[clang-tools-extra] d9cd7b0 - [clang-tidy][NFC] Update documentation for Clang Static Analyzer aliases

Piotr Zegar via cfe-commits cfe-commits at lists.llvm.org
Fri Aug 11 03:37:56 PDT 2023


Author: Piotr Zegar
Date: 2023-08-11T10:36:46Z
New Revision: d9cd7b0e5f347fb316c6efa075d009a003c8fc54

URL: https://github.com/llvm/llvm-project/commit/d9cd7b0e5f347fb316c6efa075d009a003c8fc54
DIFF: https://github.com/llvm/llvm-project/commit/d9cd7b0e5f347fb316c6efa075d009a003c8fc54.diff

LOG: [clang-tidy][NFC] Update documentation for Clang Static Analyzer aliases

Update documentation by using gen-static-analyzer-docs.py.
All  Clang Static Analyzer checks are now listed as aliases.
Check without documentation wont have a link.

Fixes: #41439

Added: 
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst

Modified: 
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
    clang-tools-extra/docs/clang-tidy/checks/list.rst

Removed: 
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst


################################################################################
diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
index 69d1e6e5a5d4a3..cb8a21dc688c7d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
@@ -5,6 +5,10 @@
 clang-analyzer-core.CallAndMessage
 ==================================
 
+Check for logical errors for function calls and Objective-C message expressions
+(e.g., uninitialized arguments, null function pointers).
+
 The clang-analyzer-core.CallAndMessage check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
index f3c652f88b6f8b..2128501702515e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.DivideZero
 ==============================
 
+Check for division by zero.
+
 The clang-analyzer-core.DivideZero check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst
deleted file mode 100644
index e4f8eeaaab9d0d..00000000000000
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst
+++ /dev/null
@@ -1,6 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation
-
-clang-analyzer-core.DynamicTypePropagation
-==========================================
-
-Generate dynamic type information

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
index 3188c29e5c2857..c103b99da3eba7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
@@ -5,6 +5,10 @@
 clang-analyzer-core.NonNullParamChecker
 =======================================
 
+Check for null pointers passed as arguments to a function whose arguments are
+references or marked with the 'nonnull' attribute.
+
 The clang-analyzer-core.NonNullParamChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
index f771c9e2803694..c225fa5ee95269 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.NullDereference
 ===================================
 
+Check for dereferences of null pointers.
+
 The clang-analyzer-core.NullDereference check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
index a3fb1111556b22..1efe0a4b26b2eb 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.StackAddressEscape
 ======================================
 
+Check that addresses to stack memory do not escape the function.
+
 The clang-analyzer-core.StackAddressEscape check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
index 1e36f6bbab233c..29f9d695b5f838 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.UndefinedBinaryOperatorResult
 =================================================
 
+Check for undefined results of binary operators.
+
 The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
index 80e6ba5f33572d..600392b5647328 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.VLASize
 ===========================
 
+Check for declarations of VLA of undefined or zero size.
+
 The clang-analyzer-core.VLASize check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
index 5da6a33c3605f3..ebb4c74249ca9a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.uninitialized.ArraySubscript
 ================================================
 
+Check for uninitialized values used as array subscripts.
+
 The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
index 8cc982b6fee3c0..eb53d0ecbd29bc 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.uninitialized.Assign
 ========================================
 
+Check for assigning uninitialized values.
+
 The clang-analyzer-core.uninitialized.Assign check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
index e0fcd7bcc76a94..330d8507e66a9a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.uninitialized.Branch
 ========================================
 
+Check for uninitialized values used as branch conditions.
+
 The clang-analyzer-core.uninitialized.Branch check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
index 396ce2656cbc85..ffe7a940096a75 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable
 
 clang-analyzer-core.uninitialized.CapturedBlockVariable
 =======================================================
 
-Check for blocks that capture uninitialized values
+Check for blocks that capture uninitialized values.
+
+The clang-analyzer-core.uninitialized.CapturedBlockVariable check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
new file mode 100644
index 00000000000000..79a5c0abebf8f6
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.NewArraySize
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize
+
+clang-analyzer-core.uninitialized.NewArraySize
+==============================================
+
+Check if the size of the array in a new[] expression is undefined.
+
+The clang-analyzer-core.uninitialized.NewArraySize check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
index 057567429d25a5..4039cd0f9a112d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
@@ -5,6 +5,9 @@
 clang-analyzer-core.uninitialized.UndefReturn
 =============================================
 
+Check for uninitialized values being returned to the caller.
+
 The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
index 660284b61de676..bc7d8a7d27660a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer
 
 clang-analyzer-cplusplus.InnerPointer
 =====================================
 
-Check for inner pointers of C++ containers used after re/deallocation
+Check for inner pointers of C++ containers used after re/deallocation.
+
+The clang-analyzer-cplusplus.InnerPointer check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
index b0d663d558b3a9..e723f21f6bc605 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
@@ -1,10 +1,9 @@
 .. title:: clang-tidy - clang-analyzer-cplusplus.Move
-.. meta::
-   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move
 
 clang-analyzer-cplusplus.Move
 =============================
 
-The clang-analyzer-cplusplus.Move check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_
-for more information.
+Find use-after-move bugs in C++.
+
+The clang-analyzer-cplusplus.Move check is an alias of
+Clang Static Analyzer cplusplus.Move.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
index 57964a8c93925d..620f1e88da1819 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
@@ -5,6 +5,10 @@
 clang-analyzer-cplusplus.NewDelete
 ==================================
 
+Check for double-free and use-after-free problems. Traces memory managed by
+new/delete.
+
 The clang-analyzer-cplusplus.NewDelete check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
index 4601a460df1686..1f85373511d376 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
@@ -5,6 +5,9 @@
 clang-analyzer-cplusplus.NewDeleteLeaks
 =======================================
 
+Check for memory leaks. Traces memory managed by new/delete.
+
 The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
new file mode 100644
index 00000000000000..7f75e2d5315dae
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.PlacementNew
+
+clang-analyzer-cplusplus.PlacementNew
+=====================================
+
+Check if default placement new is provided with pointers to sufficient storage
+capacity.
+
+The clang-analyzer-cplusplus.PlacementNew check is an alias of
+Clang Static Analyzer cplusplus.PlacementNew.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
new file mode 100644
index 00000000000000..9fab628b80d443
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.PureVirtualCall
+
+clang-analyzer-cplusplus.PureVirtualCall
+========================================
+
+Check pure virtual function calls during construction/destruction.
+
+The clang-analyzer-cplusplus.PureVirtualCall check is an alias of
+Clang Static Analyzer cplusplus.PureVirtualCall.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
new file mode 100644
index 00000000000000..e3d4a511a61a76
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.StringChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker
+
+clang-analyzer-cplusplus.StringChecker
+======================================
+
+Checks C++ std::string bugs.
+
+The clang-analyzer-cplusplus.StringChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
index 0bb41212f4d209..b421e2cbd3c69d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
@@ -5,6 +5,9 @@
 clang-analyzer-deadcode.DeadStores
 ==================================
 
+Check for values stored to variables that are never read afterwards.
+
 The clang-analyzer-deadcode.DeadStores check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
new file mode 100644
index 00000000000000..5f2a3aaae1ed11
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-fuchsia.HandleChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker
+
+clang-analyzer-fuchsia.HandleChecker
+====================================
+
+A Checker that detect leaks related to Fuchsia handles.
+
+The clang-analyzer-fuchsia.HandleChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
index 7ebbb9b7d65885..85e0dc2f116c5e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
@@ -5,6 +5,9 @@
 clang-analyzer-nullability.NullPassedToNonnull
 ==============================================
 
+Warns when a null pointer is passed to a pointer which has a _Nonnull type.
+
 The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
index e585c7ba1826b3..132c8311bc1d06 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
@@ -5,6 +5,10 @@
 clang-analyzer-nullability.NullReturnedFromNonnull
 ==================================================
 
+Warns when a null pointer is returned from a function that has _Nonnull return
+type.
+
 The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
index 9734863366126e..027487b1533eaa 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
@@ -5,6 +5,9 @@
 clang-analyzer-nullability.NullableDereferenced
 ===============================================
 
+Warns when a nullable pointer is dereferenced.
+
 The clang-analyzer-nullability.NullableDereferenced check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
index 1c9b590e67d8fe..f1261e680595a1 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
@@ -5,6 +5,9 @@
 clang-analyzer-nullability.NullablePassedToNonnull
 ==================================================
 
+Warns when a nullable pointer is passed to a pointer which has a _Nonnull type.
+
 The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
index c30b530a0dec1b..dc6f7a1525b80b 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
@@ -1,6 +1,14 @@
 .. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull
 
 clang-analyzer-nullability.NullableReturnedFromNonnull
 ======================================================
 
-Warns when a nullable pointer is returned from a function that has _Nonnull return type.
+Warns when a nullable pointer is returned from a function that has _Nonnull
+return type.
+
+The clang-analyzer-nullability.NullableReturnedFromNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
index 3380dc32777359..5cf352a23cadcf 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
@@ -5,6 +5,9 @@
 clang-analyzer-optin.cplusplus.UninitializedObject
 ==================================================
 
+Reports uninitialized fields after object construction.
+
 The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
index 52cf5ff97db81c..5ec5faaec71ee8 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
@@ -5,6 +5,9 @@
 clang-analyzer-optin.cplusplus.VirtualCall
 ==========================================
 
+Check virtual function calls during construction/destruction.
+
 The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
index 211070c5a6e0ef..45b1a92fc3378a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
@@ -5,6 +5,9 @@
 clang-analyzer-optin.mpi.MPI-Checker
 ====================================
 
+Checks MPI code.
+
 The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
index 65e9efba1b2eb9..c2fef59f568943 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
@@ -3,4 +3,7 @@
 clang-analyzer-optin.osx.OSObjectCStyleCast
 ===========================================
 
-Checker for C-style casts of OSObjects
+Checker for C-style casts of OSObjects.
+
+The clang-analyzer-optin.osx.OSObjectCStyleCast check is an alias of
+Clang Static Analyzer optin.osx.OSObjectCStyleCast.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
index 8a8395c8c8ce9d..669f37c365c8e2 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
@@ -5,6 +5,9 @@
 clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
 =============================================================================
 
+Check that NSLocalizedString macros include a comment for context.
+
 The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
index dc214719ba73b1..3ab5fd847d407d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
@@ -5,6 +5,10 @@
 clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
 =======================================================================
 
+Warns about uses of non-localized NSStrings passed to UI methods expecting
+localized NSStrings.
+
 The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
index 2684f750091a01..6b1af473c572b6 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern
 
 clang-analyzer-optin.performance.GCDAntipattern
 ===============================================
 
-Check for performance anti-patterns when using Grand Central Dispatch
+Check for performance anti-patterns when using Grand Central Dispatch.
+
+The clang-analyzer-optin.performance.GCDAntipattern check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
index fc2d7300de76a7..40e5e654192858 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-optin.performance.Padding
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding
 
 clang-analyzer-optin.performance.Padding
 ========================================
 
 Check for excessively padded structs.
+
+The clang-analyzer-optin.performance.Padding check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
index 07545becaef8e5..43dafc841777d3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi
 
 clang-analyzer-optin.portability.UnixAPI
 ========================================
 
-Finds implementation-defined behavior in UNIX/Posix functions
+Finds implementation-defined behavior in UNIX/Posix functions.
+
+The clang-analyzer-optin.portability.UnixAPI check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
index b3aae0c8bb504c..46f0821880d505 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.API
 ======================
 
+Check for proper uses of various Apple APIs.
+
 The clang-analyzer-osx.API check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
index 50fb5a8db6b0a1..a7b8a1cfb14cdc 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
@@ -3,4 +3,7 @@
 clang-analyzer-osx.MIG
 ======================
 
-Find violations of the Mach Interface Generator calling convention
+Find violations of the Mach Interface Generator calling convention.
+
+The clang-analyzer-osx.MIG check is an alias of
+Clang Static Analyzer osx.MIG.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
index 7471ad17d7d7d8..cc45624987db87 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion
 
 clang-analyzer-osx.NumberObjectConversion
 =========================================
 
-Check for erroneous conversions of objects representing numbers into numbers
+Check for erroneous conversions of objects representing numbers into numbers.
+
+The clang-analyzer-osx.NumberObjectConversion check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
index 8eceb3f3b4dd1c..c32982d407c286 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
@@ -3,4 +3,7 @@
 clang-analyzer-osx.OSObjectRetainCount
 ======================================
 
-Check for leaks and improper reference count management for OSObject
+Check for leaks and improper reference count management for OSObject.
+
+The clang-analyzer-osx.OSObjectRetainCount check is an alias of
+Clang Static Analyzer osx.OSObjectRetainCount.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
index 0b87cd02078251..8df48b78ca2bc3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.ObjCProperty
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty
 
 clang-analyzer-osx.ObjCProperty
 ===============================
 
-Check for proper uses of Objective-C properties
+Check for proper uses of Objective-C properties.
+
+The clang-analyzer-osx.ObjCProperty check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
index 130fae59a677b9..4d6f6a1684111a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.SecKeychainAPI
 =================================
 
+Check for proper uses of Secure Keychain APIs.
+
 The clang-analyzer-osx.SecKeychainAPI check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
index 56a98bfb9a2e1d..60e4022ff9915c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.AtSync
 ===============================
 
+Check for nil pointers used as mutexes for @synchronized.
+
 The clang-analyzer-osx.cocoa.AtSync check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
index 01fbe4f84368f9..1cca7bb9238e68 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
@@ -1,6 +1,14 @@
 .. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite
 
 clang-analyzer-osx.cocoa.AutoreleaseWrite
 =========================================
 
-Warn about potentially crashing writes to autoreleasing objects from 
diff erent autoreleasing pools in Objective-C
+Warn about potentially crashing writes to autoreleasing objects from 
diff erent
+autoreleasing pools in Objective-C.
+
+The clang-analyzer-osx.cocoa.AutoreleaseWrite check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
index d6c0bae27ead74..3cf78ab874f3b7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.ClassRelease
 =====================================
 
+Check for sending 'retain', 'release', or 'autorelease' directly to a Class.
+
 The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
index e02bf63b9a33b0..acaf11442b0e24 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.Dealloc
 ================================
 
+Warn about Objective-C classes that lack a correct implementation of -dealloc.
+
 The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
index 6aa64e209746e6..17e13f582c0f65 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.IncompatibleMethodTypes
 ================================================
 
+Warn about Objective-C method signatures with type incompatibilities.
+
 The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
index 622f80ff871061..2ee092bbf8f00d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops
 
 clang-analyzer-osx.cocoa.Loops
 ==============================
 
-Improved modeling of loops using Cocoa collection types
+Improved modeling of loops using Cocoa collection types.
+
+The clang-analyzer-osx.cocoa.Loops check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
index a8e4290278a9f8..ee57d1d86f100e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall
 
 clang-analyzer-osx.cocoa.MissingSuperCall
 =========================================
 
-Warn about Objective-C methods that lack a necessary call to super
+Warn about Objective-C methods that lack a necessary call to super.
+
+The clang-analyzer-osx.cocoa.MissingSuperCall check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
index 9446850c458819..0c10069041604e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.NSAutoreleasePool
 ==========================================
 
+Warn for suboptimal uses of NSAutoreleasePool in Objective-C GC mode.
+
 The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
index 23416fcf8688db..35fddde39d8db5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.NSError
 ================================
 
+Check usage of NSError** parameters.
+
 The clang-analyzer-osx.cocoa.NSError check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
index 4b521041976cfe..0e189a1d9d1d84 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.NilArg
 ===============================
 
+Check for prohibited nil arguments to ObjC method calls.
+
 The clang-analyzer-osx.cocoa.NilArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
index a6da9b0cca4919..aafdd3dc27f5c5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue
 
 clang-analyzer-osx.cocoa.NonNilReturnValue
 ==========================================
 
-Model the APIs that are guaranteed to return a non-nil value
+Model the APIs that are guaranteed to return a non-nil value.
+
+The clang-analyzer-osx.cocoa.NonNilReturnValue check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
index 10e21e30a5ea37..d27a492cb224ef 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.ObjCGenerics
 =====================================
 
+Check for type errors when using Objective-C generics.
+
 The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
index 92a72df785fadf..d0e71e8a823bfe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.RetainCount
 ====================================
 
+Check for leaks and improper reference count management.
+
 The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
index 67a0519b9b777c..3b2e433964e776 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
@@ -1,6 +1,13 @@
 .. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak
 
 clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
 ===============================================
 
-Check for leaked memory in autorelease pools that will never be drained
+Check for leaked memory in autorelease pools that will never be drained.
+
+The clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
index 96e559e103a357..a5484f2ad8c7f7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.SelfInit
 =================================
 
+Check that 'self' is properly initialized inside an initializer method.
+
 The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
index 598f12686b42c9..ab13b6ab3289b4 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.SuperDealloc
 =====================================
 
+Warn about improper use of '[super dealloc]' in Objective-C.
+
 The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
index 5a12aa4802c96b..cb3ffd1d870eb6 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.cocoa.UnusedIvars
 ====================================
 
+Warn about private ivars that are never used.
+
 The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
index 292e7e3fd1c08c..fd9405451a427b 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
@@ -5,6 +5,10 @@
 clang-analyzer-osx.cocoa.VariadicMethodTypes
 ============================================
 
+Check for passing non-Objective-C types to variadic collection initialization
+methods that expect only Objective-C types.
+
 The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
index 7dab4bdabda314..200ec6232bcc2c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.coreFoundation.CFError
 =========================================
 
+Check usage of CFErrorRef* parameters.
+
 The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
index 86e117a72f8b32..83a0541e0e32c7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.coreFoundation.CFNumber
 ==========================================
 
+Check for proper uses of CFNumber APIs.
+
 The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
index 0865611b5df61d..766993900d364d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.coreFoundation.CFRetainRelease
 =================================================
 
+Check for null arguments to CFRetain/CFRelease/CFMakeCollectable.
+
 The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
index ca1eb756eace63..e8fb9ea806f68a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
@@ -5,6 +5,9 @@
 clang-analyzer-osx.coreFoundation.containers.OutOfBounds
 ========================================================
 
+Checks for index out-of-bounds when using 'CFArray' API.
+
 The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
index fb1fa15f96267d..57370934eae6fe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
@@ -5,6 +5,10 @@
 clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
 ===============================================================
 
+Warns if 'CFArray', 'CFDictionary', 'CFSet' are created with non-pointer-size
+values.
+
 The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
index b378a34b9f7da4..a39f4ae66f0325 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
@@ -5,6 +5,10 @@
 clang-analyzer-security.FloatLoopCounter
 ========================================
 
+Warn on using a floating point value as a loop counter (CERT: FLP30-C,
+FLP30-CPP).
+
 The clang-analyzer-security.FloatLoopCounter check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
index b4e611b2653188..c7c035ecec6aed 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
 ====================================================================
 
+Warn on uses of unsecure or deprecated buffer manipulating functions.
+
 The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
index 9f050da3509e19..52b03170e08428 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.UncheckedReturn
 ===================================================
 
+Warn on uses of functions whose return values must be always checked.
+
 The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
index a135ee7f205325..26412c0c2cdc2f 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.bcmp
 ========================================
 
+Warn on uses of the 'bcmp' function.
+
 The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
index fc8d2349a09e8d..73894233661d88 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.bcopy
 =========================================
 
+Warn on uses of the 'bcopy' function.
+
 The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
index c74c2d186cb737..5626015234c5b3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.bzero
 =========================================
 
+Warn on uses of the 'bzero' function.
+
 The clang-analyzer-security.insecureAPI.bzero check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
new file mode 100644
index 00000000000000..4405f721a66ddd
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.decodeValueOfObjCType
+
+clang-analyzer-security.insecureAPI.decodeValueOfObjCType
+=========================================================
+
+Warn on uses of the '-decodeValueOfObjCType:at:' method.
+
+The clang-analyzer-security.insecureAPI.decodeValueOfObjCType check is an alias of
+Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
index 4f2b79666f6813..0bac901c623ade 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.getpw
 =========================================
 
+Warn on uses of the 'getpw' function.
+
 The clang-analyzer-security.insecureAPI.getpw check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
index fc62fe6245e894..7f9cf4ff32dcb5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.gets
 ========================================
 
+Warn on uses of the 'gets' function.
+
 The clang-analyzer-security.insecureAPI.gets check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
index 6c0d8110ac2874..54349760ed5842 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.mkstemp
 ===========================================
 
+Warn when 'mkstemp' is passed fewer than 6 X's in the format string.
+
 The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
index 153904f08797cc..5d04ffecbd1df9 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.mktemp
 ==========================================
 
+Warn on uses of the 'mktemp' function.
+
 The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
index 67c4c87c173978..634898bf40eb0e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.rand
 ========================================
 
+Warn on uses of the 'rand', 'random', and related functions.
+
 The clang-analyzer-security.insecureAPI.rand check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
index 1fcbe160e6b8e4..608bb5841a592a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.strcpy
 ==========================================
 
+Warn on uses of the 'strcpy' and 'strcat' functions.
+
 The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
index c20dea356add0b..d65307855824d5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
@@ -5,6 +5,9 @@
 clang-analyzer-security.insecureAPI.vfork
 =========================================
 
+Warn on uses of the 'vfork' function.
+
 The clang-analyzer-security.insecureAPI.vfork check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
index a3931b2b027eec..02438ad635f62e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
@@ -5,6 +5,9 @@
 clang-analyzer-unix.API
 =======================
 
+Check calls to various UNIX/Posix functions.
+
 The clang-analyzer-unix.API check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
index f772674ed5481f..949b9164b6bfd2 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
@@ -5,6 +5,10 @@
 clang-analyzer-unix.Malloc
 ==========================
 
+Check for memory leaks, double free, and use-after-free problems. Traces memory
+managed by malloc()/free().
+
 The clang-analyzer-unix.Malloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
index 3cc066b219c308..c33f6d3f6728fb 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
@@ -5,6 +5,9 @@
 clang-analyzer-unix.MallocSizeof
 ================================
 
+Check for dubious malloc arguments involving sizeof.
+
 The clang-analyzer-unix.MallocSizeof check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
index 01fc56933b20d7..c14e0e2873b2b0 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
@@ -5,6 +5,9 @@
 clang-analyzer-unix.MismatchedDeallocator
 =========================================
 
+Check for mismatched deallocators.
+
 The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
index d3f00afe5099ea..f4bc2a32cae407 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
@@ -5,6 +5,9 @@
 clang-analyzer-unix.Vfork
 =========================
 
+Check for proper usage of vfork.
+
 The clang-analyzer-unix.Vfork check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
index d861faa3ff0858..c388c15f5f0849 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
@@ -5,6 +5,10 @@
 clang-analyzer-unix.cstring.BadSizeArg
 ======================================
 
+Check the size argument passed into C string functions for common erroneous
+patterns.
+
 The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
index 17bb6af8a5fa4f..98a150dfe7cffe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
@@ -5,6 +5,9 @@
 clang-analyzer-unix.cstring.NullArg
 ===================================
 
+Check for null pointers being passed as arguments to C string functions.
+
 The clang-analyzer-unix.cstring.NullArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
 for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
index d693705d0c6efe..d0c82abd819017 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.CopyToSelf
 ================================
 
 Check for va_lists which are copied onto itself.
+
+The clang-analyzer-valist.CopyToSelf check is an alias of
+Clang Static Analyzer valist.CopyToSelf.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
index da3f5dbb1641c7..98b5dd023254ae 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.Uninitialized
 ===================================
 
 Check for usages of uninitialized (or already released) va_lists.
+
+The clang-analyzer-valist.Uninitialized check is an alias of
+Clang Static Analyzer valist.Uninitialized.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
index d73688b0e1c503..85e21c57210634 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.Unterminated
 ==================================
 
 Check for va_lists which are not released by a va_end call.
+
+The clang-analyzer-valist.Unterminated check is an alias of
+Clang Static Analyzer valist.Unterminated.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
new file mode 100644
index 00000000000000..36003280718c78
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.NoUncountedMemberChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker
+
+clang-analyzer-webkit.NoUncountedMemberChecker
+==============================================
+
+Check for no uncounted member variables.
+
+The clang-analyzer-webkit.NoUncountedMemberChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
new file mode 100644
index 00000000000000..b88df7d86e6743
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.RefCntblBaseVirtualDtor
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor
+
+clang-analyzer-webkit.RefCntblBaseVirtualDtor
+=============================================
+
+Check for any ref-countable base class having virtual destructor.
+
+The clang-analyzer-webkit.RefCntblBaseVirtualDtor check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst
new file mode 100644
index 00000000000000..1022b434c8d4ef
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.UncountedLambdaCapturesChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker
+
+clang-analyzer-webkit.UncountedLambdaCapturesChecker
+====================================================
+
+Check uncounted lambda captures.
+
+The clang-analyzer-webkit.UncountedLambdaCapturesChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 9de7989c264fb5..f4c835247ab9ed 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -434,31 +434,52 @@ Clang-Tidy Checks
    `clang-analyzer-core.uninitialized.ArraySubscript <clang-analyzer/core.uninitialized.ArraySubscript.html>`_, `Clang Static Analyzer core.uninitialized.ArraySubscript <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_,
    `clang-analyzer-core.uninitialized.Assign <clang-analyzer/core.uninitialized.Assign.html>`_, `Clang Static Analyzer core.uninitialized.Assign <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_,
    `clang-analyzer-core.uninitialized.Branch <clang-analyzer/core.uninitialized.Branch.html>`_, `Clang Static Analyzer core.uninitialized.Branch <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_,
+   `clang-analyzer-core.uninitialized.CapturedBlockVariable <clang-analyzer/core.uninitialized.CapturedBlockVariable.html>`_, `Clang Static Analyzer core.uninitialized.CapturedBlockVariable <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable>`_,
+   `clang-analyzer-core.uninitialized.NewArraySize <clang-analyzer/core.uninitialized.NewArraySize.html>`_, `Clang Static Analyzer core.uninitialized.NewArraySize <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize>`_,
    `clang-analyzer-core.uninitialized.UndefReturn <clang-analyzer/core.uninitialized.UndefReturn.html>`_, `Clang Static Analyzer core.uninitialized.UndefReturn <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_,
-   `clang-analyzer-cplusplus.Move <clang-analyzer/cplusplus.Move.html>`_, `Clang Static Analyzer cplusplus.Move <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_,
+   `clang-analyzer-cplusplus.InnerPointer <clang-analyzer/cplusplus.InnerPointer.html>`_, `Clang Static Analyzer cplusplus.InnerPointer <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer>`_,
+   `clang-analyzer-cplusplus.Move <clang-analyzer/cplusplus.Move.html>`_, Clang Static Analyzer cplusplus.Move,
    `clang-analyzer-cplusplus.NewDelete <clang-analyzer/cplusplus.NewDelete.html>`_, `Clang Static Analyzer cplusplus.NewDelete <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_,
    `clang-analyzer-cplusplus.NewDeleteLeaks <clang-analyzer/cplusplus.NewDeleteLeaks.html>`_, `Clang Static Analyzer cplusplus.NewDeleteLeaks <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_,
+   `clang-analyzer-cplusplus.PlacementNew <clang-analyzer/cplusplus.PlacementNew.html>`_, Clang Static Analyzer cplusplus.PlacementNew,
+   `clang-analyzer-cplusplus.PureVirtualCall <clang-analyzer/cplusplus.PureVirtualCall.html>`_, Clang Static Analyzer cplusplus.PureVirtualCall,
+   `clang-analyzer-cplusplus.StringChecker <clang-analyzer/cplusplus.StringChecker.html>`_, `Clang Static Analyzer cplusplus.StringChecker <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_,
    `clang-analyzer-deadcode.DeadStores <clang-analyzer/deadcode.DeadStores.html>`_, `Clang Static Analyzer deadcode.DeadStores <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_,
+   `clang-analyzer-fuchsia.HandleChecker <clang-analyzer/fuchsia.HandleChecker.html>`_, `Clang Static Analyzer fuchsia.HandleChecker <https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker>`_,
    `clang-analyzer-nullability.NullPassedToNonnull <clang-analyzer/nullability.NullPassedToNonnull.html>`_, `Clang Static Analyzer nullability.NullPassedToNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_,
    `clang-analyzer-nullability.NullReturnedFromNonnull <clang-analyzer/nullability.NullReturnedFromNonnull.html>`_, `Clang Static Analyzer nullability.NullReturnedFromNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_,
    `clang-analyzer-nullability.NullableDereferenced <clang-analyzer/nullability.NullableDereferenced.html>`_, `Clang Static Analyzer nullability.NullableDereferenced <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_,
    `clang-analyzer-nullability.NullablePassedToNonnull <clang-analyzer/nullability.NullablePassedToNonnull.html>`_, `Clang Static Analyzer nullability.NullablePassedToNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_,
+   `clang-analyzer-nullability.NullableReturnedFromNonnull <clang-analyzer/nullability.NullableReturnedFromNonnull.html>`_, `Clang Static Analyzer nullability.NullableReturnedFromNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull>`_,
    `clang-analyzer-optin.cplusplus.UninitializedObject <clang-analyzer/optin.cplusplus.UninitializedObject.html>`_, `Clang Static Analyzer optin.cplusplus.UninitializedObject <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_,
    `clang-analyzer-optin.cplusplus.VirtualCall <clang-analyzer/optin.cplusplus.VirtualCall.html>`_, `Clang Static Analyzer optin.cplusplus.VirtualCall <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_,
    `clang-analyzer-optin.mpi.MPI-Checker <clang-analyzer/optin.mpi.MPI-Checker.html>`_, `Clang Static Analyzer optin.mpi.MPI-Checker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_,
+   `clang-analyzer-optin.osx.OSObjectCStyleCast <clang-analyzer/optin.osx.OSObjectCStyleCast.html>`_, Clang Static Analyzer optin.osx.OSObjectCStyleCast,
    `clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker <clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.html>`_, `Clang Static Analyzer optin.osx.cocoa.localizability.EmptyLocalizationContextChecker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_,
    `clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker <clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.html>`_, `Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_,
+   `clang-analyzer-optin.performance.GCDAntipattern <clang-analyzer/optin.performance.GCDAntipattern.html>`_, `Clang Static Analyzer optin.performance.GCDAntipattern <https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern>`_,
+   `clang-analyzer-optin.performance.Padding <clang-analyzer/optin.performance.Padding.html>`_, `Clang Static Analyzer optin.performance.Padding <https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding>`_,
+   `clang-analyzer-optin.portability.UnixAPI <clang-analyzer/optin.portability.UnixAPI.html>`_, `Clang Static Analyzer optin.portability.UnixAPI <https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi>`_,
    `clang-analyzer-osx.API <clang-analyzer/osx.API.html>`_, `Clang Static Analyzer osx.API <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_,
+   `clang-analyzer-osx.MIG <clang-analyzer/osx.MIG.html>`_, Clang Static Analyzer osx.MIG,
+   `clang-analyzer-osx.NumberObjectConversion <clang-analyzer/osx.NumberObjectConversion.html>`_, `Clang Static Analyzer osx.NumberObjectConversion <https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion>`_,
+   `clang-analyzer-osx.OSObjectRetainCount <clang-analyzer/osx.OSObjectRetainCount.html>`_, Clang Static Analyzer osx.OSObjectRetainCount,
+   `clang-analyzer-osx.ObjCProperty <clang-analyzer/osx.ObjCProperty.html>`_, `Clang Static Analyzer osx.ObjCProperty <https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty>`_,
    `clang-analyzer-osx.SecKeychainAPI <clang-analyzer/osx.SecKeychainAPI.html>`_, `Clang Static Analyzer osx.SecKeychainAPI <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_,
    `clang-analyzer-osx.cocoa.AtSync <clang-analyzer/osx.cocoa.AtSync.html>`_, `Clang Static Analyzer osx.cocoa.AtSync <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_,
+   `clang-analyzer-osx.cocoa.AutoreleaseWrite <clang-analyzer/osx.cocoa.AutoreleaseWrite.html>`_, `Clang Static Analyzer osx.cocoa.AutoreleaseWrite <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite>`_,
    `clang-analyzer-osx.cocoa.ClassRelease <clang-analyzer/osx.cocoa.ClassRelease.html>`_, `Clang Static Analyzer osx.cocoa.ClassRelease <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_,
    `clang-analyzer-osx.cocoa.Dealloc <clang-analyzer/osx.cocoa.Dealloc.html>`_, `Clang Static Analyzer osx.cocoa.Dealloc <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_,
    `clang-analyzer-osx.cocoa.IncompatibleMethodTypes <clang-analyzer/osx.cocoa.IncompatibleMethodTypes.html>`_, `Clang Static Analyzer osx.cocoa.IncompatibleMethodTypes <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_,
+   `clang-analyzer-osx.cocoa.Loops <clang-analyzer/osx.cocoa.Loops.html>`_, `Clang Static Analyzer osx.cocoa.Loops <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops>`_,
+   `clang-analyzer-osx.cocoa.MissingSuperCall <clang-analyzer/osx.cocoa.MissingSuperCall.html>`_, `Clang Static Analyzer osx.cocoa.MissingSuperCall <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall>`_,
    `clang-analyzer-osx.cocoa.NSAutoreleasePool <clang-analyzer/osx.cocoa.NSAutoreleasePool.html>`_, `Clang Static Analyzer osx.cocoa.NSAutoreleasePool <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_,
    `clang-analyzer-osx.cocoa.NSError <clang-analyzer/osx.cocoa.NSError.html>`_, `Clang Static Analyzer osx.cocoa.NSError <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_,
    `clang-analyzer-osx.cocoa.NilArg <clang-analyzer/osx.cocoa.NilArg.html>`_, `Clang Static Analyzer osx.cocoa.NilArg <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_,
+   `clang-analyzer-osx.cocoa.NonNilReturnValue <clang-analyzer/osx.cocoa.NonNilReturnValue.html>`_, `Clang Static Analyzer osx.cocoa.NonNilReturnValue <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue>`_,
    `clang-analyzer-osx.cocoa.ObjCGenerics <clang-analyzer/osx.cocoa.ObjCGenerics.html>`_, `Clang Static Analyzer osx.cocoa.ObjCGenerics <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_,
    `clang-analyzer-osx.cocoa.RetainCount <clang-analyzer/osx.cocoa.RetainCount.html>`_, `Clang Static Analyzer osx.cocoa.RetainCount <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_,
+   `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak <clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.html>`_, `Clang Static Analyzer osx.cocoa.RunLoopAutoreleaseLeak <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak>`_,
    `clang-analyzer-osx.cocoa.SelfInit <clang-analyzer/osx.cocoa.SelfInit.html>`_, `Clang Static Analyzer osx.cocoa.SelfInit <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_,
    `clang-analyzer-osx.cocoa.SuperDealloc <clang-analyzer/osx.cocoa.SuperDealloc.html>`_, `Clang Static Analyzer osx.cocoa.SuperDealloc <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_,
    `clang-analyzer-osx.cocoa.UnusedIvars <clang-analyzer/osx.cocoa.UnusedIvars.html>`_, `Clang Static Analyzer osx.cocoa.UnusedIvars <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_,
@@ -474,6 +495,7 @@ Clang-Tidy Checks
    `clang-analyzer-security.insecureAPI.bcmp <clang-analyzer/security.insecureAPI.bcmp.html>`_, `Clang Static Analyzer security.insecureAPI.bcmp <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_,
    `clang-analyzer-security.insecureAPI.bcopy <clang-analyzer/security.insecureAPI.bcopy.html>`_, `Clang Static Analyzer security.insecureAPI.bcopy <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_,
    `clang-analyzer-security.insecureAPI.bzero <clang-analyzer/security.insecureAPI.bzero.html>`_, `Clang Static Analyzer security.insecureAPI.bzero <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_,
+   `clang-analyzer-security.insecureAPI.decodeValueOfObjCType <clang-analyzer/security.insecureAPI.decodeValueOfObjCType.html>`_, Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType,
    `clang-analyzer-security.insecureAPI.getpw <clang-analyzer/security.insecureAPI.getpw.html>`_, `Clang Static Analyzer security.insecureAPI.getpw <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_,
    `clang-analyzer-security.insecureAPI.gets <clang-analyzer/security.insecureAPI.gets.html>`_, `Clang Static Analyzer security.insecureAPI.gets <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_,
    `clang-analyzer-security.insecureAPI.mkstemp <clang-analyzer/security.insecureAPI.mkstemp.html>`_, `Clang Static Analyzer security.insecureAPI.mkstemp <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_,
@@ -488,6 +510,12 @@ Clang-Tidy Checks
    `clang-analyzer-unix.Vfork <clang-analyzer/unix.Vfork.html>`_, `Clang Static Analyzer unix.Vfork <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_,
    `clang-analyzer-unix.cstring.BadSizeArg <clang-analyzer/unix.cstring.BadSizeArg.html>`_, `Clang Static Analyzer unix.cstring.BadSizeArg <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_,
    `clang-analyzer-unix.cstring.NullArg <clang-analyzer/unix.cstring.NullArg.html>`_, `Clang Static Analyzer unix.cstring.NullArg <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_,
+   `clang-analyzer-valist.CopyToSelf <clang-analyzer/valist.CopyToSelf.html>`_, Clang Static Analyzer valist.CopyToSelf,
+   `clang-analyzer-valist.Uninitialized <clang-analyzer/valist.Uninitialized.html>`_, Clang Static Analyzer valist.Uninitialized,
+   `clang-analyzer-valist.Unterminated <clang-analyzer/valist.Unterminated.html>`_, Clang Static Analyzer valist.Unterminated,
+   `clang-analyzer-webkit.NoUncountedMemberChecker <clang-analyzer/webkit.NoUncountedMemberChecker.html>`_, `Clang Static Analyzer webkit.NoUncountedMemberChecker <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker>`_,
+   `clang-analyzer-webkit.RefCntblBaseVirtualDtor <clang-analyzer/webkit.RefCntblBaseVirtualDtor.html>`_, `Clang Static Analyzer webkit.RefCntblBaseVirtualDtor <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor>`_,
+   `clang-analyzer-webkit.UncountedLambdaCapturesChecker <clang-analyzer/webkit.UncountedLambdaCapturesChecker.html>`_, `Clang Static Analyzer webkit.UncountedLambdaCapturesChecker <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker>`_,
    `cppcoreguidelines-avoid-c-arrays <cppcoreguidelines/avoid-c-arrays.html>`_, `modernize-avoid-c-arrays <modernize/avoid-c-arrays.html>`_,
    `cppcoreguidelines-avoid-magic-numbers <cppcoreguidelines/avoid-magic-numbers.html>`_, `readability-magic-numbers <readability/magic-numbers.html>`_,
    `cppcoreguidelines-c-copy-assignment-signature <cppcoreguidelines/c-copy-assignment-signature.html>`_, `misc-unconventional-assign-operator <misc/unconventional-assign-operator.html>`_,


        


More information about the cfe-commits mailing list