diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.CallAndMessage +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage + +clang-analyzer-core.CallAndMessage +================================== + +The clang-analyzer-core.CallAndMessage check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.DivideZero +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero + +clang-analyzer-core.DivideZero +============================== + +The clang-analyzer-core.DivideZero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation + +clang-analyzer-core.DynamicTypePropagation +========================================== + +Generate dynamic type information diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker + +clang-analyzer-core.NonNullParamChecker +======================================= + +The clang-analyzer-core.NonNullParamChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.NullDereference +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference + +clang-analyzer-core.NullDereference +=================================== + +The clang-analyzer-core.NullDereference check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape + +clang-analyzer-core.StackAddressEscape +====================================== + +The clang-analyzer-core.StackAddressEscape check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult + +clang-analyzer-core.UndefinedBinaryOperatorResult +================================================= + +The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.VLASize +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize + +clang-analyzer-core.VLASize +=========================== + +The clang-analyzer-core.VLASize check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript + +clang-analyzer-core.uninitialized.ArraySubscript +================================================ + +The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign + +clang-analyzer-core.uninitialized.Assign +======================================== + +The clang-analyzer-core.uninitialized.Assign check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch + +clang-analyzer-core.uninitialized.Branch +======================================== + +The clang-analyzer-core.uninitialized.Branch check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable + +clang-analyzer-core.uninitialized.CapturedBlockVariable +======================================================= + +Check for blocks that capture uninitialized values diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn + +clang-analyzer-core.uninitialized.UndefReturn +============================================= + +The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer + +clang-analyzer-cplusplus.InnerPointer +===================================== + +Check for inner pointers of C++ containers used after re/deallocation diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.Move +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move + +clang-analyzer-cplusplus.Move +============================= + +The clang-analyzer-cplusplus.Move check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete + +clang-analyzer-cplusplus.NewDelete +================================== + +The clang-analyzer-cplusplus.NewDelete check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks + +clang-analyzer-cplusplus.NewDeleteLeaks +======================================= + +The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores + +clang-analyzer-deadcode.DeadStores +================================== + +The clang-analyzer-deadcode.DeadStores check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull + +clang-analyzer-nullability.NullPassedToNonnull +============================================== + +The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull + +clang-analyzer-nullability.NullReturnedFromNonnull +================================================== + +The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced + +clang-analyzer-nullability.NullableDereferenced +=============================================== + +The clang-analyzer-nullability.NullableDereferenced check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull + +clang-analyzer-nullability.NullablePassedToNonnull +================================================== + +The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull + +clang-analyzer-nullability.NullableReturnedFromNonnull +====================================================== + +Warns when a nullable pointer is returned from a function that has _Nonnull return type. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject + +clang-analyzer-optin.cplusplus.UninitializedObject +================================================== + +The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall + +clang-analyzer-optin.cplusplus.VirtualCall +========================================== + +The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker + +clang-analyzer-optin.mpi.MPI-Checker +==================================== + +The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast + +clang-analyzer-optin.osx.OSObjectCStyleCast +=========================================== + +Checker for C-style casts of OSObjects diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker + +clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker +============================================================================= + +The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker + +clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker +======================================================================= + +The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern + +clang-analyzer-optin.performance.GCDAntipattern +=============================================== + +Check for performance anti-patterns when using Grand Central Dispatch diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.Padding + +clang-analyzer-optin.performance.Padding +======================================== + +Check for excessively padded structs. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI + +clang-analyzer-optin.portability.UnixAPI +======================================== + +Finds implementation-defined behavior in UNIX/Posix functions diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.API +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-api + +clang-analyzer-osx.API +====================== + +The clang-analyzer-osx.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.MIG + +clang-analyzer-osx.MIG +====================== + +Find violations of the Mach Interface Generator calling convention diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion + +clang-analyzer-osx.NumberObjectConversion +========================================= + +Check for erroneous conversions of objects representing numbers into numbers diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount + +clang-analyzer-osx.OSObjectRetainCount +====================================== + +Check for leaks and improper reference count management for OSObject diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty + +clang-analyzer-osx.ObjCProperty +=============================== + +Check for proper uses of Objective-C properties diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi + +clang-analyzer-osx.SecKeychainAPI +================================= + +The clang-analyzer-osx.SecKeychainAPI check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync + +clang-analyzer-osx.cocoa.AtSync +=============================== + +The clang-analyzer-osx.cocoa.AtSync check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite + +clang-analyzer-osx.cocoa.AutoreleaseWrite +========================================= + +Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease + +clang-analyzer-osx.cocoa.ClassRelease +===================================== + +The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc + +clang-analyzer-osx.cocoa.Dealloc +================================ + +The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes + +clang-analyzer-osx.cocoa.IncompatibleMethodTypes +================================================ + +The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops + +clang-analyzer-osx.cocoa.Loops +============================== + +Improved modeling of loops using Cocoa collection types diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall + +clang-analyzer-osx.cocoa.MissingSuperCall +========================================= + +Warn about Objective-C methods that lack a necessary call to super diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool + +clang-analyzer-osx.cocoa.NSAutoreleasePool +========================================== + +The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror + +clang-analyzer-osx.cocoa.NSError +================================ + +The clang-analyzer-osx.cocoa.NSError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg + +clang-analyzer-osx.cocoa.NilArg +=============================== + +The clang-analyzer-osx.cocoa.NilArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue + +clang-analyzer-osx.cocoa.NonNilReturnValue +========================================== + +Model the APIs that are guaranteed to return a non-nil value diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics + +clang-analyzer-osx.cocoa.ObjCGenerics +===================================== + +The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount + +clang-analyzer-osx.cocoa.RetainCount +==================================== + +The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + +clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak +=============================================== + +Check for leaked memory in autorelease pools that will never be drained diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit + +clang-analyzer-osx.cocoa.SelfInit +================================= + +The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc + +clang-analyzer-osx.cocoa.SuperDealloc +===================================== + +The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars + +clang-analyzer-osx.cocoa.UnusedIvars +==================================== + +The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes + +clang-analyzer-osx.cocoa.VariadicMethodTypes +============================================ + +The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror + +clang-analyzer-osx.coreFoundation.CFError +========================================= + +The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber + +clang-analyzer-osx.coreFoundation.CFNumber +========================================== + +The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease + +clang-analyzer-osx.coreFoundation.CFRetainRelease +================================================= + +The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds + +clang-analyzer-osx.coreFoundation.containers.OutOfBounds +======================================================== + +The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues + +clang-analyzer-osx.coreFoundation.containers.PointerSizedValues +=============================================================== + +The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter + +clang-analyzer-security.FloatLoopCounter +======================================== + +The clang-analyzer-security.FloatLoopCounter check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling + +clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling +==================================================================== + +The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn + +clang-analyzer-security.insecureAPI.UncheckedReturn +=================================================== + +The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp + +clang-analyzer-security.insecureAPI.bcmp +======================================== + +The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy + +clang-analyzer-security.insecureAPI.bcopy +========================================= + +The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero + +clang-analyzer-security.insecureAPI.bzero +========================================= + +The clang-analyzer-security.insecureAPI.bzero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw + +clang-analyzer-security.insecureAPI.getpw +========================================= + +The clang-analyzer-security.insecureAPI.getpw check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets + +clang-analyzer-security.insecureAPI.gets +======================================== + +The clang-analyzer-security.insecureAPI.gets check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp + +clang-analyzer-security.insecureAPI.mkstemp +=========================================== + +The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp + +clang-analyzer-security.insecureAPI.mktemp +========================================== + +The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand + +clang-analyzer-security.insecureAPI.rand +======================================== + +The clang-analyzer-security.insecureAPI.rand check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy + +clang-analyzer-security.insecureAPI.strcpy +========================================== + +The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork + +clang-analyzer-security.insecureAPI.vfork +========================================= + +The clang-analyzer-security.insecureAPI.vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.API +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-api + +clang-analyzer-unix.API +======================= + +The clang-analyzer-unix.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.Malloc +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc + +clang-analyzer-unix.Malloc +========================== + +The clang-analyzer-unix.Malloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof + +clang-analyzer-unix.MallocSizeof +================================ + +The clang-analyzer-unix.MallocSizeof check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator + +clang-analyzer-unix.MismatchedDeallocator +========================================= + +The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.Vfork +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork + +clang-analyzer-unix.Vfork +========================= + +The clang-analyzer-unix.Vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg + +clang-analyzer-unix.cstring.BadSizeArg +====================================== + +The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst @@ -0,0 +1,10 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg + +clang-analyzer-unix.cstring.NullArg +=================================== + +The clang-analyzer-unix.cstring.NullArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf + +clang-analyzer-valist.CopyToSelf +================================ + +Check for va_lists which are copied onto itself. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.Uninitialized + +clang-analyzer-valist.Uninitialized +=================================== + +Check for usages of uninitialized (or already released) va_lists. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst @@ -0,0 +1,6 @@ +.. title:: clang-tidy - clang-analyzer-valist.Unterminated + +clang-analyzer-valist.Unterminated +================================== + +Check for va_lists which are not released by a va_end call. diff --git a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py @@ -0,0 +1,148 @@ +""" +Generates documentation based off the available static analyzers checks +References Checkers.td to determine what checks exist +""" + +import argparse +import subprocess +import json +import os +import re + +"""Get path of script so files are always in correct directory""" +__location__ = os.path.realpath( + os.path.join(os.getcwd(), os.path.dirname(__file__))) + +"""Get dict of checker related info and parse for full check names + +Returns: + checkers: dict of checker info +""" +def get_checkers(checkers_td_directory): + p = subprocess.Popen(["llvm-tblgen", "--dump-json", "-I", + checkers_td_directory, checkers_td_directory+"Checkers.td"], + stdout=subprocess.PIPE) + table_entries = json.loads(p.communicate()[0]) + documentable_checkers = [] + checkers = table_entries["!instanceof"]["Checker"] + packages = table_entries["!instanceof"]["Package"] + + for checker_ in checkers: + checker = table_entries[checker_] + checker_name = checker["CheckerName"] + package_ = checker["ParentPackage"]["def"] + package = table_entries[package_] + package_name = package["PackageName"] + checker_package_prefix = package_name + parent_package_ = package["ParentPackage"] + hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0) + + while(parent_package_ != None): + parent_package = table_entries[parent_package_["def"]] + checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix + hidden = hidden or parent_package["Hidden"] != 0 + parent_package_ = parent_package["ParentPackage"] + + full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name + anchor_url = re.sub("\.", "-", checker_package_prefix + "." + checker_name).lower() + + if(not hidden and "alpha" not in full_package_name.lower()): + checker["FullPackageName"] = full_package_name + checker["AnchorUrl"] = anchor_url + documentable_checkers.append(checker) + + documentable_checkers.sort(key=lambda x: x["FullPackageName"]) + return documentable_checkers + +"""Generate documentation for checker + +Args: + checker: Checker for which to generate documentation. + only_help_text: Generate documentation based off the checker description. + Used when there is no other documentation to link to. +""" +def generate_documentation(checker, only_help_text=False): + with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f: + f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"]) + if(not only_help_text): + f.write(".. meta::\n") + f.write(" :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#%s\n" % checker["AnchorUrl"]) + f.write("\n") + f.write("%s\n" % checker["FullPackageName"]) + f.write("=" * len(checker["FullPackageName"]) + "\n") + f.write("\n") + if(only_help_text): + f.write("%s\n" % checker["HelpText"]) + else: + f.write("The %s check is an alias, please see\n" % checker["FullPackageName"]) + f.write("`Clang Static Analyzer Available Checkers `_\n" % checker["AnchorUrl"]) + f.write("for more information.\n") + f.close() + +"""Update list.rst to include the new checks + +Args: + checkers: dict acquired from get_checkers() +""" +def update_documentation_list(checkers): + with open(os.path.join(__location__, "list.rst"), "r+") as f: + f_text = f.read() + header, check_text= f_text.split(".. toctree::\n") + checks = check_text.split("\n") + for checker in checkers: + if((" %s" % checker["FullPackageName"]) not in checks): + checks.append(" %s" % checker["FullPackageName"]) + checks.sort() + + #Overwrite file with new data + f.seek(0) + f.write(header) + f.write(".. toctree::") + for check in checks: + f.write("%s\n" % check) + f.close() + +default_path_monorepo = '../../../../clang/include/clang/StaticAnalyzer/Checkers/' +default_path_in_tree = '../../../../../include/clang/StaticAnalyzer/Checkers/' + +def parse_arguments(): + """Set up and parse command-line arguments + Returns: + file_path: Path to Checkers.td""" + usage = """Parse Checkers.td to generate documentation for static analyzer checks""" + parse = argparse.ArgumentParser(description=usage) + + file_path_help = ("""Path to Checkers directory + defaults to ../../../../clang/include/clang/StaticAnalyzer/Checkers/ if it exists + then to ../../../../../include/clang/StaticAnalyzer/Checkers/""") + + default_path=None + if(os.path.exists(default_path_monorepo)): + default_path = default_path_monorepo + elif(os.path.exists(default_path_in_tree)): + default_path = default_path_in_tree + + parse.add_argument("file", type=str, help=file_path_help, nargs='?', default=default_path) + args = parse.parse_args() + + if(args.file is None): + print("Could not find Checkers directory. Please see -h") + exit(1) + + return args.file + + +def main(): + file_path = parse_arguments() + checkers = get_checkers(file_path) + for checker in checkers: + #No documentation nor alpha documentation + if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0): + generate_documentation(checker, True) + else: + generate_documentation(checker) + print("Generated documentation for: %s" % checker["FullPackageName"]) + update_documentation_list(checkers) + +if __name__ == '__main__': + main() diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -4,6 +4,7 @@ ================= .. toctree:: + abseil-duration-addition abseil-duration-comparison abseil-duration-conversion-cast @@ -102,6 +103,90 @@ cert-msc51-cpp cert-oop11-cpp (redirects to performance-move-constructor-init) cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) + clang-analyzer-core.CallAndMessage + clang-analyzer-core.DivideZero + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NullDereference + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.VLASize + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-deadcode.DeadStores + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-osx.API + clang-analyzer-osx.MIG + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-unix.API + clang-analyzer-unix.Malloc + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.Vfork + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Unterminated cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) cppcoreguidelines-avoid-goto cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers)