. +:doc:`modernize-macro-to-enum <../modernize/macro-to-enum>` for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - cppcoreguidelines-non-private-member-variables-in-classes .. meta:: - :http-equiv=refresh: 5;URL=misc-non-private-member-variables-in-classes.html + :http-equiv=refresh: 5;URL=../misc/non-private-member-variables-in-classes.html cppcoreguidelines-non-private-member-variables-in-classes ========================================================= The cppcoreguidelines-non-private-member-variables-in-classes check is an alias, please see -`misc-non-private-member-variables-in-classes `_ +`misc-non-private-member-variables-in-classes <../misc/non-private-member-variables-in-classes.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst +++ clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst @@ -21,7 +21,7 @@ Please note, that this check does not enforce this latter rule for initializations already implemented as member initializers. For that purpose -see check `modernize-use-default-member-init `_. +see check `modernize-use-default-member-init <../modernize/use-default-member-init.html>`_. Example 1 --------- Index: clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst +++ clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - fuchsia-header-anon-namespaces .. meta:: - :http-equiv=refresh: 5;URL=google-build-namespaces.html + :http-equiv=refresh: 5;URL=../google/build-namespaces.html fuchsia-header-anon-namespaces ============================== The fuchsia-header-anon-namespaces check is an alias, please see -`google-build-namespace `_ +`google-build-namespace <../google/build-namespaces.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst +++ clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - google-readability-braces-around-statements .. meta:: - :http-equiv=refresh: 5;URL=readability-braces-around-statements.html + :http-equiv=refresh: 5;URL=../readability/braces-around-statements.html google-readability-braces-around-statements =========================================== The google-readability-braces-around-statements check is an alias, please see -`readability-braces-around-statements `_ +`readability-braces-around-statements <../readability/braces-around-statements.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst +++ clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - google-readability-function-size .. meta:: - :http-equiv=refresh: 5;URL=readability-function-size.html + :http-equiv=refresh: 5;URL=../readability/function-size.html google-readability-function-size ================================ The google-readability-function-size check is an alias, please see -`readability-function-size `_ for more +`readability-function-size <../readability/function-size.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst +++ clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - google-readability-namespace-comments .. meta:: - :http-equiv=refresh: 5;URL=llvm-namespace-comment.html + :http-equiv=refresh: 5;URL=../llvm/namespace-comment.html google-readability-namespace-comments ===================================== The google-readability-namespace-comments check is an alias, please see -`llvm-namespace-comment `_ for more information. +`llvm-namespace-comment <../llvm/namespace-comment.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp-explicit-conversions.rst +++ /dev/null @@ -1,17 +0,0 @@ -.. title:: clang-tidy - hicpp-explicit-conversions -.. meta:: - :http-equiv=refresh: 5;URL=google-explicit-constructor.html - -hicpp-explicit-conversions -========================== - -This check is an alias for `google-explicit-constructor `_. -Used to enforce parts of `rule 5.4.1 `_. -This check will enforce that constructors and conversion operators are marked `explicit`. -Other forms of casting checks are implemented in other places. -The following checks can be used to check for more forms of casting: - -- `cppcoreguidelines-pro-type-static-cast-downcast `_ -- `cppcoreguidelines-pro-type-reinterpret-cast `_ -- `cppcoreguidelines-pro-type-const-cast `_ -- `cppcoreguidelines-pro-type-cstyle-cast `_ Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-avoid-c-arrays .. meta:: - :http-equiv=refresh: 5;URL=modernize-avoid-c-arrays.html + :http-equiv=refresh: 5;URL=../modernize/avoid-c-arrays.html hicpp-avoid-c-arrays ==================== The hicpp-avoid-c-arrays check is an alias, please see -`modernize-avoid-c-arrays `_ +`modernize-avoid-c-arrays <../modernize/avoid-c-arrays.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst @@ -4,7 +4,7 @@ ================ The `hicpp-avoid-goto` check is an alias to -`cppcoreguidelines-avoid-goto `_. +`cppcoreguidelines-avoid-goto <../cppcoreguidelines/avoid-goto.html>`_. Rule `6.3.1 High Integrity C++ `_ requires that ``goto`` only skips parts of a block and is not used for other reasons. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-braces-around-statements .. meta:: - :http-equiv=refresh: 5;URL=readability-braces-around-statements.html + :http-equiv=refresh: 5;URL=../readability/braces-around-statements.html hicpp-braces-around-statements ============================== The `hicpp-braces-around-statements` check is an alias, please see -`readability-braces-around-statements `_ +`readability-braces-around-statements <../readability/braces-around-statements.html>`_ for more information. It enforces the `rule 6.1.1 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-deprecated-headers .. meta:: - :http-equiv=refresh: 5;URL=modernize-deprecated-headers.html + :http-equiv=refresh: 5;URL=../modernize/deprecated-headers.html hicpp-deprecated-headers ======================== The `hicpp-deprecated-headers` check is an alias, please see -`modernize-deprecated-headers `_ +`modernize-deprecated-headers <../modernize/deprecated-headers.html>`_ for more information. It enforces the `rule 1.3.3 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst =================================================================== --- /dev/null +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst @@ -0,0 +1,17 @@ +.. title:: clang-tidy - hicpp-explicit-conversions +.. meta:: + :http-equiv=refresh: 5;URL=../google/explicit-constructor.html + +hicpp-explicit-conversions +========================== + +This check is an alias for `google-explicit-constructor <../google/explicit-constructor.html>`_. +Used to enforce parts of `rule 5.4.1 `_. +This check will enforce that constructors and conversion operators are marked `explicit`. +Other forms of casting checks are implemented in other places. +The following checks can be used to check for more forms of casting: + +- `cppcoreguidelines-pro-type-static-cast-downcast <../cppcoreguidelines/pro-type-static-cast-downcast.html>`_ +- `cppcoreguidelines-pro-type-reinterpret-cast <../cppcoreguidelines/pro-type-reinterpret-cast.html>`_ +- `cppcoreguidelines-pro-type-const-cast <../cppcoreguidelines/pro-type-const-cast.html>`_ +- `cppcoreguidelines-pro-type-cstyle-cast <../cppcoreguidelines/pro-type-cstyle-cast.html>`_ Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-function-size .. meta:: - :http-equiv=refresh: 5;URL=readability-function-size.html + :http-equiv=refresh: 5;URL=../readability/function-size.html hicpp-function-size =================== -This check is an alias for `readability-function-size `_. +This check is an alias for `readability-function-size <../readability/function-size.html>`_. Useful to enforce multiple sections on function complexity. - `rule 8.2.2 `_ Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-invalid-access-moved .. meta:: - :http-equiv=refresh: 5;URL=bugprone-use-after-move.html + :http-equiv=refresh: 5;URL=../bugprone/use-after-move.html hicpp-invalid-access-moved ========================== -This check is an alias for `bugprone-use-after-move `_. +This check is an alias for `bugprone-use-after-move <../bugprone/use-after-move.html>`_. Implements parts of the `rule 8.4.1 `_ to check if moved-from objects are accessed. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-member-init .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-type-member-init.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/pro-type-member-init.html hicpp-member-init ================= -This check is an alias for `cppcoreguidelines-pro-type-member-init `_. +This check is an alias for `cppcoreguidelines-pro-type-member-init <../cppcoreguidelines/pro-type-member-init.html>`_. Implements the check for `rule 12.4.2 `_ to initialize class members in the right order. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-move-const-arg .. meta:: - :http-equiv=refresh: 5;URL=performance-move-const-arg.html + :http-equiv=refresh: 5;URL=../performance/move-const-arg.html hicpp-move-const-arg ==================== The `hicpp-move-const-arg` check is an alias, please see -`performance-move-const-arg `_ for more information. +`performance-move-const-arg <../performance/move-const-arg.html>`_ for more information. It enforces the `rule 17.3.1 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-named-parameter .. meta:: - :http-equiv=refresh: 5;URL=readability-named-parameter.html + :http-equiv=refresh: 5;URL=../readability/named-parameter.html hicpp-named-parameter ===================== -This check is an alias for `readability-named-parameter `_. +This check is an alias for `readability-named-parameter <../readability/named-parameter.html>`_. Implements `rule 8.2.1 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-new-delete-operators .. meta:: - :http-equiv=refresh: 5;URL=misc-new-delete-overloads.html + :http-equiv=refresh: 5;URL=../misc/new-delete-overloads.html hicpp-new-delete-operators ========================== -This check is an alias for `misc-new-delete-overloads `_. +This check is an alias for `misc-new-delete-overloads <../misc/new-delete-overloads.html>`_. Implements `rule 12.3.1 `_ to ensure the `new` and `delete` operators have the correct signature. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-no-array-decay .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-bounds-array-to-pointer-decay.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/pro-bounds-array-to-pointer-decay.html hicpp-no-array-decay ==================== The `hicpp-no-array-decay` check is an alias, please see -`cppcoreguidelines-pro-bounds-array-to-pointer-decay `_ +`cppcoreguidelines-pro-bounds-array-to-pointer-decay <../cppcoreguidelines/pro-bounds-array-to-pointer-decay.html>`_ for more information. It enforces the `rule 4.1.1 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-no-malloc .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-no-malloc.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/no-malloc.html hicpp-no-malloc =============== The `hicpp-no-malloc` check is an alias, please see -`cppcoreguidelines-no-malloc `_ +`cppcoreguidelines-no-malloc <../cppcoreguidelines/no-malloc.html>`_ for more information. It enforces the `rule 5.3.2 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - hicpp-noexcept-move .. meta:: - :http-equiv=refresh: 5;URL=performance-noexcept-move-constructor.html + :http-equiv=refresh: 5;URL=../performance/noexcept-move-constructor.html hicpp-noexcept-move =================== -This check is an alias for `performance-noexcept-move-constructor `_. +This check is an alias for `performance-noexcept-move-constructor <../performance/noexcept-move-constructor.html>`_. Checks `rule 12.5.4 `_ to mark move assignment and move construction `noexcept`. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - hicpp-special-member-functions .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-special-member-functions.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/special-member-functions.html hicpp-special-member-functions ============================== -This check is an alias for `cppcoreguidelines-special-member-functions `_. +This check is an alias for `cppcoreguidelines-special-member-functions <../cppcoreguidelines/special-member-functions.html>`_. Checks that special member functions have the correct signature, according to `rule 12.5.7 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-static-assert .. meta:: - :http-equiv=refresh: 5;URL=misc-static-assert.html + :http-equiv=refresh: 5;URL=../misc/static-assert.html hicpp-static-assert =================== The `hicpp-static-assert` check is an alias, please see -`misc-static-assert `_ for more information. +`misc-static-assert <../misc/static-assert.html>`_ for more information. It enforces the `rule 7.1.10 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-undelegated-constructor .. meta:: - :http-equiv=refresh: 5;URL=bugprone-undelegated-constructor.html + :http-equiv=refresh: 5;URL=../bugprone/undelegated-constructor.html hicpp-undelegated-constructor ============================= -This check is an alias for `bugprone-undelegated-constructor `_. +This check is an alias for `bugprone-undelegated-constructor <../bugprone/undelegated-constructor.html>`_. Partially implements `rule 12.4.5 `_ to find misplaced constructor calls inside a constructor. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - hicpp-uppercase-literal-suffix .. meta:: - :http-equiv=refresh: 5;URL=readability-uppercase-literal-suffix.html + :http-equiv=refresh: 5;URL=../readability/uppercase-literal-suffix.html hicpp-uppercase-literal-suffix ============================== The hicpp-uppercase-literal-suffix check is an alias, please see -`readability-uppercase-literal-suffix `_ for more information. +`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-auto .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-auto.html + :http-equiv=refresh: 5;URL=../modernize/use-auto.html hicpp-use-auto ============== The `hicpp-use-auto` check is an alias, please see -`modernize-use-auto `_ for more information. +`modernize-use-auto <../modernize/use-auto.html>`_ for more information. It enforces the `rule 7.1.8 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-emplace .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-emplace.html + :http-equiv=refresh: 5;URL=../modernize/use-emplace.html hicpp-use-emplace ================= The `hicpp-use-emplace` check is an alias, please see -`modernize-use-emplace `_ for more information. +`modernize-use-emplace <../modernize/use-emplace.html>`_ for more information. It enforces the `rule 17.4.2 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst @@ -1,9 +1,9 @@ .. title:: clang-tidy - hicpp-use-equals-defaults .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-equals-default.html + :http-equiv=refresh: 5;URL=../modernize/use-equals-default.html hicpp-use-equals-default ======================== -This check is an alias for `modernize-use-equals-default `_. +This check is an alias for `modernize-use-equals-default <../modernize/use-equals-default.html>`_. Implements `rule 12.5.1 `_ to explicitly default special member functions. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-equals-delete .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-equals-delete.html + :http-equiv=refresh: 5;URL=../modernize/use-equals-delete.html hicpp-use-equals-delete ======================= -This check is an alias for `modernize-use-equals-delete `_. +This check is an alias for `modernize-use-equals-delete <../modernize/use-equals-delete.html>`_. Implements `rule 12.5.1 `_ to explicitly default or delete special member functions. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-noexcept .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-noexcept.html + :http-equiv=refresh: 5;URL=../modernize/use-noexcept.html hicpp-use-noexcept ================== The `hicpp-use-noexcept` check is an alias, please see -`modernize-use-noexcept `_ for more information. +`modernize-use-noexcept <../modernize/use-noexcept.html>`_ for more information. It enforces the `rule 1.3.5 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-nullptr .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-nullptr.html + :http-equiv=refresh: 5;URL=../modernize/use-nullptr.html hicpp-use-nullptr ================= The `hicpp-use-nullptr` check is an alias, please see -`modernize-use-nullptr `_ for more information. +`modernize-use-nullptr <../modernize/use-nullptr.html>`_ for more information. It enforces the `rule 2.5.3 `_. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - hicpp-use-override .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-override.html + :http-equiv=refresh: 5;URL=../modernize/use-override.html hicpp-use-override ================== -This check is an alias for `modernize-use-override `_. +This check is an alias for `modernize-use-override <../modernize/use-override.html>`_. Implements `rule 10.2.1 `_ to declare a virtual function `override` when overriding. Index: clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst +++ clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - hicpp-vararg .. meta:: - :http-equiv=refresh: 5;URL=cppcoreguidelines-pro-type-vararg.html + :http-equiv=refresh: 5;URL=../cppcoreguidelines/pro-type-vararg.html hicpp-vararg ============ The `hicpp-vararg` check is an alias, please see -`cppcoreguidelines-pro-type-vararg `_ +`cppcoreguidelines-pro-type-vararg <../cppcoreguidelines/pro-type-vararg.html>`_ for more information. It enforces the `rule 14.1.1 `_. Index: clang-tools-extra/docs/clang-tidy/checks/list.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/list.rst +++ clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -7,458 +7,482 @@ :glob: :hidden: - * + abseil/* + altera/* + android/* + boost/* + bugprone/* + cert/* + clang-analyzer/* + concurrency/* + cppcoreguidelines/* + darwin/* + fuchsia/* + google/* + hicpp/* + linuxkernel/* + llvm/* + llvmlibc/* + misc/* + modernize/* + mpi/* + objc/* + openmp/* + performance/* + portability/* + readability/* + zircon/* .. csv-table:: :header: "Name", "Offers fixes" - `abseil-cleanup-ctad `_, "Yes" - `abseil-duration-addition `_, "Yes" - `abseil-duration-comparison `_, "Yes" - `abseil-duration-conversion-cast `_, "Yes" - `abseil-duration-division `_, "Yes" - `abseil-duration-factory-float `_, "Yes" - `abseil-duration-factory-scale `_, "Yes" - `abseil-duration-subtraction `_, "Yes" - `abseil-duration-unnecessary-conversion `_, "Yes" - `abseil-faster-strsplit-delimiter `_, "Yes" - `abseil-no-internal-dependencies `_, - `abseil-no-namespace `_, - `abseil-redundant-strcat-calls `_, "Yes" - `abseil-str-cat-append `_, "Yes" - `abseil-string-find-startswith `_, "Yes" - `abseil-string-find-str-contains `_, "Yes" - `abseil-time-comparison `_, "Yes" - `abseil-time-subtraction `_, "Yes" - `abseil-upgrade-duration-conversions `_, "Yes" - `altera-id-dependent-backward-branch `_, - `altera-kernel-name-restriction `_, - `altera-single-work-item-barrier `_, - `altera-struct-pack-align `_, "Yes" - `altera-unroll-loops `_, - `android-cloexec-accept `_, "Yes" - `android-cloexec-accept4 `_, "Yes" - `android-cloexec-creat `_, "Yes" - `android-cloexec-dup `_, "Yes" - `android-cloexec-epoll-create `_, "Yes" - `android-cloexec-epoll-create1 `_, "Yes" - `android-cloexec-fopen `_, "Yes" - `android-cloexec-inotify-init `_, "Yes" - `android-cloexec-inotify-init1 `_, "Yes" - `android-cloexec-memfd-create `_, "Yes" - `android-cloexec-open `_, "Yes" - `android-cloexec-pipe `_, "Yes" - `android-cloexec-pipe2 `_, "Yes" - `android-cloexec-socket `_, "Yes" - `android-comparison-in-temp-failure-retry `_, - `boost-use-to-string `_, "Yes" - `bugprone-argument-comment `_, "Yes" - `bugprone-assert-side-effect `_, - `bugprone-bad-signal-to-kill-thread `_, - `bugprone-bool-pointer-implicit-conversion `_, "Yes" - `bugprone-branch-clone `_, - `bugprone-copy-constructor-init `_, "Yes" - `bugprone-dangling-handle `_, - `bugprone-dynamic-static-initializers `_, - `bugprone-easily-swappable-parameters `_, - `bugprone-exception-escape `_, - `bugprone-fold-init-type `_, - `bugprone-forward-declaration-namespace `_, - `bugprone-forwarding-reference-overload `_, - `bugprone-implicit-widening-of-multiplication-result `_, "Yes" - `bugprone-inaccurate-erase `_, "Yes" - `bugprone-incorrect-roundings `_, - `bugprone-infinite-loop `_, - `bugprone-integer-division `_, - `bugprone-lambda-function-name `_, - `bugprone-macro-parentheses `_, "Yes" - `bugprone-macro-repeated-side-effects `_, - `bugprone-misplaced-operator-in-strlen-in-alloc `_, "Yes" - `bugprone-misplaced-pointer-arithmetic-in-alloc `_, "Yes" - `bugprone-misplaced-widening-cast `_, - `bugprone-move-forwarding-reference `_, "Yes" - `bugprone-multiple-statement-macro `_, - `bugprone-no-escape `_, - `bugprone-not-null-terminated-result `_, "Yes" - `bugprone-parent-virtual-call `_, "Yes" - `bugprone-posix-return `_, "Yes" - `bugprone-redundant-branch-condition `_, "Yes" - `bugprone-reserved-identifier `_, "Yes" - `bugprone-shared-ptr-array-mismatch `_, "Yes" - `bugprone-signal-handler `_, - `bugprone-signed-char-misuse `_, - `bugprone-sizeof-container `_, - `bugprone-sizeof-expression `_, - `bugprone-spuriously-wake-up-functions `_, - `bugprone-string-constructor `_, "Yes" - `bugprone-string-integer-assignment `_, "Yes" - `bugprone-string-literal-with-embedded-nul `_, - `bugprone-stringview-nullptr `_, "Yes" - `bugprone-suspicious-enum-usage `_, - `bugprone-suspicious-include `_, - `bugprone-suspicious-memory-comparison `_, - `bugprone-suspicious-memset-usage `_, "Yes" - `bugprone-suspicious-missing-comma `_, - `bugprone-suspicious-semicolon `_, "Yes" - `bugprone-suspicious-string-compare `_, "Yes" - `bugprone-swapped-arguments `_, "Yes" - `bugprone-terminating-continue `_, "Yes" - `bugprone-throw-keyword-missing `_, - `bugprone-too-small-loop-variable `_, - `bugprone-unchecked-optional-access `_, - `bugprone-undefined-memory-manipulation `_, - `bugprone-undelegated-constructor `_, - `bugprone-unhandled-exception-at-new `_, - `bugprone-unhandled-self-assignment `_, - `bugprone-unused-raii `_, "Yes" - `bugprone-unused-return-value `_, - `bugprone-use-after-move `_, - `bugprone-virtual-near-miss `_, "Yes" - `cert-dcl21-cpp `_, "Yes" - `cert-dcl50-cpp `_, - `cert-dcl58-cpp `_, - `cert-env33-c `_, - `cert-err33-c `_, - `cert-err34-c `_, - `cert-err52-cpp `_, - `cert-err58-cpp `_, - `cert-err60-cpp `_, - `cert-flp30-c `_, - `cert-mem57-cpp `_, - `cert-msc50-cpp `_, - `cert-msc51-cpp `_, - `cert-oop57-cpp `_, - `cert-oop58-cpp `_, - `clang-analyzer-core.DynamicTypePropagation `_, - `clang-analyzer-core.uninitialized.CapturedBlockVariable `_, - `clang-analyzer-cplusplus.InnerPointer `_, - `clang-analyzer-nullability.NullableReturnedFromNonnull `_, - `clang-analyzer-optin.osx.OSObjectCStyleCast `_, - `clang-analyzer-optin.performance.GCDAntipattern `_, - `clang-analyzer-optin.performance.Padding `_, - `clang-analyzer-optin.portability.UnixAPI `_, - `clang-analyzer-osx.MIG `_, - `clang-analyzer-osx.NumberObjectConversion `_, - `clang-analyzer-osx.OSObjectRetainCount `_, - `clang-analyzer-osx.ObjCProperty `_, - `clang-analyzer-osx.cocoa.AutoreleaseWrite `_, - `clang-analyzer-osx.cocoa.Loops `_, - `clang-analyzer-osx.cocoa.MissingSuperCall `_, - `clang-analyzer-osx.cocoa.NonNilReturnValue `_, - `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak `_, - `clang-analyzer-valist.CopyToSelf `_, - `clang-analyzer-valist.Uninitialized `_, - `clang-analyzer-valist.Unterminated `_, - `concurrency-mt-unsafe `_, - `concurrency-thread-canceltype-asynchronous `_, - `cppcoreguidelines-avoid-goto `_, - `cppcoreguidelines-avoid-non-const-global-variables `_, - `cppcoreguidelines-init-variables `_, "Yes" - `cppcoreguidelines-interfaces-global-init `_, - `cppcoreguidelines-macro-usage `_, - `cppcoreguidelines-narrowing-conversions `_, - `cppcoreguidelines-no-malloc `_, - `cppcoreguidelines-owning-memory `_, - `cppcoreguidelines-prefer-member-initializer `_, "Yes" - `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, - `cppcoreguidelines-pro-bounds-constant-array-index `_, "Yes" - `cppcoreguidelines-pro-bounds-pointer-arithmetic `_, - `cppcoreguidelines-pro-type-const-cast `_, - `cppcoreguidelines-pro-type-cstyle-cast `_, "Yes" - `cppcoreguidelines-pro-type-member-init `_, "Yes" - `cppcoreguidelines-pro-type-reinterpret-cast `_, - `cppcoreguidelines-pro-type-static-cast-downcast `_, "Yes" - `cppcoreguidelines-pro-type-union-access `_, - `cppcoreguidelines-pro-type-vararg `_, - `cppcoreguidelines-slicing `_, - `cppcoreguidelines-special-member-functions `_, - `cppcoreguidelines-virtual-class-destructor `_, "Yes" - `darwin-avoid-spinlock `_, - `darwin-dispatch-once-nonstatic `_, "Yes" - `fuchsia-default-arguments-calls `_, - `fuchsia-default-arguments-declarations `_, "Yes" - `fuchsia-multiple-inheritance `_, - `fuchsia-overloaded-operator `_, - `fuchsia-statically-constructed-objects `_, - `fuchsia-trailing-return `_, - `fuchsia-virtual-inheritance `_, - `google-build-explicit-make-pair `_, - `google-build-namespaces `_, - `google-build-using-namespace `_, - `google-default-arguments `_, - `google-explicit-constructor `_, "Yes" - `google-global-names-in-headers `_, - `google-objc-avoid-nsobject-new `_, - `google-objc-avoid-throwing-exception `_, - `google-objc-function-naming `_, - `google-objc-global-variable-declaration `_, - `google-readability-avoid-underscore-in-googletest-name `_, - `google-readability-casting `_, - `google-readability-todo `_, - `google-runtime-int `_, - `google-runtime-operator `_, - `google-upgrade-googletest-case `_, "Yes" - `hicpp-avoid-goto `_, - `hicpp-exception-baseclass `_, - `hicpp-multiway-paths-covered `_, - `hicpp-no-assembler `_, - `hicpp-signed-bitwise `_, - `linuxkernel-must-use-errs `_, - `llvm-header-guard `_, - `llvm-include-order `_, "Yes" - `llvm-namespace-comment `_, - `llvm-prefer-isa-or-dyn-cast-in-conditionals `_, "Yes" - `llvm-prefer-register-over-unsigned `_, "Yes" - `llvm-twine-local `_, "Yes" - `llvmlibc-callee-namespace `_, - `llvmlibc-implementation-in-namespace `_, - `llvmlibc-restrict-system-libc-headers `_, "Yes" - `misc-definitions-in-headers `_, "Yes" - `misc-misleading-bidirectional `_, - `misc-misleading-identifier `_, - `misc-misplaced-const `_, - `misc-new-delete-overloads `_, - `misc-no-recursion `_, - `misc-non-copyable-objects `_, - `misc-non-private-member-variables-in-classes `_, - `misc-redundant-expression `_, "Yes" - `misc-static-assert `_, "Yes" - `misc-throw-by-value-catch-by-reference `_, - `misc-unconventional-assign-operator `_, - `misc-uniqueptr-reset-release `_, "Yes" - `misc-unused-alias-decls `_, "Yes" - `misc-unused-parameters `_, "Yes" - `misc-unused-using-decls `_, "Yes" - `modernize-avoid-bind `_, "Yes" - `modernize-avoid-c-arrays `_, - `modernize-concat-nested-namespaces `_, "Yes" - `modernize-deprecated-headers `_, "Yes" - `modernize-deprecated-ios-base-aliases `_, "Yes" - `modernize-loop-convert `_, "Yes" - `modernize-macro-to-enum `_, "Yes" - `modernize-make-shared `_, "Yes" - `modernize-make-unique `_, "Yes" - `modernize-pass-by-value `_, "Yes" - `modernize-raw-string-literal `_, "Yes" - `modernize-redundant-void-arg `_, "Yes" - `modernize-replace-auto-ptr `_, "Yes" - `modernize-replace-disallow-copy-and-assign-macro `_, "Yes" - `modernize-replace-random-shuffle `_, "Yes" - `modernize-return-braced-init-list `_, "Yes" - `modernize-shrink-to-fit `_, "Yes" - `modernize-unary-static-assert `_, "Yes" - `modernize-use-auto `_, "Yes" - `modernize-use-bool-literals `_, "Yes" - `modernize-use-default-member-init `_, "Yes" - `modernize-use-emplace `_, "Yes" - `modernize-use-equals-default `_, "Yes" - `modernize-use-equals-delete `_, "Yes" - `modernize-use-nodiscard `_, "Yes" - `modernize-use-noexcept `_, "Yes" - `modernize-use-nullptr `_, "Yes" - `modernize-use-override `_, "Yes" - `modernize-use-trailing-return-type `_, "Yes" - `modernize-use-transparent-functors `_, "Yes" - `modernize-use-uncaught-exceptions `_, "Yes" - `modernize-use-using `_, "Yes" - `mpi-buffer-deref `_, "Yes" - `mpi-type-mismatch `_, "Yes" - `objc-assert-equals `_, "Yes" - `objc-avoid-nserror-init `_, - `objc-dealloc-in-category `_, - `objc-forbidden-subclassing `_, - `objc-missing-hash `_, - `objc-nsinvocation-argument-lifetime `_, "Yes" - `objc-property-declaration `_, "Yes" - `objc-super-self `_, "Yes" - `openmp-exception-escape `_, - `openmp-use-default-none `_, - `performance-faster-string-find `_, "Yes" - `performance-for-range-copy `_, "Yes" - `performance-implicit-conversion-in-loop `_, - `performance-inefficient-algorithm `_, "Yes" - `performance-inefficient-string-concatenation `_, - `performance-inefficient-vector-operation `_, "Yes" - `performance-move-const-arg `_, "Yes" - `performance-move-constructor-init `_, - `performance-no-automatic-move `_, - `performance-no-int-to-ptr `_, - `performance-noexcept-move-constructor `_, "Yes" - `performance-trivially-destructible `_, "Yes" - `performance-type-promotion-in-math-fn `_, "Yes" - `performance-unnecessary-copy-initialization `_, "Yes" - `performance-unnecessary-value-param `_, "Yes" - `portability-restrict-system-includes `_, "Yes" - `portability-simd-intrinsics `_, - `portability-std-allocator-const `_, - `readability-avoid-const-params-in-decls `_, "Yes" - `readability-braces-around-statements `_, "Yes" - `readability-const-return-type `_, "Yes" - `readability-container-contains `_, "Yes" - `readability-container-data-pointer `_, "Yes" - `readability-container-size-empty `_, "Yes" - `readability-convert-member-functions-to-static `_, "Yes" - `readability-delete-null-pointer `_, "Yes" - `readability-duplicate-include `_, "Yes" - `readability-else-after-return `_, "Yes" - `readability-function-cognitive-complexity `_, - `readability-function-size `_, - `readability-identifier-length `_, - `readability-identifier-naming `_, "Yes" - `readability-implicit-bool-conversion `_, "Yes" - `readability-inconsistent-declaration-parameter-name `_, "Yes" - `readability-isolate-declaration `_, "Yes" - `readability-magic-numbers `_, - `readability-make-member-function-const `_, "Yes" - `readability-misleading-indentation `_, - `readability-misplaced-array-index `_, "Yes" - `readability-named-parameter `_, "Yes" - `readability-non-const-parameter `_, "Yes" - `readability-qualified-auto `_, "Yes" - `readability-redundant-access-specifiers `_, "Yes" - `readability-redundant-control-flow `_, "Yes" - `readability-redundant-declaration `_, "Yes" - `readability-redundant-function-ptr-dereference `_, "Yes" - `readability-redundant-member-init `_, "Yes" - `readability-redundant-preprocessor `_, - `readability-redundant-smartptr-get `_, "Yes" - `readability-redundant-string-cstr `_, "Yes" - `readability-redundant-string-init `_, "Yes" - `readability-simplify-boolean-expr `_, "Yes" - `readability-simplify-subscript-expr `_, "Yes" - `readability-static-accessed-through-instance `_, "Yes" - `readability-static-definition-in-anonymous-namespace `_, "Yes" - `readability-string-compare `_, "Yes" - `readability-suspicious-call-argument `_, - `readability-uniqueptr-delete-release `_, "Yes" - `readability-uppercase-literal-suffix `_, "Yes" - `readability-use-anyofallof `_, - `zircon-temporary-objects `_, + `abseil-cleanup-ctad `_, "Yes" + `abseil-duration-addition `_, "Yes" + `abseil-duration-comparison `_, "Yes" + `abseil-duration-conversion-cast `_, "Yes" + `abseil-duration-division `_, "Yes" + `abseil-duration-factory-float `_, "Yes" + `abseil-duration-factory-scale `_, "Yes" + `abseil-duration-subtraction `_, "Yes" + `abseil-duration-unnecessary-conversion `_, "Yes" + `abseil-faster-strsplit-delimiter `_, "Yes" + `abseil-no-internal-dependencies `_, + `abseil-no-namespace `_, + `abseil-redundant-strcat-calls `_, "Yes" + `abseil-str-cat-append `_, "Yes" + `abseil-string-find-startswith `_, "Yes" + `abseil-string-find-str-contains `_, "Yes" + `abseil-time-comparison `_, "Yes" + `abseil-time-subtraction `_, "Yes" + `abseil-upgrade-duration-conversions `_, "Yes" + `altera-id-dependent-backward-branch `_, + `altera-kernel-name-restriction `_, + `altera-single-work-item-barrier `_, + `altera-struct-pack-align `_, "Yes" + `altera-unroll-loops `_, + `android-cloexec-accept `_, "Yes" + `android-cloexec-accept4 `_, "Yes" + `android-cloexec-creat `_, "Yes" + `android-cloexec-dup `_, "Yes" + `android-cloexec-epoll-create `_, "Yes" + `android-cloexec-epoll-create1 `_, "Yes" + `android-cloexec-fopen `_, "Yes" + `android-cloexec-inotify-init `_, "Yes" + `android-cloexec-inotify-init1 `_, "Yes" + `android-cloexec-memfd-create `_, "Yes" + `android-cloexec-open `_, "Yes" + `android-cloexec-pipe `_, "Yes" + `android-cloexec-pipe2 `_, "Yes" + `android-cloexec-socket `_, "Yes" + `android-comparison-in-temp-failure-retry `_, + `boost-use-to-string `_, "Yes" + `bugprone-argument-comment `_, "Yes" + `bugprone-assert-side-effect `_, + `bugprone-bad-signal-to-kill-thread `_, + `bugprone-bool-pointer-implicit-conversion `_, "Yes" + `bugprone-branch-clone `_, + `bugprone-copy-constructor-init `_, "Yes" + `bugprone-dangling-handle `_, + `bugprone-dynamic-static-initializers `_, + `bugprone-easily-swappable-parameters `_, + `bugprone-exception-escape `_, + `bugprone-fold-init-type `_, + `bugprone-forward-declaration-namespace `_, + `bugprone-forwarding-reference-overload `_, + `bugprone-implicit-widening-of-multiplication-result `_, "Yes" + `bugprone-inaccurate-erase `_, "Yes" + `bugprone-incorrect-roundings `_, + `bugprone-infinite-loop `_, + `bugprone-integer-division `_, + `bugprone-lambda-function-name `_, + `bugprone-macro-parentheses `_, "Yes" + `bugprone-macro-repeated-side-effects `_, + `bugprone-misplaced-operator-in-strlen-in-alloc `_, "Yes" + `bugprone-misplaced-pointer-arithmetic-in-alloc `_, "Yes" + `bugprone-misplaced-widening-cast `_, + `bugprone-move-forwarding-reference `_, "Yes" + `bugprone-multiple-statement-macro `_, + `bugprone-no-escape `_, + `bugprone-not-null-terminated-result `_, "Yes" + `bugprone-parent-virtual-call `_, "Yes" + `bugprone-posix-return `_, "Yes" + `bugprone-redundant-branch-condition `_, "Yes" + `bugprone-reserved-identifier `_, "Yes" + `bugprone-shared-ptr-array-mismatch `_, "Yes" + `bugprone-signal-handler `_, + `bugprone-signed-char-misuse `_, + `bugprone-sizeof-container `_, + `bugprone-sizeof-expression `_, + `bugprone-spuriously-wake-up-functions `_, + `bugprone-string-constructor `_, "Yes" + `bugprone-string-integer-assignment `_, "Yes" + `bugprone-string-literal-with-embedded-nul `_, + `bugprone-stringview-nullptr `_, "Yes" + `bugprone-suspicious-enum-usage `_, + `bugprone-suspicious-include `_, + `bugprone-suspicious-memory-comparison `_, + `bugprone-suspicious-memset-usage `_, "Yes" + `bugprone-suspicious-missing-comma `_, + `bugprone-suspicious-semicolon `_, "Yes" + `bugprone-suspicious-string-compare `_, "Yes" + `bugprone-swapped-arguments `_, "Yes" + `bugprone-terminating-continue `_, "Yes" + `bugprone-throw-keyword-missing `_, + `bugprone-too-small-loop-variable `_, + `bugprone-unchecked-optional-access `_, + `bugprone-undefined-memory-manipulation `_, + `bugprone-undelegated-constructor `_, + `bugprone-unhandled-exception-at-new `_, + `bugprone-unhandled-self-assignment `_, + `bugprone-unused-raii `_, "Yes" + `bugprone-unused-return-value `_, + `bugprone-use-after-move `_, + `bugprone-virtual-near-miss `_, "Yes" + `cert-dcl21-cpp `_, "Yes" + `cert-dcl50-cpp `_, + `cert-dcl58-cpp `_, + `cert-env33-c `_, + `cert-err33-c `_, + `cert-err34-c `_, + `cert-err52-cpp `_, + `cert-err58-cpp `_, + `cert-err60-cpp `_, + `cert-flp30-c `_, + `cert-mem57-cpp `_, + `cert-msc50-cpp `_, + `cert-msc51-cpp `_, + `cert-oop57-cpp `_, + `cert-oop58-cpp `_, + `clang-analyzer-core.DynamicTypePropagation `_, + `clang-analyzer-core.uninitialized.CapturedBlockVariable `_, + `clang-analyzer-cplusplus.InnerPointer `_, + `clang-analyzer-nullability.NullableReturnedFromNonnull `_, + `clang-analyzer-optin.osx.OSObjectCStyleCast `_, + `clang-analyzer-optin.performance.GCDAntipattern `_, + `clang-analyzer-optin.performance.Padding `_, + `clang-analyzer-optin.portability.UnixAPI `_, + `clang-analyzer-osx.MIG `_, + `clang-analyzer-osx.NumberObjectConversion `_, + `clang-analyzer-osx.OSObjectRetainCount `_, + `clang-analyzer-osx.ObjCProperty `_, + `clang-analyzer-osx.cocoa.AutoreleaseWrite `_, + `clang-analyzer-osx.cocoa.Loops `_, + `clang-analyzer-osx.cocoa.MissingSuperCall `_, + `clang-analyzer-osx.cocoa.NonNilReturnValue `_, + `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak `_, + `clang-analyzer-valist.CopyToSelf `_, + `clang-analyzer-valist.Uninitialized `_, + `clang-analyzer-valist.Unterminated `_, + `concurrency-mt-unsafe `_, + `concurrency-thread-canceltype-asynchronous `_, + `cppcoreguidelines-avoid-goto `_, + `cppcoreguidelines-avoid-non-const-global-variables `_, + `cppcoreguidelines-init-variables `_, "Yes" + `cppcoreguidelines-interfaces-global-init `_, + `cppcoreguidelines-macro-usage `_, + `cppcoreguidelines-narrowing-conversions `_, + `cppcoreguidelines-no-malloc `_, + `cppcoreguidelines-owning-memory `_, + `cppcoreguidelines-prefer-member-initializer `_, "Yes" + `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, + `cppcoreguidelines-pro-bounds-constant-array-index `_, "Yes" + `cppcoreguidelines-pro-bounds-pointer-arithmetic `_, + `cppcoreguidelines-pro-type-const-cast `_, + `cppcoreguidelines-pro-type-cstyle-cast `_, "Yes" + `cppcoreguidelines-pro-type-member-init `_, "Yes" + `cppcoreguidelines-pro-type-reinterpret-cast `_, + `cppcoreguidelines-pro-type-static-cast-downcast `_, "Yes" + `cppcoreguidelines-pro-type-union-access `_, + `cppcoreguidelines-pro-type-vararg `_, + `cppcoreguidelines-slicing `_, + `cppcoreguidelines-special-member-functions `_, + `cppcoreguidelines-virtual-class-destructor `_, "Yes" + `darwin-avoid-spinlock `_, + `darwin-dispatch-once-nonstatic `_, "Yes" + `fuchsia-default-arguments-calls `_, + `fuchsia-default-arguments-declarations `_, "Yes" + `fuchsia-multiple-inheritance `_, + `fuchsia-overloaded-operator `_, + `fuchsia-statically-constructed-objects `_, + `fuchsia-trailing-return `_, + `fuchsia-virtual-inheritance `_, + `google-build-explicit-make-pair `_, + `google-build-namespaces `_, + `google-build-using-namespace `_, + `google-default-arguments `_, + `google-explicit-constructor `_, "Yes" + `google-global-names-in-headers `_, + `google-objc-avoid-nsobject-new `_, + `google-objc-avoid-throwing-exception `_, + `google-objc-function-naming `_, + `google-objc-global-variable-declaration `_, + `google-readability-avoid-underscore-in-googletest-name `_, + `google-readability-casting `_, + `google-readability-todo `_, + `google-runtime-int `_, + `google-runtime-operator `_, + `google-upgrade-googletest-case `_, "Yes" + `hicpp-avoid-goto `_, + `hicpp-exception-baseclass `_, + `hicpp-multiway-paths-covered `_, + `hicpp-no-assembler `_, + `hicpp-signed-bitwise `_, + `linuxkernel-must-use-errs `_, + `llvm-header-guard `_, + `llvm-include-order `_, "Yes" + `llvm-namespace-comment `_, + `llvm-prefer-isa-or-dyn-cast-in-conditionals `_, "Yes" + `llvm-prefer-register-over-unsigned `_, "Yes" + `llvm-twine-local `_, "Yes" + `llvmlibc-callee-namespace `_, + `llvmlibc-implementation-in-namespace `_, + `llvmlibc-restrict-system-libc-headers `_, "Yes" + `misc-definitions-in-headers `_, "Yes" + `misc-misleading-bidirectional `_, + `misc-misleading-identifier `_, + `misc-misplaced-const `_, + `misc-new-delete-overloads `_, + `misc-no-recursion `_, + `misc-non-copyable-objects `_, + `misc-non-private-member-variables-in-classes `_, + `misc-redundant-expression `_, "Yes" + `misc-static-assert `_, "Yes" + `misc-throw-by-value-catch-by-reference `_, + `misc-unconventional-assign-operator `_, + `misc-uniqueptr-reset-release `_, "Yes" + `misc-unused-alias-decls `_, "Yes" + `misc-unused-parameters `_, "Yes" + `misc-unused-using-decls `_, "Yes" + `modernize-avoid-bind `_, "Yes" + `modernize-avoid-c-arrays `_, + `modernize-concat-nested-namespaces `_, "Yes" + `modernize-deprecated-headers `_, "Yes" + `modernize-deprecated-ios-base-aliases `_, "Yes" + `modernize-loop-convert `_, "Yes" + `modernize-macro-to-enum `_, "Yes" + `modernize-make-shared `_, "Yes" + `modernize-make-unique `_, "Yes" + `modernize-pass-by-value `_, "Yes" + `modernize-raw-string-literal `_, "Yes" + `modernize-redundant-void-arg `_, "Yes" + `modernize-replace-auto-ptr `_, "Yes" + `modernize-replace-disallow-copy-and-assign-macro `_, "Yes" + `modernize-replace-random-shuffle `_, "Yes" + `modernize-return-braced-init-list `_, "Yes" + `modernize-shrink-to-fit `_, "Yes" + `modernize-unary-static-assert `_, "Yes" + `modernize-use-auto `_, "Yes" + `modernize-use-bool-literals `_, "Yes" + `modernize-use-default-member-init `_, "Yes" + `modernize-use-emplace `_, "Yes" + `modernize-use-equals-default `_, "Yes" + `modernize-use-equals-delete `_, "Yes" + `modernize-use-nodiscard `_, "Yes" + `modernize-use-noexcept `_, "Yes" + `modernize-use-nullptr `_, "Yes" + `modernize-use-override `_, "Yes" + `modernize-use-trailing-return-type `_, "Yes" + `modernize-use-transparent-functors `_, "Yes" + `modernize-use-uncaught-exceptions `_, "Yes" + `modernize-use-using `_, "Yes" + `mpi-buffer-deref `_, "Yes" + `mpi-type-mismatch `_, "Yes" + `objc-assert-equals `_, "Yes" + `objc-avoid-nserror-init `_, + `objc-dealloc-in-category `_, + `objc-forbidden-subclassing `_, + `objc-missing-hash `_, + `objc-nsinvocation-argument-lifetime `_, "Yes" + `objc-property-declaration `_, "Yes" + `objc-super-self `_, "Yes" + `openmp-exception-escape `_, + `openmp-use-default-none `_, + `performance-faster-string-find `_, "Yes" + `performance-for-range-copy `_, "Yes" + `performance-implicit-conversion-in-loop `_, + `performance-inefficient-algorithm `_, "Yes" + `performance-inefficient-string-concatenation `_, + `performance-inefficient-vector-operation `_, "Yes" + `performance-move-const-arg `_, "Yes" + `performance-move-constructor-init `_, + `performance-no-automatic-move `_, + `performance-no-int-to-ptr `_, + `performance-noexcept-move-constructor `_, "Yes" + `performance-trivially-destructible `_, "Yes" + `performance-type-promotion-in-math-fn `_, "Yes" + `performance-unnecessary-copy-initialization `_, "Yes" + `performance-unnecessary-value-param `_, "Yes" + `portability-restrict-system-includes `_, "Yes" + `portability-simd-intrinsics `_, + `portability-std-allocator-const `_, + `readability-avoid-const-params-in-decls `_, "Yes" + `readability-braces-around-statements `_, "Yes" + `readability-const-return-type `_, "Yes" + `readability-container-contains `_, "Yes" + `readability-container-data-pointer `_, "Yes" + `readability-container-size-empty `_, "Yes" + `readability-convert-member-functions-to-static `_, "Yes" + `readability-delete-null-pointer `_, "Yes" + `readability-duplicate-include `_, "Yes" + `readability-else-after-return `_, "Yes" + `readability-function-cognitive-complexity `_, + `readability-function-size `_, + `readability-identifier-length `_, + `readability-identifier-naming `_, "Yes" + `readability-implicit-bool-conversion `_, "Yes" + `readability-inconsistent-declaration-parameter-name `_, "Yes" + `readability-isolate-declaration `_, "Yes" + `readability-magic-numbers `_, + `readability-make-member-function-const `_, "Yes" + `readability-misleading-indentation `_, + `readability-misplaced-array-index `_, "Yes" + `readability-named-parameter `_, "Yes" + `readability-non-const-parameter `_, "Yes" + `readability-qualified-auto `_, "Yes" + `readability-redundant-access-specifiers `_, "Yes" + `readability-redundant-control-flow `_, "Yes" + `readability-redundant-declaration `_, "Yes" + `readability-redundant-function-ptr-dereference `_, "Yes" + `readability-redundant-member-init `_, "Yes" + `readability-redundant-preprocessor `_, + `readability-redundant-smartptr-get `_, "Yes" + `readability-redundant-string-cstr `_, "Yes" + `readability-redundant-string-init `_, "Yes" + `readability-simplify-boolean-expr `_, "Yes" + `readability-simplify-subscript-expr `_, "Yes" + `readability-static-accessed-through-instance `_, "Yes" + `readability-static-definition-in-anonymous-namespace `_, "Yes" + `readability-string-compare `_, "Yes" + `readability-suspicious-call-argument `_, + `readability-uniqueptr-delete-release `_, "Yes" + `readability-uppercase-literal-suffix `_, "Yes" + `readability-use-anyofallof `_, + `zircon-temporary-objects `_, .. csv-table:: Aliases.. :header: "Name", "Redirect", "Offers fixes" - `bugprone-narrowing-conversions `_, `cppcoreguidelines-narrowing-conversions `_, - `cert-con36-c `_, `bugprone-spuriously-wake-up-functions `_, - `cert-con54-cpp `_, `bugprone-spuriously-wake-up-functions `_, - `cert-dcl03-c `_, `misc-static-assert `_, "Yes" - `cert-dcl16-c `_, `readability-uppercase-literal-suffix `_, "Yes" - `cert-dcl37-c `_, `bugprone-reserved-identifier `_, "Yes" - `cert-dcl51-cpp `_, `bugprone-reserved-identifier `_, "Yes" - `cert-dcl54-cpp `_, `misc-new-delete-overloads `_, - `cert-dcl59-cpp `_, `google-build-namespaces `_, - `cert-err09-cpp `_, `misc-throw-by-value-catch-by-reference `_, - `cert-err61-cpp `_, `misc-throw-by-value-catch-by-reference `_, - `cert-exp42-c `_, `bugprone-suspicious-memory-comparison `_, - `cert-fio38-c `_, `misc-non-copyable-objects `_, - `cert-flp37-c `_, `bugprone-suspicious-memory-comparison `_, - `cert-msc30-c `_, `cert-msc50-cpp `_, - `cert-msc32-c `_, `cert-msc51-cpp `_, - `cert-oop11-cpp `_, `performance-move-constructor-init `_, - `cert-oop54-cpp `_, `bugprone-unhandled-self-assignment `_, - `cert-pos44-c `_, `bugprone-bad-signal-to-kill-thread `_, - `cert-pos47-c `_, `concurrency-thread-canceltype-asynchronous `_, - `cert-sig30-c `_, `bugprone-signal-handler `_, - `cert-str34-c `_, `bugprone-signed-char-misuse `_, - `clang-analyzer-core.CallAndMessage `_, `Clang Static Analyzer `_, - `clang-analyzer-core.DivideZero `_, `Clang Static Analyzer `_, - `clang-analyzer-core.NonNullParamChecker `_, `Clang Static Analyzer `_, - `clang-analyzer-core.NullDereference `_, `Clang Static Analyzer `_, - `clang-analyzer-core.StackAddressEscape `_, `Clang Static Analyzer `_, - `clang-analyzer-core.UndefinedBinaryOperatorResult `_, `Clang Static Analyzer `_, - `clang-analyzer-core.VLASize `_, `Clang Static Analyzer `_, - `clang-analyzer-core.uninitialized.ArraySubscript `_, `Clang Static Analyzer `_, - `clang-analyzer-core.uninitialized.Assign `_, `Clang Static Analyzer `_, - `clang-analyzer-core.uninitialized.Branch `_, `Clang Static Analyzer `_, - `clang-analyzer-core.uninitialized.UndefReturn `_, `Clang Static Analyzer `_, - `clang-analyzer-cplusplus.Move `_, `Clang Static Analyzer `_, - `clang-analyzer-cplusplus.NewDelete `_, `Clang Static Analyzer `_, - `clang-analyzer-cplusplus.NewDeleteLeaks `_, `Clang Static Analyzer `_, - `clang-analyzer-deadcode.DeadStores `_, `Clang Static Analyzer `_, - `clang-analyzer-nullability.NullPassedToNonnull `_, `Clang Static Analyzer `_, - `clang-analyzer-nullability.NullReturnedFromNonnull `_, `Clang Static Analyzer `_, - `clang-analyzer-nullability.NullableDereferenced `_, `Clang Static Analyzer `_, - `clang-analyzer-nullability.NullablePassedToNonnull `_, `Clang Static Analyzer `_, - `clang-analyzer-optin.cplusplus.UninitializedObject `_, `Clang Static Analyzer `_, - `clang-analyzer-optin.cplusplus.VirtualCall `_, `Clang Static Analyzer `_, - `clang-analyzer-optin.mpi.MPI-Checker `_, `Clang Static Analyzer `_, - `clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, `Clang Static Analyzer `_, - `clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.API `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.SecKeychainAPI `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.AtSync `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.ClassRelease `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.Dealloc `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.IncompatibleMethodTypes `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.NSAutoreleasePool `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.NSError `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.NilArg `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.ObjCGenerics `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.RetainCount `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.SelfInit `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.SuperDealloc `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.UnusedIvars `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.cocoa.VariadicMethodTypes `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.coreFoundation.CFError `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.coreFoundation.CFNumber `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.coreFoundation.CFRetainRelease `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.coreFoundation.containers.OutOfBounds `_, `Clang Static Analyzer `_, - `clang-analyzer-osx.coreFoundation.containers.PointerSizedValues `_, `Clang Static Analyzer `_, - `clang-analyzer-security.FloatLoopCounter `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.UncheckedReturn `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.bcmp `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.bcopy `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.bzero `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.getpw `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.gets `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.mkstemp `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.mktemp `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.rand `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.strcpy `_, `Clang Static Analyzer `_, - `clang-analyzer-security.insecureAPI.vfork `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.API `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.Malloc `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.MallocSizeof `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.MismatchedDeallocator `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.Vfork `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.cstring.BadSizeArg `_, `Clang Static Analyzer `_, - `clang-analyzer-unix.cstring.NullArg `_, `Clang Static Analyzer `_, - `cppcoreguidelines-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, - `cppcoreguidelines-avoid-magic-numbers `_, `readability-magic-numbers `_, - `cppcoreguidelines-c-copy-assignment-signature `_, `misc-unconventional-assign-operator `_, - `cppcoreguidelines-explicit-virtual-functions `_, `modernize-use-override `_, "Yes" - `cppcoreguidelines-macro-to-enum `_, `modernize-macro-to-enum `_, "Yes" - `cppcoreguidelines-non-private-member-variables-in-classes `_, `misc-non-private-member-variables-in-classes `_, - `fuchsia-header-anon-namespaces `_, `google-build-namespaces `_, - `google-readability-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" - `google-readability-function-size `_, `readability-function-size `_, - `google-readability-namespace-comments `_, `llvm-namespace-comment `_, - `hicpp-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, - `hicpp-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" - `hicpp-deprecated-headers `_, `modernize-deprecated-headers `_, "Yes" - `hicpp-explicit-conversions `_, `google-explicit-constructor `_, "Yes" - `hicpp-function-size `_, `readability-function-size `_, - `hicpp-invalid-access-moved `_, `bugprone-use-after-move `_, - `hicpp-member-init `_, `cppcoreguidelines-pro-type-member-init `_, "Yes" - `hicpp-move-const-arg `_, `performance-move-const-arg `_, "Yes" - `hicpp-named-parameter `_, `readability-named-parameter `_, "Yes" - `hicpp-new-delete-operators `_, `misc-new-delete-overloads `_, - `hicpp-no-array-decay `_, `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, - `hicpp-no-malloc `_, `cppcoreguidelines-no-malloc `_, - `hicpp-noexcept-move `_, `performance-noexcept-move-constructor `_, "Yes" - `hicpp-special-member-functions `_, `cppcoreguidelines-special-member-functions `_, - `hicpp-static-assert `_, `misc-static-assert `_, "Yes" - `hicpp-undelegated-constructor `_, `bugprone-undelegated-constructor `_, - `hicpp-uppercase-literal-suffix `_, `readability-uppercase-literal-suffix `_, "Yes" - `hicpp-use-auto `_, `modernize-use-auto `_, "Yes" - `hicpp-use-emplace `_, `modernize-use-emplace `_, "Yes" - `hicpp-use-equals-default `_, `modernize-use-equals-default `_, "Yes" - `hicpp-use-equals-delete `_, `modernize-use-equals-delete `_, "Yes" - `hicpp-use-noexcept `_, `modernize-use-noexcept `_, "Yes" - `hicpp-use-nullptr `_, `modernize-use-nullptr `_, "Yes" - `hicpp-use-override `_, `modernize-use-override `_, "Yes" - `hicpp-vararg `_, `cppcoreguidelines-pro-type-vararg `_, - `llvm-else-after-return `_, `readability-else-after-return `_, "Yes" - `llvm-qualified-auto `_, `readability-qualified-auto `_, "Yes" + `bugprone-narrowing-conversions `_, `cppcoreguidelines-narrowing-conversions `_, + `cert-con36-c `_, `bugprone-spuriously-wake-up-functions `_, + `cert-con54-cpp `_, `bugprone-spuriously-wake-up-functions `_, + `cert-dcl03-c `_, `misc-static-assert `_, "Yes" + `cert-dcl16-c `_, `readability-uppercase-literal-suffix `_, "Yes" + `cert-dcl37-c `_, `bugprone-reserved-identifier `_, "Yes" + `cert-dcl51-cpp `_, `bugprone-reserved-identifier `_, "Yes" + `cert-dcl54-cpp `_, `misc-new-delete-overloads `_, + `cert-dcl59-cpp `_, `google-build-namespaces `_, + `cert-err09-cpp `_, `misc-throw-by-value-catch-by-reference `_, + `cert-err61-cpp `_, `misc-throw-by-value-catch-by-reference `_, + `cert-exp42-c `_, `bugprone-suspicious-memory-comparison `_, + `cert-fio38-c `_, `misc-non-copyable-objects `_, + `cert-flp37-c `_, `bugprone-suspicious-memory-comparison `_, + `cert-msc30-c `_, `cert-msc50-cpp `_, + `cert-msc32-c `_, `cert-msc51-cpp `_, + `cert-oop11-cpp `_, `performance-move-constructor-init `_, + `cert-oop54-cpp `_, `bugprone-unhandled-self-assignment `_, + `cert-pos44-c `_, `bugprone-bad-signal-to-kill-thread `_, + `cert-pos47-c `_, `concurrency-thread-canceltype-asynchronous `_, + `cert-sig30-c `_, `bugprone-signal-handler `_, + `cert-str34-c `_, `bugprone-signed-char-misuse `_, + `clang-analyzer-core.CallAndMessage `_, `Clang Static Analyzer core.CallAndMessage `_, + `clang-analyzer-core.DivideZero `_, `Clang Static Analyzer core.DivideZero `_, + `clang-analyzer-core.NonNullParamChecker `_, `Clang Static Analyzer core.NonNullParamChecker `_, + `clang-analyzer-core.NullDereference `_, `Clang Static Analyzer core.NullDereference `_, + `clang-analyzer-core.StackAddressEscape `_, `Clang Static Analyzer core.StackAddressEscape `_, + `clang-analyzer-core.UndefinedBinaryOperatorResult `_, `Clang Static Analyzer core.UndefinedBinaryOperatorResult `_, + `clang-analyzer-core.VLASize `_, `Clang Static Analyzer core.VLASize `_, + `clang-analyzer-core.uninitialized.ArraySubscript `_, `Clang Static Analyzer core.uninitialized.ArraySubscript `_, + `clang-analyzer-core.uninitialized.Assign `_, `Clang Static Analyzer core.uninitialized.Assign `_, + `clang-analyzer-core.uninitialized.Branch `_, `Clang Static Analyzer core.uninitialized.Branch `_, + `clang-analyzer-core.uninitialized.UndefReturn `_, `Clang Static Analyzer core.uninitialized.UndefReturn `_, + `clang-analyzer-cplusplus.Move `_, `Clang Static Analyzer cplusplus.Move `_, + `clang-analyzer-cplusplus.NewDelete `_, `Clang Static Analyzer cplusplus.NewDelete `_, + `clang-analyzer-cplusplus.NewDeleteLeaks `_, `Clang Static Analyzer cplusplus.NewDeleteLeaks `_, + `clang-analyzer-deadcode.DeadStores `_, `Clang Static Analyzer deadcode.DeadStores `_, + `clang-analyzer-nullability.NullPassedToNonnull `_, `Clang Static Analyzer nullability.NullPassedToNonnull `_, + `clang-analyzer-nullability.NullReturnedFromNonnull `_, `Clang Static Analyzer nullability.NullReturnedFromNonnull `_, + `clang-analyzer-nullability.NullableDereferenced `_, `Clang Static Analyzer nullability.NullableDereferenced `_, + `clang-analyzer-nullability.NullablePassedToNonnull `_, `Clang Static Analyzer nullability.NullablePassedToNonnull `_, + `clang-analyzer-optin.cplusplus.UninitializedObject `_, `Clang Static Analyzer optin.cplusplus.UninitializedObject `_, + `clang-analyzer-optin.cplusplus.VirtualCall `_, `Clang Static Analyzer optin.cplusplus.VirtualCall `_, + `clang-analyzer-optin.mpi.MPI-Checker `_, `Clang Static Analyzer optin.mpi.MPI-Checker `_, + `clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, `Clang Static Analyzer optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, + `clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, `Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, + `clang-analyzer-osx.API `_, `Clang Static Analyzer osx.API `_, + `clang-analyzer-osx.SecKeychainAPI `_, `Clang Static Analyzer osx.SecKeychainAPI `_, + `clang-analyzer-osx.cocoa.AtSync `_, `Clang Static Analyzer osx.cocoa.AtSync `_, + `clang-analyzer-osx.cocoa.ClassRelease `_, `Clang Static Analyzer osx.cocoa.ClassRelease `_, + `clang-analyzer-osx.cocoa.Dealloc `_, `Clang Static Analyzer osx.cocoa.Dealloc `_, + `clang-analyzer-osx.cocoa.IncompatibleMethodTypes `_, `Clang Static Analyzer osx.cocoa.IncompatibleMethodTypes `_, + `clang-analyzer-osx.cocoa.NSAutoreleasePool `_, `Clang Static Analyzer osx.cocoa.NSAutoreleasePool `_, + `clang-analyzer-osx.cocoa.NSError `_, `Clang Static Analyzer osx.cocoa.NSError `_, + `clang-analyzer-osx.cocoa.NilArg `_, `Clang Static Analyzer osx.cocoa.NilArg `_, + `clang-analyzer-osx.cocoa.ObjCGenerics `_, `Clang Static Analyzer osx.cocoa.ObjCGenerics `_, + `clang-analyzer-osx.cocoa.RetainCount `_, `Clang Static Analyzer osx.cocoa.RetainCount `_, + `clang-analyzer-osx.cocoa.SelfInit `_, `Clang Static Analyzer osx.cocoa.SelfInit `_, + `clang-analyzer-osx.cocoa.SuperDealloc `_, `Clang Static Analyzer osx.cocoa.SuperDealloc `_, + `clang-analyzer-osx.cocoa.UnusedIvars `_, `Clang Static Analyzer osx.cocoa.UnusedIvars `_, + `clang-analyzer-osx.cocoa.VariadicMethodTypes `_, `Clang Static Analyzer osx.cocoa.VariadicMethodTypes `_, + `clang-analyzer-osx.coreFoundation.CFError `_, `Clang Static Analyzer osx.coreFoundation.CFError `_, + `clang-analyzer-osx.coreFoundation.CFNumber `_, `Clang Static Analyzer osx.coreFoundation.CFNumber `_, + `clang-analyzer-osx.coreFoundation.CFRetainRelease `_, `Clang Static Analyzer osx.coreFoundation.CFRetainRelease `_, + `clang-analyzer-osx.coreFoundation.containers.OutOfBounds `_, `Clang Static Analyzer osx.coreFoundation.containers.OutOfBounds `_, + `clang-analyzer-osx.coreFoundation.containers.PointerSizedValues `_, `Clang Static Analyzer osx.coreFoundation.containers.PointerSizedValues `_, + `clang-analyzer-security.FloatLoopCounter `_, `Clang Static Analyzer security.FloatLoopCounter `_, + `clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, `Clang Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, + `clang-analyzer-security.insecureAPI.UncheckedReturn `_, `Clang Static Analyzer security.insecureAPI.UncheckedReturn `_, + `clang-analyzer-security.insecureAPI.bcmp `_, `Clang Static Analyzer security.insecureAPI.bcmp `_, + `clang-analyzer-security.insecureAPI.bcopy `_, `Clang Static Analyzer security.insecureAPI.bcopy `_, + `clang-analyzer-security.insecureAPI.bzero `_, `Clang Static Analyzer security.insecureAPI.bzero `_, + `clang-analyzer-security.insecureAPI.getpw `_, `Clang Static Analyzer security.insecureAPI.getpw `_, + `clang-analyzer-security.insecureAPI.gets `_, `Clang Static Analyzer security.insecureAPI.gets `_, + `clang-analyzer-security.insecureAPI.mkstemp `_, `Clang Static Analyzer security.insecureAPI.mkstemp `_, + `clang-analyzer-security.insecureAPI.mktemp `_, `Clang Static Analyzer security.insecureAPI.mktemp `_, + `clang-analyzer-security.insecureAPI.rand `_, `Clang Static Analyzer security.insecureAPI.rand `_, + `clang-analyzer-security.insecureAPI.strcpy `_, `Clang Static Analyzer security.insecureAPI.strcpy `_, + `clang-analyzer-security.insecureAPI.vfork `_, `Clang Static Analyzer security.insecureAPI.vfork `_, + `clang-analyzer-unix.API `_, `Clang Static Analyzer unix.API `_, + `clang-analyzer-unix.Malloc `_, `Clang Static Analyzer unix.Malloc `_, + `clang-analyzer-unix.MallocSizeof `_, `Clang Static Analyzer unix.MallocSizeof `_, + `clang-analyzer-unix.MismatchedDeallocator `_, `Clang Static Analyzer unix.MismatchedDeallocator `_, + `clang-analyzer-unix.Vfork `_, `Clang Static Analyzer unix.Vfork `_, + `clang-analyzer-unix.cstring.BadSizeArg `_, `Clang Static Analyzer unix.cstring.BadSizeArg `_, + `clang-analyzer-unix.cstring.NullArg `_, `Clang Static Analyzer unix.cstring.NullArg `_, + `cppcoreguidelines-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, + `cppcoreguidelines-avoid-magic-numbers `_, `readability-magic-numbers `_, + `cppcoreguidelines-c-copy-assignment-signature `_, `misc-unconventional-assign-operator `_, + `cppcoreguidelines-explicit-virtual-functions `_, `modernize-use-override `_, "Yes" + `cppcoreguidelines-macro-to-enum `_, `modernize-macro-to-enum `_, "Yes" + `cppcoreguidelines-non-private-member-variables-in-classes `_, `misc-non-private-member-variables-in-classes `_, + `fuchsia-header-anon-namespaces `_, `google-build-namespaces `_, + `google-readability-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" + `google-readability-function-size `_, `readability-function-size `_, + `google-readability-namespace-comments `_, `llvm-namespace-comment `_, + `hicpp-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, + `hicpp-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" + `hicpp-deprecated-headers `_, `modernize-deprecated-headers `_, "Yes" + `hicpp-explicit-conversions `_, `google-explicit-constructor `_, "Yes" + `hicpp-function-size `_, `readability-function-size `_, + `hicpp-invalid-access-moved `_, `bugprone-use-after-move `_, + `hicpp-member-init `_, `cppcoreguidelines-pro-type-member-init `_, "Yes" + `hicpp-move-const-arg `_, `performance-move-const-arg `_, "Yes" + `hicpp-named-parameter `_, `readability-named-parameter `_, "Yes" + `hicpp-new-delete-operators `_, `misc-new-delete-overloads `_, + `hicpp-no-array-decay `_, `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, + `hicpp-no-malloc `_, `cppcoreguidelines-no-malloc `_, + `hicpp-noexcept-move `_, `performance-noexcept-move-constructor `_, "Yes" + `hicpp-special-member-functions `_, `cppcoreguidelines-special-member-functions `_, + `hicpp-static-assert `_, `misc-static-assert `_, "Yes" + `hicpp-undelegated-constructor `_, `bugprone-undelegated-constructor `_, + `hicpp-uppercase-literal-suffix `_, `readability-uppercase-literal-suffix `_, "Yes" + `hicpp-use-auto `_, `modernize-use-auto `_, "Yes" + `hicpp-use-emplace `_, `modernize-use-emplace `_, "Yes" + `hicpp-use-equals-default `_, `modernize-use-equals-default `_, "Yes" + `hicpp-use-equals-delete `_, `modernize-use-equals-delete `_, "Yes" + `hicpp-use-noexcept `_, `modernize-use-noexcept `_, "Yes" + `hicpp-use-nullptr `_, `modernize-use-nullptr `_, "Yes" + `hicpp-use-override `_, `modernize-use-override `_, "Yes" + `hicpp-vararg `_, `cppcoreguidelines-pro-type-vararg `_, + `llvm-else-after-return `_, `readability-else-after-return `_, "Yes" + `llvm-qualified-auto `_, `readability-qualified-auto `_, "Yes" Index: clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst +++ clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst @@ -1,11 +1,11 @@ .. title:: clang-tidy - llvm-else-after-return .. meta:: - :http-equiv=refresh: 5;URL=readability-else-after-return.html + :http-equiv=refresh: 5;URL=../readability/else-after-return.html llvm-else-after-return ====================== The llvm-else-after-return check is an alias, please see -`readability-else-after-return `_ +`readability-else-after-return <../readability/else-after-return.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst +++ clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst @@ -1,10 +1,10 @@ .. title:: clang-tidy - llvm-qualified-auto .. meta:: - :http-equiv=refresh: 5;URL=readability-qualified-auto.html + :http-equiv=refresh: 5;URL=../readability/qualified-auto.html llvm-qualified-auto =================== The llvm-qualified-auto check is an alias, please see -`readability-qualified-auto `_ +`readability-qualified-auto <../readability/qualified-auto.html>`_ for more information. Index: clang-tools-extra/docs/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.rst +++ clang-tools-extra/docs/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.rst @@ -31,5 +31,5 @@ This can be used to allow known safe includes such as Linux development headers. See :doc:`portability-restrict-system-includes - ` for more + <../portability/restrict-system-includes>` for more details. Index: clang-tools-extra/docs/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.rst +++ clang-tools-extra/docs/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.rst @@ -38,7 +38,7 @@ * Notice that the migration example above leaves the ``private`` access specification untouched. You might want to run the check :doc:`modernize-use-equals-delete - ` to get warnings for deleted functions in + <../modernize/use-equals-delete>` to get warnings for deleted functions in private sections. Options Index: clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst +++ clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst @@ -2,10 +2,10 @@ .. title:: clang-tidy - modernize-use-default .. meta:: - :http-equiv=refresh: 5;URL=modernize-use-equals-default.html + :http-equiv=refresh: 5;URL=../modernize/use-equals-default.html modernize-use-default ===================== This check has been renamed to -`modernize-use-equals-default `_. +`modernize-use-equals-default <../modernize/use-equals-default.html>`_. Index: clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst +++ clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst @@ -2,11 +2,11 @@ .. title:: clang-tidy - performance-implicit-cast-in-loop .. meta:: - :http-equiv=refresh: 5;URL=performance-implicit-conversion-in-loop.html + :http-equiv=refresh: 5;URL=../performance/implicit-conversion-in-loop.html performance-implicit-cast-in-loop ================================= This check has been renamed to `performance-implicit-conversion-in-loop -`_. +<../performance/implicit-conversion-in-loop.html>`_. Index: clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst +++ clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst @@ -10,5 +10,5 @@ might find more opportunities to mark member functions ``static``. After making a member function ``static``, you might want to run the check -`readability-static-accessed-through-instance `_ to replace calls like +`readability-static-accessed-through-instance <../readability/static-accessed-through-instance.html>`_ to replace calls like ``Instance.method()`` by ``Class::method()``. Index: clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst +++ clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst @@ -2,10 +2,10 @@ .. title:: clang-tidy - readability-implicit-bool-cast .. meta:: - :http-equiv=refresh: 5;URL=readability-implicit-bool-conversion.html + :http-equiv=refresh: 5;URL=../readability/implicit-bool-conversion.html readability-implicit-bool-cast ============================== This check has been renamed to `readability-implicit-bool-conversion -`_. +<../readability/implicit-bool-conversion.html>`_. Index: clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst =================================================================== --- clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst +++ clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst @@ -37,7 +37,7 @@ * are templated or part of a class template * have an empty body * do not (implicitly) use ``this`` at all - (see `readability-convert-member-functions-to-static `_). + (see `readability-convert-member-functions-to-static <../readability/convert-member-functions-to-static.html>`_). The following real-world examples will be preserved by the check: