summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst10
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst6
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py148
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/list.rst85
86 files changed, 993 insertions, 0 deletions
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
new file mode 100644
index 00000000000..69d1e6e5a5d
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.CallAndMessage
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage
+
+clang-analyzer-core.CallAndMessage
+==================================
+
+The clang-analyzer-core.CallAndMessage check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
new file mode 100644
index 00000000000..f3c652f88b6
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.DivideZero
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero
+
+clang-analyzer-core.DivideZero
+==============================
+
+The clang-analyzer-core.DivideZero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
new file mode 100644
index 00000000000..e4f8eeaaab9
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation
+
+clang-analyzer-core.DynamicTypePropagation
+==========================================
+
+Generate dynamic type information
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
new file mode 100644
index 00000000000..3188c29e5c2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker
+
+clang-analyzer-core.NonNullParamChecker
+=======================================
+
+The clang-analyzer-core.NonNullParamChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
new file mode 100644
index 00000000000..f771c9e2803
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NullDereference
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference
+
+clang-analyzer-core.NullDereference
+===================================
+
+The clang-analyzer-core.NullDereference check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
new file mode 100644
index 00000000000..a3fb1111556
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape
+
+clang-analyzer-core.StackAddressEscape
+======================================
+
+The clang-analyzer-core.StackAddressEscape check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
new file mode 100644
index 00000000000..1e36f6bbab2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult
+
+clang-analyzer-core.UndefinedBinaryOperatorResult
+=================================================
+
+The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
new file mode 100644
index 00000000000..80e6ba5f335
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.VLASize
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize
+
+clang-analyzer-core.VLASize
+===========================
+
+The clang-analyzer-core.VLASize check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
new file mode 100644
index 00000000000..5da6a33c360
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript
+
+clang-analyzer-core.uninitialized.ArraySubscript
+================================================
+
+The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
new file mode 100644
index 00000000000..8cc982b6fee
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign
+
+clang-analyzer-core.uninitialized.Assign
+========================================
+
+The clang-analyzer-core.uninitialized.Assign check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
new file mode 100644
index 00000000000..e0fcd7bcc76
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch
+
+clang-analyzer-core.uninitialized.Branch
+========================================
+
+The clang-analyzer-core.uninitialized.Branch check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
new file mode 100644
index 00000000000..396ce2656cb
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable
+
+clang-analyzer-core.uninitialized.CapturedBlockVariable
+=======================================================
+
+Check for blocks that capture uninitialized values
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
new file mode 100644
index 00000000000..057567429d2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn
+
+clang-analyzer-core.uninitialized.UndefReturn
+=============================================
+
+The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
new file mode 100644
index 00000000000..660284b61de
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer
+
+clang-analyzer-cplusplus.InnerPointer
+=====================================
+
+Check for inner pointers of C++ containers used after re/deallocation
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
new file mode 100644
index 00000000000..b0d663d558b
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.Move
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move
+
+clang-analyzer-cplusplus.Move
+=============================
+
+The clang-analyzer-cplusplus.Move check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
new file mode 100644
index 00000000000..57964a8c939
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete
+
+clang-analyzer-cplusplus.NewDelete
+==================================
+
+The clang-analyzer-cplusplus.NewDelete check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
new file mode 100644
index 00000000000..4601a460df1
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks
+
+clang-analyzer-cplusplus.NewDeleteLeaks
+=======================================
+
+The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
new file mode 100644
index 00000000000..0bb41212f4d
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores
+
+clang-analyzer-deadcode.DeadStores
+==================================
+
+The clang-analyzer-deadcode.DeadStores check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
new file mode 100644
index 00000000000..7ebbb9b7d65
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull
+
+clang-analyzer-nullability.NullPassedToNonnull
+==============================================
+
+The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
new file mode 100644
index 00000000000..e585c7ba182
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull
+
+clang-analyzer-nullability.NullReturnedFromNonnull
+==================================================
+
+The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
new file mode 100644
index 00000000000..97348633661
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced
+
+clang-analyzer-nullability.NullableDereferenced
+===============================================
+
+The clang-analyzer-nullability.NullableDereferenced check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
new file mode 100644
index 00000000000..1c9b590e67d
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull
+
+clang-analyzer-nullability.NullablePassedToNonnull
+==================================================
+
+The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
new file mode 100644
index 00000000000..c30b530a0de
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull
+
+clang-analyzer-nullability.NullableReturnedFromNonnull
+======================================================
+
+Warns when a nullable pointer is returned from a function that has _Nonnull return type.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
new file mode 100644
index 00000000000..3380dc32777
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject
+
+clang-analyzer-optin.cplusplus.UninitializedObject
+==================================================
+
+The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
new file mode 100644
index 00000000000..52cf5ff97db
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall
+
+clang-analyzer-optin.cplusplus.VirtualCall
+==========================================
+
+The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
new file mode 100644
index 00000000000..211070c5a6e
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker
+
+clang-analyzer-optin.mpi.MPI-Checker
+====================================
+
+The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
new file mode 100644
index 00000000000..65e9efba1b2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast
+
+clang-analyzer-optin.osx.OSObjectCStyleCast
+===========================================
+
+Checker for C-style casts of OSObjects
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
new file mode 100644
index 00000000000..8a8395c8c8c
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+=============================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
new file mode 100644
index 00000000000..dc214719ba7
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+=======================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
new file mode 100644
index 00000000000..2684f750091
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern
+
+clang-analyzer-optin.performance.GCDAntipattern
+===============================================
+
+Check for performance anti-patterns when using Grand Central Dispatch
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
new file mode 100644
index 00000000000..fc2d7300de7
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.Padding
+
+clang-analyzer-optin.performance.Padding
+========================================
+
+Check for excessively padded structs.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
new file mode 100644
index 00000000000..07545becaef
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI
+
+clang-analyzer-optin.portability.UnixAPI
+========================================
+
+Finds implementation-defined behavior in UNIX/Posix functions
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
new file mode 100644
index 00000000000..b3aae0c8bb5
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.API
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-api
+
+clang-analyzer-osx.API
+======================
+
+The clang-analyzer-osx.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
new file mode 100644
index 00000000000..50fb5a8db6b
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.MIG
+
+clang-analyzer-osx.MIG
+======================
+
+Find violations of the Mach Interface Generator calling convention
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
new file mode 100644
index 00000000000..7471ad17d7d
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion
+
+clang-analyzer-osx.NumberObjectConversion
+=========================================
+
+Check for erroneous conversions of objects representing numbers into numbers
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
new file mode 100644
index 00000000000..8eceb3f3b4d
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount
+
+clang-analyzer-osx.OSObjectRetainCount
+======================================
+
+Check for leaks and improper reference count management for OSObject
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
new file mode 100644
index 00000000000..0b87cd02078
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty
+
+clang-analyzer-osx.ObjCProperty
+===============================
+
+Check for proper uses of Objective-C properties
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
new file mode 100644
index 00000000000..130fae59a67
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi
+
+clang-analyzer-osx.SecKeychainAPI
+=================================
+
+The clang-analyzer-osx.SecKeychainAPI check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
new file mode 100644
index 00000000000..56a98bfb9a2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync
+
+clang-analyzer-osx.cocoa.AtSync
+===============================
+
+The clang-analyzer-osx.cocoa.AtSync check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
new file mode 100644
index 00000000000..01fbe4f8436
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite
+
+clang-analyzer-osx.cocoa.AutoreleaseWrite
+=========================================
+
+Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
new file mode 100644
index 00000000000..d6c0bae27ea
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease
+
+clang-analyzer-osx.cocoa.ClassRelease
+=====================================
+
+The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
new file mode 100644
index 00000000000..e02bf63b9a3
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc
+
+clang-analyzer-osx.cocoa.Dealloc
+================================
+
+The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
new file mode 100644
index 00000000000..6aa64e20974
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes
+
+clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+================================================
+
+The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
new file mode 100644
index 00000000000..622f80ff871
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops
+
+clang-analyzer-osx.cocoa.Loops
+==============================
+
+Improved modeling of loops using Cocoa collection types
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
new file mode 100644
index 00000000000..a8e4290278a
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall
+
+clang-analyzer-osx.cocoa.MissingSuperCall
+=========================================
+
+Warn about Objective-C methods that lack a necessary call to super
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
new file mode 100644
index 00000000000..9446850c458
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool
+
+clang-analyzer-osx.cocoa.NSAutoreleasePool
+==========================================
+
+The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
new file mode 100644
index 00000000000..23416fcf868
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror
+
+clang-analyzer-osx.cocoa.NSError
+================================
+
+The clang-analyzer-osx.cocoa.NSError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
new file mode 100644
index 00000000000..4b521041976
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg
+
+clang-analyzer-osx.cocoa.NilArg
+===============================
+
+The clang-analyzer-osx.cocoa.NilArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
new file mode 100644
index 00000000000..a6da9b0cca4
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue
+
+clang-analyzer-osx.cocoa.NonNilReturnValue
+==========================================
+
+Model the APIs that are guaranteed to return a non-nil value
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
new file mode 100644
index 00000000000..10e21e30a5e
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics
+
+clang-analyzer-osx.cocoa.ObjCGenerics
+=====================================
+
+The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
new file mode 100644
index 00000000000..92a72df785f
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount
+
+clang-analyzer-osx.cocoa.RetainCount
+====================================
+
+The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
new file mode 100644
index 00000000000..67a0519b9b7
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+
+clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+===============================================
+
+Check for leaked memory in autorelease pools that will never be drained
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
new file mode 100644
index 00000000000..96e559e103a
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit
+
+clang-analyzer-osx.cocoa.SelfInit
+=================================
+
+The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
new file mode 100644
index 00000000000..598f12686b4
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc
+
+clang-analyzer-osx.cocoa.SuperDealloc
+=====================================
+
+The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
new file mode 100644
index 00000000000..5a12aa4802c
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars
+
+clang-analyzer-osx.cocoa.UnusedIvars
+====================================
+
+The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
new file mode 100644
index 00000000000..292e7e3fd1c
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes
+
+clang-analyzer-osx.cocoa.VariadicMethodTypes
+============================================
+
+The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
new file mode 100644
index 00000000000..7dab4bdabda
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror
+
+clang-analyzer-osx.coreFoundation.CFError
+=========================================
+
+The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
new file mode 100644
index 00000000000..86e117a72f8
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber
+
+clang-analyzer-osx.coreFoundation.CFNumber
+==========================================
+
+The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
new file mode 100644
index 00000000000..0865611b5df
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease
+
+clang-analyzer-osx.coreFoundation.CFRetainRelease
+=================================================
+
+The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
new file mode 100644
index 00000000000..ca1eb756eac
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds
+
+clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+========================================================
+
+The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
new file mode 100644
index 00000000000..fb1fa15f962
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues
+
+clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+===============================================================
+
+The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
new file mode 100644
index 00000000000..b378a34b9f7
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter
+
+clang-analyzer-security.FloatLoopCounter
+========================================
+
+The clang-analyzer-security.FloatLoopCounter check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
new file mode 100644
index 00000000000..b4e611b2653
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling
+
+clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+====================================================================
+
+The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
new file mode 100644
index 00000000000..9f050da3509
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn
+
+clang-analyzer-security.insecureAPI.UncheckedReturn
+===================================================
+
+The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
new file mode 100644
index 00000000000..a135ee7f205
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp
+
+clang-analyzer-security.insecureAPI.bcmp
+========================================
+
+The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
new file mode 100644
index 00000000000..fc8d2349a09
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy
+
+clang-analyzer-security.insecureAPI.bcopy
+=========================================
+
+The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
new file mode 100644
index 00000000000..c74c2d186cb
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero
+
+clang-analyzer-security.insecureAPI.bzero
+=========================================
+
+The clang-analyzer-security.insecureAPI.bzero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
new file mode 100644
index 00000000000..4f2b79666f6
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw
+
+clang-analyzer-security.insecureAPI.getpw
+=========================================
+
+The clang-analyzer-security.insecureAPI.getpw check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
new file mode 100644
index 00000000000..fc62fe6245e
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets
+
+clang-analyzer-security.insecureAPI.gets
+========================================
+
+The clang-analyzer-security.insecureAPI.gets check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
new file mode 100644
index 00000000000..6c0d8110ac2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp
+
+clang-analyzer-security.insecureAPI.mkstemp
+===========================================
+
+The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
new file mode 100644
index 00000000000..153904f0879
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp
+
+clang-analyzer-security.insecureAPI.mktemp
+==========================================
+
+The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
new file mode 100644
index 00000000000..67c4c87c173
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand
+
+clang-analyzer-security.insecureAPI.rand
+========================================
+
+The clang-analyzer-security.insecureAPI.rand check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
new file mode 100644
index 00000000000..1fcbe160e6b
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy
+
+clang-analyzer-security.insecureAPI.strcpy
+==========================================
+
+The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
new file mode 100644
index 00000000000..c20dea356ad
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork
+
+clang-analyzer-security.insecureAPI.vfork
+=========================================
+
+The clang-analyzer-security.insecureAPI.vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
new file mode 100644
index 00000000000..a3931b2b027
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.API
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-api
+
+clang-analyzer-unix.API
+=======================
+
+The clang-analyzer-unix.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
new file mode 100644
index 00000000000..f772674ed54
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Malloc
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc
+
+clang-analyzer-unix.Malloc
+==========================
+
+The clang-analyzer-unix.Malloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
new file mode 100644
index 00000000000..3cc066b219c
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof
+
+clang-analyzer-unix.MallocSizeof
+================================
+
+The clang-analyzer-unix.MallocSizeof check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
new file mode 100644
index 00000000000..01fc56933b2
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator
+
+clang-analyzer-unix.MismatchedDeallocator
+=========================================
+
+The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
new file mode 100644
index 00000000000..d3f00afe509
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Vfork
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork
+
+clang-analyzer-unix.Vfork
+=========================
+
+The clang-analyzer-unix.Vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
new file mode 100644
index 00000000000..d861faa3ff0
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg
+
+clang-analyzer-unix.cstring.BadSizeArg
+======================================
+
+The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
new file mode 100644
index 00000000000..17bb6af8a5f
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg
+.. meta::
+ :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg
+
+clang-analyzer-unix.cstring.NullArg
+===================================
+
+The clang-analyzer-unix.cstring.NullArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
+for more information.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
new file mode 100644
index 00000000000..d693705d0c6
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf
+
+clang-analyzer-valist.CopyToSelf
+================================
+
+Check for va_lists which are copied onto itself.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
new file mode 100644
index 00000000000..da3f5dbb164
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Uninitialized
+
+clang-analyzer-valist.Uninitialized
+===================================
+
+Check for usages of uninitialized (or already released) va_lists.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
new file mode 100644
index 00000000000..d73688b0e1c
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Unterminated
+
+clang-analyzer-valist.Unterminated
+==================================
+
+Check for va_lists which are not released by a va_end call.
diff --git a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
new file mode 100644
index 00000000000..51956d15f15
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
@@ -0,0 +1,148 @@
+"""
+Generates documentation based off the available static analyzers checks
+References Checkers.td to determine what checks exist
+"""
+
+import argparse
+import subprocess
+import json
+import os
+import re
+
+"""Get path of script so files are always in correct directory"""
+__location__ = os.path.realpath(
+ os.path.join(os.getcwd(), os.path.dirname(__file__)))
+
+"""Get dict of checker related info and parse for full check names
+
+Returns:
+ checkers: dict of checker info
+"""
+def get_checkers(checkers_td_directory):
+ p = subprocess.Popen(["llvm-tblgen", "--dump-json", "-I",
+ checkers_td_directory, checkers_td_directory+"Checkers.td"],
+ stdout=subprocess.PIPE)
+ table_entries = json.loads(p.communicate()[0])
+ documentable_checkers = []
+ checkers = table_entries["!instanceof"]["Checker"]
+ packages = table_entries["!instanceof"]["Package"]
+
+ for checker_ in checkers:
+ checker = table_entries[checker_]
+ checker_name = checker["CheckerName"]
+ package_ = checker["ParentPackage"]["def"]
+ package = table_entries[package_]
+ package_name = package["PackageName"]
+ checker_package_prefix = package_name
+ parent_package_ = package["ParentPackage"]
+ hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0)
+
+ while(parent_package_ != None):
+ parent_package = table_entries[parent_package_["def"]]
+ checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix
+ hidden = hidden or parent_package["Hidden"] != 0
+ parent_package_ = parent_package["ParentPackage"]
+
+ full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name
+ anchor_url = re.sub("\.", "-", checker_package_prefix + "." + checker_name).lower()
+
+ if(not hidden and "alpha" not in full_package_name.lower()):
+ checker["FullPackageName"] = full_package_name
+ checker["AnchorUrl"] = anchor_url
+ documentable_checkers.append(checker)
+
+ documentable_checkers.sort(key=lambda x: x["FullPackageName"])
+ return documentable_checkers
+
+"""Generate documentation for checker
+
+Args:
+ checker: Checker for which to generate documentation.
+ only_help_text: Generate documentation based off the checker description.
+ Used when there is no other documentation to link to.
+"""
+def generate_documentation(checker, only_help_text=False):
+ with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f:
+ f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"])
+ if(not only_help_text):
+ f.write(".. meta::\n")
+ f.write(" :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#%s\n" % checker["AnchorUrl"])
+ f.write("\n")
+ f.write("%s\n" % checker["FullPackageName"])
+ f.write("=" * len(checker["FullPackageName"]) + "\n")
+ f.write("\n")
+ if(only_help_text):
+ f.write("%s\n" % checker["HelpText"])
+ else:
+ f.write("The %s check is an alias, please see\n" % checker["FullPackageName"])
+ f.write("`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#%s>`_\n" % checker["AnchorUrl"])
+ f.write("for more information.\n")
+ f.close()
+
+"""Update list.rst to include the new checks
+
+Args:
+ checkers: dict acquired from get_checkers()
+"""
+def update_documentation_list(checkers):
+ with open(os.path.join(__location__, "list.rst"), "r+") as f:
+ f_text = f.read()
+ header, check_text= f_text.split(".. toctree::\n")
+ checks = check_text.split("\n")
+ for checker in checkers:
+ if((" %s" % checker["FullPackageName"]) not in checks):
+ checks.append(" %s" % checker["FullPackageName"])
+ checks.sort()
+
+ #Overwrite file with new data
+ f.seek(0)
+ f.write(header)
+ f.write(".. toctree::")
+ for check in checks:
+ f.write("%s\n" % check)
+ f.close()
+
+default_path_monorepo = '../../../../clang/include/clang/StaticAnalyzer/Checkers/'
+default_path_in_tree = '../../../../../include/clang/StaticAnalyzer/Checkers/'
+
+def parse_arguments():
+ """Set up and parse command-line arguments
+ Returns:
+ file_path: Path to Checkers.td"""
+ usage = """Parse Checkers.td to generate documentation for static analyzer checks"""
+ parse = argparse.ArgumentParser(description=usage)
+
+ file_path_help = ("""Path to Checkers directory
+ defaults to ../../../../clang/include/clang/StaticAnalyzer/Checkers/ if it exists
+ then to ../../../../../include/clang/StaticAnalyzer/Checkers/""")
+
+ default_path=None
+ if(os.path.exists(default_path_monorepo)):
+ default_path = default_path_monorepo
+ elif(os.path.exists(default_path_in_tree)):
+ default_path = default_path_in_tree
+
+ parse.add_argument("file", type=str, help=file_path_help, nargs='?', default=default_path)
+ args = parse.parse_args()
+
+ if(args.file is None):
+ print("Could not find Checkers directory. Please see -h")
+ exit(1)
+
+ return args.file
+
+
+def main():
+ file_path = parse_arguments()
+ checkers = get_checkers(file_path)
+ for checker in checkers:
+ #No documentation nor alpha documentation
+ if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0):
+ generate_documentation(checker, True)
+ else:
+ generate_documentation(checker)
+ print("Generated documentation for: %s" % checker["FullPackageName"])
+ update_documentation_list(checkers)
+
+if __name__ == '__main__':
+ main()
diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index a04a49f4fb9..26fc254f1fa 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -4,6 +4,7 @@ Clang-Tidy Checks
=================
.. toctree::
+
abseil-duration-addition
abseil-duration-comparison
abseil-duration-conversion-cast
@@ -102,6 +103,90 @@ Clang-Tidy Checks
cert-msc51-cpp
cert-oop11-cpp (redirects to performance-move-constructor-init) <cert-oop11-cpp>
cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) <cert-oop54-cpp>
+ clang-analyzer-core.CallAndMessage
+ clang-analyzer-core.DivideZero
+ clang-analyzer-core.DynamicTypePropagation
+ clang-analyzer-core.NonNullParamChecker
+ clang-analyzer-core.NullDereference
+ clang-analyzer-core.StackAddressEscape
+ clang-analyzer-core.UndefinedBinaryOperatorResult
+ clang-analyzer-core.VLASize
+ clang-analyzer-core.uninitialized.ArraySubscript
+ clang-analyzer-core.uninitialized.Assign
+ clang-analyzer-core.uninitialized.Branch
+ clang-analyzer-core.uninitialized.CapturedBlockVariable
+ clang-analyzer-core.uninitialized.UndefReturn
+ clang-analyzer-cplusplus.InnerPointer
+ clang-analyzer-cplusplus.Move
+ clang-analyzer-cplusplus.NewDelete
+ clang-analyzer-cplusplus.NewDeleteLeaks
+ clang-analyzer-deadcode.DeadStores
+ clang-analyzer-nullability.NullPassedToNonnull
+ clang-analyzer-nullability.NullReturnedFromNonnull
+ clang-analyzer-nullability.NullableDereferenced
+ clang-analyzer-nullability.NullablePassedToNonnull
+ clang-analyzer-nullability.NullableReturnedFromNonnull
+ clang-analyzer-optin.cplusplus.UninitializedObject
+ clang-analyzer-optin.cplusplus.VirtualCall
+ clang-analyzer-optin.mpi.MPI-Checker
+ clang-analyzer-optin.osx.OSObjectCStyleCast
+ clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+ clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+ clang-analyzer-optin.performance.GCDAntipattern
+ clang-analyzer-optin.performance.Padding
+ clang-analyzer-optin.portability.UnixAPI
+ clang-analyzer-osx.API
+ clang-analyzer-osx.MIG
+ clang-analyzer-osx.NumberObjectConversion
+ clang-analyzer-osx.OSObjectRetainCount
+ clang-analyzer-osx.ObjCProperty
+ clang-analyzer-osx.SecKeychainAPI
+ clang-analyzer-osx.cocoa.AtSync
+ clang-analyzer-osx.cocoa.AutoreleaseWrite
+ clang-analyzer-osx.cocoa.ClassRelease
+ clang-analyzer-osx.cocoa.Dealloc
+ clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+ clang-analyzer-osx.cocoa.Loops
+ clang-analyzer-osx.cocoa.MissingSuperCall
+ clang-analyzer-osx.cocoa.NSAutoreleasePool
+ clang-analyzer-osx.cocoa.NSError
+ clang-analyzer-osx.cocoa.NilArg
+ clang-analyzer-osx.cocoa.NonNilReturnValue
+ clang-analyzer-osx.cocoa.ObjCGenerics
+ clang-analyzer-osx.cocoa.RetainCount
+ clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+ clang-analyzer-osx.cocoa.SelfInit
+ clang-analyzer-osx.cocoa.SuperDealloc
+ clang-analyzer-osx.cocoa.UnusedIvars
+ clang-analyzer-osx.cocoa.VariadicMethodTypes
+ clang-analyzer-osx.coreFoundation.CFError
+ clang-analyzer-osx.coreFoundation.CFNumber
+ clang-analyzer-osx.coreFoundation.CFRetainRelease
+ clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+ clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+ clang-analyzer-security.FloatLoopCounter
+ clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+ clang-analyzer-security.insecureAPI.UncheckedReturn
+ clang-analyzer-security.insecureAPI.bcmp
+ clang-analyzer-security.insecureAPI.bcopy
+ clang-analyzer-security.insecureAPI.bzero
+ clang-analyzer-security.insecureAPI.getpw
+ clang-analyzer-security.insecureAPI.gets
+ clang-analyzer-security.insecureAPI.mkstemp
+ clang-analyzer-security.insecureAPI.mktemp
+ clang-analyzer-security.insecureAPI.rand
+ clang-analyzer-security.insecureAPI.strcpy
+ clang-analyzer-security.insecureAPI.vfork
+ clang-analyzer-unix.API
+ clang-analyzer-unix.Malloc
+ clang-analyzer-unix.MallocSizeof
+ clang-analyzer-unix.MismatchedDeallocator
+ clang-analyzer-unix.Vfork
+ clang-analyzer-unix.cstring.BadSizeArg
+ clang-analyzer-unix.cstring.NullArg
+ clang-analyzer-valist.CopyToSelf
+ clang-analyzer-valist.Uninitialized
+ clang-analyzer-valist.Unterminated
cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) <cppcoreguidelines-avoid-c-arrays>
cppcoreguidelines-avoid-goto
cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers) <cppcoreguidelines-avoid-magic-numbers>
OpenPOWER on IntegriCloud