[clang-tools-extra] d9cd7b0 - [clang-tidy][NFC] Update documentation for Clang Static Analyzer aliases
Piotr Zegar via cfe-commits
cfe-commits at lists.llvm.org
Fri Aug 11 03:37:56 PDT 2023
Author: Piotr Zegar
Date: 2023-08-11T10:36:46Z
New Revision: d9cd7b0e5f347fb316c6efa075d009a003c8fc54
URL: https://github.com/llvm/llvm-project/commit/d9cd7b0e5f347fb316c6efa075d009a003c8fc54
DIFF: https://github.com/llvm/llvm-project/commit/d9cd7b0e5f347fb316c6efa075d009a003c8fc54.diff
LOG: [clang-tidy][NFC] Update documentation for Clang Static Analyzer aliases
Update documentation by using gen-static-analyzer-docs.py.
All Clang Static Analyzer checks are now listed as aliases.
Check without documentation wont have a link.
Fixes: #41439
Added:
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst
Modified:
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
clang-tools-extra/docs/clang-tidy/checks/list.rst
Removed:
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst
################################################################################
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
index 69d1e6e5a5d4a3..cb8a21dc688c7d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst
@@ -5,6 +5,10 @@
clang-analyzer-core.CallAndMessage
==================================
+Check for logical errors for function calls and Objective-C message expressions
+(e.g., uninitialized arguments, null function pointers).
+
The clang-analyzer-core.CallAndMessage check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
index f3c652f88b6f8b..2128501702515e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.DivideZero
==============================
+Check for division by zero.
+
The clang-analyzer-core.DivideZero check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst
deleted file mode 100644
index e4f8eeaaab9d0d..00000000000000
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DynamicTypePropagation.rst
+++ /dev/null
@@ -1,6 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation
-
-clang-analyzer-core.DynamicTypePropagation
-==========================================
-
-Generate dynamic type information
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
index 3188c29e5c2857..c103b99da3eba7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst
@@ -5,6 +5,10 @@
clang-analyzer-core.NonNullParamChecker
=======================================
+Check for null pointers passed as arguments to a function whose arguments are
+references or marked with the 'nonnull' attribute.
+
The clang-analyzer-core.NonNullParamChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
index f771c9e2803694..c225fa5ee95269 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.NullDereference
===================================
+Check for dereferences of null pointers.
+
The clang-analyzer-core.NullDereference check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
index a3fb1111556b22..1efe0a4b26b2eb 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.StackAddressEscape
======================================
+Check that addresses to stack memory do not escape the function.
+
The clang-analyzer-core.StackAddressEscape check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
index 1e36f6bbab233c..29f9d695b5f838 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.UndefinedBinaryOperatorResult
=================================================
+Check for undefined results of binary operators.
+
The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
index 80e6ba5f33572d..600392b5647328 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.VLASize
===========================
+Check for declarations of VLA of undefined or zero size.
+
The clang-analyzer-core.VLASize check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
index 5da6a33c3605f3..ebb4c74249ca9a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.uninitialized.ArraySubscript
================================================
+Check for uninitialized values used as array subscripts.
+
The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
index 8cc982b6fee3c0..eb53d0ecbd29bc 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.uninitialized.Assign
========================================
+Check for assigning uninitialized values.
+
The clang-analyzer-core.uninitialized.Assign check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
index e0fcd7bcc76a94..330d8507e66a9a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.uninitialized.Branch
========================================
+Check for uninitialized values used as branch conditions.
+
The clang-analyzer-core.uninitialized.Branch check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
index 396ce2656cbc85..ffe7a940096a75 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable
clang-analyzer-core.uninitialized.CapturedBlockVariable
=======================================================
-Check for blocks that capture uninitialized values
+Check for blocks that capture uninitialized values.
+
+The clang-analyzer-core.uninitialized.CapturedBlockVariable check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
new file mode 100644
index 00000000000000..79a5c0abebf8f6
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.NewArraySize
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize
+
+clang-analyzer-core.uninitialized.NewArraySize
+==============================================
+
+Check if the size of the array in a new[] expression is undefined.
+
+The clang-analyzer-core.uninitialized.NewArraySize check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
index 057567429d25a5..4039cd0f9a112d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst
@@ -5,6 +5,9 @@
clang-analyzer-core.uninitialized.UndefReturn
=============================================
+Check for uninitialized values being returned to the caller.
+
The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
index 660284b61de676..bc7d8a7d27660a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer
clang-analyzer-cplusplus.InnerPointer
=====================================
-Check for inner pointers of C++ containers used after re/deallocation
+Check for inner pointers of C++ containers used after re/deallocation.
+
+The clang-analyzer-cplusplus.InnerPointer check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
index b0d663d558b3a9..e723f21f6bc605 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.Move.rst
@@ -1,10 +1,9 @@
.. title:: clang-tidy - clang-analyzer-cplusplus.Move
-.. meta::
- :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move
clang-analyzer-cplusplus.Move
=============================
-The clang-analyzer-cplusplus.Move check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_
-for more information.
+Find use-after-move bugs in C++.
+
+The clang-analyzer-cplusplus.Move check is an alias of
+Clang Static Analyzer cplusplus.Move.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
index 57964a8c93925d..620f1e88da1819 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst
@@ -5,6 +5,10 @@
clang-analyzer-cplusplus.NewDelete
==================================
+Check for double-free and use-after-free problems. Traces memory managed by
+new/delete.
+
The clang-analyzer-cplusplus.NewDelete check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
index 4601a460df1686..1f85373511d376 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst
@@ -5,6 +5,9 @@
clang-analyzer-cplusplus.NewDeleteLeaks
=======================================
+Check for memory leaks. Traces memory managed by new/delete.
+
The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
new file mode 100644
index 00000000000000..7f75e2d5315dae
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.PlacementNew
+
+clang-analyzer-cplusplus.PlacementNew
+=====================================
+
+Check if default placement new is provided with pointers to sufficient storage
+capacity.
+
+The clang-analyzer-cplusplus.PlacementNew check is an alias of
+Clang Static Analyzer cplusplus.PlacementNew.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
new file mode 100644
index 00000000000000..9fab628b80d443
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.PureVirtualCall
+
+clang-analyzer-cplusplus.PureVirtualCall
+========================================
+
+Check pure virtual function calls during construction/destruction.
+
+The clang-analyzer-cplusplus.PureVirtualCall check is an alias of
+Clang Static Analyzer cplusplus.PureVirtualCall.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
new file mode 100644
index 00000000000000..e3d4a511a61a76
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.StringChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker
+
+clang-analyzer-cplusplus.StringChecker
+======================================
+
+Checks C++ std::string bugs.
+
+The clang-analyzer-cplusplus.StringChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
index 0bb41212f4d209..b421e2cbd3c69d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst
@@ -5,6 +5,9 @@
clang-analyzer-deadcode.DeadStores
==================================
+Check for values stored to variables that are never read afterwards.
+
The clang-analyzer-deadcode.DeadStores check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
new file mode 100644
index 00000000000000..5f2a3aaae1ed11
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-fuchsia.HandleChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker
+
+clang-analyzer-fuchsia.HandleChecker
+====================================
+
+A Checker that detect leaks related to Fuchsia handles.
+
+The clang-analyzer-fuchsia.HandleChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
index 7ebbb9b7d65885..85e0dc2f116c5e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst
@@ -5,6 +5,9 @@
clang-analyzer-nullability.NullPassedToNonnull
==============================================
+Warns when a null pointer is passed to a pointer which has a _Nonnull type.
+
The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
index e585c7ba1826b3..132c8311bc1d06 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst
@@ -5,6 +5,10 @@
clang-analyzer-nullability.NullReturnedFromNonnull
==================================================
+Warns when a null pointer is returned from a function that has _Nonnull return
+type.
+
The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
index 9734863366126e..027487b1533eaa 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst
@@ -5,6 +5,9 @@
clang-analyzer-nullability.NullableDereferenced
===============================================
+Warns when a nullable pointer is dereferenced.
+
The clang-analyzer-nullability.NullableDereferenced check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
index 1c9b590e67d8fe..f1261e680595a1 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst
@@ -5,6 +5,9 @@
clang-analyzer-nullability.NullablePassedToNonnull
==================================================
+Warns when a nullable pointer is passed to a pointer which has a _Nonnull type.
+
The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
index c30b530a0dec1b..dc6f7a1525b80b 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst
@@ -1,6 +1,14 @@
.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull
clang-analyzer-nullability.NullableReturnedFromNonnull
======================================================
-Warns when a nullable pointer is returned from a function that has _Nonnull return type.
+Warns when a nullable pointer is returned from a function that has _Nonnull
+return type.
+
+The clang-analyzer-nullability.NullableReturnedFromNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
index 3380dc32777359..5cf352a23cadcf 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst
@@ -5,6 +5,9 @@
clang-analyzer-optin.cplusplus.UninitializedObject
==================================================
+Reports uninitialized fields after object construction.
+
The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
index 52cf5ff97db81c..5ec5faaec71ee8 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst
@@ -5,6 +5,9 @@
clang-analyzer-optin.cplusplus.VirtualCall
==========================================
+Check virtual function calls during construction/destruction.
+
The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
index 211070c5a6e0ef..45b1a92fc3378a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst
@@ -5,6 +5,9 @@
clang-analyzer-optin.mpi.MPI-Checker
====================================
+Checks MPI code.
+
The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
index 65e9efba1b2eb9..c2fef59f568943 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
@@ -3,4 +3,7 @@
clang-analyzer-optin.osx.OSObjectCStyleCast
===========================================
-Checker for C-style casts of OSObjects
+Checker for C-style casts of OSObjects.
+
+The clang-analyzer-optin.osx.OSObjectCStyleCast check is an alias of
+Clang Static Analyzer optin.osx.OSObjectCStyleCast.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
index 8a8395c8c8ce9d..669f37c365c8e2 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
@@ -5,6 +5,9 @@
clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
=============================================================================
+Check that NSLocalizedString macros include a comment for context.
+
The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
index dc214719ba73b1..3ab5fd847d407d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
@@ -5,6 +5,10 @@
clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
=======================================================================
+Warns about uses of non-localized NSStrings passed to UI methods expecting
+localized NSStrings.
+
The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
index 2684f750091a01..6b1af473c572b6 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern
clang-analyzer-optin.performance.GCDAntipattern
===============================================
-Check for performance anti-patterns when using Grand Central Dispatch
+Check for performance anti-patterns when using Grand Central Dispatch.
+
+The clang-analyzer-optin.performance.GCDAntipattern check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
index fc2d7300de76a7..40e5e654192858 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-optin.performance.Padding
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding
clang-analyzer-optin.performance.Padding
========================================
Check for excessively padded structs.
+
+The clang-analyzer-optin.performance.Padding check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
index 07545becaef8e5..43dafc841777d3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi
clang-analyzer-optin.portability.UnixAPI
========================================
-Finds implementation-defined behavior in UNIX/Posix functions
+Finds implementation-defined behavior in UNIX/Posix functions.
+
+The clang-analyzer-optin.portability.UnixAPI check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
index b3aae0c8bb504c..46f0821880d505 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.API
======================
+Check for proper uses of various Apple APIs.
+
The clang-analyzer-osx.API check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
index 50fb5a8db6b0a1..a7b8a1cfb14cdc 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
@@ -3,4 +3,7 @@
clang-analyzer-osx.MIG
======================
-Find violations of the Mach Interface Generator calling convention
+Find violations of the Mach Interface Generator calling convention.
+
+The clang-analyzer-osx.MIG check is an alias of
+Clang Static Analyzer osx.MIG.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
index 7471ad17d7d7d8..cc45624987db87 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion
clang-analyzer-osx.NumberObjectConversion
=========================================
-Check for erroneous conversions of objects representing numbers into numbers
+Check for erroneous conversions of objects representing numbers into numbers.
+
+The clang-analyzer-osx.NumberObjectConversion check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
index 8eceb3f3b4dd1c..c32982d407c286 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
@@ -3,4 +3,7 @@
clang-analyzer-osx.OSObjectRetainCount
======================================
-Check for leaks and improper reference count management for OSObject
+Check for leaks and improper reference count management for OSObject.
+
+The clang-analyzer-osx.OSObjectRetainCount check is an alias of
+Clang Static Analyzer osx.OSObjectRetainCount.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
index 0b87cd02078251..8df48b78ca2bc3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty
clang-analyzer-osx.ObjCProperty
===============================
-Check for proper uses of Objective-C properties
+Check for proper uses of Objective-C properties.
+
+The clang-analyzer-osx.ObjCProperty check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
index 130fae59a677b9..4d6f6a1684111a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.SecKeychainAPI
=================================
+Check for proper uses of Secure Keychain APIs.
+
The clang-analyzer-osx.SecKeychainAPI check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
index 56a98bfb9a2e1d..60e4022ff9915c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.AtSync
===============================
+Check for nil pointers used as mutexes for @synchronized.
+
The clang-analyzer-osx.cocoa.AtSync check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
index 01fbe4f84368f9..1cca7bb9238e68 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst
@@ -1,6 +1,14 @@
.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite
clang-analyzer-osx.cocoa.AutoreleaseWrite
=========================================
-Warn about potentially crashing writes to autoreleasing objects from
diff erent autoreleasing pools in Objective-C
+Warn about potentially crashing writes to autoreleasing objects from
diff erent
+autoreleasing pools in Objective-C.
+
+The clang-analyzer-osx.cocoa.AutoreleaseWrite check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
index d6c0bae27ead74..3cf78ab874f3b7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.ClassRelease
=====================================
+Check for sending 'retain', 'release', or 'autorelease' directly to a Class.
+
The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
index e02bf63b9a33b0..acaf11442b0e24 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.Dealloc
================================
+Warn about Objective-C classes that lack a correct implementation of -dealloc.
+
The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
index 6aa64e209746e6..17e13f582c0f65 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.IncompatibleMethodTypes
================================================
+Warn about Objective-C method signatures with type incompatibilities.
+
The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
index 622f80ff871061..2ee092bbf8f00d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops
clang-analyzer-osx.cocoa.Loops
==============================
-Improved modeling of loops using Cocoa collection types
+Improved modeling of loops using Cocoa collection types.
+
+The clang-analyzer-osx.cocoa.Loops check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
index a8e4290278a9f8..ee57d1d86f100e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall
clang-analyzer-osx.cocoa.MissingSuperCall
=========================================
-Warn about Objective-C methods that lack a necessary call to super
+Warn about Objective-C methods that lack a necessary call to super.
+
+The clang-analyzer-osx.cocoa.MissingSuperCall check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
index 9446850c458819..0c10069041604e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.NSAutoreleasePool
==========================================
+Warn for suboptimal uses of NSAutoreleasePool in Objective-C GC mode.
+
The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
index 23416fcf8688db..35fddde39d8db5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.NSError
================================
+Check usage of NSError** parameters.
+
The clang-analyzer-osx.cocoa.NSError check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
index 4b521041976cfe..0e189a1d9d1d84 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.NilArg
===============================
+Check for prohibited nil arguments to ObjC method calls.
+
The clang-analyzer-osx.cocoa.NilArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
index a6da9b0cca4919..aafdd3dc27f5c5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue
clang-analyzer-osx.cocoa.NonNilReturnValue
==========================================
-Model the APIs that are guaranteed to return a non-nil value
+Model the APIs that are guaranteed to return a non-nil value.
+
+The clang-analyzer-osx.cocoa.NonNilReturnValue check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
index 10e21e30a5ea37..d27a492cb224ef 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.ObjCGenerics
=====================================
+Check for type errors when using Objective-C generics.
+
The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
index 92a72df785fadf..d0e71e8a823bfe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.RetainCount
====================================
+Check for leaks and improper reference count management.
+
The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
index 67a0519b9b777c..3b2e433964e776 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst
@@ -1,6 +1,13 @@
.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak
clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
===============================================
-Check for leaked memory in autorelease pools that will never be drained
+Check for leaked memory in autorelease pools that will never be drained.
+
+The clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
index 96e559e103a357..a5484f2ad8c7f7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.SelfInit
=================================
+Check that 'self' is properly initialized inside an initializer method.
+
The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
index 598f12686b42c9..ab13b6ab3289b4 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.SuperDealloc
=====================================
+Warn about improper use of '[super dealloc]' in Objective-C.
+
The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
index 5a12aa4802c96b..cb3ffd1d870eb6 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.cocoa.UnusedIvars
====================================
+Warn about private ivars that are never used.
+
The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
index 292e7e3fd1c08c..fd9405451a427b 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst
@@ -5,6 +5,10 @@
clang-analyzer-osx.cocoa.VariadicMethodTypes
============================================
+Check for passing non-Objective-C types to variadic collection initialization
+methods that expect only Objective-C types.
+
The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
index 7dab4bdabda314..200ec6232bcc2c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.coreFoundation.CFError
=========================================
+Check usage of CFErrorRef* parameters.
+
The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
index 86e117a72f8b32..83a0541e0e32c7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.coreFoundation.CFNumber
==========================================
+Check for proper uses of CFNumber APIs.
+
The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
index 0865611b5df61d..766993900d364d 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.coreFoundation.CFRetainRelease
=================================================
+Check for null arguments to CFRetain/CFRelease/CFMakeCollectable.
+
The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
index ca1eb756eace63..e8fb9ea806f68a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst
@@ -5,6 +5,9 @@
clang-analyzer-osx.coreFoundation.containers.OutOfBounds
========================================================
+Checks for index out-of-bounds when using 'CFArray' API.
+
The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
index fb1fa15f96267d..57370934eae6fe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst
@@ -5,6 +5,10 @@
clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
===============================================================
+Warns if 'CFArray', 'CFDictionary', 'CFSet' are created with non-pointer-size
+values.
+
The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
index b378a34b9f7da4..a39f4ae66f0325 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst
@@ -5,6 +5,10 @@
clang-analyzer-security.FloatLoopCounter
========================================
+Warn on using a floating point value as a loop counter (CERT: FLP30-C,
+FLP30-CPP).
+
The clang-analyzer-security.FloatLoopCounter check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
index b4e611b2653188..c7c035ecec6aed 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
====================================================================
+Warn on uses of unsecure or deprecated buffer manipulating functions.
+
The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
index 9f050da3509e19..52b03170e08428 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.UncheckedReturn
===================================================
+Warn on uses of functions whose return values must be always checked.
+
The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
index a135ee7f205325..26412c0c2cdc2f 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.bcmp
========================================
+Warn on uses of the 'bcmp' function.
+
The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
index fc8d2349a09e8d..73894233661d88 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.bcopy
=========================================
+Warn on uses of the 'bcopy' function.
+
The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
index c74c2d186cb737..5626015234c5b3 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.bzero
=========================================
+Warn on uses of the 'bzero' function.
+
The clang-analyzer-security.insecureAPI.bzero check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
new file mode 100644
index 00000000000000..4405f721a66ddd
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.decodeValueOfObjCType.rst
@@ -0,0 +1,9 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.decodeValueOfObjCType
+
+clang-analyzer-security.insecureAPI.decodeValueOfObjCType
+=========================================================
+
+Warn on uses of the '-decodeValueOfObjCType:at:' method.
+
+The clang-analyzer-security.insecureAPI.decodeValueOfObjCType check is an alias of
+Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
index 4f2b79666f6813..0bac901c623ade 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.getpw
=========================================
+Warn on uses of the 'getpw' function.
+
The clang-analyzer-security.insecureAPI.getpw check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
index fc62fe6245e894..7f9cf4ff32dcb5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.gets
========================================
+Warn on uses of the 'gets' function.
+
The clang-analyzer-security.insecureAPI.gets check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
index 6c0d8110ac2874..54349760ed5842 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.mkstemp
===========================================
+Warn when 'mkstemp' is passed fewer than 6 X's in the format string.
+
The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
index 153904f08797cc..5d04ffecbd1df9 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.mktemp
==========================================
+Warn on uses of the 'mktemp' function.
+
The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
index 67c4c87c173978..634898bf40eb0e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.rand
========================================
+Warn on uses of the 'rand', 'random', and related functions.
+
The clang-analyzer-security.insecureAPI.rand check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
index 1fcbe160e6b8e4..608bb5841a592a 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.strcpy
==========================================
+Warn on uses of the 'strcpy' and 'strcat' functions.
+
The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
index c20dea356add0b..d65307855824d5 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst
@@ -5,6 +5,9 @@
clang-analyzer-security.insecureAPI.vfork
=========================================
+Warn on uses of the 'vfork' function.
+
The clang-analyzer-security.insecureAPI.vfork check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
index a3931b2b027eec..02438ad635f62e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst
@@ -5,6 +5,9 @@
clang-analyzer-unix.API
=======================
+Check calls to various UNIX/Posix functions.
+
The clang-analyzer-unix.API check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
index f772674ed5481f..949b9164b6bfd2 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst
@@ -5,6 +5,10 @@
clang-analyzer-unix.Malloc
==========================
+Check for memory leaks, double free, and use-after-free problems. Traces memory
+managed by malloc()/free().
+
The clang-analyzer-unix.Malloc check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
index 3cc066b219c308..c33f6d3f6728fb 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst
@@ -5,6 +5,9 @@
clang-analyzer-unix.MallocSizeof
================================
+Check for dubious malloc arguments involving sizeof.
+
The clang-analyzer-unix.MallocSizeof check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
index 01fc56933b20d7..c14e0e2873b2b0 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst
@@ -5,6 +5,9 @@
clang-analyzer-unix.MismatchedDeallocator
=========================================
+Check for mismatched deallocators.
+
The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
index d3f00afe5099ea..f4bc2a32cae407 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst
@@ -5,6 +5,9 @@
clang-analyzer-unix.Vfork
=========================
+Check for proper usage of vfork.
+
The clang-analyzer-unix.Vfork check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
index d861faa3ff0858..c388c15f5f0849 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst
@@ -5,6 +5,10 @@
clang-analyzer-unix.cstring.BadSizeArg
======================================
+Check the size argument passed into C string functions for common erroneous
+patterns.
+
The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
index 17bb6af8a5fa4f..98a150dfe7cffe 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst
@@ -5,6 +5,9 @@
clang-analyzer-unix.cstring.NullArg
===================================
+Check for null pointers being passed as arguments to C string functions.
+
The clang-analyzer-unix.cstring.NullArg check is an alias, please see
-`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
index d693705d0c6efe..d0c82abd819017 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.CopyToSelf.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.CopyToSelf
================================
Check for va_lists which are copied onto itself.
+
+The clang-analyzer-valist.CopyToSelf check is an alias of
+Clang Static Analyzer valist.CopyToSelf.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
index da3f5dbb1641c7..98b5dd023254ae 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Uninitialized.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.Uninitialized
===================================
Check for usages of uninitialized (or already released) va_lists.
+
+The clang-analyzer-valist.Uninitialized check is an alias of
+Clang Static Analyzer valist.Uninitialized.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
index d73688b0e1c503..85e21c57210634 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/valist.Unterminated.rst
@@ -4,3 +4,6 @@ clang-analyzer-valist.Unterminated
==================================
Check for va_lists which are not released by a va_end call.
+
+The clang-analyzer-valist.Unterminated check is an alias of
+Clang Static Analyzer valist.Unterminated.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
new file mode 100644
index 00000000000000..36003280718c78
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.NoUncountedMemberChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker
+
+clang-analyzer-webkit.NoUncountedMemberChecker
+==============================================
+
+Check for no uncounted member variables.
+
+The clang-analyzer-webkit.NoUncountedMemberChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
new file mode 100644
index 00000000000000..b88df7d86e6743
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.RefCntblBaseVirtualDtor
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor
+
+clang-analyzer-webkit.RefCntblBaseVirtualDtor
+=============================================
+
+Check for any ref-countable base class having virtual destructor.
+
+The clang-analyzer-webkit.RefCntblBaseVirtualDtor check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst
new file mode 100644
index 00000000000000..1022b434c8d4ef
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-webkit.UncountedLambdaCapturesChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker
+
+clang-analyzer-webkit.UncountedLambdaCapturesChecker
+====================================================
+
+Check uncounted lambda captures.
+
+The clang-analyzer-webkit.UncountedLambdaCapturesChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 9de7989c264fb5..f4c835247ab9ed 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -434,31 +434,52 @@ Clang-Tidy Checks
`clang-analyzer-core.uninitialized.ArraySubscript <clang-analyzer/core.uninitialized.ArraySubscript.html>`_, `Clang Static Analyzer core.uninitialized.ArraySubscript <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_,
`clang-analyzer-core.uninitialized.Assign <clang-analyzer/core.uninitialized.Assign.html>`_, `Clang Static Analyzer core.uninitialized.Assign <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_,
`clang-analyzer-core.uninitialized.Branch <clang-analyzer/core.uninitialized.Branch.html>`_, `Clang Static Analyzer core.uninitialized.Branch <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_,
+ `clang-analyzer-core.uninitialized.CapturedBlockVariable <clang-analyzer/core.uninitialized.CapturedBlockVariable.html>`_, `Clang Static Analyzer core.uninitialized.CapturedBlockVariable <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable>`_,
+ `clang-analyzer-core.uninitialized.NewArraySize <clang-analyzer/core.uninitialized.NewArraySize.html>`_, `Clang Static Analyzer core.uninitialized.NewArraySize <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize>`_,
`clang-analyzer-core.uninitialized.UndefReturn <clang-analyzer/core.uninitialized.UndefReturn.html>`_, `Clang Static Analyzer core.uninitialized.UndefReturn <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_,
- `clang-analyzer-cplusplus.Move <clang-analyzer/cplusplus.Move.html>`_, `Clang Static Analyzer cplusplus.Move <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_,
+ `clang-analyzer-cplusplus.InnerPointer <clang-analyzer/cplusplus.InnerPointer.html>`_, `Clang Static Analyzer cplusplus.InnerPointer <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer>`_,
+ `clang-analyzer-cplusplus.Move <clang-analyzer/cplusplus.Move.html>`_, Clang Static Analyzer cplusplus.Move,
`clang-analyzer-cplusplus.NewDelete <clang-analyzer/cplusplus.NewDelete.html>`_, `Clang Static Analyzer cplusplus.NewDelete <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_,
`clang-analyzer-cplusplus.NewDeleteLeaks <clang-analyzer/cplusplus.NewDeleteLeaks.html>`_, `Clang Static Analyzer cplusplus.NewDeleteLeaks <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_,
+ `clang-analyzer-cplusplus.PlacementNew <clang-analyzer/cplusplus.PlacementNew.html>`_, Clang Static Analyzer cplusplus.PlacementNew,
+ `clang-analyzer-cplusplus.PureVirtualCall <clang-analyzer/cplusplus.PureVirtualCall.html>`_, Clang Static Analyzer cplusplus.PureVirtualCall,
+ `clang-analyzer-cplusplus.StringChecker <clang-analyzer/cplusplus.StringChecker.html>`_, `Clang Static Analyzer cplusplus.StringChecker <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_,
`clang-analyzer-deadcode.DeadStores <clang-analyzer/deadcode.DeadStores.html>`_, `Clang Static Analyzer deadcode.DeadStores <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_,
+ `clang-analyzer-fuchsia.HandleChecker <clang-analyzer/fuchsia.HandleChecker.html>`_, `Clang Static Analyzer fuchsia.HandleChecker <https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker>`_,
`clang-analyzer-nullability.NullPassedToNonnull <clang-analyzer/nullability.NullPassedToNonnull.html>`_, `Clang Static Analyzer nullability.NullPassedToNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_,
`clang-analyzer-nullability.NullReturnedFromNonnull <clang-analyzer/nullability.NullReturnedFromNonnull.html>`_, `Clang Static Analyzer nullability.NullReturnedFromNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_,
`clang-analyzer-nullability.NullableDereferenced <clang-analyzer/nullability.NullableDereferenced.html>`_, `Clang Static Analyzer nullability.NullableDereferenced <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_,
`clang-analyzer-nullability.NullablePassedToNonnull <clang-analyzer/nullability.NullablePassedToNonnull.html>`_, `Clang Static Analyzer nullability.NullablePassedToNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_,
+ `clang-analyzer-nullability.NullableReturnedFromNonnull <clang-analyzer/nullability.NullableReturnedFromNonnull.html>`_, `Clang Static Analyzer nullability.NullableReturnedFromNonnull <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull>`_,
`clang-analyzer-optin.cplusplus.UninitializedObject <clang-analyzer/optin.cplusplus.UninitializedObject.html>`_, `Clang Static Analyzer optin.cplusplus.UninitializedObject <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_,
`clang-analyzer-optin.cplusplus.VirtualCall <clang-analyzer/optin.cplusplus.VirtualCall.html>`_, `Clang Static Analyzer optin.cplusplus.VirtualCall <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_,
`clang-analyzer-optin.mpi.MPI-Checker <clang-analyzer/optin.mpi.MPI-Checker.html>`_, `Clang Static Analyzer optin.mpi.MPI-Checker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_,
+ `clang-analyzer-optin.osx.OSObjectCStyleCast <clang-analyzer/optin.osx.OSObjectCStyleCast.html>`_, Clang Static Analyzer optin.osx.OSObjectCStyleCast,
`clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker <clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.html>`_, `Clang Static Analyzer optin.osx.cocoa.localizability.EmptyLocalizationContextChecker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_,
`clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker <clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.html>`_, `Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_,
+ `clang-analyzer-optin.performance.GCDAntipattern <clang-analyzer/optin.performance.GCDAntipattern.html>`_, `Clang Static Analyzer optin.performance.GCDAntipattern <https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern>`_,
+ `clang-analyzer-optin.performance.Padding <clang-analyzer/optin.performance.Padding.html>`_, `Clang Static Analyzer optin.performance.Padding <https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-padding>`_,
+ `clang-analyzer-optin.portability.UnixAPI <clang-analyzer/optin.portability.UnixAPI.html>`_, `Clang Static Analyzer optin.portability.UnixAPI <https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi>`_,
`clang-analyzer-osx.API <clang-analyzer/osx.API.html>`_, `Clang Static Analyzer osx.API <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_,
+ `clang-analyzer-osx.MIG <clang-analyzer/osx.MIG.html>`_, Clang Static Analyzer osx.MIG,
+ `clang-analyzer-osx.NumberObjectConversion <clang-analyzer/osx.NumberObjectConversion.html>`_, `Clang Static Analyzer osx.NumberObjectConversion <https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion>`_,
+ `clang-analyzer-osx.OSObjectRetainCount <clang-analyzer/osx.OSObjectRetainCount.html>`_, Clang Static Analyzer osx.OSObjectRetainCount,
+ `clang-analyzer-osx.ObjCProperty <clang-analyzer/osx.ObjCProperty.html>`_, `Clang Static Analyzer osx.ObjCProperty <https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty>`_,
`clang-analyzer-osx.SecKeychainAPI <clang-analyzer/osx.SecKeychainAPI.html>`_, `Clang Static Analyzer osx.SecKeychainAPI <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_,
`clang-analyzer-osx.cocoa.AtSync <clang-analyzer/osx.cocoa.AtSync.html>`_, `Clang Static Analyzer osx.cocoa.AtSync <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_,
+ `clang-analyzer-osx.cocoa.AutoreleaseWrite <clang-analyzer/osx.cocoa.AutoreleaseWrite.html>`_, `Clang Static Analyzer osx.cocoa.AutoreleaseWrite <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-autoreleasewrite>`_,
`clang-analyzer-osx.cocoa.ClassRelease <clang-analyzer/osx.cocoa.ClassRelease.html>`_, `Clang Static Analyzer osx.cocoa.ClassRelease <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_,
`clang-analyzer-osx.cocoa.Dealloc <clang-analyzer/osx.cocoa.Dealloc.html>`_, `Clang Static Analyzer osx.cocoa.Dealloc <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_,
`clang-analyzer-osx.cocoa.IncompatibleMethodTypes <clang-analyzer/osx.cocoa.IncompatibleMethodTypes.html>`_, `Clang Static Analyzer osx.cocoa.IncompatibleMethodTypes <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_,
+ `clang-analyzer-osx.cocoa.Loops <clang-analyzer/osx.cocoa.Loops.html>`_, `Clang Static Analyzer osx.cocoa.Loops <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-loops>`_,
+ `clang-analyzer-osx.cocoa.MissingSuperCall <clang-analyzer/osx.cocoa.MissingSuperCall.html>`_, `Clang Static Analyzer osx.cocoa.MissingSuperCall <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-missingsupercall>`_,
`clang-analyzer-osx.cocoa.NSAutoreleasePool <clang-analyzer/osx.cocoa.NSAutoreleasePool.html>`_, `Clang Static Analyzer osx.cocoa.NSAutoreleasePool <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_,
`clang-analyzer-osx.cocoa.NSError <clang-analyzer/osx.cocoa.NSError.html>`_, `Clang Static Analyzer osx.cocoa.NSError <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_,
`clang-analyzer-osx.cocoa.NilArg <clang-analyzer/osx.cocoa.NilArg.html>`_, `Clang Static Analyzer osx.cocoa.NilArg <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_,
+ `clang-analyzer-osx.cocoa.NonNilReturnValue <clang-analyzer/osx.cocoa.NonNilReturnValue.html>`_, `Clang Static Analyzer osx.cocoa.NonNilReturnValue <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nonnilreturnvalue>`_,
`clang-analyzer-osx.cocoa.ObjCGenerics <clang-analyzer/osx.cocoa.ObjCGenerics.html>`_, `Clang Static Analyzer osx.cocoa.ObjCGenerics <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_,
`clang-analyzer-osx.cocoa.RetainCount <clang-analyzer/osx.cocoa.RetainCount.html>`_, `Clang Static Analyzer osx.cocoa.RetainCount <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_,
+ `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak <clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.html>`_, `Clang Static Analyzer osx.cocoa.RunLoopAutoreleaseLeak <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-runloopautoreleaseleak>`_,
`clang-analyzer-osx.cocoa.SelfInit <clang-analyzer/osx.cocoa.SelfInit.html>`_, `Clang Static Analyzer osx.cocoa.SelfInit <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_,
`clang-analyzer-osx.cocoa.SuperDealloc <clang-analyzer/osx.cocoa.SuperDealloc.html>`_, `Clang Static Analyzer osx.cocoa.SuperDealloc <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_,
`clang-analyzer-osx.cocoa.UnusedIvars <clang-analyzer/osx.cocoa.UnusedIvars.html>`_, `Clang Static Analyzer osx.cocoa.UnusedIvars <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_,
@@ -474,6 +495,7 @@ Clang-Tidy Checks
`clang-analyzer-security.insecureAPI.bcmp <clang-analyzer/security.insecureAPI.bcmp.html>`_, `Clang Static Analyzer security.insecureAPI.bcmp <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_,
`clang-analyzer-security.insecureAPI.bcopy <clang-analyzer/security.insecureAPI.bcopy.html>`_, `Clang Static Analyzer security.insecureAPI.bcopy <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_,
`clang-analyzer-security.insecureAPI.bzero <clang-analyzer/security.insecureAPI.bzero.html>`_, `Clang Static Analyzer security.insecureAPI.bzero <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_,
+ `clang-analyzer-security.insecureAPI.decodeValueOfObjCType <clang-analyzer/security.insecureAPI.decodeValueOfObjCType.html>`_, Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType,
`clang-analyzer-security.insecureAPI.getpw <clang-analyzer/security.insecureAPI.getpw.html>`_, `Clang Static Analyzer security.insecureAPI.getpw <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_,
`clang-analyzer-security.insecureAPI.gets <clang-analyzer/security.insecureAPI.gets.html>`_, `Clang Static Analyzer security.insecureAPI.gets <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_,
`clang-analyzer-security.insecureAPI.mkstemp <clang-analyzer/security.insecureAPI.mkstemp.html>`_, `Clang Static Analyzer security.insecureAPI.mkstemp <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_,
@@ -488,6 +510,12 @@ Clang-Tidy Checks
`clang-analyzer-unix.Vfork <clang-analyzer/unix.Vfork.html>`_, `Clang Static Analyzer unix.Vfork <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_,
`clang-analyzer-unix.cstring.BadSizeArg <clang-analyzer/unix.cstring.BadSizeArg.html>`_, `Clang Static Analyzer unix.cstring.BadSizeArg <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_,
`clang-analyzer-unix.cstring.NullArg <clang-analyzer/unix.cstring.NullArg.html>`_, `Clang Static Analyzer unix.cstring.NullArg <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_,
+ `clang-analyzer-valist.CopyToSelf <clang-analyzer/valist.CopyToSelf.html>`_, Clang Static Analyzer valist.CopyToSelf,
+ `clang-analyzer-valist.Uninitialized <clang-analyzer/valist.Uninitialized.html>`_, Clang Static Analyzer valist.Uninitialized,
+ `clang-analyzer-valist.Unterminated <clang-analyzer/valist.Unterminated.html>`_, Clang Static Analyzer valist.Unterminated,
+ `clang-analyzer-webkit.NoUncountedMemberChecker <clang-analyzer/webkit.NoUncountedMemberChecker.html>`_, `Clang Static Analyzer webkit.NoUncountedMemberChecker <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker>`_,
+ `clang-analyzer-webkit.RefCntblBaseVirtualDtor <clang-analyzer/webkit.RefCntblBaseVirtualDtor.html>`_, `Clang Static Analyzer webkit.RefCntblBaseVirtualDtor <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor>`_,
+ `clang-analyzer-webkit.UncountedLambdaCapturesChecker <clang-analyzer/webkit.UncountedLambdaCapturesChecker.html>`_, `Clang Static Analyzer webkit.UncountedLambdaCapturesChecker <https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker>`_,
`cppcoreguidelines-avoid-c-arrays <cppcoreguidelines/avoid-c-arrays.html>`_, `modernize-avoid-c-arrays <modernize/avoid-c-arrays.html>`_,
`cppcoreguidelines-avoid-magic-numbers <cppcoreguidelines/avoid-magic-numbers.html>`_, `readability-magic-numbers <readability/magic-numbers.html>`_,
`cppcoreguidelines-c-copy-assignment-signature <cppcoreguidelines/c-copy-assignment-signature.html>`_, `misc-unconventional-assign-operator <misc/unconventional-assign-operator.html>`_,
More information about the cfe-commits
mailing list