Author: Piotr Zegar
Date: 2024-01-02T18:26:44Z
New Revision: 4b7707bfd9b24e972212c6e40d91c1b21f6f65b6

URL: 
https://github.com/llvm/llvm-project/commit/4b7707bfd9b24e972212c6e40d91c1b21f6f65b6
DIFF: 
https://github.com/llvm/llvm-project/commit/4b7707bfd9b24e972212c6e40d91c1b21f6f65b6.diff

LOG: [clang-tidy][DOC] Generate documentation for new Clang-Analyzer checks

Some checks were recently moved from alpha stage.
Manualy running gen-static-analyzer-docs.py to
generate missing documentation for Clang-tidy.

Added: 
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.core.EnumCastOutOfRange.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.cert.env.InvalidPtr.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Errno.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst

Modified: 
    clang-tools-extra/docs/clang-tidy/checks/list.rst

Removed: 
    


################################################################################
diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.core.EnumCastOutOfRange.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.core.EnumCastOutOfRange.rst
new file mode 100644
index 00000000000000..99dd1adf38f6b9
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.core.EnumCastOutOfRange.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-optin.core.EnumCastOutOfRange
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-core-enumcastoutofrange
+
+clang-analyzer-optin.core.EnumCastOutOfRange
+============================================
+
+Check integer to enumeration casts for out of range values.
+
+The `clang-analyzer-optin.core.EnumCastOutOfRange` check is an alias, please 
see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#optin-core-enumcastoutofrange>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.cert.env.InvalidPtr.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.cert.env.InvalidPtr.rst
new file mode 100644
index 00000000000000..8986fa0e684f58
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.cert.env.InvalidPtr.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-security.cert.env.InvalidPtr
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-cert-env-invalidptr
+
+clang-analyzer-security.cert.env.InvalidPtr
+===========================================
+
+Finds usages of possibly invalidated pointers.
+
+The `clang-analyzer-security.cert.env.InvalidPtr` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-cert-env-invalidptr>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Errno.rst 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Errno.rst
new file mode 100644
index 00000000000000..67a2d05811dc15
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Errno.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-unix.Errno
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-errno
+
+clang-analyzer-unix.Errno
+=========================
+
+Check for improper use of 'errno'.
+
+The `clang-analyzer-unix.Errno` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-errno>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
new file mode 100644
index 00000000000000..17906732c86f70
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.StdCLibraryFunctions.rst
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - clang-analyzer-unix.StdCLibraryFunctions
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-stdclibraryfunctions
+
+clang-analyzer-unix.StdCLibraryFunctions
+========================================
+
+Check for invalid arguments of C standard library functions, and apply 
relations
+between arguments and return value.
+
+The `clang-analyzer-unix.StdCLibraryFunctions` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-stdclibraryfunctions>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst 
b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 39d8b490d927cc..b36bf7d497b9dd 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -440,6 +440,7 @@ Clang-Tidy Checks
    :doc:`clang-analyzer-nullability.NullableDereferenced 
<clang-analyzer/nullability.NullableDereferenced>`, `Clang Static Analyzer 
nullability.NullableDereferenced 
<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_,
    :doc:`clang-analyzer-nullability.NullablePassedToNonnull 
<clang-analyzer/nullability.NullablePassedToNonnull>`, `Clang Static Analyzer 
nullability.NullablePassedToNonnull 
<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_,
    :doc:`clang-analyzer-nullability.NullableReturnedFromNonnull 
<clang-analyzer/nullability.NullableReturnedFromNonnull>`, `Clang Static 
Analyzer nullability.NullableReturnedFromNonnull 
<https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablereturnedfromnonnull>`_,
+   :doc:`clang-analyzer-optin.core.EnumCastOutOfRange 
<clang-analyzer/optin.core.EnumCastOutOfRange>`, `Clang Static Analyzer 
optin.core.EnumCastOutOfRange 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-core-enumcastoutofrange>`_,
    :doc:`clang-analyzer-optin.cplusplus.UninitializedObject 
<clang-analyzer/optin.cplusplus.UninitializedObject>`, `Clang Static Analyzer 
optin.cplusplus.UninitializedObject 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_,
    :doc:`clang-analyzer-optin.cplusplus.VirtualCall 
<clang-analyzer/optin.cplusplus.VirtualCall>`, `Clang Static Analyzer 
optin.cplusplus.VirtualCall 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_,
    :doc:`clang-analyzer-optin.mpi.MPI-Checker 
<clang-analyzer/optin.mpi.MPI-Checker>`, `Clang Static Analyzer 
optin.mpi.MPI-Checker 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_,
@@ -479,6 +480,7 @@ Clang-Tidy Checks
    :doc:`clang-analyzer-osx.coreFoundation.containers.OutOfBounds 
<clang-analyzer/osx.coreFoundation.containers.OutOfBounds>`, `Clang Static 
Analyzer osx.coreFoundation.containers.OutOfBounds 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_,
    :doc:`clang-analyzer-osx.coreFoundation.containers.PointerSizedValues 
<clang-analyzer/osx.coreFoundation.containers.PointerSizedValues>`, `Clang 
Static Analyzer osx.coreFoundation.containers.PointerSizedValues 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_,
    :doc:`clang-analyzer-security.FloatLoopCounter 
<clang-analyzer/security.FloatLoopCounter>`, `Clang Static Analyzer 
security.FloatLoopCounter 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_,
+   :doc:`clang-analyzer-security.cert.env.InvalidPtr 
<clang-analyzer/security.cert.env.InvalidPtr>`, `Clang Static Analyzer 
security.cert.env.InvalidPtr 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-cert-env-invalidptr>`_,
    :doc:`clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling>`, `Clang 
Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_,
    :doc:`clang-analyzer-security.insecureAPI.UncheckedReturn 
<clang-analyzer/security.insecureAPI.UncheckedReturn>`, `Clang Static Analyzer 
security.insecureAPI.UncheckedReturn 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_,
    :doc:`clang-analyzer-security.insecureAPI.bcmp 
<clang-analyzer/security.insecureAPI.bcmp>`, `Clang Static Analyzer 
security.insecureAPI.bcmp 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_,
@@ -493,9 +495,11 @@ Clang-Tidy Checks
    :doc:`clang-analyzer-security.insecureAPI.strcpy 
<clang-analyzer/security.insecureAPI.strcpy>`, `Clang Static Analyzer 
security.insecureAPI.strcpy 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_,
    :doc:`clang-analyzer-security.insecureAPI.vfork 
<clang-analyzer/security.insecureAPI.vfork>`, `Clang Static Analyzer 
security.insecureAPI.vfork 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_,
    :doc:`clang-analyzer-unix.API <clang-analyzer/unix.API>`, `Clang Static 
Analyzer unix.API 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_,
+   :doc:`clang-analyzer-unix.Errno <clang-analyzer/unix.Errno>`, `Clang Static 
Analyzer unix.Errno 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-errno>`_,
    :doc:`clang-analyzer-unix.Malloc <clang-analyzer/unix.Malloc>`, `Clang 
Static Analyzer unix.Malloc 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_,
    :doc:`clang-analyzer-unix.MallocSizeof <clang-analyzer/unix.MallocSizeof>`, 
`Clang Static Analyzer unix.MallocSizeof 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_,
    :doc:`clang-analyzer-unix.MismatchedDeallocator 
<clang-analyzer/unix.MismatchedDeallocator>`, `Clang Static Analyzer 
unix.MismatchedDeallocator 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_,
+   :doc:`clang-analyzer-unix.StdCLibraryFunctions 
<clang-analyzer/unix.StdCLibraryFunctions>`, `Clang Static Analyzer 
unix.StdCLibraryFunctions 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-stdclibraryfunctions>`_,
    :doc:`clang-analyzer-unix.Vfork <clang-analyzer/unix.Vfork>`, `Clang Static 
Analyzer unix.Vfork 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_,
    :doc:`clang-analyzer-unix.cstring.BadSizeArg 
<clang-analyzer/unix.cstring.BadSizeArg>`, `Clang Static Analyzer 
unix.cstring.BadSizeArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_,
    :doc:`clang-analyzer-unix.cstring.NullArg 
<clang-analyzer/unix.cstring.NullArg>`, `Clang Static Analyzer 
unix.cstring.NullArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_,


        
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to