diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.clone.CloneChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.clone.CloneChecker + +clang-analyzer-alpha.clone.CloneChecker +======================================= +The clang-analyzer-alpha.clone.CloneChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.BoolAssignment.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.BoolAssignment + +clang-analyzer-alpha.core.BoolAssignment +======================================== +The clang-analyzer-alpha.core.BoolAssignment check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CallAndMessageUnInitRefArg.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + +clang-analyzer-alpha.core.CallAndMessageUnInitRefArg +==================================================== +The clang-analyzer-alpha.core.CallAndMessageUnInitRefArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastSize.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CastSize + +clang-analyzer-alpha.core.CastSize +================================== +The clang-analyzer-alpha.core.CastSize check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.CastToStruct.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.CastToStruct + +clang-analyzer-alpha.core.CastToStruct +====================================== +The clang-analyzer-alpha.core.CastToStruct check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.Conversion.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.Conversion + +clang-analyzer-alpha.core.Conversion +==================================== +The clang-analyzer-alpha.core.Conversion check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.DynamicTypeChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.DynamicTypeChecker + +clang-analyzer-alpha.core.DynamicTypeChecker +============================================ +The clang-analyzer-alpha.core.DynamicTypeChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.FixedAddr.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.FixedAddr + +clang-analyzer-alpha.core.FixedAddr +=================================== +The clang-analyzer-alpha.core.FixedAddr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.IdenticalExpr.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.IdenticalExpr + +clang-analyzer-alpha.core.IdenticalExpr +======================================= +The clang-analyzer-alpha.core.IdenticalExpr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerArithm.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.PointerArithm + +clang-analyzer-alpha.core.PointerArithm +======================================= +The clang-analyzer-alpha.core.PointerArithm check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.PointerSub.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.PointerSub + +clang-analyzer-alpha.core.PointerSub +==================================== +The clang-analyzer-alpha.core.PointerSub check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.SizeofPtr.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.SizeofPtr + +clang-analyzer-alpha.core.SizeofPtr +=================================== +The clang-analyzer-alpha.core.SizeofPtr check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.StackAddressAsyncEscape.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.StackAddressAsyncEscape + +clang-analyzer-alpha.core.StackAddressAsyncEscape +================================================= +The clang-analyzer-alpha.core.StackAddressAsyncEscape check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.core.TestAfterDivZero.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.core.TestAfterDivZero + +clang-analyzer-alpha.core.TestAfterDivZero +========================================== +The clang-analyzer-alpha.core.TestAfterDivZero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + +clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor +======================================================= +The clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.EnumCastOutOfRange.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + +clang-analyzer-alpha.cplusplus.EnumCastOutOfRange +================================================= +The clang-analyzer-alpha.cplusplus.EnumCastOutOfRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.InvalidatedIterator.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.InvalidatedIterator + +clang-analyzer-alpha.cplusplus.InvalidatedIterator +================================================== +The clang-analyzer-alpha.cplusplus.InvalidatedIterator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.IteratorRange.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.IteratorRange + +clang-analyzer-alpha.cplusplus.IteratorRange +============================================ +The clang-analyzer-alpha.cplusplus.IteratorRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.cplusplus.MismatchedIterator.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.cplusplus.MismatchedIterator + +clang-analyzer-alpha.cplusplus.MismatchedIterator +================================================= +The clang-analyzer-alpha.cplusplus.MismatchedIterator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.deadcode.UnreachableCode.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.deadcode.UnreachableCode + +clang-analyzer-alpha.deadcode.UnreachableCode +============================================= +The clang-analyzer-alpha.deadcode.UnreachableCode check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.llvm.Conventions.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.llvm.Conventions + +clang-analyzer-alpha.llvm.Conventions +===================================== +The clang-analyzer-alpha.llvm.Conventions check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerIteration.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.nondeterminism.PointerIteration + +clang-analyzer-alpha.nondeterminism.PointerIteration +==================================================== +The clang-analyzer-alpha.nondeterminism.PointerIteration check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.nondeterminism.PointerSorting.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.nondeterminism.PointerSorting + +clang-analyzer-alpha.nondeterminism.PointerSorting +================================================== +The clang-analyzer-alpha.nondeterminism.PointerSorting check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + +clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment +=================================================== +The clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + +clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions +======================================================================== +The clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + +clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation +=========================================================== +The clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + +clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod +======================================================== +The clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + +clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker +================================================================= +The clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBound.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ArrayBound + +clang-analyzer-alpha.security.ArrayBound +======================================== +The clang-analyzer-alpha.security.ArrayBound check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ArrayBoundV2.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ArrayBoundV2 + +clang-analyzer-alpha.security.ArrayBoundV2 +========================================== +The clang-analyzer-alpha.security.ArrayBoundV2 check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MallocOverflow.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.MallocOverflow + +clang-analyzer-alpha.security.MallocOverflow +============================================ +The clang-analyzer-alpha.security.MallocOverflow check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.MmapWriteExec.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.MmapWriteExec + +clang-analyzer-alpha.security.MmapWriteExec +=========================================== +The clang-analyzer-alpha.security.MmapWriteExec check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.ReturnPtrRange.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.ReturnPtrRange + +clang-analyzer-alpha.security.ReturnPtrRange +============================================ +The clang-analyzer-alpha.security.ReturnPtrRange check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.security.taint.TaintPropagation.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.security.taint.TaintPropagation + +clang-analyzer-alpha.security.taint.TaintPropagation +==================================================== +The clang-analyzer-alpha.security.taint.TaintPropagation check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.BlockInCriticalSection.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.BlockInCriticalSection + +clang-analyzer-alpha.unix.BlockInCriticalSection +================================================ +The clang-analyzer-alpha.unix.BlockInCriticalSection check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Chroot.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.Chroot + +clang-analyzer-alpha.unix.Chroot +================================ +The clang-analyzer-alpha.unix.Chroot check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.PthreadLock.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.PthreadLock + +clang-analyzer-alpha.unix.PthreadLock +===================================== +The clang-analyzer-alpha.unix.PthreadLock check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.SimpleStream.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.SimpleStream + +clang-analyzer-alpha.unix.SimpleStream +====================================== +The clang-analyzer-alpha.unix.SimpleStream check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.Stream.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.Stream + +clang-analyzer-alpha.unix.Stream +================================ +The clang-analyzer-alpha.unix.Stream check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.BufferOverlap.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.BufferOverlap + +clang-analyzer-alpha.unix.cstring.BufferOverlap +=============================================== +The clang-analyzer-alpha.unix.cstring.BufferOverlap check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.NotNullTerminated.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.NotNullTerminated + +clang-analyzer-alpha.unix.cstring.NotNullTerminated +=================================================== +The clang-analyzer-alpha.unix.cstring.NotNullTerminated check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-alpha.unix.cstring.OutOfBounds.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-alpha.unix.cstring.OutOfBounds + +clang-analyzer-alpha.unix.cstring.OutOfBounds +============================================= +The clang-analyzer-alpha.unix.cstring.OutOfBounds check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.CallAndMessage + +clang-analyzer-core.CallAndMessage +================================== +The clang-analyzer-core.CallAndMessage check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.DivideZero + +clang-analyzer-core.DivideZero +============================== +The clang-analyzer-core.DivideZero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation + +clang-analyzer-core.DynamicTypePropagation +========================================== +Generate dynamic type information diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker + +clang-analyzer-core.NonNullParamChecker +======================================= +The clang-analyzer-core.NonNullParamChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.NullDereference + +clang-analyzer-core.NullDereference +=================================== +The clang-analyzer-core.NullDereference check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape + +clang-analyzer-core.StackAddressEscape +====================================== +The clang-analyzer-core.StackAddressEscape check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult + +clang-analyzer-core.UndefinedBinaryOperatorResult +================================================= +The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.VLASize + +clang-analyzer-core.VLASize +=========================== +The clang-analyzer-core.VLASize check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript + +clang-analyzer-core.uninitialized.ArraySubscript +================================================ +The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign + +clang-analyzer-core.uninitialized.Assign +======================================== +The clang-analyzer-core.uninitialized.Assign check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch + +clang-analyzer-core.uninitialized.Branch +======================================== +The clang-analyzer-core.uninitialized.Branch check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable + +clang-analyzer-core.uninitialized.CapturedBlockVariable +======================================================= +Check for blocks that capture uninitialized values diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn + +clang-analyzer-core.uninitialized.UndefReturn +============================================= +The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer + +clang-analyzer-cplusplus.InnerPointer +===================================== +Check for inner pointers of C++ containers used after re/deallocation diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.Move + +clang-analyzer-cplusplus.Move +============================= +The clang-analyzer-cplusplus.Move check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete + +clang-analyzer-cplusplus.NewDelete +================================== +The clang-analyzer-cplusplus.NewDelete check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks + +clang-analyzer-cplusplus.NewDeleteLeaks +======================================= +The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores + +clang-analyzer-deadcode.DeadStores +================================== +The clang-analyzer-deadcode.DeadStores check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull + +clang-analyzer-nullability.NullPassedToNonnull +============================================== +The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull + +clang-analyzer-nullability.NullReturnedFromNonnull +================================================== +The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced + +clang-analyzer-nullability.NullableDereferenced +=============================================== +The clang-analyzer-nullability.NullableDereferenced check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull + +clang-analyzer-nullability.NullablePassedToNonnull +================================================== +The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull + +clang-analyzer-nullability.NullableReturnedFromNonnull +====================================================== +Warns when a nullable pointer is returned from a function that has _Nonnull return type. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject + +clang-analyzer-optin.cplusplus.UninitializedObject +================================================== +The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall + +clang-analyzer-optin.cplusplus.VirtualCall +========================================== +The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker + +clang-analyzer-optin.mpi.MPI-Checker +==================================== +The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast + +clang-analyzer-optin.osx.OSObjectCStyleCast +=========================================== +Checker for C-style casts of OSObjects diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + +clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker +============================================================================= +The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + +clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker +======================================================================= +The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern + +clang-analyzer-optin.performance.GCDAntipattern +=============================================== +Check for performance anti-patterns when using Grand Central Dispatch diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-optin.performance.Padding + +clang-analyzer-optin.performance.Padding +======================================== +Check for excessively padded structs. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI + +clang-analyzer-optin.portability.UnixAPI +======================================== +Finds implementation-defined behavior in UNIX/Posix functions diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.API + +clang-analyzer-osx.API +====================== +The clang-analyzer-osx.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.MIG + +clang-analyzer-osx.MIG +====================== +Find violations of the Mach Interface Generator calling convention diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion + +clang-analyzer-osx.NumberObjectConversion +========================================= +Check for erroneous conversions of objects representing numbers into numbers diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount + +clang-analyzer-osx.OSObjectRetainCount +====================================== +Check for leaks and improper reference count management for OSObject diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty + +clang-analyzer-osx.ObjCProperty +=============================== +Check for proper uses of Objective-C properties diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI + +clang-analyzer-osx.SecKeychainAPI +================================= +The clang-analyzer-osx.SecKeychainAPI check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync + +clang-analyzer-osx.cocoa.AtSync +=============================== +The clang-analyzer-osx.cocoa.AtSync check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite + +clang-analyzer-osx.cocoa.AutoreleaseWrite +========================================= +Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease + +clang-analyzer-osx.cocoa.ClassRelease +===================================== +The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc + +clang-analyzer-osx.cocoa.Dealloc +================================ +The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes + +clang-analyzer-osx.cocoa.IncompatibleMethodTypes +================================================ +The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops + +clang-analyzer-osx.cocoa.Loops +============================== +Improved modeling of loops using Cocoa collection types diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall + +clang-analyzer-osx.cocoa.MissingSuperCall +========================================= +Warn about Objective-C methods that lack a necessary call to super diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool + +clang-analyzer-osx.cocoa.NSAutoreleasePool +========================================== +The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError + +clang-analyzer-osx.cocoa.NSError +================================ +The clang-analyzer-osx.cocoa.NSError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg + +clang-analyzer-osx.cocoa.NilArg +=============================== +The clang-analyzer-osx.cocoa.NilArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue + +clang-analyzer-osx.cocoa.NonNilReturnValue +========================================== +Model the APIs that are guaranteed to return a non-nil value diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics + +clang-analyzer-osx.cocoa.ObjCGenerics +===================================== +The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount + +clang-analyzer-osx.cocoa.RetainCount +==================================== +The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + +clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak +=============================================== +Check for leaked memory in autorelease pools that will never be drained diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit + +clang-analyzer-osx.cocoa.SelfInit +================================= +The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc + +clang-analyzer-osx.cocoa.SuperDealloc +===================================== +The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars + +clang-analyzer-osx.cocoa.UnusedIvars +==================================== +The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes + +clang-analyzer-osx.cocoa.VariadicMethodTypes +============================================ +The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError + +clang-analyzer-osx.coreFoundation.CFError +========================================= +The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber + +clang-analyzer-osx.coreFoundation.CFNumber +========================================== +The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease + +clang-analyzer-osx.coreFoundation.CFRetainRelease +================================================= +The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds + +clang-analyzer-osx.coreFoundation.containers.OutOfBounds +======================================================== +The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + +clang-analyzer-osx.coreFoundation.containers.PointerSizedValues +=============================================================== +The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter + +clang-analyzer-security.FloatLoopCounter +======================================== +The clang-analyzer-security.FloatLoopCounter check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + +clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling +==================================================================== +The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn + +clang-analyzer-security.insecureAPI.UncheckedReturn +=================================================== +The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp + +clang-analyzer-security.insecureAPI.bcmp +======================================== +The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy + +clang-analyzer-security.insecureAPI.bcopy +========================================= +The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero + +clang-analyzer-security.insecureAPI.bzero +========================================= +The clang-analyzer-security.insecureAPI.bzero check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw + +clang-analyzer-security.insecureAPI.getpw +========================================= +The clang-analyzer-security.insecureAPI.getpw check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets + +clang-analyzer-security.insecureAPI.gets +======================================== +The clang-analyzer-security.insecureAPI.gets check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp + +clang-analyzer-security.insecureAPI.mkstemp +=========================================== +The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp + +clang-analyzer-security.insecureAPI.mktemp +========================================== +The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand + +clang-analyzer-security.insecureAPI.rand +======================================== +The clang-analyzer-security.insecureAPI.rand check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy + +clang-analyzer-security.insecureAPI.strcpy +========================================== +The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork + +clang-analyzer-security.insecureAPI.vfork +========================================= +The clang-analyzer-security.insecureAPI.vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.API + +clang-analyzer-unix.API +======================= +The clang-analyzer-unix.API check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.Malloc + +clang-analyzer-unix.Malloc +========================== +The clang-analyzer-unix.Malloc check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof + +clang-analyzer-unix.MallocSizeof +================================ +The clang-analyzer-unix.MallocSizeof check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator + +clang-analyzer-unix.MismatchedDeallocator +========================================= +The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.Vfork + +clang-analyzer-unix.Vfork +========================= +The clang-analyzer-unix.Vfork check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg + +clang-analyzer-unix.cstring.BadSizeArg +====================================== +The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst @@ -0,0 +1,7 @@ +.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg + +clang-analyzer-unix.cstring.NullArg +=================================== +The clang-analyzer-unix.cstring.NullArg check is an alias, please see +`Clang Static Analyzer Available Checkers `_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf + +clang-analyzer-valist.CopyToSelf +================================ +Check for va_lists which are copied onto itself. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-valist.Uninitialized + +clang-analyzer-valist.Uninitialized +=================================== +Check for usages of uninitialized (or already released) va_lists. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst @@ -0,0 +1,5 @@ +.. title:: clang-tidy - clang-analyzer-valist.Unterminated + +clang-analyzer-valist.Unterminated +================================== +Check for va_lists which are not released by a va_end call. diff --git a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py @@ -0,0 +1,114 @@ +""" +Generates documentation based off the available static analyzers checks +References Checkers.td to determine what checks exist +""" + +checkers_td_directory = "../../../../clang/include/clang/StaticAnalyzer/Checkers/" + +import subprocess +import json +import os + +"""Get path of script so files are always in correct directory""" +__location__ = os.path.realpath( + os.path.join(os.getcwd(), os.path.dirname(__file__))) + +"""Get dict of checker related info and parse for full check names + +Returns: + checkers: dict of checker info +""" +def get_checkers(): + result = subprocess.run(["llvm-tblgen", "--dump-json", "-I", + checkers_td_directory, checkers_td_directory+"Checkers.td"], + stdout=subprocess.PIPE) + table_entries = json.loads(result.stdout) + documentable_checkers = [] + checkers = table_entries["!instanceof"]["Checker"] + packages = table_entries["!instanceof"]["Package"] + + for checker_ in checkers: + checker = table_entries[checker_] + checker_name = checker["CheckerName"] + package_ = checker["ParentPackage"]["def"] + package = table_entries[package_] + package_name = package["PackageName"] + checker_package_prefix = package_name + parent_package_ = package["ParentPackage"] + hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0) + + while(parent_package_ != None): + parent_package = table_entries[parent_package_["def"]] + checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix + hidden = hidden or parent_package["Hidden"] != 0 + parent_package_ = parent_package["ParentPackage"] + + full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name + + if(not hidden): + checker["FullPackageName"] = full_package_name + documentable_checkers.append(checker) + + documentable_checkers.sort(key=lambda x: x["FullPackageName"]) + return documentable_checkers + +"""Generate documentation for checker + +Args: + checker: Checker for which to generate documentation. + only_help_text: Generate documentation based off the checker description. + Used when there is no other documentation to link to. +""" +def generate_documentation(checker, only_help_text=False): + with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f: + f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"]) + f.write("\n") + f.write("%s\n" % checker["FullPackageName"]) + f.write("=" * len(checker["FullPackageName"])) + f.write("\n") + if(only_help_text): + f.write("%s\n" % checker["HelpText"]) + else: + f.write("The %s check is an alias, please see\n" % checker["FullPackageName"]) + f.write("`Clang Static Analyzer Available Checkers `_\n") + f.write("for more information.\n") + f.close() + +"""Update list.rst to include the new checks + +Args: + checkers: dict acquired from get_checkers() +""" +def update_documentation_list(checkers): + with open(os.path.join(__location__, "list.rst"), "r+") as f: + f_text = f.read() + header, check_text= f_text.split(".. toctree::\n") + checks = check_text.split("\n") + for checker in checkers: + if(checker["FullPackageName"] not in checks): + checks.append(" %s" % checker["FullPackageName"]) + checks.sort() + + #Overwrite file with new data + f.seek(0) + f.write(header) + f.write(".. toctree::\n") + for check in checks: + f.write("%s\n" % check) + f.close() + + + +def main(): + checkers = get_checkers() + for checker in checkers: + #No documentation nor alpha documentation + if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0): + generate_documentation(checker, True) + else: + generate_documentation(checker) + print("Generated documentation for: %s" % checker["FullPackageName"]) + update_documentation_list(checkers) + +if __name__ == '__main__': + main() diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -4,6 +4,11 @@ ================= .. toctree:: + + + + + abseil-duration-addition abseil-duration-comparison abseil-duration-conversion-cast @@ -102,6 +107,510 @@ cert-msc51-cpp cert-oop11-cpp (redirects to performance-move-constructor-init) cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) + clang-analyzer-alpha.clone.CloneChecker + clang-analyzer-alpha.clone.CloneChecker + clang-analyzer-alpha.clone.CloneChecker + clang-analyzer-alpha.clone.CloneChecker + clang-analyzer-alpha.core.BoolAssignment + clang-analyzer-alpha.core.BoolAssignment + clang-analyzer-alpha.core.BoolAssignment + clang-analyzer-alpha.core.BoolAssignment + clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + clang-analyzer-alpha.core.CallAndMessageUnInitRefArg + clang-analyzer-alpha.core.CastSize + clang-analyzer-alpha.core.CastSize + clang-analyzer-alpha.core.CastSize + clang-analyzer-alpha.core.CastSize + clang-analyzer-alpha.core.CastToStruct + clang-analyzer-alpha.core.CastToStruct + clang-analyzer-alpha.core.CastToStruct + clang-analyzer-alpha.core.CastToStruct + clang-analyzer-alpha.core.Conversion + clang-analyzer-alpha.core.Conversion + clang-analyzer-alpha.core.Conversion + clang-analyzer-alpha.core.Conversion + clang-analyzer-alpha.core.DynamicTypeChecker + clang-analyzer-alpha.core.DynamicTypeChecker + clang-analyzer-alpha.core.DynamicTypeChecker + clang-analyzer-alpha.core.DynamicTypeChecker + clang-analyzer-alpha.core.FixedAddr + clang-analyzer-alpha.core.FixedAddr + clang-analyzer-alpha.core.FixedAddr + clang-analyzer-alpha.core.FixedAddr + clang-analyzer-alpha.core.IdenticalExpr + clang-analyzer-alpha.core.IdenticalExpr + clang-analyzer-alpha.core.IdenticalExpr + clang-analyzer-alpha.core.IdenticalExpr + clang-analyzer-alpha.core.PointerArithm + clang-analyzer-alpha.core.PointerArithm + clang-analyzer-alpha.core.PointerArithm + clang-analyzer-alpha.core.PointerArithm + clang-analyzer-alpha.core.PointerSub + clang-analyzer-alpha.core.PointerSub + clang-analyzer-alpha.core.PointerSub + clang-analyzer-alpha.core.PointerSub + clang-analyzer-alpha.core.SizeofPtr + clang-analyzer-alpha.core.SizeofPtr + clang-analyzer-alpha.core.SizeofPtr + clang-analyzer-alpha.core.SizeofPtr + clang-analyzer-alpha.core.StackAddressAsyncEscape + clang-analyzer-alpha.core.StackAddressAsyncEscape + clang-analyzer-alpha.core.StackAddressAsyncEscape + clang-analyzer-alpha.core.StackAddressAsyncEscape + clang-analyzer-alpha.core.TestAfterDivZero + clang-analyzer-alpha.core.TestAfterDivZero + clang-analyzer-alpha.core.TestAfterDivZero + clang-analyzer-alpha.core.TestAfterDivZero + clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + clang-analyzer-alpha.cplusplus.DeleteWithNonVirtualDtor + clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + clang-analyzer-alpha.cplusplus.EnumCastOutOfRange + clang-analyzer-alpha.cplusplus.InvalidatedIterator + clang-analyzer-alpha.cplusplus.InvalidatedIterator + clang-analyzer-alpha.cplusplus.InvalidatedIterator + clang-analyzer-alpha.cplusplus.InvalidatedIterator + clang-analyzer-alpha.cplusplus.IteratorRange + clang-analyzer-alpha.cplusplus.IteratorRange + clang-analyzer-alpha.cplusplus.IteratorRange + clang-analyzer-alpha.cplusplus.IteratorRange + clang-analyzer-alpha.cplusplus.MismatchedIterator + clang-analyzer-alpha.cplusplus.MismatchedIterator + clang-analyzer-alpha.cplusplus.MismatchedIterator + clang-analyzer-alpha.cplusplus.MismatchedIterator + clang-analyzer-alpha.deadcode.UnreachableCode + clang-analyzer-alpha.deadcode.UnreachableCode + clang-analyzer-alpha.deadcode.UnreachableCode + clang-analyzer-alpha.deadcode.UnreachableCode + clang-analyzer-alpha.llvm.Conventions + clang-analyzer-alpha.llvm.Conventions + clang-analyzer-alpha.llvm.Conventions + clang-analyzer-alpha.llvm.Conventions + clang-analyzer-alpha.nondeterminism.PointerIteration + clang-analyzer-alpha.nondeterminism.PointerIteration + clang-analyzer-alpha.nondeterminism.PointerIteration + clang-analyzer-alpha.nondeterminism.PointerIteration + clang-analyzer-alpha.nondeterminism.PointerSorting + clang-analyzer-alpha.nondeterminism.PointerSorting + clang-analyzer-alpha.nondeterminism.PointerSorting + clang-analyzer-alpha.nondeterminism.PointerSorting + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignment + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + clang-analyzer-alpha.osx.cocoa.DirectIvarAssignmentForAnnotatedFunctions + clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + clang-analyzer-alpha.osx.cocoa.InstanceVariableInvalidation + clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + clang-analyzer-alpha.osx.cocoa.MissingInvalidationMethod + clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + clang-analyzer-alpha.osx.cocoa.localizability.PluralMisuseChecker + clang-analyzer-alpha.security.ArrayBound + clang-analyzer-alpha.security.ArrayBound + clang-analyzer-alpha.security.ArrayBound + clang-analyzer-alpha.security.ArrayBound + clang-analyzer-alpha.security.ArrayBoundV2 + clang-analyzer-alpha.security.ArrayBoundV2 + clang-analyzer-alpha.security.ArrayBoundV2 + clang-analyzer-alpha.security.ArrayBoundV2 + clang-analyzer-alpha.security.MallocOverflow + clang-analyzer-alpha.security.MallocOverflow + clang-analyzer-alpha.security.MallocOverflow + clang-analyzer-alpha.security.MallocOverflow + clang-analyzer-alpha.security.MmapWriteExec + clang-analyzer-alpha.security.MmapWriteExec + clang-analyzer-alpha.security.MmapWriteExec + clang-analyzer-alpha.security.MmapWriteExec + clang-analyzer-alpha.security.ReturnPtrRange + clang-analyzer-alpha.security.ReturnPtrRange + clang-analyzer-alpha.security.ReturnPtrRange + clang-analyzer-alpha.security.ReturnPtrRange + clang-analyzer-alpha.security.taint.TaintPropagation + clang-analyzer-alpha.security.taint.TaintPropagation + clang-analyzer-alpha.security.taint.TaintPropagation + clang-analyzer-alpha.security.taint.TaintPropagation + clang-analyzer-alpha.unix.BlockInCriticalSection + clang-analyzer-alpha.unix.BlockInCriticalSection + clang-analyzer-alpha.unix.BlockInCriticalSection + clang-analyzer-alpha.unix.BlockInCriticalSection + clang-analyzer-alpha.unix.Chroot + clang-analyzer-alpha.unix.Chroot + clang-analyzer-alpha.unix.Chroot + clang-analyzer-alpha.unix.Chroot + clang-analyzer-alpha.unix.PthreadLock + clang-analyzer-alpha.unix.PthreadLock + clang-analyzer-alpha.unix.PthreadLock + clang-analyzer-alpha.unix.PthreadLock + clang-analyzer-alpha.unix.SimpleStream + clang-analyzer-alpha.unix.SimpleStream + clang-analyzer-alpha.unix.SimpleStream + clang-analyzer-alpha.unix.SimpleStream + clang-analyzer-alpha.unix.Stream + clang-analyzer-alpha.unix.Stream + clang-analyzer-alpha.unix.Stream + clang-analyzer-alpha.unix.Stream + clang-analyzer-alpha.unix.cstring.BufferOverlap + clang-analyzer-alpha.unix.cstring.BufferOverlap + clang-analyzer-alpha.unix.cstring.BufferOverlap + clang-analyzer-alpha.unix.cstring.BufferOverlap + clang-analyzer-alpha.unix.cstring.NotNullTerminated + clang-analyzer-alpha.unix.cstring.NotNullTerminated + clang-analyzer-alpha.unix.cstring.NotNullTerminated + clang-analyzer-alpha.unix.cstring.NotNullTerminated + clang-analyzer-alpha.unix.cstring.OutOfBounds + clang-analyzer-alpha.unix.cstring.OutOfBounds + clang-analyzer-alpha.unix.cstring.OutOfBounds + clang-analyzer-alpha.unix.cstring.OutOfBounds + clang-analyzer-core.CallAndMessage + clang-analyzer-core.CallAndMessage + clang-analyzer-core.CallAndMessage + clang-analyzer-core.CallAndMessage + clang-analyzer-core.DivideZero + clang-analyzer-core.DivideZero + clang-analyzer-core.DivideZero + clang-analyzer-core.DivideZero + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.DynamicTypePropagation + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NonNullParamChecker + clang-analyzer-core.NullDereference + clang-analyzer-core.NullDereference + clang-analyzer-core.NullDereference + clang-analyzer-core.NullDereference + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.StackAddressEscape + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.UndefinedBinaryOperatorResult + clang-analyzer-core.VLASize + clang-analyzer-core.VLASize + clang-analyzer-core.VLASize + clang-analyzer-core.VLASize + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.ArraySubscript + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Assign + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.Branch + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.CapturedBlockVariable + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-core.uninitialized.UndefReturn + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.InnerPointer + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.Move + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDelete + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-cplusplus.NewDeleteLeaks + clang-analyzer-deadcode.DeadStores + clang-analyzer-deadcode.DeadStores + clang-analyzer-deadcode.DeadStores + clang-analyzer-deadcode.DeadStores + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullPassedToNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullReturnedFromNonnull + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullableDereferenced + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullablePassedToNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-nullability.NullableReturnedFromNonnull + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.UninitializedObject + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.cplusplus.VirtualCall + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.mpi.MPI-Checker + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.OSObjectCStyleCast + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.GCDAntipattern + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.performance.Padding + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-optin.portability.UnixAPI + clang-analyzer-osx.API + clang-analyzer-osx.API + clang-analyzer-osx.API + clang-analyzer-osx.API + clang-analyzer-osx.MIG + clang-analyzer-osx.MIG + clang-analyzer-osx.MIG + clang-analyzer-osx.MIG + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.NumberObjectConversion + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.OSObjectRetainCount + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.ObjCProperty + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.SecKeychainAPI + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AtSync + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.AutoreleaseWrite + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.ClassRelease + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.Dealloc + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.IncompatibleMethodTypes + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.Loops + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.MissingSuperCall + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSAutoreleasePool + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NSError + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NilArg + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.NonNilReturnValue + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.ObjCGenerics + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RetainCount + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SelfInit + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.SuperDealloc + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.UnusedIvars + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.cocoa.VariadicMethodTypes + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFError + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFNumber + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.CFRetainRelease + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.OutOfBounds + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-osx.coreFoundation.containers.PointerSizedValues + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.FloatLoopCounter + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.UncheckedReturn + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcmp + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bcopy + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.bzero + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.getpw + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.gets + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mkstemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.mktemp + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.rand + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.strcpy + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-security.insecureAPI.vfork + clang-analyzer-unix.API + clang-analyzer-unix.API + clang-analyzer-unix.API + clang-analyzer-unix.API + clang-analyzer-unix.Malloc + clang-analyzer-unix.Malloc + clang-analyzer-unix.Malloc + clang-analyzer-unix.Malloc + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MallocSizeof + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.MismatchedDeallocator + clang-analyzer-unix.Vfork + clang-analyzer-unix.Vfork + clang-analyzer-unix.Vfork + clang-analyzer-unix.Vfork + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.BadSizeArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-unix.cstring.NullArg + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.CopyToSelf + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Uninitialized + clang-analyzer-valist.Unterminated + clang-analyzer-valist.Unterminated + clang-analyzer-valist.Unterminated + clang-analyzer-valist.Unterminated cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) cppcoreguidelines-avoid-goto cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers)