diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.clone.CloneChecker + +clang-analyzer-alpha.clone.CloneChecker +======================================= + +The clang-analyzer-alpha.clone.CloneChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.BoolAssignment + +clang-analyzer-alpha.core.BoolAssignment +======================================== + +The clang-analyzer-alpha.core.BoolAssignment check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + +clang-analyzer-alpha.core.CallAndMessageUnInitRefArg +==================================================== + +The clang-analyzer-alpha.core.CallAndMessageUnInitRefArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CastSize + +clang-analyzer-alpha.core.CastSize +================================== + +The clang-analyzer-alpha.core.CastSize check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CastToStruct + +clang-analyzer-alpha.core.CastToStruct +====================================== + +The clang-analyzer-alpha.core.CastToStruct check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.Conversion + +clang-analyzer-alpha.core.Conversion +==================================== + +The clang-analyzer-alpha.core.Conversion check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.DynamicTypeChecker + +clang-analyzer-alpha.core.DynamicTypeChecker +============================================ + +The clang-analyzer-alpha.core.DynamicTypeChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.FixedAddr + +clang-analyzer-alpha.core.FixedAddr +=================================== + +The clang-analyzer-alpha.core.FixedAddr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.IdenticalExpr + +clang-analyzer-alpha.core.IdenticalExpr +======================================= + +The clang-analyzer-alpha.core.IdenticalExpr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.PointerArithm + +clang-analyzer-alpha.core.PointerArithm +======================================= + +The clang-analyzer-alpha.core.PointerArithm check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.PointerSub + +clang-analyzer-alpha.core.PointerSub +==================================== + +The clang-analyzer-alpha.core.PointerSub check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.SizeofPtr + +clang-analyzer-alpha.core.SizeofPtr +=================================== + +The clang-analyzer-alpha.core.SizeofPtr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.StackAddressAsyncEscape + +clang-analyzer-alpha.core.StackAddressAsyncEscape +================================================= + +The clang-analyzer-alpha.core.StackAddressAsyncEscape check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.TestAfterDivZero + +clang-analyzer-alpha.core.TestAfterDivZero +========================================== + +The clang-analyzer-alpha.core.TestAfterDivZero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + +clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor +======================================================= + +The clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + +clang-analyzer-alpha.cplusplus.EnumCastOutOfRange +================================================= + +The clang-analyzer-alpha.cplusplus.EnumCastOutOfRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.InvalidatedIterator + +clang-analyzer-alpha.cplusplus.InvalidatedIterator +================================================== + +The clang-analyzer-alpha.cplusplus.InvalidatedIterator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.IteratorRange + +clang-analyzer-alpha.cplusplus.IteratorRange +============================================ + +The clang-analyzer-alpha.cplusplus.IteratorRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.MismatchedIterator + +clang-analyzer-alpha.cplusplus.MismatchedIterator +================================================= + +The clang-analyzer-alpha.cplusplus.MismatchedIterator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.deadcode.UnreachableCode + +clang-analyzer-alpha.deadcode.UnreachableCode +============================================= + +The clang-analyzer-alpha.deadcode.UnreachableCode check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.llvm.Conventions + +clang-analyzer-alpha.llvm.Conventions +===================================== + +The clang-analyzer-alpha.llvm.Conventions check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.nondeterminism.PointerIteration + +clang-analyzer-alpha.nondeterminism.PointerIteration +==================================================== + +The clang-analyzer-alpha.nondeterminism.PointerIteration check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.nondeterminism.PointerSorting + +clang-analyzer-alpha.nondeterminism.PointerSorting +================================================== + +The clang-analyzer-alpha.nondeterminism.PointerSorting check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + +clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment +=================================================== + +The clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + +clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions +======================================================================== + +The clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + +clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation +=========================================================== + +The clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + +clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod +======================================================== + +The clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + +clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker +================================================================= + +The clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ArrayBound + +clang-analyzer-alpha.security.ArrayBound +======================================== + +The clang-analyzer-alpha.security.ArrayBound check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ArrayBoundV2 + +clang-analyzer-alpha.security.ArrayBoundV2 +========================================== + +The clang-analyzer-alpha.security.ArrayBoundV2 check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.MallocOverflow + +clang-analyzer-alpha.security.MallocOverflow +============================================ + +The clang-analyzer-alpha.security.MallocOverflow check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.MmapWriteExec + +clang-analyzer-alpha.security.MmapWriteExec +=========================================== + +The clang-analyzer-alpha.security.MmapWriteExec check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ReturnPtrRange + +clang-analyzer-alpha.security.ReturnPtrRange +============================================ + +The clang-analyzer-alpha.security.ReturnPtrRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.taint.TaintPropagation + +clang-analyzer-alpha.security.taint.TaintPropagation +==================================================== + +The clang-analyzer-alpha.security.taint.TaintPropagation check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.BlockInCriticalSection + +clang-analyzer-alpha.unix.BlockInCriticalSection +================================================ + +The clang-analyzer-alpha.unix.BlockInCriticalSection check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.Chroot + +clang-analyzer-alpha.unix.Chroot +================================ + +The clang-analyzer-alpha.unix.Chroot check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.PthreadLock + +clang-analyzer-alpha.unix.PthreadLock +===================================== + +The clang-analyzer-alpha.unix.PthreadLock check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.SimpleStream + +clang-analyzer-alpha.unix.SimpleStream +====================================== + +The clang-analyzer-alpha.unix.SimpleStream check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.Stream + +clang-analyzer-alpha.unix.Stream +================================ + +The clang-analyzer-alpha.unix.Stream check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.BufferOverlap + +clang-analyzer-alpha.unix.cstring.BufferOverlap +=============================================== + +The clang-analyzer-alpha.unix.cstring.BufferOverlap check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.NotNullTerminated + +clang-analyzer-alpha.unix.cstring.NotNullTerminated +=================================================== + +The clang-analyzer-alpha.unix.cstring.NotNullTerminated check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.OutOfBounds + +clang-analyzer-alpha.unix.cstring.OutOfBounds +============================================= + +The clang-analyzer-alpha.unix.cstring.OutOfBounds check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.CallAndMessage + +clang-analyzer-core.CallAndMessage +================================== + +The clang-analyzer-core.CallAndMessage check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.DivideZero + +clang-analyzer-core.DivideZero +============================== + +The clang-analyzer-core.DivideZero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation + +clang-analyzer-core.DynamicTypePropagation +========================================== + +Generate dynamic type information diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker + +clang-analyzer-core.NonNullParamChecker +======================================= + +The clang-analyzer-core.NonNullParamChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.NullDereference + +clang-analyzer-core.NullDereference +=================================== + +The clang-analyzer-core.NullDereference check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape + +clang-analyzer-core.StackAddressEscape +====================================== + +The clang-analyzer-core.StackAddressEscape check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult + +clang-analyzer-core.UndefinedBinaryOperatorResult +================================================= + +The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.VLASize + +clang-analyzer-core.VLASize +=========================== + +The clang-analyzer-core.VLASize check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript + +clang-analyzer-core.uninitialized.ArraySubscript +================================================ + +The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign + +clang-analyzer-core.uninitialized.Assign +======================================== + +The clang-analyzer-core.uninitialized.Assign check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch + +clang-analyzer-core.uninitialized.Branch +======================================== + +The clang-analyzer-core.uninitialized.Branch check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable + +clang-analyzer-core.uninitialized.CapturedBlockVariable +======================================================= + +Check for blocks that capture uninitialized values diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn + +clang-analyzer-core.uninitialized.UndefReturn +============================================= + +The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer + +clang-analyzer-cplusplus.InnerPointer +===================================== + +Check for inner pointers of C++ containers used after re/deallocation diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.Move + +clang-analyzer-cplusplus.Move +============================= + +The clang-analyzer-cplusplus.Move check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete + +clang-analyzer-cplusplus.NewDelete +================================== + +The clang-analyzer-cplusplus.NewDelete check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks + +clang-analyzer-cplusplus.NewDeleteLeaks +======================================= + +The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores + +clang-analyzer-deadcode.DeadStores +================================== + +The clang-analyzer-deadcode.DeadStores check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull + +clang-analyzer-nullability.NullPassedToNonnull +============================================== + +The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull + +clang-analyzer-nullability.NullReturnedFromNonnull +================================================== + +The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced + +clang-analyzer-nullability.NullableDereferenced +=============================================== + +The clang-analyzer-nullability.NullableDereferenced check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull + +clang-analyzer-nullability.NullablePassedToNonnull +================================================== + +The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull + +clang-analyzer-nullability.NullableReturnedFromNonnull +====================================================== + +Warns when a nullable pointer is returned from a function that has _Nonnull return type. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject + +clang-analyzer-optin.cplusplus.UninitializedObject +================================================== + +The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall + +clang-analyzer-optin.cplusplus.VirtualCall +========================================== + +The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker + +clang-analyzer-optin.mpi.MPI-Checker +==================================== + +The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast + +clang-analyzer-optin.osx.OSObjectCStyleCast +=========================================== + +Checker for C-style casts of OSObjects diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + +clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker +============================================================================= + +The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + +clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker +======================================================================= + +The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern + +clang-analyzer-optin.performance.GCDAntipattern +=============================================== + +Check for performance anti-patterns when using Grand Central Dispatch diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.Padding + +clang-analyzer-optin.performance.Padding +======================================== + +Check for excessively padded structs. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI + +clang-analyzer-optin.portability.UnixAPI +======================================== + +Finds implementation-defined behavior in UNIX/Posix functions diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.API + +clang-analyzer-osx.API +====================== + +The clang-analyzer-osx.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.MIG + +clang-analyzer-osx.MIG +====================== + +Find violations of the Mach Interface Generator calling convention diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion + +clang-analyzer-osx.NumberObjectConversion +========================================= + +Check for erroneous conversions of objects representing numbers into numbers diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount + +clang-analyzer-osx.OSObjectRetainCount +====================================== + +Check for leaks and improper reference count management for OSObject diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty + +clang-analyzer-osx.ObjCProperty +=============================== + +Check for proper uses of Objective-C properties diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI + +clang-analyzer-osx.SecKeychainAPI +================================= + +The clang-analyzer-osx.SecKeychainAPI check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync + +clang-analyzer-osx.cocoa.AtSync +=============================== + +The clang-analyzer-osx.cocoa.AtSync check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite + +clang-analyzer-osx.cocoa.AutoreleaseWrite +========================================= + +Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease + +clang-analyzer-osx.cocoa.ClassRelease +===================================== + +The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc + +clang-analyzer-osx.cocoa.Dealloc +================================ + +The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes + +clang-analyzer-osx.cocoa.IncompatibleMethodTypes +================================================ + +The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops + +clang-analyzer-osx.cocoa.Loops +============================== + +Improved modeling of loops using Cocoa collection types diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall + +clang-analyzer-osx.cocoa.MissingSuperCall +========================================= + +Warn about Objective-C methods that lack a necessary call to super diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool + +clang-analyzer-osx.cocoa.NSAutoreleasePool +========================================== + +The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError + +clang-analyzer-osx.cocoa.NSError +================================ + +The clang-analyzer-osx.cocoa.NSError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg + +clang-analyzer-osx.cocoa.NilArg +=============================== + +The clang-analyzer-osx.cocoa.NilArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue + +clang-analyzer-osx.cocoa.NonNilReturnValue +========================================== + +Model the APIs that are guaranteed to return a non-nil value diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics + +clang-analyzer-osx.cocoa.ObjCGenerics +===================================== + +The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount + +clang-analyzer-osx.cocoa.RetainCount +==================================== + +The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + +clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak +=============================================== + +Check for leaked memory in autorelease pools that will never be drained diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit + +clang-analyzer-osx.cocoa.SelfInit +================================= + +The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc + +clang-analyzer-osx.cocoa.SuperDealloc +===================================== + +The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars + +clang-analyzer-osx.cocoa.UnusedIvars +==================================== + +The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes + +clang-analyzer-osx.cocoa.VariadicMethodTypes +============================================ + +The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError + +clang-analyzer-osx.coreFoundation.CFError +========================================= + +The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber + +clang-analyzer-osx.coreFoundation.CFNumber +========================================== + +The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease + +clang-analyzer-osx.coreFoundation.CFRetainRelease +================================================= + +The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds + +clang-analyzer-osx.coreFoundation.containers.OutOfBounds +======================================================== + +The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + +clang-analyzer-osx.coreFoundation.containers.PointerSizedValues +=============================================================== + +The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter + +clang-analyzer-security.FloatLoopCounter +======================================== + +The clang-analyzer-security.FloatLoopCounter check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + +clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling +==================================================================== + +The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn + +clang-analyzer-security.insecureAPI.UncheckedReturn +=================================================== + +The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp + +clang-analyzer-security.insecureAPI.bcmp +======================================== + +The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy + +clang-analyzer-security.insecureAPI.bcopy +========================================= + +The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero + +clang-analyzer-security.insecureAPI.bzero +========================================= + +The clang-analyzer-security.insecureAPI.bzero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw + +clang-analyzer-security.insecureAPI.getpw +========================================= + +The clang-analyzer-security.insecureAPI.getpw check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets + +clang-analyzer-security.insecureAPI.gets +======================================== + +The clang-analyzer-security.insecureAPI.gets check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp + +clang-analyzer-security.insecureAPI.mkstemp +=========================================== + +The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp + +clang-analyzer-security.insecureAPI.mktemp +========================================== + +The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand + +clang-analyzer-security.insecureAPI.rand +======================================== + +The clang-analyzer-security.insecureAPI.rand check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy + +clang-analyzer-security.insecureAPI.strcpy +========================================== + +The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork + +clang-analyzer-security.insecureAPI.vfork +========================================= + +The clang-analyzer-security.insecureAPI.vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.API + +clang-analyzer-unix.API +======================= + +The clang-analyzer-unix.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.Malloc + +clang-analyzer-unix.Malloc +========================== + +The clang-analyzer-unix.Malloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof + +clang-analyzer-unix.MallocSizeof +================================ + +The clang-analyzer-unix.MallocSizeof check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator + +clang-analyzer-unix.MismatchedDeallocator +========================================= + +The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.Vfork + +clang-analyzer-unix.Vfork +========================= + +The clang-analyzer-unix.Vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg + +clang-analyzer-unix.cstring.BadSizeArg +====================================== + +The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst @@ -0,0 +1,8 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg + +clang-analyzer-unix.cstring.NullArg +=================================== + +The clang-analyzer-unix.cstring.NullArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf + +clang-analyzer-valist.CopyToSelf +================================ + +Check for va_lists which are copied onto itself. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.Uninitialized + +clang-analyzer-valist.Uninitialized +=================================== + +Check for usages of uninitialized (or already released) va_lists. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.Unterminated + +clang-analyzer-valist.Unterminated +================================== + +Check for va_lists which are not released by a va_end call. diff --git a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py @@ -0,0 +1,117 @@ +""" +Generates documentation based off the available static analyzers checks +References Checkers.td to determine what checks exist +""" + +checkers_td_directory = "../../../../clang/include/clang/StaticAnalyzer/Checkers/" + +import subprocess +import json +import os +import re + +"""Get path of script so files are always in correct directory""" +__location__ = os.path.realpath( + os.path.join(os.getcwd(), os.path.dirname(__file__))) + +"""Get dict of checker related info and parse for full check names + +Returns: + checkers: dict of checker info +""" +def get_checkers(): + result = subprocess.run(["llvm-tblgen", "--dump-json", "-I", + checkers_td_directory, checkers_td_directory+"Checkers.td"], + stdout=subprocess.PIPE) + table_entries = json.loads(result.stdout) + documentable_checkers = [] + checkers = table_entries["!instanceof"]["Checker"] + packages = table_entries["!instanceof"]["Package"] + + for checker_ in checkers: + checker = table_entries[checker_] + checker_name = checker["CheckerName"] + package_ = checker["ParentPackage"]["def"] + package = table_entries[package_] + package_name = package["PackageName"] + checker_package_prefix = package_name + parent_package_ = package["ParentPackage"] + hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0) + + while(parent_package_ != None): + parent_package = table_entries[parent_package_["def"]] + checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix + hidden = hidden or parent_package["Hidden"] != 0 + parent_package_ = parent_package["ParentPackage"] + + full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name + anchor_url = re.sub("\.", "-", checker_package_prefix + "." + checker_name).lower() + + if(not hidden): + checker["FullPackageName"] = full_package_name + checker["AnchorUrl"] = anchor_url + documentable_checkers.append(checker) + + documentable_checkers.sort(key=lambda x: x["FullPackageName"]) + return documentable_checkers + +"""Generate documentation for checker + +Args: + checker: Checker for which to generate documentation. + only_help_text: Generate documentation based off the checker description. + Used when there is no other documentation to link to. +""" +def generate_documentation(checker, only_help_text=False): + with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f: + f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"]) + f.write("\n") + f.write("%s\n" % checker["FullPackageName"]) + f.write("=" * len(checker["FullPackageName"]) + "\n") + f.write("\n") + if(only_help_text): + f.write("%s\n" % checker["HelpText"]) + else: + f.write("The %s check is an alias, please see\n" % checker["FullPackageName"]) + f.write("`Clang Static Analyzer Available Checkers `_\n" % checker["AnchorUrl"]) + f.write("for more information.\n") + f.close() + +"""Update list.rst to include the new checks + +Args: + checkers: dict acquired from get_checkers() +""" +def update_documentation_list(checkers): + with open(os.path.join(__location__, "list.rst"), "r+") as f: + f_text = f.read() + header, check_text= f_text.split(".. toctree::\n") + checks = check_text.split("\n") + for checker in checkers: + if((" %s" % checker["FullPackageName"]) not in checks): + checks.append(" %s" % checker["FullPackageName"]) + checks.sort() + + #Overwrite file with new data + f.seek(0) + f.write(header) + f.write(".. toctree::") + for check in checks: + f.write("%s\n" % check) + f.close() + + + +def main(): + checkers = get_checkers() + for checker in checkers: + #No documentation nor alpha documentation + if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0): + generate_documentation(checker, True) + else: + generate_documentation(checker) + print("Generated documentation for: %s" % checker["FullPackageName"]) + update_documentation_list(checkers) + +if __name__ == '__main__': + main() diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -4,6 +4,7 @@ ================= .. toctree:: + abseil-duration-addition abseil-duration-comparison abseil-duration-conversion-cast @@ -102,6 +103,132 @@ cert-msc51-cpp cert-oop11-cpp (redirects to performance-move-constructor-init) cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) + clang-analyzer-alpha.clone.CloneChecker + clang-analyzer-alpha.core.BoolAssignment + clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + clang-analyzer-alpha.core.CastSize + clang-analyzer-alpha.core.CastToStruct + clang-analyzer-alpha.core.Conversion + clang-analyzer-alpha.core.DynamicTypeChecker + clang-analyzer-alpha.core.FixedAddr + clang-analyzer-alpha.core.IdenticalExpr + clang-analyzer-alpha.core.PointerArithm + clang-analyzer-alpha.core.PointerSub + clang-analyzer-alpha.core.SizeofPtr + clang-analyzer-alpha.core.StackAddressAsyncEscape + clang-analyzer-alpha.core.TestAfterDivZero + clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + clang-analyzer-alpha.cplusplus.InvalidatedIterator + clang-analyzer-alpha.cplusplus.IteratorRange + clang-analyzer-alpha.cplusplus.MismatchedIterator + clang-analyzer-alpha.deadcode.UnreachableCode + clang-analyzer-alpha.llvm.Conventions + clang-analyzer-alpha.nondeterminism.PointerIteration + clang-analyzer-alpha.nondeterminism.PointerSorting + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + clang-analyzer-alpha.security.ArrayBound + clang-analyzer-alpha.security.ArrayBoundV2 + clang-analyzer-alpha.security.MallocOverflow + clang-analyzer-alpha.security.MmapWriteExec + clang-analyzer-alpha.security.ReturnPtrRange + clang-analyzer-alpha.security.taint.TaintPropagation + clang-analyzer-alpha.unix.BlockInCriticalSection + clang-analyzer-alpha.unix.Chroot + clang-analyzer-alpha.unix.PthreadLock + clang-analyzer-alpha.unix.SimpleStream + clang-analyzer-alpha.unix.Stream + clang-analyzer-alpha.unix.cstring.BufferOverlap + clang-analyzer-alpha.unix.cstring.NotNullTerminated + clang-analyzer-alpha.unix.cstring.OutOfBounds + clang-analyzer-core.CallAndMessage + clang-analyzer-core.DivideZero + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NullDereference + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.VLASize + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-deadcode.DeadStores + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-osx.API + clang-analyzer-osx.MIG + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-unix.API + clang-analyzer-unix.Malloc + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.Vfork + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Unterminated cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) cppcoreguidelines-avoid-goto cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers) diff --git a/clang/docs/analyzer/checkers.rst b/clang/docs/analyzer/checkers.rst --- a/clang/docs/analyzer/checkers.rst +++ b/clang/docs/analyzer/checkers.rst @@ -29,6 +29,8 @@ null pointer dereference, usage of uninitialized values, etc. *These checkers must be always switched on as other checker rely on them.* +.. _core-CallAndMessage: + core.CallAndMessage (C, C++, ObjC) """""""""""""""""""""""""""""""""" Check for logical errors for function calls and Objective-C message expressions (e.g., uninitialized arguments, null function pointers). @@ -36,6 +38,8 @@ .. literalinclude:: checkers/callandmessage_example.c :language: objc +.. _core-DivideZero: + core.DivideZero (C, C++, ObjC) """""""""""""""""""""""""""""" Check for division by zero. @@ -43,6 +47,8 @@ .. literalinclude:: checkers/dividezero_example.c :language: c +.. _core-NonNullParamChecker: + core.NonNullParamChecker (C, C++, ObjC) """"""""""""""""""""""""""""""""""""""" Check for null pointers passed as arguments to a function whose arguments are references or marked with the 'nonnull' attribute. @@ -56,6 +62,8 @@ f(p); // warn } +.. _core-NullDereference: + core.NullDereference (C, C++, ObjC) """"""""""""""""""""""""""""""""""" Check for dereferences of null pointers. @@ -99,6 +107,8 @@ obj->x = 1; // warn } +.. _core-StackAddressEscape: + core.StackAddressEscape (C) """"""""""""""""""""""""""" Check that addresses to stack memory do not escape the function. @@ -123,6 +133,8 @@ } +.. _core-UndefinedBinaryOperatorResult: + core.UndefinedBinaryOperatorResult (C) """""""""""""""""""""""""""""""""""""" Check for undefined results of binary operators. @@ -134,6 +146,8 @@ int y = x + 1; // warn: left operand is garbage } +.. _core-VLASize: + core.VLASize (C) """""""""""""""" Check for declarations of Variable Length Arrays of undefined or zero size. @@ -152,6 +166,8 @@ int vla2[x]; // warn: zero size } +.. _core-uninitialized-ArraySubscript: + core.uninitialized.ArraySubscript (C) """"""""""""""""""""""""""""""""""""" Check for uninitialized values used as array subscripts. @@ -163,6 +179,8 @@ int x = a[i]; // warn: array subscript is undefined } +.. _core-uninitialized-Assign: + core.uninitialized.Assign (C) """"""""""""""""""""""""""""" Check for assigning uninitialized values. @@ -174,6 +192,8 @@ x |= 1; // warn: left expression is uninitialized } +.. _core-uninitialized-Branch: + core.uninitialized.Branch (C) """"""""""""""""""""""""""""" Check for uninitialized values used as branch conditions. @@ -186,6 +206,8 @@ return; } +.. _core-uninitialized-CapturedBlockVariable: + core.uninitialized.CapturedBlockVariable (C) """""""""""""""""""""""""""""""""""""""""""" Check for blocks that capture uninitialized values. @@ -197,6 +219,8 @@ ^{ int y = x; }(); // warn } +.. _core-uninitialized-UndefReturn: + core.uninitialized.UndefReturn (C) """""""""""""""""""""""""""""""""" Check for uninitialized values being returned to the caller. @@ -216,10 +240,14 @@ C++ Checkers. +.. _cplusplus-InnerPointer: + cplusplus.InnerPointer """""""""""""""""""""" Check for inner pointers of C++ containers used after re/deallocation. +.. _cplusplus-NewDelete: + cplusplus.NewDelete (C++) """"""""""""""""""""""""" Check for double-free and use-after-free problems. Traces memory managed by new/delete. @@ -227,6 +255,8 @@ .. literalinclude:: checkers/newdelete_example.cpp :language: cpp +.. _cplusplus-NewDeleteLeaks: + cplusplus.NewDeleteLeaks (C++) """""""""""""""""""""""""""""" Check for memory leaks. Traces memory managed by new/delete. @@ -238,6 +268,8 @@ } // warn +.. _cplusplus-SelfAssignment: + cplusplus.SelfAssignment (C++) """""""""""""""""""""""""""""" Checks C++ copy and move assignment operators for self assignment. @@ -249,6 +281,8 @@ Dead Code Checkers. +.. _deadcode-DeadStores: + deadcode.DeadStores (C) """"""""""""""""""""""" Check for values stored to variables that are never read afterwards. @@ -267,6 +301,8 @@ Objective C checkers that warn for null pointer passing and dereferencing errors. +.. _nullability-NullPassedToNonnull: + nullability.NullPassedToNonnull (ObjC) """""""""""""""""""""""""""""""""""""" Warns when a null pointer is passed to a pointer which has a _Nonnull type. @@ -278,6 +314,8 @@ // Warning: nil passed to a callee that requires a non-null 1st parameter NSString *greeting = [@"Hello " stringByAppendingString:name]; +.. _nullability-NullReturnedFromNonnull: + nullability.NullReturnedFromNonnull (ObjC) """""""""""""""""""""""""""""""""""""""""" Warns when a null pointer is returned from a function that has _Nonnull return type. @@ -294,6 +332,8 @@ return result; } +.. _nullability-NullableDereferenced: + nullability.NullableDereferenced (ObjC) """"""""""""""""""""""""""""""""""""""" Warns when a nullable pointer is dereferenced. @@ -313,6 +353,8 @@ next->data = 7; } +.. _nullability-NullablePassedToNonnull: + nullability.NullablePassedToNonnull (ObjC) """""""""""""""""""""""""""""""""""""""""" Warns when a nullable pointer is passed to a pointer which has a _Nonnull type. @@ -328,6 +370,8 @@ takesNonnull(p); // warn } +.. _nullability-NullableReturnedFromNonnull: + nullability.NullableReturnedFromNonnull (ObjC) """""""""""""""""""""""""""""""""""""""""""""" Warns when a nullable pointer is returned from a function that has _Nonnull return type. @@ -339,6 +383,8 @@ Checkers for portability, performance or coding style specific rules. +.. _optin-cplusplus-UninitializedObject: + optin.cplusplus.UninitializedObject (C++) """"""""""""""""""""""""""""""""""""""""" @@ -443,6 +489,8 @@ structures that have a field with a name or type name that matches the given pattern. *Defaults to ""*. +.. _optin-cplusplus-VirtualCall: + optin.cplusplus.VirtualCall (C++) """"""""""""""""""""""""""""""""" Check virtual function calls during construction or destruction. @@ -465,6 +513,8 @@ virtual void f(); }; +.. _optin-mpi-MPI-Checker: + optin.mpi.MPI-Checker (C) """"""""""""""""""""""""" Checks MPI code. @@ -494,6 +544,8 @@ MPI_Wait(&sendReq1[1][7][9], MPI_STATUS_IGNORE); // warn } +.. _optin-osx-cocoa-localizability-EmptyLocalizationContextChecker: + optin.osx.cocoa.localizability.EmptyLocalizationContextChecker (ObjC) """"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" Check that NSLocalizedString macros include a comment for context. @@ -507,6 +559,8 @@ @"LocalizedString", nil, [[NSBundle alloc] init], nil,@""); // warn } +.. _optin-osx-cocoa-localizability-NonLocalizedStringChecker: + optin.osx.cocoa.localizability.NonLocalizedStringChecker (ObjC) """"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" Warns about uses of non-localized NSStrings passed to UI methods expecting localized NSStrings. @@ -523,14 +577,20 @@ // Warning: User-facing text should use localized string macro [alarmStateLabel setText:alarmText]; +.. _optin-performance-GCDAntipattern: + optin.performance.GCDAntipattern """""""""""""""""""""""""""""""" Check for performance anti-patterns when using Grand Central Dispatch. +.. _optin-performance-Padding: + optin.performance.Padding """"""""""""""""""""""""" Check for excessively padded structs. +.. _optin-portability-UnixAPI: + optin.portability.UnixAPI """"""""""""""""""""""""" Finds implementation-defined behavior in UNIX/Posix functions. @@ -543,6 +603,8 @@ Security related checkers. +.. _security-FloatLoopCounter: + security.FloatLoopCounter (C) """"""""""""""""""""""""""""" Warn on using a floating point value as a loop counter (CERT: FLP30-C, FLP30-CPP). @@ -553,6 +615,8 @@ for (float x = 0.1f; x <= 1.0f; x += 0.1f) {} // warn } +.. _security-insecureAPI-UncheckedReturn: + security.insecureAPI.UncheckedReturn (C) """""""""""""""""""""""""""""""""""""""" Warn on uses of functions whose return values must be always checked. @@ -563,6 +627,8 @@ setuid(1); // warn } +.. _security-insecureAPI-bcmp: + security.insecureAPI.bcmp (C) """"""""""""""""""""""""""""" Warn on uses of the 'bcmp' function. @@ -573,6 +639,8 @@ bcmp(ptr0, ptr1, n); // warn } +.. _security-insecureAPI-bcopy: + security.insecureAPI.bcopy (C) """""""""""""""""""""""""""""" Warn on uses of the 'bcopy' function. @@ -583,6 +651,8 @@ bcopy(src, dst, n); // warn } +.. _security-insecureAPI-bzero: + security.insecureAPI.bzero (C) """""""""""""""""""""""""""""" Warn on uses of the 'bzero' function. @@ -593,6 +663,8 @@ bzero(ptr, n); // warn } +.. _security-insecureAPI-getpw: + security.insecureAPI.getpw (C) """""""""""""""""""""""""""""" Warn on uses of the 'getpw' function. @@ -604,6 +676,8 @@ getpw(2, buff); // warn } +.. _security-insecureAPI-gets: + security.insecureAPI.gets (C) """"""""""""""""""""""""""""" Warn on uses of the 'gets' function. @@ -615,6 +689,8 @@ gets(buff); // warn } +.. _security-insecureAPI-mkstemp: + security.insecureAPI.mkstemp (C) """""""""""""""""""""""""""""""" Warn when 'mkstemp' is passed fewer than 6 X's in the format string. @@ -625,6 +701,8 @@ mkstemp("XX"); // warn } +.. _security-insecureAPI-mktemp: + security.insecureAPI.mktemp (C) """"""""""""""""""""""""""""""" Warn on uses of the ``mktemp`` function. @@ -635,6 +713,8 @@ char *x = mktemp("/tmp/zxcv"); // warn: insecure, use mkstemp } +.. _security-insecureAPI-rand: + security.insecureAPI.rand (C) """"""""""""""""""""""""""""" Warn on uses of inferior random number generating functions (only if arc4random function is available): @@ -646,6 +726,8 @@ random(); // warn } +.. _security-insecureAPI-strcpy: + security.insecureAPI.strcpy (C) """"""""""""""""""""""""""""""" Warn on uses of the ``strcpy`` and ``strcat`` functions. @@ -660,6 +742,8 @@ } +.. _security-insecureAPI-vfork: + security.insecureAPI.vfork (C) """""""""""""""""""""""""""""" Warn on uses of the 'vfork' function. @@ -670,6 +754,8 @@ vfork(); // warn } +.. _security-insecureAPI-DeprecatedOrUnsafeBufferHandling: + security.insecureAPI.DeprecatedOrUnsafeBufferHandling (C) """"""""""""""""""""""""""""""""""""""""""""""""""""""""" Warn on occurrences of unsafe or deprecated buffer handling functions, which now have a secure variant: ``sprintf, vsprintf, scanf, wscanf, fscanf, fwscanf, vscanf, vwscanf, vfscanf, vfwscanf, sscanf, swscanf, vsscanf, vswscanf, swprintf, snprintf, vswprintf, vsnprintf, memcpy, memmove, strncpy, strncat, memset`` @@ -687,6 +773,8 @@ ^^^^ POSIX/Unix checkers. +.. _unix-API: + unix.API (C) """""""""""" Check calls to various UNIX/Posix functions: ``open, pthread_once, calloc, malloc, realloc, alloca``. @@ -694,6 +782,8 @@ .. literalinclude:: checkers/unix_api_example.c :language: c +.. _unix-Malloc: + unix.Malloc (C) """"""""""""""" Check for memory leaks, double free, and use-after-free problems. Traces memory managed by malloc()/free(). @@ -701,6 +791,8 @@ .. literalinclude:: checkers/unix_malloc_example.c :language: c +.. _unix-MallocSizeof: + unix.MallocSizeof (C) """"""""""""""""""""" Check for dubious ``malloc`` arguments involving ``sizeof``. @@ -714,6 +806,8 @@ free(p); } +.. _unix-MismatchedDeallocator: + unix.MismatchedDeallocator (C, C++) """"""""""""""""""""""""""""""""""" Check for mismatched deallocators. @@ -721,6 +815,8 @@ .. literalinclude:: checkers/mismatched_deallocator_example.cpp :language: c +.. _unix-Vfork: + unix.Vfork (C) """""""""""""" Check for proper usage of ``vfork``. @@ -751,6 +847,8 @@ while(1); } +.. _unix-cstring-BadSizeArg: + unix.cstring.BadSizeArg (C) """"""""""""""""""""""""""" Check the size argument passed into C string functions for common erroneous patterns. Use ``-Wno-strncat-size`` compiler option to mute other ``strncat``-related compiler warnings. @@ -763,6 +861,8 @@ // warn: potential buffer overflow } +.. _unix-cstrisng-NullArg: + unix.cstrisng.NullArg (C) """"""""""""""""""""""""" Check for null pointers being passed as arguments to C string functions: @@ -780,6 +880,8 @@ ^^^ macOS checkers. +.. _osx-API: + osx.API (C) """"""""""" Check for proper uses of various Apple APIs. @@ -791,6 +893,8 @@ dispatch_once(&pred, ^(){}); // warn: dispatch_once uses local } +.. _osx-NumberObjectConversion: + osx.NumberObjectConversion (C, C++, ObjC) """"""""""""""""""""""""""""""""""""""""" Check for erroneous conversions of objects representing numbers into numbers. @@ -804,6 +908,8 @@ [self displayPhotos]; } +.. _osx-ObjCProperty: + osx.ObjCProperty (ObjC) """"""""""""""""""""""" Check for proper uses of Objective-C properties. @@ -818,6 +924,8 @@ } +.. _osx-SecKeychainAPI: + osx.SecKeychainAPI (C) """""""""""""""""""""" Check for proper uses of Secure Keychain APIs. @@ -825,6 +933,8 @@ .. literalinclude:: checkers/seckeychainapi_example.m :language: objc +.. _osx-cocoa-AtSync: + osx.cocoa.AtSync (ObjC) """"""""""""""""""""""" Check for nil pointers used as mutexes for @synchronized. @@ -841,10 +951,14 @@ @synchronized(y) {} // warn: uninitialized value used as mutex } +.. _osx-cocoa-AutoreleaseWrite: + osx.cocoa.AutoreleaseWrite """""""""""""""""""""""""" Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C. +.. _osx-cocoa-ClassRelease: + osx.cocoa.ClassRelease (ObjC) """"""""""""""""""""""""""""" Check for sending 'retain', 'release', or 'autorelease' directly to a Class. @@ -858,6 +972,8 @@ [MyClass release]; // warn } +.. _osx-cocoa-Dealloc: + osx.cocoa.Dealloc (ObjC) """""""""""""""""""""""" Warn about Objective-C classes that lack a correct implementation of -dealloc @@ -865,6 +981,8 @@ .. literalinclude:: checkers/dealloc_example.m :language: objc +.. _osx-cocoa-IncompatibleMethodTypes: + osx.cocoa.IncompatibleMethodTypes (ObjC) """""""""""""""""""""""""""""""""""""""" Warn about Objective-C method signatures with type incompatibilities. @@ -887,10 +1005,14 @@ - (float)foo { return 1.0; } // warn @end +.. _osx-cocoa-Loops: + osx.cocoa.Loops """"""""""""""" Improved modeling of loops using Cocoa collection types. +.. _osx-cocoa-MissingSuperCall: + osx.cocoa.MissingSuperCall (ObjC) """"""""""""""""""""""""""""""""" Warn about Objective-C methods that lack a necessary call to super. @@ -904,6 +1026,8 @@ @end +.. _osx-cocoa-NSAutoreleasePool: + osx.cocoa.NSAutoreleasePool (ObjC) """""""""""""""""""""""""""""""""" Warn for suboptimal uses of NSAutoreleasePool in Objective-C GC mode. @@ -915,6 +1039,8 @@ [pool release]; // warn } +.. _osx-cocoa-NSError: + osx.cocoa.NSError (ObjC) """""""""""""""""""""""" Check usage of NSError parameters. @@ -943,6 +1069,8 @@ } @end +.. _osx-cocoa-NilArg: + osx.cocoa.NilArg (ObjC) """"""""""""""""""""""" Check for prohibited nil arguments to ObjC method calls. @@ -965,10 +1093,14 @@ } +.. _osx-cocoa-NonNilReturnValue: + osx.cocoa.NonNilReturnValue """"""""""""""""""""""""""" Models the APIs that are guaranteed to return a non-nil value. +.. _osx-cocoa-ObjCGenerics: + osx.cocoa.ObjCGenerics (ObjC) """"""""""""""""""""""""""""" Check for type errors when using Objective-C generics. @@ -982,6 +1114,8 @@ // to incompatible type 'NSString *' [birthDates addObject: [NSDate date]]; +.. _osx-cocoa-RetainCount: + osx.cocoa.RetainCount (ObjC) """""""""""""""""""""""""""" Check for leaks and improper reference count management @@ -998,10 +1132,14 @@ } +.. _osx-cocoa-RunLoopAutoreleaseLeak: + osx.cocoa.RunLoopAutoreleaseLeak """""""""""""""""""""""""""""""" Check for leaked memory in autorelease pools that will never be drained. +.. _osx-cocoa-SelfInit: + osx.cocoa.SelfInit (ObjC) """"""""""""""""""""""""" Check that 'self' is properly initialized inside an initializer method. @@ -1034,6 +1172,8 @@ } @end +.. _osx-cocoa-SuperDealloc: + osx.cocoa.SuperDealloc (ObjC) """"""""""""""""""""""""""""" Warn about improper use of '[super dealloc]' in Objective-C. @@ -1052,6 +1192,8 @@ } @end +.. _osx-cocoa-UnusedIvars: + osx.cocoa.UnusedIvars (ObjC) """""""""""""""""""""""""""" Warn about private ivars that are never used. @@ -1067,6 +1209,8 @@ @implementation MyObj @end +.. _osx-cocoa-VariadicMethodTypes: + osx.cocoa.VariadicMethodTypes (ObjC) """""""""""""""""""""""""""""""""""" Check for passing non-Objective-C types to variadic collection @@ -1079,6 +1223,8 @@ // warn: argument should be an ObjC pointer type, not 'char *' } +.. _osx-coreFoundation-CFError: + osx.coreFoundation.CFError (C) """""""""""""""""""""""""""""" Check usage of CFErrorRef* parameters @@ -1095,6 +1241,8 @@ return 0; } +.. _osx-coreFoundation-CFNumber: + osx.coreFoundation.CFNumber (C) """"""""""""""""""""""""""""""" Check for proper uses of CFNumber APIs. @@ -1106,6 +1254,8 @@ // warn: 8 bit integer is used to initialize a 16 bit integer } +.. _osx-coreFoundation-CFRetainRelease: + osx.coreFoundation.CFRetainRelease (C) """""""""""""""""""""""""""""""""""""" Check for null arguments to CFRetain/CFRelease/CFMakeCollectable. @@ -1124,6 +1274,8 @@ CFRelease(p); // warn } +.. _osx-coreFoundation-containers-OutOfBounds: + osx.coreFoundation.containers.OutOfBounds (C) """"""""""""""""""""""""""""""""""""""""""""" Checks for index out-of-bounds when using 'CFArray' API. @@ -1135,6 +1287,8 @@ CFArrayGetValueAtIndex(A, 0); // warn } +.. _osx-coreFoundation-containers-PointerSizedValues: + osx.coreFoundation.containers.PointerSizedValues (C) """""""""""""""""""""""""""""""""""""""""""""""""""" Warns if 'CFArray', 'CFDictionary', 'CFSet' are created with non-pointer-size values. @@ -1158,6 +1312,8 @@ alpha.clone ^^^^^^^^^^^ +.. _alpha-clone-CloneChecker: + alpha.clone.CloneChecker (C, C++, ObjC) """"""""""""""""""""""""""""""""""""""" Reports similar pieces of code. @@ -1180,6 +1336,8 @@ return y; } +.. _alpha-core-BoolAssignment: + alpha.core.BoolAssignment (ObjC) """""""""""""""""""""""""""""""" Warn about assigning non-{0,1} values to boolean variables. @@ -1193,6 +1351,8 @@ alpha.core ^^^^^^^^^^ +.. _alpha-core-CallAndMessageUnInitRefArg: + alpha.core.CallAndMessageUnInitRefArg (C,C++, ObjC) """"""""""""""""""""""""""""""""""""""""""""""""""" Check for logical errors for function calls and Objective-C @@ -1213,6 +1373,8 @@ foo(&x); // warn } +.. _alpha-core-CastSize: + alpha.core.CastSize (C) """"""""""""""""""""""" Check when casting a malloc'ed type ``T``, whether the size is a multiple of the size of ``T``. @@ -1223,6 +1385,8 @@ int *x = (int *) malloc(11); // warn } +.. _alpha-core-CastToStruct: + alpha.core.CastToStruct (C, C++) """""""""""""""""""""""""""""""" Check for cast from non-struct pointer to struct pointer. @@ -1243,6 +1407,8 @@ c *pc = (c *) p; // warn } +.. _alpha-core-Conversion: + alpha.core.Conversion (C, C++, ObjC) """""""""""""""""""""""""""""""""""" Loss of sign/precision in implicit conversions. @@ -1265,6 +1431,8 @@ short X = A; // warn (loss of precision) } +.. _alpha-core-DynamicTypeChecker: + alpha.core.DynamicTypeChecker (ObjC) """""""""""""""""""""""""""""""""""" Check for cases where the dynamic and the static type of an object are unrelated. @@ -1279,6 +1447,8 @@ NSNumber *number = date; [number doubleValue]; +.. _alpha-core-FixedAddr: + alpha.core.FixedAddr (C) """""""""""""""""""""""" Check for assignment of a fixed address to a pointer. @@ -1290,6 +1460,8 @@ p = (int *) 0x10000; // warn } +.. _alpha-core-IdenticalExpr: + alpha.core.IdenticalExpr (C, C++) """"""""""""""""""""""""""""""""" Warn about unintended use of identical expressions in operators. @@ -1318,6 +1490,8 @@ } } +.. _alpha-core-PointerArithm: + alpha.core.PointerArithm (C) """""""""""""""""""""""""""" Check for pointer arithmetic on locations other than array elements. @@ -1330,6 +1504,8 @@ p = &x + 1; // warn } +.. _alpha-core-PointerSub: + alpha.core.PointerSub (C) """"""""""""""""""""""""" Check for pointer subtractions on two pointers pointing to different memory chunks. @@ -1341,6 +1517,8 @@ int d = &y - &x; // warn } +.. _alpha-core-SizeofPtr: + alpha.core.SizeofPtr (C) """""""""""""""""""""""" Warn about unintended use of ``sizeof()`` on pointer expressions. @@ -1354,6 +1532,8 @@ // warn: sizeof(ptr) can produce an unexpected result } +.. _alpha-core-StackAddressAsyncEscape: + alpha.core.StackAddressAsyncEscape (C) """""""""""""""""""""""""""""""""""""" Check that addresses to stack memory do not escape the function that involves dispatch_after or dispatch_async. @@ -1376,6 +1556,8 @@ // returned block } +.. _alpha-core-TestAfterDivZero: + alpha.core.TestAfterDivZero (C) """"""""""""""""""""""""""""""" Check for division by variable that is later compared against 0. @@ -1391,6 +1573,8 @@ alpha.cplusplus ^^^^^^^^^^^^^^^ +.. _alpha-cplusplus-DeleteWithNonVirtualDtor: + alpha.cplusplus.DeleteWithNonVirtualDtor (C++) """""""""""""""""""""""""""""""""""""""""""""" Reports destructions of polymorphic objects with a non-virtual destructor in their base class. @@ -1408,6 +1592,8 @@ // destructor } +.. _alpha-cplusplus-EnumCastOutOfRange: + alpha.cplusplus.EnumCastOutOfRange (C++) """""""""""""""""""""""""""""""""""""""" Check for integer to enumeration casts that could result in undefined values. @@ -1423,6 +1609,8 @@ // warn: the value provided to the cast expression is not in the valid range of values for the enum +.. _alpha-cplusplus-InvalidatedIterator: + alpha.cplusplus.InvalidatedIterator (C++) """"""""""""""""""""""""""""""""""""""""" Check for use of invalidated iterators. @@ -1437,6 +1625,8 @@ } +.. _alpha-cplusplus-IteratorRange: + alpha.cplusplus.IteratorRange (C++) """"""""""""""""""""""""""""""""""" Check for iterators used outside their valid ranges. @@ -1448,6 +1638,8 @@ *i; // warn: iterator accessed outside of its range } +.. _alpha-cplusplus-MismatchedIterator: + alpha.cplusplus.MismatchedIterator (C++) """""""""""""""""""""""""""""""""""""""" Check for use of iterators of different containers where iterators of the same container are expected. @@ -1470,6 +1662,8 @@ // expected } +.. _alpha-cplusplus-MisusedMovedObject: + alpha.cplusplus.MisusedMovedObject (C++) """""""""""""""""""""""""""""""""""""""" Method calls on a moved-from object and copying a moved-from object will be reported. @@ -1489,6 +1683,8 @@ alpha.deadcode ^^^^^^^^^^^^^^ +.. _alpha-deadcode-UnreachableCode: + alpha.deadcode.UnreachableCode (C, C++) """"""""""""""""""""""""""""""""""""""" Check unreachable code. @@ -1522,6 +1718,8 @@ alpha.llvm ^^^^^^^^^^ +.. _alpha-llvm-Conventions: + alpha.llvm.Conventions """""""""""""""""""""" @@ -1534,6 +1732,8 @@ alpha.osx ^^^^^^^^^ +.. _alpha-osx-cocoa-DirectIvarAssignment: + alpha.osx.cocoa.DirectIvarAssignment (ObjC) """"""""""""""""""""""""""""""""""""""""""" Check for direct assignments to instance variables. @@ -1552,6 +1752,8 @@ } @end +.. _alpha-osx-cocoa-DirectIvarAssignmentForAnnotatedFunctions: + alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions (ObjC) """""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" Check for direct assignments to instance variables in @@ -1576,6 +1778,8 @@ @end +.. _alpha-osx-cocoa-InstanceVariableInvalidation: + alpha.osx.cocoa.InstanceVariableInvalidation (ObjC) """"""""""""""""""""""""""""""""""""""""""""""""""" Check that the invalidatable instance variables are @@ -1602,6 +1806,8 @@ @end // warn: var needs to be invalidated or set to nil +.. _alpha-osx-cocoa-MissingInvalidationMethod: + alpha.osx.cocoa.MissingInvalidationMethod (ObjC) """""""""""""""""""""""""""""""""""""""""""""""" Check that the invalidation methods are present in classes that contain invalidatable instance variables. @@ -1624,6 +1830,8 @@ @implementation MissingInvalidationMethodDecl @end +.. _alpha-osx-cocoa-localizability-PluralMisuseChecker: + alpha.osx.cocoa.localizability.PluralMisuseChecker (ObjC) """"""""""""""""""""""""""""""""""""""""""""""""""""""""" Warns against using one vs. many plural pattern in code when generating localized strings. @@ -1648,6 +1856,8 @@ alpha.security ^^^^^^^^^^^^^^ +.. _alpha-security-ArrayBound: + alpha.security.ArrayBound (C) """"""""""""""""""""""""""""" Warn about buffer overflows (older checker). @@ -1684,6 +1894,8 @@ b[1] = 3; // warn } +.. _alpha-security-ArrayBoundV2: + alpha.security.ArrayBoundV2 (C) """"""""""""""""""""""""""""""" Warn about buffer overflows (newer checker). @@ -1716,6 +1928,8 @@ char c = s[x]; // warn: index is tainted } +.. _alpha-security-MallocOverflow: + alpha.security.MallocOverflow (C) """"""""""""""""""""""""""""""""" Check for overflows in the arguments to malloc(). @@ -1726,6 +1940,8 @@ void *p = malloc(n * sizeof(int)); // warn } +.. _alpha-security-MmapWriteExec: + alpha.security.MmapWriteExec (C) """""""""""""""""""""""""""""""" Warn on mmap() calls that are both writable and executable. @@ -1740,6 +1956,8 @@ // code } +.. _alpha-security-ReturnPtrRange: + alpha.security.ReturnPtrRange (C) """"""""""""""""""""""""""""""""" Check for an out-of-bound pointer being returned to callers. @@ -1758,6 +1976,8 @@ return x; // warn: undefined or garbage returned } +.. _alpha-security-taint-TaintPropagation: + alpha.security.taint.TaintPropagation (C, C++) """""""""""""""""""""""""""""""""""""""""""""" Generate taint information used by other checkers. @@ -1790,6 +2010,8 @@ alpha.unix ^^^^^^^^^^^ +.. _alpha-unix-BlockInCriticalSection: + alpha.unix.BlockInCriticalSection (C) """"""""""""""""""""""""""""""""""""" Check for calls to blocking functions inside a critical section. @@ -1806,6 +2028,8 @@ m.unlock(); } +.. _alpha-unix-Chroot: + alpha.unix.Chroot (C) """"""""""""""""""""" Check improper use of chroot. @@ -1819,6 +2043,8 @@ f(); // warn: no call of chdir("/") immediately after chroot } +.. _alpha-unix-PthreadLock: + alpha.unix.PthreadLock (C) """""""""""""""""""""""""" Simple lock -> unlock checker. @@ -1857,6 +2083,8 @@ // warn: this was not the most recently acquired lock } +.. _alpha-unix-SimpleStream: + alpha.unix.SimpleStream (C) """"""""""""""""""""""""""" Check for misuses of stream APIs. Check for misuses of stream APIs: ``fopen, fclose`` @@ -1879,6 +2107,8 @@ fclose(F); // warn: closing a previously closed file stream } +.. _alpha-unix-Stream: + alpha.unix.Stream (C) """"""""""""""""""""" Check stream handling functions: ``fopen, tmpfile, fclose, fread, fwrite, fseek, ftell, rewind, fgetpos,`` @@ -1919,6 +2149,8 @@ } +.. _alpha-unix-cstring-BufferOverlap: + alpha.unix.cstring.BufferOverlap (C) """""""""""""""""""""""""""""""""""" Checks for overlap in two buffer arguments. Applies to: ``memcpy, mempcpy``. @@ -1930,6 +2162,8 @@ memcpy(a + 2, a + 1, 8); // warn } +.. _alpha-unix-cstring-NotNullTerminated: + alpha.unix.cstring.NotNullTerminated (C) """""""""""""""""""""""""""""""""""""""" Check for arguments which are not null-terminated strings; applies to: ``strlen, strnlen, strcpy, strncpy, strcat, strncat``. @@ -1940,6 +2174,8 @@ int y = strlen((char *)&test); // warn } +.. _alpha-unix-cstring-OutOfBounds: + alpha.unix.cstring.OutOfBounds (C) """""""""""""""""""""""""""""""""" Check for out-of-bounds access in string functions; applies to:`` strncopy, strncat``. @@ -1951,6 +2187,8 @@ int y = strlen((char *)&test); // warn } +.. _alpha-nondeterminism-PointerIteration: + alpha.nondeterminism.PointerIteration (C++) """"""""""""""""""""""""""""""""""""""""""" Check for non-determinism caused by iterating unordered containers of pointers. @@ -1965,6 +2203,8 @@ f(i); } +.. _alpha-nondeterminism-PointerSorting: + alpha.nondeterminism.PointerSorting (C++) """"""""""""""""""""""""""""""""""""""""" Check for non-determinism caused by sorting of pointers. @@ -1990,58 +2230,86 @@ Checkers used for debugging the analyzer. :doc:`developer-docs/DebugChecks` page contains a detailed description. +.. _debug-AnalysisOrder: + debug.AnalysisOrder """"""""""""""""""" Print callbacks that are called during analysis in order. +.. _debug-ConfigDumper: + debug.ConfigDumper """""""""""""""""" Dump config table. +.. _debug-DumpCFG Display: + debug.DumpCFG Display """"""""""""""""""""" Control-Flow Graphs. +.. _debug-DumpCallGraph: + debug.DumpCallGraph """"""""""""""""""" Display Call Graph. +.. _debug-DumpCalls: + debug.DumpCalls """"""""""""""" Print calls as they are traversed by the engine. +.. _debug-DumpDominators: + debug.DumpDominators """""""""""""""""""" Print the dominance tree for a given CFG. +.. _debug-DumpLiveVars: + debug.DumpLiveVars """""""""""""""""" Print results of live variable analysis. +.. _debug-DumpTraversal: + debug.DumpTraversal """"""""""""""""""" Print branch conditions as they are traversed by the engine. +.. _debug-ExprInspection: + debug.ExprInspection """""""""""""""""""" Check the analyzer's understanding of expressions. +.. _debug-Stats: + debug.Stats """"""""""" Emit warnings with analyzer statistics. +.. _debug-TaintTest: + debug.TaintTest """"""""""""""" Mark tainted symbols as such. +.. _debug-ViewCFG: + debug.ViewCFG """"""""""""" View Control-Flow Graphs using GraphViz. +.. _debug-ViewCallGraph: + debug.ViewCallGraph """"""""""""""""""" View Call Graph using GraphViz. +.. _debug-ViewExplodedGraph: + debug.ViewExplodedGraph """"""""""""""""""""""" View Exploded Graphs using GraphViz.