Nathan-Huckleberry updated this revision to Diff 209634.
Nathan-Huckleberry added a comment.

- Forgot to fix list.rst


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D64454/new/

https://reviews.llvm.org/D64454

Files:
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
  clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
  
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
  clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
  clang-tools-extra/docs/clang-tidy/checks/list.rst

Index: clang-tools-extra/docs/clang-tidy/checks/list.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -4,6 +4,7 @@
 =================
 
 .. toctree::
+
    abseil-duration-addition
    abseil-duration-comparison
    abseil-duration-conversion-cast
@@ -102,6 +103,90 @@
    cert-msc51-cpp
    cert-oop11-cpp (redirects to performance-move-constructor-init) <cert-oop11-cpp>
    cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) <cert-oop54-cpp>
+   clang-analyzer-core.CallAndMessage
+   clang-analyzer-core.DivideZero
+   clang-analyzer-core.DynamicTypePropagation
+   clang-analyzer-core.NonNullParamChecker
+   clang-analyzer-core.NullDereference
+   clang-analyzer-core.StackAddressEscape
+   clang-analyzer-core.UndefinedBinaryOperatorResult
+   clang-analyzer-core.VLASize
+   clang-analyzer-core.uninitialized.ArraySubscript
+   clang-analyzer-core.uninitialized.Assign
+   clang-analyzer-core.uninitialized.Branch
+   clang-analyzer-core.uninitialized.CapturedBlockVariable
+   clang-analyzer-core.uninitialized.UndefReturn
+   clang-analyzer-cplusplus.InnerPointer
+   clang-analyzer-cplusplus.Move
+   clang-analyzer-cplusplus.NewDelete
+   clang-analyzer-cplusplus.NewDeleteLeaks
+   clang-analyzer-deadcode.DeadStores
+   clang-analyzer-nullability.NullPassedToNonnull
+   clang-analyzer-nullability.NullReturnedFromNonnull
+   clang-analyzer-nullability.NullableDereferenced
+   clang-analyzer-nullability.NullablePassedToNonnull
+   clang-analyzer-nullability.NullableReturnedFromNonnull
+   clang-analyzer-optin.cplusplus.UninitializedObject
+   clang-analyzer-optin.cplusplus.VirtualCall
+   clang-analyzer-optin.mpi.MPI-Checker
+   clang-analyzer-optin.osx.OSObjectCStyleCast
+   clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+   clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+   clang-analyzer-optin.performance.GCDAntipattern
+   clang-analyzer-optin.performance.Padding
+   clang-analyzer-optin.portability.UnixAPI
+   clang-analyzer-osx.API
+   clang-analyzer-osx.MIG
+   clang-analyzer-osx.NumberObjectConversion
+   clang-analyzer-osx.OSObjectRetainCount
+   clang-analyzer-osx.ObjCProperty
+   clang-analyzer-osx.SecKeychainAPI
+   clang-analyzer-osx.cocoa.AtSync
+   clang-analyzer-osx.cocoa.AutoreleaseWrite
+   clang-analyzer-osx.cocoa.ClassRelease
+   clang-analyzer-osx.cocoa.Dealloc
+   clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+   clang-analyzer-osx.cocoa.Loops
+   clang-analyzer-osx.cocoa.MissingSuperCall
+   clang-analyzer-osx.cocoa.NSAutoreleasePool
+   clang-analyzer-osx.cocoa.NSError
+   clang-analyzer-osx.cocoa.NilArg
+   clang-analyzer-osx.cocoa.NonNilReturnValue
+   clang-analyzer-osx.cocoa.ObjCGenerics
+   clang-analyzer-osx.cocoa.RetainCount
+   clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+   clang-analyzer-osx.cocoa.SelfInit
+   clang-analyzer-osx.cocoa.SuperDealloc
+   clang-analyzer-osx.cocoa.UnusedIvars
+   clang-analyzer-osx.cocoa.VariadicMethodTypes
+   clang-analyzer-osx.coreFoundation.CFError
+   clang-analyzer-osx.coreFoundation.CFNumber
+   clang-analyzer-osx.coreFoundation.CFRetainRelease
+   clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+   clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+   clang-analyzer-security.FloatLoopCounter
+   clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+   clang-analyzer-security.insecureAPI.UncheckedReturn
+   clang-analyzer-security.insecureAPI.bcmp
+   clang-analyzer-security.insecureAPI.bcopy
+   clang-analyzer-security.insecureAPI.bzero
+   clang-analyzer-security.insecureAPI.getpw
+   clang-analyzer-security.insecureAPI.gets
+   clang-analyzer-security.insecureAPI.mkstemp
+   clang-analyzer-security.insecureAPI.mktemp
+   clang-analyzer-security.insecureAPI.rand
+   clang-analyzer-security.insecureAPI.strcpy
+   clang-analyzer-security.insecureAPI.vfork
+   clang-analyzer-unix.API
+   clang-analyzer-unix.Malloc
+   clang-analyzer-unix.MallocSizeof
+   clang-analyzer-unix.MismatchedDeallocator
+   clang-analyzer-unix.Vfork
+   clang-analyzer-unix.cstring.BadSizeArg
+   clang-analyzer-unix.cstring.NullArg
+   clang-analyzer-valist.CopyToSelf
+   clang-analyzer-valist.Uninitialized
+   clang-analyzer-valist.Unterminated
    cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) <cppcoreguidelines-avoid-c-arrays>
    cppcoreguidelines-avoid-goto
    cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers) <cppcoreguidelines-avoid-magic-numbers>
Index: clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
@@ -0,0 +1,120 @@
+"""
+Generates documentation based off the available static analyzers checks
+References Checkers.td to determine what checks exist
+"""
+
+checkers_td_directory = "../../../../clang/include/clang/StaticAnalyzer/Checkers/"
+
+import subprocess
+import json
+import os
+import re
+
+"""Get path of script so files are always in correct directory"""
+__location__ = os.path.realpath(
+        os.path.join(os.getcwd(), os.path.dirname(__file__)))
+
+"""Get dict of checker related info and parse for full check names
+
+Returns:
+  checkers: dict of checker info
+"""
+def get_checkers():
+  result = subprocess.run(["llvm-tblgen", "--dump-json", "-I",
+                           checkers_td_directory, checkers_td_directory+"Checkers.td"],
+                           stdout=subprocess.PIPE)
+  table_entries = json.loads(result.stdout)
+  documentable_checkers = []
+  checkers = table_entries["!instanceof"]["Checker"]
+  packages = table_entries["!instanceof"]["Package"]
+
+  for checker_ in checkers:
+    checker = table_entries[checker_]
+    checker_name = checker["CheckerName"]
+    package_ = checker["ParentPackage"]["def"]
+    package = table_entries[package_]
+    package_name = package["PackageName"]
+    checker_package_prefix = package_name
+    parent_package_ = package["ParentPackage"]
+    hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0)
+
+    while(parent_package_ != None):
+      parent_package = table_entries[parent_package_["def"]]
+      checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix
+      hidden = hidden or parent_package["Hidden"] != 0
+      parent_package_ = parent_package["ParentPackage"]
+
+    full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name
+    anchor_url = re.sub("\.", "-", checker_package_prefix + "." + checker_name).lower()
+
+    if(not hidden and "alpha" not in full_package_name.lower()):
+      checker["FullPackageName"] = full_package_name
+      checker["AnchorUrl"] = anchor_url
+      documentable_checkers.append(checker)
+
+  documentable_checkers.sort(key=lambda x: x["FullPackageName"])
+  return documentable_checkers
+
+"""Generate documentation for checker
+
+Args:
+  checker: Checker for which to generate documentation.
+  only_help_text: Generate documentation based off the checker description.
+    Used when there is no other documentation to link to.
+"""
+def generate_documentation(checker, only_help_text=False):
+  with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f:
+    f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"])
+    if(not only_help_text):
+      f.write(".. meta::\n")
+      f.write("   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#%s\n"; % checker["AnchorUrl"])
+    f.write("\n")
+    f.write("%s\n" % checker["FullPackageName"])
+    f.write("=" * len(checker["FullPackageName"]) + "\n")
+    f.write("\n")
+    if(only_help_text):
+      f.write("%s\n" % checker["HelpText"])
+    else:
+      f.write("The %s check is an alias, please see\n" % checker["FullPackageName"])
+      f.write("`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#%s>`_\n" % checker["AnchorUrl"])
+      f.write("for more information.\n")
+    f.close()
+
+"""Update list.rst to include the new checks
+
+Args:
+  checkers: dict acquired from get_checkers()
+"""
+def update_documentation_list(checkers):
+  with open(os.path.join(__location__, "list.rst"), "r+") as f:
+    f_text = f.read()
+    header, check_text= f_text.split(".. toctree::\n")
+    checks = check_text.split("\n")
+    for checker in checkers:
+      if(("   %s" % checker["FullPackageName"]) not in checks):
+        checks.append("   %s" % checker["FullPackageName"])
+    checks.sort()
+
+    #Overwrite file with new data
+    f.seek(0)
+    f.write(header)
+    f.write(".. toctree::")
+    for check in checks:
+      f.write("%s\n" % check)
+    f.close()
+
+
+
+def main():
+  checkers = get_checkers()
+  for checker in checkers:
+    #No documentation nor alpha documentation
+    if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0):
+      generate_documentation(checker, True)
+    else:
+      generate_documentation(checker)
+    print("Generated documentation for: %s" % checker["FullPackageName"])
+  update_documentation_list(checkers)
+
+if __name__ == '__main__':
+  main()
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Unterminated
+
+clang-analyzer-valist.Unterminated
+==================================
+
+Check for va_lists which are not released by a va_end call.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Uninitialized
+
+clang-analyzer-valist.Uninitialized
+===================================
+
+Check for usages of uninitialized (or already released) va_lists.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf
+
+clang-analyzer-valist.CopyToSelf
+================================
+
+Check for va_lists which are copied onto itself.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg
+
+clang-analyzer-unix.cstring.NullArg
+===================================
+
+The clang-analyzer-unix.cstring.NullArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg
+
+clang-analyzer-unix.cstring.BadSizeArg
+======================================
+
+The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Vfork
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork
+
+clang-analyzer-unix.Vfork
+=========================
+
+The clang-analyzer-unix.Vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator
+
+clang-analyzer-unix.MismatchedDeallocator
+=========================================
+
+The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof
+
+clang-analyzer-unix.MallocSizeof
+================================
+
+The clang-analyzer-unix.MallocSizeof check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Malloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc
+
+clang-analyzer-unix.Malloc
+==========================
+
+The clang-analyzer-unix.Malloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.API
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-api
+
+clang-analyzer-unix.API
+=======================
+
+The clang-analyzer-unix.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork
+
+clang-analyzer-security.insecureAPI.vfork
+=========================================
+
+The clang-analyzer-security.insecureAPI.vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy
+
+clang-analyzer-security.insecureAPI.strcpy
+==========================================
+
+The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand
+
+clang-analyzer-security.insecureAPI.rand
+========================================
+
+The clang-analyzer-security.insecureAPI.rand check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp
+
+clang-analyzer-security.insecureAPI.mktemp
+==========================================
+
+The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp
+
+clang-analyzer-security.insecureAPI.mkstemp
+===========================================
+
+The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets
+
+clang-analyzer-security.insecureAPI.gets
+========================================
+
+The clang-analyzer-security.insecureAPI.gets check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw
+
+clang-analyzer-security.insecureAPI.getpw
+=========================================
+
+The clang-analyzer-security.insecureAPI.getpw check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero
+
+clang-analyzer-security.insecureAPI.bzero
+=========================================
+
+The clang-analyzer-security.insecureAPI.bzero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy
+
+clang-analyzer-security.insecureAPI.bcopy
+=========================================
+
+The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp
+
+clang-analyzer-security.insecureAPI.bcmp
+========================================
+
+The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn
+
+clang-analyzer-security.insecureAPI.UncheckedReturn
+===================================================
+
+The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling
+
+clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+====================================================================
+
+The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter
+
+clang-analyzer-security.FloatLoopCounter
+========================================
+
+The clang-analyzer-security.FloatLoopCounter check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues
+
+clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+===============================================================
+
+The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds
+
+clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+========================================================
+
+The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease
+
+clang-analyzer-osx.coreFoundation.CFRetainRelease
+=================================================
+
+The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber
+
+clang-analyzer-osx.coreFoundation.CFNumber
+==========================================
+
+The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror
+
+clang-analyzer-osx.coreFoundation.CFError
+=========================================
+
+The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes
+
+clang-analyzer-osx.cocoa.VariadicMethodTypes
+============================================
+
+The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars
+
+clang-analyzer-osx.cocoa.UnusedIvars
+====================================
+
+The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc
+
+clang-analyzer-osx.cocoa.SuperDealloc
+=====================================
+
+The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit
+
+clang-analyzer-osx.cocoa.SelfInit
+=================================
+
+The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+
+clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+===============================================
+
+Check for leaked memory in autorelease pools that will never be drained
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount
+
+clang-analyzer-osx.cocoa.RetainCount
+====================================
+
+The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics
+
+clang-analyzer-osx.cocoa.ObjCGenerics
+=====================================
+
+The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue
+
+clang-analyzer-osx.cocoa.NonNilReturnValue
+==========================================
+
+Model the APIs that are guaranteed to return a non-nil value
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg
+
+clang-analyzer-osx.cocoa.NilArg
+===============================
+
+The clang-analyzer-osx.cocoa.NilArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror
+
+clang-analyzer-osx.cocoa.NSError
+================================
+
+The clang-analyzer-osx.cocoa.NSError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool
+
+clang-analyzer-osx.cocoa.NSAutoreleasePool
+==========================================
+
+The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall
+
+clang-analyzer-osx.cocoa.MissingSuperCall
+=========================================
+
+Warn about Objective-C methods that lack a necessary call to super
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops
+
+clang-analyzer-osx.cocoa.Loops
+==============================
+
+Improved modeling of loops using Cocoa collection types
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes
+
+clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+================================================
+
+The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc
+
+clang-analyzer-osx.cocoa.Dealloc
+================================
+
+The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease
+
+clang-analyzer-osx.cocoa.ClassRelease
+=====================================
+
+The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite
+
+clang-analyzer-osx.cocoa.AutoreleaseWrite
+=========================================
+
+Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync
+
+clang-analyzer-osx.cocoa.AtSync
+===============================
+
+The clang-analyzer-osx.cocoa.AtSync check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi
+
+clang-analyzer-osx.SecKeychainAPI
+=================================
+
+The clang-analyzer-osx.SecKeychainAPI check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty
+
+clang-analyzer-osx.ObjCProperty
+===============================
+
+Check for proper uses of Objective-C properties
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount
+
+clang-analyzer-osx.OSObjectRetainCount
+======================================
+
+Check for leaks and improper reference count management for OSObject
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion
+
+clang-analyzer-osx.NumberObjectConversion
+=========================================
+
+Check for erroneous conversions of objects representing numbers into numbers
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.MIG
+
+clang-analyzer-osx.MIG
+======================
+
+Find violations of the Mach Interface Generator calling convention
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.API
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-api
+
+clang-analyzer-osx.API
+======================
+
+The clang-analyzer-osx.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI
+
+clang-analyzer-optin.portability.UnixAPI
+========================================
+
+Finds implementation-defined behavior in UNIX/Posix functions
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.Padding
+
+clang-analyzer-optin.performance.Padding
+========================================
+
+Check for excessively padded structs.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern
+
+clang-analyzer-optin.performance.GCDAntipattern
+===============================================
+
+Check for performance anti-patterns when using Grand Central Dispatch
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+=======================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+=============================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast
+
+clang-analyzer-optin.osx.OSObjectCStyleCast
+===========================================
+
+Checker for C-style casts of OSObjects
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker
+
+clang-analyzer-optin.mpi.MPI-Checker
+====================================
+
+The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall
+
+clang-analyzer-optin.cplusplus.VirtualCall
+==========================================
+
+The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject
+
+clang-analyzer-optin.cplusplus.UninitializedObject
+==================================================
+
+The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull
+
+clang-analyzer-nullability.NullableReturnedFromNonnull
+======================================================
+
+Warns when a nullable pointer is returned from a function that has _Nonnull return type.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull
+
+clang-analyzer-nullability.NullablePassedToNonnull
+==================================================
+
+The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced
+
+clang-analyzer-nullability.NullableDereferenced
+===============================================
+
+The clang-analyzer-nullability.NullableDereferenced check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull
+
+clang-analyzer-nullability.NullReturnedFromNonnull
+==================================================
+
+The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull
+
+clang-analyzer-nullability.NullPassedToNonnull
+==============================================
+
+The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores
+
+clang-analyzer-deadcode.DeadStores
+==================================
+
+The clang-analyzer-deadcode.DeadStores check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks
+
+clang-analyzer-cplusplus.NewDeleteLeaks
+=======================================
+
+The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete
+
+clang-analyzer-cplusplus.NewDelete
+==================================
+
+The clang-analyzer-cplusplus.NewDelete check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.Move
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move
+
+clang-analyzer-cplusplus.Move
+=============================
+
+The clang-analyzer-cplusplus.Move check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer
+
+clang-analyzer-cplusplus.InnerPointer
+=====================================
+
+Check for inner pointers of C++ containers used after re/deallocation
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn
+
+clang-analyzer-core.uninitialized.UndefReturn
+=============================================
+
+The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable
+
+clang-analyzer-core.uninitialized.CapturedBlockVariable
+=======================================================
+
+Check for blocks that capture uninitialized values
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch
+
+clang-analyzer-core.uninitialized.Branch
+========================================
+
+The clang-analyzer-core.uninitialized.Branch check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign
+
+clang-analyzer-core.uninitialized.Assign
+========================================
+
+The clang-analyzer-core.uninitialized.Assign check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript
+
+clang-analyzer-core.uninitialized.ArraySubscript
+================================================
+
+The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.VLASize
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize
+
+clang-analyzer-core.VLASize
+===========================
+
+The clang-analyzer-core.VLASize check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult
+
+clang-analyzer-core.UndefinedBinaryOperatorResult
+=================================================
+
+The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape
+
+clang-analyzer-core.StackAddressEscape
+======================================
+
+The clang-analyzer-core.StackAddressEscape check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NullDereference
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference
+
+clang-analyzer-core.NullDereference
+===================================
+
+The clang-analyzer-core.NullDereference check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker
+
+clang-analyzer-core.NonNullParamChecker
+=======================================
+
+The clang-analyzer-core.NonNullParamChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation
+
+clang-analyzer-core.DynamicTypePropagation
+==========================================
+
+Generate dynamic type information
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.DivideZero
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero
+
+clang-analyzer-core.DivideZero
+==============================
+
+The clang-analyzer-core.DivideZero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
+for more information.
Index: clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
===================================================================
--- /dev/null
+++ clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.CallAndMessage
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage
+
+clang-analyzer-core.CallAndMessage
+==================================
+
+The clang-analyzer-core.CallAndMessage check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
+for more information.
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to