diff --git a/clang-tools-extra/clang-tidy/add_new_check.py b/clang-tools-extra/clang-tidy/add_new_check.py index 520212883d997..ada2ee1119cf9 100755 --- a/clang-tools-extra/clang-tidy/add_new_check.py +++ b/clang-tools-extra/clang-tidy/add_new_check.py @@ -484,7 +484,7 @@ def process_doc(doc_file): def format_link(doc_file): check_name, match = process_doc(doc_file) if not match and check_name and not check_name.startswith("clang-analyzer-"): - return " `%(check_name)s <%(module)s/%(check)s.html>`_,%(autofix)s\n" % { + return " :doc:`%(check_name)s <%(module)s/%(check)s>`,%(autofix)s\n" % { "check_name": check_name, "module": doc_file[0], "check": doc_file[1].replace(".rst", ""), @@ -503,16 +503,20 @@ def format_link_alias(doc_file): # Preserve the anchor in checkers.html from group 2. target = "" if not match else match.group(1) + ".html" + match.group(2) autofix = "" + ref_begin = "" + ref_end = "_" else: redirect_parts = re.search("^\.\./([^/]*)/([^/]*)$", match.group(1)) title = redirect_parts[1] + "-" + redirect_parts[2] - target = redirect_parts[1] + "/" + redirect_parts[2] + ".html" + target = redirect_parts[1] + "/" + redirect_parts[2] autofix = has_auto_fix(title) + ref_begin = ":doc:" + ref_end = "" if target: # The checker is just a redirect. return ( - " `%(check_name)s <%(module)s/%(check_file)s.html>`_, `%(title)s <%(target)s>`_,%(autofix)s\n" + " :doc:`%(check_name)s <%(module)s/%(check_file)s>`, %(ref_begin)s`%(title)s <%(target)s>`%(ref_end)s,%(autofix)s\n" % { "check_name": check_name, "module": module, @@ -520,11 +524,13 @@ def format_link_alias(doc_file): "target": target, "title": title, "autofix": autofix, + "ref_begin" : ref_begin, + "ref_end" : ref_end }) else: # The checker is just a alias without redirect. return ( - " `%(check_name)s <%(module)s/%(check_file)s.html>`_, %(title)s,%(autofix)s\n" + " :doc:`%(check_name)s <%(module)s/%(check_file)s>`, %(title)s,%(autofix)s\n" % { "check_name": check_name, "module": module, diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst index 880f945024fd0..f4bb40b341bcd 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/narrowing-conversions.rst @@ -6,5 +6,5 @@ bugprone-narrowing-conversions ============================== The bugprone-narrowing-conversions check is an alias, please see -`cppcoreguidelines-narrowing-conversions <../cppcoreguidelines/narrowing-conversions.html>`_ +:doc:`cppcoreguidelines-narrowing-conversions <../cppcoreguidelines/narrowing-conversions>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst b/clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst index c9b24dbcbb94f..5ca96216a1004 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/bugprone/unused-return-value.rst @@ -52,5 +52,5 @@ Options By default the following function return types are checked: `::std::error_code`, `::std::error_condition`, `::std::errc`, `::std::expected`, `::boost::system::error_code` -`cert-err33-c <../cert/err33-c.html>`_ is an alias of this check that checks a +:doc:`cert-err33-c <../cert/err33-c>` is an alias of this check that checks a fixed and large set of standard library functions. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst index 38f85af12d084..2a1d5173dd756 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/con36-c.rst @@ -5,6 +5,6 @@ cert-con36-c ============ -The cert-con36-c check is an alias, please see -`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions.html>`_ +The `cert-con36-c` check is an alias, please see +:doc:`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst index b6cf410243058..3b4039d7d4ec0 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/con54-cpp.rst @@ -5,6 +5,6 @@ cert-con54-cpp ============== -The cert-con54-cpp check is an alias, please see -`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions.html>`_ +The `cert-con54-cpp` check is an alias, please see +:doc:`bugprone-spuriously-wake-up-functions <../bugprone/spuriously-wake-up-functions>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst index 98ec1c1c0c376..6bb7408060ee6 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl03-c.rst @@ -5,5 +5,5 @@ cert-dcl03-c ============ -The cert-dcl03-c check is an alias, please see -`misc-static-assert <../misc/static-assert.html>`_ for more information. +The `cert-dcl03-c` check is an alias, please see +:doc:`misc-static-assert <../misc/static-assert>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst index 9ee698bfd9d92..7a5b63db1782c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl16-c.rst @@ -5,5 +5,5 @@ cert-dcl16-c ============ -The cert-dcl16-c check is an alias, please see -`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix.html>`_ for more information. +The `cert-dcl16-c` check is an alias, please see +:doc:`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst index c221f7f0afcf8..3167567d54622 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl37-c.rst @@ -5,6 +5,6 @@ cert-dcl37-c ============ -The cert-dcl37-c check is an alias, please see -`bugprone-reserved-identifier <../bugprone/reserved-identifier.html>`_ for more +The `cert-dcl37-c` check is an alias, please see +:doc:`bugprone-reserved-identifier <../bugprone/reserved-identifier>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst index 573fc16866ba4..1e17a52428f98 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl51-cpp.rst @@ -5,6 +5,6 @@ cert-dcl51-cpp ============== -The cert-dcl51-cpp check is an alias, please see -`bugprone-reserved-identifier <../bugprone/reserved-identifier.html>`_ for more +The `cert-dcl51-cpp` check is an alias, please see +:doc:`bugprone-reserved-identifier <../bugprone/reserved-identifier>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst index 216d206d66bc9..8438611a7d5c7 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl54-cpp.rst @@ -5,6 +5,6 @@ cert-dcl54-cpp ============== -The cert-dcl54-cpp check is an alias, please see -`misc-new-delete-overloads <../misc/new-delete-overloads.html>`_ for more +The `cert-dcl54-cpp` check is an alias, please see +:doc:`misc-new-delete-overloads <../misc/new-delete-overloads>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst index 2022b1c051084..9aeed141d655d 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/dcl59-cpp.rst @@ -5,5 +5,5 @@ cert-dcl59-cpp ============== -The cert-dcl59-cpp check is an alias, please see -`google-build-namespaces <../google/build-namespaces.html>`_ for more information. +The `cert-dcl59-cpp` check is an alias, please see +:doc:`google-build-namespaces <../google/build-namespaces>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst index 75b495e099a8b..1a9c0f9d7cbed 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err09-cpp.rst @@ -5,8 +5,8 @@ cert-err09-cpp ============== -The cert-err09-cpp check is an alias, please see -`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference.html>`_ +The `cert-err09-cpp` check is an alias, please see +:doc:`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference>` for more information. This check corresponds to the CERT C++ Coding Standard recommendation diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst index c75ee8d3c09d7..f3211e50b7e6c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err33-c.rst @@ -186,7 +186,7 @@ functions are checked: * wscanf() * wscanf_s() -This check is an alias of check `bugprone-unused-return-value <../bugprone/unused-return-value.html>`_ +This check is an alias of check :doc:`bugprone-unused-return-value <../bugprone/unused-return-value>` with a fixed set of functions. The check corresponds to a part of CERT C Coding Standard rule `ERR33-C. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst index d38456a9e3f77..96007952c0e2a 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/err61-cpp.rst @@ -5,6 +5,6 @@ cert-err61-cpp ============== -The cert-err61-cpp check is an alias, please see -`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference.html>`_ +The `cert-err61-cpp` check is an alias, please see +:doc:`misc-throw-by-value-catch-by-reference <../misc/throw-by-value-catch-by-reference>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst index f5f9e54a20345..03a3679dba4e2 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/exp42-c.rst @@ -4,5 +4,5 @@ cert-exp42-c ============ -The cert-exp42-c check is an alias, please see -`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison.html>`_ for more information. +The `cert-exp42-c` check is an alias, please see +:doc:`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst index 5093592424b0a..aeaaad793ca5c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/fio38-c.rst @@ -5,6 +5,6 @@ cert-fio38-c ============ -The cert-fio38-c check is an alias, please see -`misc-non-copyable-objects <../misc/non-copyable-objects.html>`_ for more +The `cert-fio38-c` check is an alias, please see +:doc:`misc-non-copyable-objects <../misc/non-copyable-objects>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst index 806bf0eb44ba1..05277ef99c911 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/flp37-c.rst @@ -4,5 +4,5 @@ cert-flp37-c ============ -The cert-flp37-c check is an alias, please see -`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison.html>`_ for more information. +The `cert-flp37-c` check is an alias, please see +:doc:`bugprone-suspicious-memory-comparison <../bugprone/suspicious-memory-comparison>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc24-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc24-c.rst index f4b3f3f663921..91ef3c34fd4db 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc24-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc24-c.rst @@ -5,6 +5,6 @@ cert-msc24-c ============ -The cert-msc24-c check is an alias, please see -`bugprone-unsafe-functions <../bugprone/unsafe-functions.html>`_ for more +The `cert-msc24-c` check is an alias, please see +:doc:`bugprone-unsafe-functions <../bugprone/unsafe-functions>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst index cdb4cfa1a7bb9..a2898f1a11acf 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc30-c.rst @@ -5,5 +5,5 @@ cert-msc30-c ============ -The cert-msc30-c check is an alias, please see -`cert-msc50-cpp <../cert/msc50-cpp.html>`_ for more information. +The `cert-msc30-c` check is an alias, please see +:doc:`cert-msc50-cpp <../cert/msc50-cpp>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst index e184a4ff37e06..6e453edefa76e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc32-c.rst @@ -5,5 +5,5 @@ cert-msc32-c ============ -The cert-msc32-c check is an alias, please see -`cert-msc51-cpp <../cert/msc51-cpp.html>`_ for more information. +The `cert-msc32-c` check is an alias, please see +:doc:`cert-msc51-cpp <../cert/msc51-cpp>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc33-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc33-c.rst index 5c61556edab00..412ea21490aff 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc33-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc33-c.rst @@ -5,6 +5,6 @@ cert-msc33-c ============ -The cert-msc33-c check is an alias, please see -`bugprone-unsafe-functions <../bugprone/unsafe-functions.html>`_ for more +The `cert-msc33-c` check is an alias, please see +:doc:`bugprone-unsafe-functions <../bugprone/unsafe-functions>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/msc54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/msc54-cpp.rst index 2c966cb2b5f01..e2bd2c5c1b249 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/msc54-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/msc54-cpp.rst @@ -5,6 +5,6 @@ cert-msc54-cpp ============== -The cert-msc54-cpp check is an alias, please see -`bugprone-signal-handler <../bugprone/signal-handler.html>`_ +The `cert-msc54-cpp` check is an alias, please see +:doc:`bugprone-signal-handler <../bugprone/signal-handler>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst index fe50c260bed0b..a18503e5e7955 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/oop11-cpp.rst @@ -5,8 +5,8 @@ cert-oop11-cpp ============== -The cert-oop11-cpp check is an alias, please see -`performance-move-constructor-init <../performance/move-constructor-init.html>`_ +The `cert-oop11-cpp check` is an alias, please see +:doc:`performance-move-constructor-init <../performance/move-constructor-init>` for more information. This check corresponds to the CERT C++ Coding Standard recommendation diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst index f83865c9f0d89..e7c957488507f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/oop54-cpp.rst @@ -5,6 +5,6 @@ cert-oop54-cpp ============== -The cert-oop54-cpp check is an alias, please see -`bugprone-unhandled-self-assignment <../bugprone/unhandled-self-assignment.html>`_ +The `cert-oop54-cpp` check is an alias, please see +:doc:`bugprone-unhandled-self-assignment <../bugprone/unhandled-self-assignment>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst index f821e36d9f9fb..2fd6c5c4b99a2 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/pos44-c.rst @@ -5,5 +5,5 @@ cert-pos44-c ============ -The cert-pos44-c check is an alias, please see -`bugprone-bad-signal-to-kill-thread <../bugprone/bad-signal-to-kill-thread.html>`_ for more information. +The `cert-pos44-c` check is an alias, please see +:doc:`bugprone-bad-signal-to-kill-thread <../bugprone/bad-signal-to-kill-thread>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst index 91547ebe17b98..9b62a3ab9a366 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/pos47-c.rst @@ -5,5 +5,5 @@ cert-pos47-c ============ -The cert-pos47-c check is an alias, please see -`concurrency-thread-canceltype-asynchronous <../concurrency/thread-canceltype-asynchronous.html>`_ for more information. +The `cert-pos47-c` check is an alias, please see +:doc:`concurrency-thread-canceltype-asynchronous <../concurrency/thread-canceltype-asynchronous>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst index 73b35bc200b2f..af5251d77bdfe 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/sig30-c.rst @@ -5,6 +5,6 @@ cert-sig30-c ============ -The cert-sig30-c check is an alias, please see -`bugprone-signal-handler <../bugprone/signal-handler.html>`_ +The `cert-sig30-c` check is an alias, please see +:doc:`bugprone-signal-handler <../bugprone/signal-handler>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst b/clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst index d109fa5fc984c..ddbb2164c77c5 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cert/str34-c.rst @@ -5,6 +5,6 @@ cert-str34-c ============ -The cert-str34-c check is an alias, please see -`bugprone-signed-char-misuse <../bugprone/signed-char-misuse.html>`_ +The `cert-str34-c` check is an alias, please see +:doc:`bugprone-signed-char-misuse <../bugprone/signed-char-misuse>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.BitwiseShift.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.BitwiseShift.rst new file mode 100644 index 0000000000000..d8d6314d43922 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.BitwiseShift.rst @@ -0,0 +1,13 @@ +.. title:: clang-tidy - clang-analyzer-core.BitwiseShift +.. meta:: + :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-bitwiseshift + +clang-analyzer-core.BitwiseShift +================================ + +Finds cases where bitwise shift operation causes undefined behaviour. + +The `clang-analyzer-core.BitwiseShift` check is an alias, please see +`Clang Static Analyzer Available Checkers +`_ +for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst index cb8a21dc688c7..df0dccced7c81 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.CallAndMessage.rst @@ -8,7 +8,7 @@ clang-analyzer-core.CallAndMessage Check for logical errors for function calls and Objective-C message expressions (e.g., uninitialized arguments, null function pointers). -The clang-analyzer-core.CallAndMessage check is an alias, please see +The `clang-analyzer-core.CallAndMessage` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst index 2128501702515..b88a761850f65 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.DivideZero.rst @@ -7,7 +7,7 @@ clang-analyzer-core.DivideZero Check for division by zero. -The clang-analyzer-core.DivideZero check is an alias, please see +The `clang-analyzer-core.DivideZero` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst index c103b99da3eba..439cb98978847 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NonNullParamChecker.rst @@ -8,7 +8,7 @@ clang-analyzer-core.NonNullParamChecker Check for null pointers passed as arguments to a function whose arguments are references or marked with the 'nonnull' attribute. -The clang-analyzer-core.NonNullParamChecker check is an alias, please see +The `clang-analyzer-core.NonNullParamChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst index c225fa5ee9526..6bb4c1b79cefe 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.NullDereference.rst @@ -7,7 +7,7 @@ clang-analyzer-core.NullDereference Check for dereferences of null pointers. -The clang-analyzer-core.NullDereference check is an alias, please see +The `clang-analyzer-core.NullDereference` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst index 1efe0a4b26b2e..c4769e16ffbfa 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.StackAddressEscape.rst @@ -7,7 +7,7 @@ clang-analyzer-core.StackAddressEscape Check that addresses to stack memory do not escape the function. -The clang-analyzer-core.StackAddressEscape check is an alias, please see +The `clang-analyzer-core.StackAddressEscape` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst index 29f9d695b5f83..5242232415245 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.UndefinedBinaryOperatorResult.rst @@ -7,7 +7,7 @@ clang-analyzer-core.UndefinedBinaryOperatorResult Check for undefined results of binary operators. -The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see +The `clang-analyzer-core.UndefinedBinaryOperatorResult` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst index 600392b564732..f9af836cf6607 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.VLASize.rst @@ -7,7 +7,7 @@ clang-analyzer-core.VLASize Check for declarations of VLA of undefined or zero size. -The clang-analyzer-core.VLASize check is an alias, please see +The `clang-analyzer-core.VLASize` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst index ebb4c74249ca9..7f0c6b18147f6 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.ArraySubscript.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.ArraySubscript Check for uninitialized values used as array subscripts. -The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see +The `clang-analyzer-core.uninitialized.ArraySubscript` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst index eb53d0ecbd29b..79618e59e8f09 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Assign.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.Assign Check for assigning uninitialized values. -The clang-analyzer-core.uninitialized.Assign check is an alias, please see +The `clang-analyzer-core.uninitialized.Assign` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst index 330d8507e66a9..fe5763823d52e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.Branch.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.Branch Check for uninitialized values used as branch conditions. -The clang-analyzer-core.uninitialized.Branch check is an alias, please see +The `clang-analyzer-core.uninitialized.Branch` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst index ffe7a940096a7..b052c9de4302b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.CapturedBlockVariable.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.CapturedBlockVariable Check for blocks that capture uninitialized values. -The clang-analyzer-core.uninitialized.CapturedBlockVariable check is an alias, please see +The `clang-analyzer-core.uninitialized.CapturedBlockVariable` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst index 79a5c0abebf8f..03aeb3e185407 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.NewArraySize.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.NewArraySize Check if the size of the array in a new[] expression is undefined. -The clang-analyzer-core.uninitialized.NewArraySize check is an alias, please see +The `clang-analyzer-core.uninitialized.NewArraySize` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst index 4039cd0f9a112..25d52fc8baca7 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/core.uninitialized.UndefReturn.rst @@ -7,7 +7,7 @@ clang-analyzer-core.uninitialized.UndefReturn Check for uninitialized values being returned to the caller. -The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see +The `clang-analyzer-core.uninitialized.UndefReturn` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst index bc7d8a7d27660..91937c1adf8cb 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.InnerPointer.rst @@ -7,7 +7,7 @@ clang-analyzer-cplusplus.InnerPointer Check for inner pointers of C++ containers used after re/deallocation. -The clang-analyzer-cplusplus.InnerPointer check is an alias, please see +The `clang-analyzer-cplusplus.InnerPointer` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst index 620f1e88da181..1a7174b0fea45 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDelete.rst @@ -8,7 +8,7 @@ clang-analyzer-cplusplus.NewDelete Check for double-free and use-after-free problems. Traces memory managed by new/delete. -The clang-analyzer-cplusplus.NewDelete check is an alias, please see +The `clang-analyzer-cplusplus.NewDelete` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst index 1f85373511d37..dcd58cd100238 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.NewDeleteLeaks.rst @@ -7,7 +7,7 @@ clang-analyzer-cplusplus.NewDeleteLeaks Check for memory leaks. Traces memory managed by new/delete. -The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see +The `clang-analyzer-cplusplus.NewDeleteLeaks` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst index c5d19a7deeb2e..75a1653587452 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PlacementNew.rst @@ -8,7 +8,7 @@ clang-analyzer-cplusplus.PlacementNew Check if default placement new is provided with pointers to sufficient storage capacity. -The clang-analyzer-cplusplus.PlacementNew check is an alias, please see +The `clang-analyzer-cplusplus.PlacementNew` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst index e3d4a511a61a7..5ffbae9c2660c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.StringChecker.rst @@ -7,7 +7,7 @@ clang-analyzer-cplusplus.StringChecker Checks C++ std::string bugs. -The clang-analyzer-cplusplus.StringChecker check is an alias, please see +The `clang-analyzer-cplusplus.StringChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst index b421e2cbd3c69..faab8cd4c5e96 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/deadcode.DeadStores.rst @@ -7,7 +7,7 @@ clang-analyzer-deadcode.DeadStores Check for values stored to variables that are never read afterwards. -The clang-analyzer-deadcode.DeadStores check is an alias, please see +The `clang-analyzer-deadcode.DeadStores` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst index 5f2a3aaae1ed1..974aa491e1183 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/fuchsia.HandleChecker.rst @@ -7,7 +7,7 @@ clang-analyzer-fuchsia.HandleChecker A Checker that detect leaks related to Fuchsia handles. -The clang-analyzer-fuchsia.HandleChecker check is an alias, please see +The `clang-analyzer-fuchsia.HandleChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst index 85e0dc2f116c5..0cba3bea831ee 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullPassedToNonnull.rst @@ -7,7 +7,7 @@ clang-analyzer-nullability.NullPassedToNonnull Warns when a null pointer is passed to a pointer which has a _Nonnull type. -The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see +The `clang-analyzer-nullability.NullPassedToNonnull` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst index 132c8311bc1d0..d7f8f7ef3119e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullReturnedFromNonnull.rst @@ -8,7 +8,7 @@ clang-analyzer-nullability.NullReturnedFromNonnull Warns when a null pointer is returned from a function that has _Nonnull return type. -The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see +The `clang-analyzer-nullability.NullReturnedFromNonnull` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst index 027487b1533ea..c86960c877cea 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableDereferenced.rst @@ -7,7 +7,7 @@ clang-analyzer-nullability.NullableDereferenced Warns when a nullable pointer is dereferenced. -The clang-analyzer-nullability.NullableDereferenced check is an alias, please see +The `clang-analyzer-nullability.NullableDereferenced` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst index f1261e680595a..f2830669d5c75 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullablePassedToNonnull.rst @@ -7,7 +7,7 @@ clang-analyzer-nullability.NullablePassedToNonnull Warns when a nullable pointer is passed to a pointer which has a _Nonnull type. -The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see +The `clang-analyzer-nullability.NullablePassedToNonnull` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst index dc6f7a1525b80..220c839cb240b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/nullability.NullableReturnedFromNonnull.rst @@ -8,7 +8,7 @@ clang-analyzer-nullability.NullableReturnedFromNonnull Warns when a nullable pointer is returned from a function that has _Nonnull return type. -The clang-analyzer-nullability.NullableReturnedFromNonnull check is an alias, please see +The `clang-analyzer-nullability.NullableReturnedFromNonnull` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst index 5cf352a23cadc..ed66cfc6efd9f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.UninitializedObject.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.cplusplus.UninitializedObject Reports uninitialized fields after object construction. -The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see +The `clang-analyzer-optin.cplusplus.UninitializedObject` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst index 5ec5faaec71ee..4b7a25441f9f8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.cplusplus.VirtualCall.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.cplusplus.VirtualCall Check virtual function calls during construction/destruction. -The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see +The `clang-analyzer-optin.cplusplus.VirtualCall` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst index 45b1a92fc3378..005d904ec3e02 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.mpi.MPI-Checker.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.mpi.MPI-Checker Checks MPI code. -The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see +The `clang-analyzer-optin.mpi.MPI-Checker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst index 669f37c365c8e..81d4fc39cd561 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker Check that NSLocalizedString macros include a comment for context. -The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see +The `clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst index 3ab5fd847d407..3faef615eaaad 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst @@ -8,7 +8,7 @@ clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker Warns about uses of non-localized NSStrings passed to UI methods expecting localized NSStrings. -The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see +The `clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst index 6b1af473c572b..95f435acd7c9c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.GCDAntipattern.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.performance.GCDAntipattern Check for performance anti-patterns when using Grand Central Dispatch. -The clang-analyzer-optin.performance.GCDAntipattern check is an alias, please see +The `clang-analyzer-optin.performance.GCDAntipattern` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst index 40e5e65419285..77acf0a6ed115 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.performance.Padding.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.performance.Padding Check for excessively padded structs. -The clang-analyzer-optin.performance.Padding check is an alias, please see +The `clang-analyzer-optin.performance.Padding` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst index 43dafc841777d..f133494718a87 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.portability.UnixAPI.rst @@ -7,7 +7,7 @@ clang-analyzer-optin.portability.UnixAPI Finds implementation-defined behavior in UNIX/Posix functions. -The clang-analyzer-optin.portability.UnixAPI check is an alias, please see +The `clang-analyzer-optin.portability.UnixAPI` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst index 46f0821880d50..7bb178d1072f5 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.API.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.API Check for proper uses of various Apple APIs. -The clang-analyzer-osx.API check is an alias, please see +The `clang-analyzer-osx.API` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst index cc45624987db8..89ddfeb9ecd45 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.NumberObjectConversion.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.NumberObjectConversion Check for erroneous conversions of objects representing numbers into numbers. -The clang-analyzer-osx.NumberObjectConversion check is an alias, please see +The `clang-analyzer-osx.NumberObjectConversion` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst index 8df48b78ca2bc..a3c2aca52a550 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.ObjCProperty.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.ObjCProperty Check for proper uses of Objective-C properties. -The clang-analyzer-osx.ObjCProperty check is an alias, please see +The `clang-analyzer-osx.ObjCProperty` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst index 4d6f6a1684111..21dc34e73e1f6 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.SecKeychainAPI.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.SecKeychainAPI Check for proper uses of Secure Keychain APIs. -The clang-analyzer-osx.SecKeychainAPI check is an alias, please see +The `clang-analyzer-osx.SecKeychainAPI` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst index 60e4022ff9915..341dcf51fc614 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AtSync.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.AtSync Check for nil pointers used as mutexes for @synchronized. -The clang-analyzer-osx.cocoa.AtSync check is an alias, please see +The `clang-analyzer-osx.cocoa.AtSync` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst index 1cca7bb9238e6..f2516c36e08a7 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.AutoreleaseWrite.rst @@ -8,7 +8,7 @@ clang-analyzer-osx.cocoa.AutoreleaseWrite Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C. -The clang-analyzer-osx.cocoa.AutoreleaseWrite check is an alias, please see +The `clang-analyzer-osx.cocoa.AutoreleaseWrite` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst index 3cf78ab874f3b..ae197294b97a4 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ClassRelease.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.ClassRelease Check for sending 'retain', 'release', or 'autorelease' directly to a Class. -The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see +The `clang-analyzer-osx.cocoa.ClassRelease` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst index acaf11442b0e2..4176e8279f64e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Dealloc.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.Dealloc Warn about Objective-C classes that lack a correct implementation of -dealloc. -The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see +The `clang-analyzer-osx.cocoa.Dealloc` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst index 17e13f582c0f6..a3b47405b631f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.IncompatibleMethodTypes.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.IncompatibleMethodTypes Warn about Objective-C method signatures with type incompatibilities. -The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see +The `clang-analyzer-osx.cocoa.IncompatibleMethodTypes` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst index 2ee092bbf8f00..03af29665b426 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.Loops.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.Loops Improved modeling of loops using Cocoa collection types. -The clang-analyzer-osx.cocoa.Loops check is an alias, please see +The `clang-analyzer-osx.cocoa.Loops` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst index ee57d1d86f100..53d96f6c6298f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.MissingSuperCall.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.MissingSuperCall Warn about Objective-C methods that lack a necessary call to super. -The clang-analyzer-osx.cocoa.MissingSuperCall check is an alias, please see +The `clang-analyzer-osx.cocoa.MissingSuperCall` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst index 0c10069041604..22f5bc21d8a33 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSAutoreleasePool.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.NSAutoreleasePool Warn for suboptimal uses of NSAutoreleasePool in Objective-C GC mode. -The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see +The `clang-analyzer-osx.cocoa.NSAutoreleasePool` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst index 35fddde39d8db..fdb93230e530b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NSError.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.NSError Check usage of NSError** parameters. -The clang-analyzer-osx.cocoa.NSError check is an alias, please see +The `clang-analyzer-osx.cocoa.NSError` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst index 0e189a1d9d1d8..116dfd0dfc765 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NilArg.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.NilArg Check for prohibited nil arguments to ObjC method calls. -The clang-analyzer-osx.cocoa.NilArg check is an alias, please see +The `clang-analyzer-osx.cocoa.NilArg` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst index aafdd3dc27f5c..e4ae9f817fc58 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.NonNilReturnValue.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.NonNilReturnValue Model the APIs that are guaranteed to return a non-nil value. -The clang-analyzer-osx.cocoa.NonNilReturnValue check is an alias, please see +The `clang-analyzer-osx.cocoa.NonNilReturnValue` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst index d27a492cb224e..dc80bd2b9125c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.ObjCGenerics.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.ObjCGenerics Check for type errors when using Objective-C generics. -The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see +The `clang-analyzer-osx.cocoa.ObjCGenerics` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst index d0e71e8a823bf..d932bf5079456 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RetainCount.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.RetainCount Check for leaks and improper reference count management. -The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see +The `clang-analyzer-osx.cocoa.RetainCount` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst index 3b2e433964e77..2388d96673b6b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.RunLoopAutoreleaseLeak.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak Check for leaked memory in autorelease pools that will never be drained. -The clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak check is an alias, please see +The `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst index a5484f2ad8c7f..ec218b6d92ca5 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SelfInit.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.SelfInit Check that 'self' is properly initialized inside an initializer method. -The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see +The `clang-analyzer-osx.cocoa.SelfInit` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst index ab13b6ab3289b..f0e52e7ad2f02 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.SuperDealloc.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.SuperDealloc Warn about improper use of '[super dealloc]' in Objective-C. -The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see +The `clang-analyzer-osx.cocoa.SuperDealloc` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst index cb3ffd1d870eb..ed92cf583680b 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.UnusedIvars.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.cocoa.UnusedIvars Warn about private ivars that are never used. -The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see +The `clang-analyzer-osx.cocoa.UnusedIvars` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst index fd9405451a427..b18ca4338d140 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.cocoa.VariadicMethodTypes.rst @@ -8,7 +8,7 @@ clang-analyzer-osx.cocoa.VariadicMethodTypes Check for passing non-Objective-C types to variadic collection initialization methods that expect only Objective-C types. -The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see +The `clang-analyzer-osx.cocoa.VariadicMethodTypes` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst index 200ec6232bcc2..54547aded1ddc 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFError.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.coreFoundation.CFError Check usage of CFErrorRef* parameters. -The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see +The `clang-analyzer-osx.coreFoundation.CFError` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst index 83a0541e0e32c..ce8ebadcac3bf 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFNumber.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.coreFoundation.CFNumber Check for proper uses of CFNumber APIs. -The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see +The `clang-analyzer-osx.coreFoundation.CFNumber` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst index 766993900d364..4cc5a6c8e95a5 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.CFRetainRelease.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.coreFoundation.CFRetainRelease Check for null arguments to CFRetain/CFRelease/CFMakeCollectable. -The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see +The `clang-analyzer-osx.coreFoundation.CFRetainRelease` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst index e8fb9ea806f68..2c6f30c4fbcf9 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.OutOfBounds.rst @@ -7,7 +7,7 @@ clang-analyzer-osx.coreFoundation.containers.OutOfBounds Checks for index out-of-bounds when using 'CFArray' API. -The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see +The `clang-analyzer-osx.coreFoundation.containers.OutOfBounds` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst index 57370934eae6f..6862f6f187279 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.coreFoundation.containers.PointerSizedValues.rst @@ -8,7 +8,7 @@ clang-analyzer-osx.coreFoundation.containers.PointerSizedValues Warns if 'CFArray', 'CFDictionary', 'CFSet' are created with non-pointer-size values. -The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see +The `clang-analyzer-osx.coreFoundation.containers.PointerSizedValues` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst index a39f4ae66f032..c6c6719805f30 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.FloatLoopCounter.rst @@ -8,7 +8,7 @@ clang-analyzer-security.FloatLoopCounter Warn on using a floating point value as a loop counter (CERT: FLP30-C, FLP30-CPP). -The clang-analyzer-security.FloatLoopCounter check is an alias, please see +The `clang-analyzer-security.FloatLoopCounter` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst index c7c035ecec6ae..8a8880805af70 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling Warn on uses of unsecure or deprecated buffer manipulating functions. -The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see +The `clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst index 52b03170e0842..b4489c649633d 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.UncheckedReturn.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.UncheckedReturn Warn on uses of functions whose return values must be always checked. -The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see +The `clang-analyzer-security.insecureAPI.UncheckedReturn` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst index 26412c0c2cdc2..e0c66a7083f37 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcmp.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.bcmp Warn on uses of the 'bcmp' function. -The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see +The `clang-analyzer-security.insecureAPI.bcmp` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst index 73894233661d8..2d6869b6ebcab 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bcopy.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.bcopy Warn on uses of the 'bcopy' function. -The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see +The `clang-analyzer-security.insecureAPI.bcopy` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst index 5626015234c5b..e9ed1f7d1e28a 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.bzero.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.bzero Warn on uses of the 'bzero' function. -The clang-analyzer-security.insecureAPI.bzero check is an alias, please see +The `clang-analyzer-security.insecureAPI.bzero` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst index 0bac901c623ad..ed661a2fa3590 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.getpw.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.getpw Warn on uses of the 'getpw' function. -The clang-analyzer-security.insecureAPI.getpw check is an alias, please see +The `clang-analyzer-security.insecureAPI.getpw` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst index 7f9cf4ff32dcb..5b579d825381d 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.gets.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.gets Warn on uses of the 'gets' function. -The clang-analyzer-security.insecureAPI.gets check is an alias, please see +The `clang-analyzer-security.insecureAPI.gets` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst index 54349760ed584..d84251db35142 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mkstemp.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.mkstemp Warn when 'mkstemp' is passed fewer than 6 X's in the format string. -The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see +The `clang-analyzer-security.insecureAPI.mkstemp` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst index 5d04ffecbd1df..e5778cbfb6c2f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.mktemp.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.mktemp Warn on uses of the 'mktemp' function. -The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see +The `clang-analyzer-security.insecureAPI.mktemp` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst index 634898bf40eb0..25acabe7f8a16 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.rand.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.rand Warn on uses of the 'rand', 'random', and related functions. -The clang-analyzer-security.insecureAPI.rand check is an alias, please see +The `clang-analyzer-security.insecureAPI.rand` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst index 608bb5841a592..4177950d686b3 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.strcpy.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.strcpy Warn on uses of the 'strcpy' and 'strcat' functions. -The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see +The `clang-analyzer-security.insecureAPI.strcpy` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst index d65307855824d..0a24fb960b520 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.insecureAPI.vfork.rst @@ -7,7 +7,7 @@ clang-analyzer-security.insecureAPI.vfork Warn on uses of the 'vfork' function. -The clang-analyzer-security.insecureAPI.vfork check is an alias, please see +The `clang-analyzer-security.insecureAPI.vfork` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst index 02438ad635f62..b561b9037d2a4 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.API.rst @@ -7,7 +7,7 @@ clang-analyzer-unix.API Check calls to various UNIX/Posix functions. -The clang-analyzer-unix.API check is an alias, please see +The `clang-analyzer-unix.API` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst index 949b9164b6bfd..78c0ef193623a 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Malloc.rst @@ -8,7 +8,7 @@ clang-analyzer-unix.Malloc Check for memory leaks, double free, and use-after-free problems. Traces memory managed by malloc()/free(). -The clang-analyzer-unix.Malloc check is an alias, please see +The `clang-analyzer-unix.Malloc` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst index c33f6d3f6728f..6cb193dd5fab7 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MallocSizeof.rst @@ -7,7 +7,7 @@ clang-analyzer-unix.MallocSizeof Check for dubious malloc arguments involving sizeof. -The clang-analyzer-unix.MallocSizeof check is an alias, please see +The `clang-analyzer-unix.MallocSizeof` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst index c14e0e2873b2b..924dd41a1b6d2 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.MismatchedDeallocator.rst @@ -7,7 +7,7 @@ clang-analyzer-unix.MismatchedDeallocator Check for mismatched deallocators. -The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see +The `clang-analyzer-unix.MismatchedDeallocator` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst index f4bc2a32cae40..5b1e5bf89563e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Vfork.rst @@ -7,7 +7,7 @@ clang-analyzer-unix.Vfork Check for proper usage of vfork. -The clang-analyzer-unix.Vfork check is an alias, please see +The `clang-analyzer-unix.Vfork` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst index c388c15f5f084..3aa1ec9cc0a62 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.BadSizeArg.rst @@ -8,7 +8,7 @@ clang-analyzer-unix.cstring.BadSizeArg Check the size argument passed into C string functions for common erroneous patterns. -The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see +The `clang-analyzer-unix.cstring.BadSizeArg` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst index 98a150dfe7cff..8957735dc6d99 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.cstring.NullArg.rst @@ -7,7 +7,7 @@ clang-analyzer-unix.cstring.NullArg Check for null pointers being passed as arguments to C string functions. -The clang-analyzer-unix.cstring.NullArg check is an alias, please see +The `clang-analyzer-unix.cstring.NullArg` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst index 36003280718c7..bd7dcff489c2e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.NoUncountedMemberChecker.rst @@ -7,7 +7,7 @@ clang-analyzer-webkit.NoUncountedMemberChecker Check for no uncounted member variables. -The clang-analyzer-webkit.NoUncountedMemberChecker check is an alias, please see +The `clang-analyzer-webkit.NoUncountedMemberChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst index b88df7d86e674..e0f2036ec1c09 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.RefCntblBaseVirtualDtor.rst @@ -7,7 +7,7 @@ clang-analyzer-webkit.RefCntblBaseVirtualDtor Check for any ref-countable base class having virtual destructor. -The clang-analyzer-webkit.RefCntblBaseVirtualDtor check is an alias, please see +The `clang-analyzer-webkit.RefCntblBaseVirtualDtor` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst index 1022b434c8d4e..8b4a21bfaf707 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/webkit.UncountedLambdaCapturesChecker.rst @@ -7,7 +7,7 @@ clang-analyzer-webkit.UncountedLambdaCapturesChecker Check uncounted lambda captures. -The clang-analyzer-webkit.UncountedLambdaCapturesChecker check is an alias, please see +The `clang-analyzer-webkit.UncountedLambdaCapturesChecker` check is an alias, please see `Clang Static Analyzer Available Checkers `_ for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst index 88d50ee827311..f3fba94ed01f1 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-c-arrays.rst @@ -6,5 +6,5 @@ cppcoreguidelines-avoid-c-arrays ================================ The cppcoreguidelines-avoid-c-arrays check is an alias, please see -`modernize-avoid-c-arrays <../modernize/avoid-c-arrays.html>`_ +:doc:`modernize-avoid-c-arrays <../modernize/avoid-c-arrays>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst index 28c7dc91fd8bb..119b1fd3d0dd1 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/avoid-magic-numbers.rst @@ -6,5 +6,5 @@ cppcoreguidelines-avoid-magic-numbers ===================================== The cppcoreguidelines-avoid-magic-numbers check is an alias, please see -`readability-magic-numbers <../readability/magic-numbers.html>`_ +:doc:`readability-magic-numbers <../readability/magic-numbers>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst index 4570b2681e9eb..986b63bc5c78e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/c-copy-assignment-signature.rst @@ -5,6 +5,6 @@ cppcoreguidelines-c-copy-assignment-signature ============================================= -The cppcoreguidelines-c-copy-assignment-signature check is an alias, please see -`misc-unconventional-assign-operator <../misc/unconventional-assign-operator.html>`_ +The `cppcoreguidelines-c-copy-assignment-signature` check is an alias, please see +:doc:`misc-unconventional-assign-operator <../misc/unconventional-assign-operator>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst index 9461061d38587..e9a703c3b3e26 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/explicit-virtual-functions.rst @@ -5,6 +5,6 @@ cppcoreguidelines-explicit-virtual-functions ============================================ -The cppcoreguidelines-explicit-virtual-functions check is an alias, please see -`modernize-use-override <../modernize/use-override.html>`_ +The `cppcoreguidelines-explicit-virtual-functions` check is an alias, please see +:doc:`modernize-use-override <../modernize/use-override>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-destructor.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-destructor.rst index 2a5ce350aa1b4..5eb5f67b8f948 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-destructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-destructor.rst @@ -8,6 +8,6 @@ cppcoreguidelines-noexcept-destructor This check implements `C.37 `_ from the C++ Core Guidelines. -The cppcoreguidelines-noexcept-destructor check is an alias, please see -`performance-noexcept-destructor <../performance/noexcept-destructor.html>`_ +The `cppcoreguidelines-noexcept-destructor` check is an alias, please see +:doc:`performance-noexcept-destructor <../performance/noexcept-destructor>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-move-operations.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-move-operations.rst index 83e1bffbf3a09..a4b0f7d17253a 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-move-operations.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-move-operations.rst @@ -8,6 +8,6 @@ cppcoreguidelines-noexcept-move-operations This check implements `C.66 `_ from the C++ Core Guidelines. -The cppcoreguidelines-noexcept-move-operations check is an alias, please see -`performance-noexcept-move-constructor <../performance/noexcept-move-constructor.html>`_ +The `cppcoreguidelines-noexcept-move-operations` check is an alias, please see +:doc:`performance-noexcept-move-constructor <../performance/noexcept-move-constructor>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-swap.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-swap.rst index a8e5da658af54..f4e5ed0a4f872 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-swap.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/noexcept-swap.rst @@ -10,6 +10,6 @@ This check implements `C.83 `_ from the C++ Core Guidelines. -The cppcoreguidelines-noexcept-swap check is an alias, please see -`performance-noexcept-swap <../performance/noexcept-swap.html>`_ +The `cppcoreguidelines-noexcept-swap check` is an alias, please see +:doc:`performance-noexcept-swap <../performance/noexcept-swap>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst index e17f3f5722dc5..7f18c17498d39 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/non-private-member-variables-in-classes.rst @@ -7,5 +7,5 @@ cppcoreguidelines-non-private-member-variables-in-classes The cppcoreguidelines-non-private-member-variables-in-classes check is an alias, please see -`misc-non-private-member-variables-in-classes <../misc/non-private-member-variables-in-classes.html>`_ +:doc:`misc-non-private-member-variables-in-classes <../misc/non-private-member-variables-in-classes>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst index 32dad44064f4b..81aa662043bc3 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.rst @@ -25,13 +25,13 @@ from the C++ Core Guidelines. Please note, that this check does not enforce this latter rule for initializations already implemented as member initializers. For that purpose -see check `modernize-use-default-member-init <../modernize/use-default-member-init.html>`_. +see check :doc:`modernize-use-default-member-init <../modernize/use-default-member-init>`. .. note:: Enforcement of rule C.48 in this check is deprecated, to be removed in :program:`clang-tidy` version 19 (only C.49 will be enforced by this check then). - Please use `cppcoreguidelines-use-default-member-init <../cppcoreguidelines/use-default-member-init.html>`_ + Please use :doc:`cppcoreguidelines-use-default-member-init <../cppcoreguidelines/use-default-member-init>` to enforce rule C.48. Example 1 @@ -65,6 +65,7 @@ Here ``n`` can be initialized using a default member initializer, unlike return; m = 1; } + }; Example 2 --------- @@ -98,12 +99,12 @@ Here ``n`` can be initialized in the constructor initialization list, unlike Note: this option is deprecated, to be removed in :program:`clang-tidy` version 19. Please use the `UseAssignment` option from - `cppcoreguidelines-use-default-member-init <../cppcoreguidelines/use-default-member-init.html>`_ + :doc:`cppcoreguidelines-use-default-member-init <../cppcoreguidelines/use-default-member-init>` instead. If this option is set to `true` (by default `UseAssignment` from - `modernize-use-default-member-init - <../modernize/use-default-member-init.html>`_ will be used), + :doc:`modernize-use-default-member-init + <../modernize/use-default-member-init>` will be used), the check will initialize members with an assignment. In this case the fix of the first example looks like this: diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/use-default-member-init.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/use-default-member-init.rst index f9fa6e4d883fc..e785f3133e200 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/use-default-member-init.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines/use-default-member-init.rst @@ -8,6 +8,6 @@ cppcoreguidelines-use-default-member-init This check implements `C.48 `_ from the C++ Core Guidelines. -The cppcoreguidelines-use-default-member-init check is an alias, please see -`modernize-use-default-member-init <../modernize/use-default-member-init.html>`_ +The `cppcoreguidelines-use-default-member-init` check is an alias, please see +:doc:`modernize-use-default-member-init <../modernize/use-default-member-init>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst b/clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst index 10f7d66d1bb5e..a92f3f411c031 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/fuchsia/header-anon-namespaces.rst @@ -6,5 +6,5 @@ fuchsia-header-anon-namespaces ============================== The fuchsia-header-anon-namespaces check is an alias, please see -`google-build-namespace <../google/build-namespaces.html>`_ +:doc:`google-build-namespace <../google/build-namespaces>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py index 92b89c1c17398..6545a3906fa50 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py +++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py @@ -110,7 +110,7 @@ def generate_documentation(checker, has_documentation): f.write("\n\n") if has_documentation: f.write( - "The %s check is an alias, please see\n" % checker["FullPackageName"] + "The `%s` check is an alias, please see\n" % checker["FullPackageName"] ) f.write( "`Clang Static Analyzer Available Checkers\n`_\n" @@ -136,10 +136,10 @@ def update_documentation_list(checkers): checks = [x for x in checks if "clang-analyzer-" not in x] for checker in checkers: if checker["Documentation"]: - checks.append(" `%s `_, `Clang Static Analyzer %s `_," % (checker["FullPackageName"], + checks.append(" :doc:`%s `, `Clang Static Analyzer %s `_," % (checker["FullPackageName"], checker["ShortName"], checker["ShortName"], checker["AnchorUrl"])) else: - checks.append(" `%s `_, Clang Static Analyzer %s," % (checker["FullPackageName"], checker["ShortName"], checker["ShortName"])) + checks.append(" :doc:`%s `, Clang Static Analyzer %s," % (checker["FullPackageName"], checker["ShortName"], checker["ShortName"])) checks.sort() diff --git a/clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst b/clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst index 8bb9d8707c578..6130609fb11b4 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/google/readability-braces-around-statements.rst @@ -5,6 +5,6 @@ google-readability-braces-around-statements =========================================== -The google-readability-braces-around-statements check is an alias, please see -`readability-braces-around-statements <../readability/braces-around-statements.html>`_ +The `google-readability-braces-around-statements` check is an alias, please see +:doc:`readability-braces-around-statements <../readability/braces-around-statements>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst b/clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst index 65741c117ef0d..d7eec0d203392 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/google/readability-function-size.rst @@ -5,6 +5,6 @@ google-readability-function-size ================================ -The google-readability-function-size check is an alias, please see -`readability-function-size <../readability/function-size.html>`_ for more +The `google-readability-function-size` check is an alias, please see +:doc:`readability-function-size <../readability/function-size>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst b/clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst index 19e0773df5440..56f7d27c23ce7 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/google/readability-namespace-comments.rst @@ -5,5 +5,5 @@ google-readability-namespace-comments ===================================== -The google-readability-namespace-comments check is an alias, please see -`llvm-namespace-comment <../llvm/namespace-comment.html>`_ for more information. +The `google-readability-namespace-comments check` is an alias, please see +:doc:`llvm-namespace-comment <../llvm/namespace-comment>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst index 579905babba04..5d125a89e7f43 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-c-arrays.rst @@ -6,5 +6,5 @@ hicpp-avoid-c-arrays ==================== The hicpp-avoid-c-arrays check is an alias, please see -`modernize-avoid-c-arrays <../modernize/avoid-c-arrays.html>`_ +:doc:`modernize-avoid-c-arrays <../modernize/avoid-c-arrays>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst index f543f616feba0..3b951e5c23c39 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/avoid-goto.rst @@ -6,7 +6,7 @@ hicpp-avoid-goto ================ The `hicpp-avoid-goto` check is an alias to -`cppcoreguidelines-avoid-goto <../cppcoreguidelines/avoid-goto.html>`_. +:doc:`cppcoreguidelines-avoid-goto <../cppcoreguidelines/avoid-goto>`. Rule `6.3.1 High Integrity C++ `_ requires that ``goto`` only skips parts of a block and is not used for other reasons. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst index 893f2ca3aaa49..9dd5b82e84c8c 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/braces-around-statements.rst @@ -6,6 +6,6 @@ hicpp-braces-around-statements ============================== The `hicpp-braces-around-statements` check is an alias, please see -`readability-braces-around-statements <../readability/braces-around-statements.html>`_ +:doc:`readability-braces-around-statements <../readability/braces-around-statements>` for more information. It enforces the `rule 6.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst index e9812fd0c94dc..8b38ae1c8cfd1 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/deprecated-headers.rst @@ -6,6 +6,6 @@ hicpp-deprecated-headers ======================== The `hicpp-deprecated-headers` check is an alias, please see -`modernize-deprecated-headers <../modernize/deprecated-headers.html>`_ +:doc:`modernize-deprecated-headers <../modernize/deprecated-headers>` for more information. It enforces the `rule 1.3.3 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst index 61a80267d97bc..15175c0d7d00f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/explicit-conversions.rst @@ -5,13 +5,13 @@ hicpp-explicit-conversions ========================== -This check is an alias for `google-explicit-constructor <../google/explicit-constructor.html>`_. +This check is an alias for :doc:`google-explicit-constructor <../google/explicit-constructor>`. Used to enforce parts of `rule 5.4.1 `_. This check will enforce that constructors and conversion operators are marked `explicit`. Other forms of casting checks are implemented in other places. The following checks can be used to check for more forms of casting: -- `cppcoreguidelines-pro-type-static-cast-downcast <../cppcoreguidelines/pro-type-static-cast-downcast.html>`_ -- `cppcoreguidelines-pro-type-reinterpret-cast <../cppcoreguidelines/pro-type-reinterpret-cast.html>`_ -- `cppcoreguidelines-pro-type-const-cast <../cppcoreguidelines/pro-type-const-cast.html>`_ -- `cppcoreguidelines-pro-type-cstyle-cast <../cppcoreguidelines/pro-type-cstyle-cast.html>`_ +- :doc:`cppcoreguidelines-pro-type-static-cast-downcast <../cppcoreguidelines/pro-type-static-cast-downcast>` +- :doc:`cppcoreguidelines-pro-type-reinterpret-cast <../cppcoreguidelines/pro-type-reinterpret-cast>` +- :doc:`cppcoreguidelines-pro-type-const-cast <../cppcoreguidelines/pro-type-const-cast>` +- :doc:`cppcoreguidelines-pro-type-cstyle-cast <../cppcoreguidelines/pro-type-cstyle-cast>` diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst index 417a18d1a50e4..a8b70823aba2e 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/function-size.rst @@ -5,7 +5,7 @@ hicpp-function-size =================== -This check is an alias for `readability-function-size <../readability/function-size.html>`_. +This check is an alias for :doc:`readability-function-size <../readability/function-size>`. Useful to enforce multiple sections on function complexity. - `rule 8.2.2 `_ diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst index 759b9fc467f8a..299c9332185be 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/invalid-access-moved.rst @@ -5,6 +5,6 @@ hicpp-invalid-access-moved ========================== -This check is an alias for `bugprone-use-after-move <../bugprone/use-after-move.html>`_. +This check is an alias for :doc:`bugprone-use-after-move <../bugprone/use-after-move>`. Implements parts of the `rule 8.4.1 `_ to check if moved-from objects are accessed. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst index 135174cc7988f..a565d7ddf83cf 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/member-init.rst @@ -5,7 +5,7 @@ hicpp-member-init ================= -This check is an alias for `cppcoreguidelines-pro-type-member-init <../cppcoreguidelines/pro-type-member-init.html>`_. +This check is an alias for :doc:`cppcoreguidelines-pro-type-member-init <../cppcoreguidelines/pro-type-member-init>`. Implements the check for `rule 12.4.2 `_ to initialize class members in the right order. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst index 32f6830fb1ad4..ddee4ae48ef81 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/move-const-arg.rst @@ -6,5 +6,5 @@ hicpp-move-const-arg ==================== The `hicpp-move-const-arg` check is an alias, please see -`performance-move-const-arg <../performance/move-const-arg.html>`_ for more information. +:doc:`performance-move-const-arg <../performance/move-const-arg>` for more information. It enforces the `rule 17.3.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst index ced016514cfad..09d5aa7feddc5 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/named-parameter.rst @@ -5,6 +5,6 @@ hicpp-named-parameter ===================== -This check is an alias for `readability-named-parameter <../readability/named-parameter.html>`_. +This check is an alias for :doc:`readability-named-parameter <../readability/named-parameter>`. Implements `rule 8.2.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst index 826016772b48d..a4c3123306a07 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/new-delete-operators.rst @@ -5,6 +5,6 @@ hicpp-new-delete-operators ========================== -This check is an alias for `misc-new-delete-overloads <../misc/new-delete-overloads.html>`_. +This check is an alias for :doc:`misc-new-delete-overloads <../misc/new-delete-overloads>`. Implements `rule 12.3.1 `_ to ensure the `new` and `delete` operators have the correct signature. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst index a8d2d868fe180..5ee65ea6d8acc 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-array-decay.rst @@ -6,6 +6,6 @@ hicpp-no-array-decay ==================== The `hicpp-no-array-decay` check is an alias, please see -`cppcoreguidelines-pro-bounds-array-to-pointer-decay <../cppcoreguidelines/pro-bounds-array-to-pointer-decay.html>`_ +:doc:`cppcoreguidelines-pro-bounds-array-to-pointer-decay <../cppcoreguidelines/pro-bounds-array-to-pointer-decay>` for more information. It enforces the `rule 4.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst index c61bdd6367106..0345a58e594d3 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/no-malloc.rst @@ -6,6 +6,6 @@ hicpp-no-malloc =============== The `hicpp-no-malloc` check is an alias, please see -`cppcoreguidelines-no-malloc <../cppcoreguidelines/no-malloc.html>`_ +:doc:`cppcoreguidelines-no-malloc <../cppcoreguidelines/no-malloc>` for more information. It enforces the `rule 5.3.2 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst index d3d5718b1825a..e8584214ea45f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/noexcept-move.rst @@ -5,5 +5,6 @@ hicpp-noexcept-move =================== -This check is an alias for `performance-noexcept-move-constructor <../performance/noexcept-move-constructor.html>`_. +This check is an alias for :doc:`performance-noexcept-move-constructor +<../performance/noexcept-move-constructor>`. Checks `rule 12.5.4 `_ to mark move assignment and move construction `noexcept`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst index 514f83de9924a..cfe58bdeb59d0 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/special-member-functions.rst @@ -5,5 +5,5 @@ hicpp-special-member-functions ============================== -This check is an alias for `cppcoreguidelines-special-member-functions <../cppcoreguidelines/special-member-functions.html>`_. +This check is an alias for :doc:`cppcoreguidelines-special-member-functions <../cppcoreguidelines/special-member-functions>`. Checks that special member functions have the correct signature, according to `rule 12.5.7 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst index fe50faae76b93..44928a308940f 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/static-assert.rst @@ -6,5 +6,5 @@ hicpp-static-assert =================== The `hicpp-static-assert` check is an alias, please see -`misc-static-assert <../misc/static-assert.html>`_ for more information. +:doc:`misc-static-assert <../misc/static-assert>` for more information. It enforces the `rule 7.1.10 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst index 15fc8c520c138..4636e2c5d06a2 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/undelegated-constructor.rst @@ -5,7 +5,7 @@ hicpp-undelegated-constructor ============================= -This check is an alias for `bugprone-undelegated-constructor <../bugprone/undelegated-constructor.html>`_. +This check is an alias for :doc:`bugprone-undelegated-constructor <../bugprone/undelegated-constructor>`. Partially implements `rule 12.4.5 `_ to find misplaced constructor calls inside a constructor. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst index 9a35cc5ed8d29..29ee07dfb9ae9 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/uppercase-literal-suffix.rst @@ -6,4 +6,4 @@ hicpp-uppercase-literal-suffix ============================== The hicpp-uppercase-literal-suffix check is an alias, please see -`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix.html>`_ for more information. +:doc:`readability-uppercase-literal-suffix <../readability/uppercase-literal-suffix>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst index 905b5d112614f..ec835785d4fb8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-auto.rst @@ -6,5 +6,5 @@ hicpp-use-auto ============== The `hicpp-use-auto` check is an alias, please see -`modernize-use-auto <../modernize/use-auto.html>`_ for more information. +:doc:`modernize-use-auto <../modernize/use-auto>` for more information. It enforces the `rule 7.1.8 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst index c76f793750235..3c2d057f8dfc0 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-emplace.rst @@ -6,5 +6,5 @@ hicpp-use-emplace ================= The `hicpp-use-emplace` check is an alias, please see -`modernize-use-emplace <../modernize/use-emplace.html>`_ for more information. +:doc:`modernize-use-emplace <../modernize/use-emplace>` for more information. It enforces the `rule 17.4.2 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst index bc28721382851..e6b6d5354c9a8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-default.rst @@ -5,5 +5,5 @@ hicpp-use-equals-default ======================== -This check is an alias for `modernize-use-equals-default <../modernize/use-equals-default.html>`_. +This check is an alias for :doc:`modernize-use-equals-default <../modernize/use-equals-default>`. Implements `rule 12.5.1 `_ to explicitly default special member functions. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst index 020f133da7cf0..000e233b66a38 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-equals-delete.rst @@ -5,6 +5,6 @@ hicpp-use-equals-delete ======================= -This check is an alias for `modernize-use-equals-delete <../modernize/use-equals-delete.html>`_. +This check is an alias for :doc:`modernize-use-equals-delete <../modernize/use-equals-delete>`. Implements `rule 12.5.1 `_ to explicitly default or delete special member functions. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst index ef6d5c7ae10d3..e429625ca9f36 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-noexcept.rst @@ -6,5 +6,5 @@ hicpp-use-noexcept ================== The `hicpp-use-noexcept` check is an alias, please see -`modernize-use-noexcept <../modernize/use-noexcept.html>`_ for more information. +:doc:`modernize-use-noexcept <../modernize/use-noexcept>` for more information. It enforces the `rule 1.3.5 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst index a2958cdbead93..c16ae4ec04657 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-nullptr.rst @@ -6,5 +6,5 @@ hicpp-use-nullptr ================= The `hicpp-use-nullptr` check is an alias, please see -`modernize-use-nullptr <../modernize/use-nullptr.html>`_ for more information. +:doc:`modernize-use-nullptr <../modernize/use-nullptr>` for more information. It enforces the `rule 2.5.3 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst index 18695cfa515ef..2f6b543def2c8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/use-override.rst @@ -5,6 +5,6 @@ hicpp-use-override ================== -This check is an alias for `modernize-use-override <../modernize/use-override.html>`_. +This check is an alias for :doc:`modernize-use-override <../modernize/use-override>`. Implements `rule 10.2.1 `_ to declare a virtual function `override` when overriding. diff --git a/clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst b/clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst index 65bc7e432423a..1e5081fbda773 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/hicpp/vararg.rst @@ -6,6 +6,6 @@ hicpp-vararg ============ The `hicpp-vararg` check is an alias, please see -`cppcoreguidelines-pro-type-vararg <../cppcoreguidelines/pro-type-vararg.html>`_ +:doc:`cppcoreguidelines-pro-type-vararg <../cppcoreguidelines/pro-type-vararg>` for more information. It enforces the `rule 14.1.1 `_. diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst index bbacd7458c6c3..9eaf86a292b74 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -36,505 +36,506 @@ Clang-Tidy Checks .. csv-table:: :header: "Name", "Offers fixes" - `abseil-cleanup-ctad `_, "Yes" - `abseil-duration-addition `_, "Yes" - `abseil-duration-comparison `_, "Yes" - `abseil-duration-conversion-cast `_, "Yes" - `abseil-duration-division `_, "Yes" - `abseil-duration-factory-float `_, "Yes" - `abseil-duration-factory-scale `_, "Yes" - `abseil-duration-subtraction `_, "Yes" - `abseil-duration-unnecessary-conversion `_, "Yes" - `abseil-faster-strsplit-delimiter `_, "Yes" - `abseil-no-internal-dependencies `_, - `abseil-no-namespace `_, - `abseil-redundant-strcat-calls `_, "Yes" - `abseil-str-cat-append `_, "Yes" - `abseil-string-find-startswith `_, "Yes" - `abseil-string-find-str-contains `_, "Yes" - `abseil-time-comparison `_, "Yes" - `abseil-time-subtraction `_, "Yes" - `abseil-upgrade-duration-conversions `_, "Yes" - `altera-id-dependent-backward-branch `_, - `altera-kernel-name-restriction `_, - `altera-single-work-item-barrier `_, - `altera-struct-pack-align `_, "Yes" - `altera-unroll-loops `_, - `android-cloexec-accept `_, "Yes" - `android-cloexec-accept4 `_, "Yes" - `android-cloexec-creat `_, "Yes" - `android-cloexec-dup `_, "Yes" - `android-cloexec-epoll-create `_, "Yes" - `android-cloexec-epoll-create1 `_, "Yes" - `android-cloexec-fopen `_, "Yes" - `android-cloexec-inotify-init `_, "Yes" - `android-cloexec-inotify-init1 `_, "Yes" - `android-cloexec-memfd-create `_, "Yes" - `android-cloexec-open `_, "Yes" - `android-cloexec-pipe `_, "Yes" - `android-cloexec-pipe2 `_, "Yes" - `android-cloexec-socket `_, "Yes" - `android-comparison-in-temp-failure-retry `_, - `boost-use-to-string `_, "Yes" - `bugprone-argument-comment `_, "Yes" - `bugprone-assert-side-effect `_, - `bugprone-assignment-in-if-condition `_, - `bugprone-bad-signal-to-kill-thread `_, - `bugprone-bool-pointer-implicit-conversion `_, "Yes" - `bugprone-branch-clone `_, - `bugprone-copy-constructor-init `_, "Yes" - `bugprone-dangling-handle `_, - `bugprone-dynamic-static-initializers `_, - `bugprone-easily-swappable-parameters `_, - `bugprone-empty-catch `_, - `bugprone-exception-escape `_, - `bugprone-fold-init-type `_, - `bugprone-forward-declaration-namespace `_, - `bugprone-forwarding-reference-overload `_, - `bugprone-implicit-widening-of-multiplication-result `_, "Yes" - `bugprone-inaccurate-erase `_, "Yes" - `bugprone-inc-dec-in-conditions `_, - `bugprone-incorrect-roundings `_, - `bugprone-infinite-loop `_, - `bugprone-integer-division `_, - `bugprone-lambda-function-name `_, - `bugprone-macro-parentheses `_, "Yes" - `bugprone-macro-repeated-side-effects `_, - `bugprone-misplaced-operator-in-strlen-in-alloc `_, "Yes" - `bugprone-misplaced-pointer-arithmetic-in-alloc `_, "Yes" - `bugprone-misplaced-widening-cast `_, - `bugprone-move-forwarding-reference `_, "Yes" - `bugprone-multi-level-implicit-pointer-conversion `_, - `bugprone-multiple-new-in-one-expression `_, - `bugprone-multiple-statement-macro `_, - `bugprone-no-escape `_, - `bugprone-non-zero-enum-to-bool-conversion `_, - `bugprone-not-null-terminated-result `_, "Yes" - `bugprone-optional-value-conversion `_, "Yes" - `bugprone-parent-virtual-call `_, "Yes" - `bugprone-posix-return `_, "Yes" - `bugprone-redundant-branch-condition `_, "Yes" - `bugprone-reserved-identifier `_, "Yes" - `bugprone-shared-ptr-array-mismatch `_, "Yes" - `bugprone-signal-handler `_, - `bugprone-signed-char-misuse `_, - `bugprone-sizeof-container `_, - `bugprone-sizeof-expression `_, - `bugprone-spuriously-wake-up-functions `_, - `bugprone-standalone-empty `_, "Yes" - `bugprone-string-constructor `_, "Yes" - `bugprone-string-integer-assignment `_, "Yes" - `bugprone-string-literal-with-embedded-nul `_, - `bugprone-stringview-nullptr `_, "Yes" - `bugprone-suspicious-enum-usage `_, - `bugprone-suspicious-include `_, - `bugprone-suspicious-memory-comparison `_, - `bugprone-suspicious-memset-usage `_, "Yes" - `bugprone-suspicious-missing-comma `_, - `bugprone-suspicious-realloc-usage `_, - `bugprone-suspicious-semicolon `_, "Yes" - `bugprone-suspicious-string-compare `_, "Yes" - `bugprone-swapped-arguments `_, "Yes" - `bugprone-switch-missing-default-case `_, - `bugprone-terminating-continue `_, "Yes" - `bugprone-throw-keyword-missing `_, - `bugprone-too-small-loop-variable `_, - `bugprone-unchecked-optional-access `_, - `bugprone-undefined-memory-manipulation `_, - `bugprone-undelegated-constructor `_, - `bugprone-unhandled-exception-at-new `_, - `bugprone-unhandled-self-assignment `_, - `bugprone-unique-ptr-array-mismatch `_, "Yes" - `bugprone-unsafe-functions `_, - `bugprone-unused-raii `_, "Yes" - `bugprone-unused-return-value `_, - `bugprone-use-after-move `_, - `bugprone-virtual-near-miss `_, "Yes" - `cert-dcl21-cpp `_, "Yes" - `cert-dcl50-cpp `_, - `cert-dcl58-cpp `_, - `cert-env33-c `_, - `cert-err33-c `_, - `cert-err34-c `_, - `cert-err52-cpp `_, - `cert-err58-cpp `_, - `cert-err60-cpp `_, - `cert-flp30-c `_, - `cert-mem57-cpp `_, - `cert-msc50-cpp `_, - `cert-msc51-cpp `_, - `cert-oop57-cpp `_, - `cert-oop58-cpp `_, - `concurrency-mt-unsafe `_, - `concurrency-thread-canceltype-asynchronous `_, - `cppcoreguidelines-avoid-capturing-lambda-coroutines `_, - `cppcoreguidelines-avoid-const-or-ref-data-members `_, - `cppcoreguidelines-avoid-do-while `_, - `cppcoreguidelines-avoid-goto `_, - `cppcoreguidelines-avoid-non-const-global-variables `_, - `cppcoreguidelines-avoid-reference-coroutine-parameters `_, - `cppcoreguidelines-init-variables `_, "Yes" - `cppcoreguidelines-interfaces-global-init `_, - `cppcoreguidelines-macro-usage `_, - `cppcoreguidelines-misleading-capture-default-by-value `_, "Yes" - `cppcoreguidelines-missing-std-forward `_, - `cppcoreguidelines-narrowing-conversions `_, - `cppcoreguidelines-no-malloc `_, - `cppcoreguidelines-no-suspend-with-lock `_, - `cppcoreguidelines-owning-memory `_, - `cppcoreguidelines-prefer-member-initializer `_, "Yes" - `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, - `cppcoreguidelines-pro-bounds-constant-array-index `_, "Yes" - `cppcoreguidelines-pro-bounds-pointer-arithmetic `_, - `cppcoreguidelines-pro-type-const-cast `_, - `cppcoreguidelines-pro-type-cstyle-cast `_, "Yes" - `cppcoreguidelines-pro-type-member-init `_, "Yes" - `cppcoreguidelines-pro-type-reinterpret-cast `_, - `cppcoreguidelines-pro-type-static-cast-downcast `_, "Yes" - `cppcoreguidelines-pro-type-union-access `_, - `cppcoreguidelines-pro-type-vararg `_, - `cppcoreguidelines-rvalue-reference-param-not-moved `_, - `cppcoreguidelines-slicing `_, - `cppcoreguidelines-special-member-functions `_, - `cppcoreguidelines-virtual-class-destructor `_, "Yes" - `darwin-avoid-spinlock `_, - `darwin-dispatch-once-nonstatic `_, "Yes" - `fuchsia-default-arguments-calls `_, - `fuchsia-default-arguments-declarations `_, "Yes" - `fuchsia-multiple-inheritance `_, - `fuchsia-overloaded-operator `_, - `fuchsia-statically-constructed-objects `_, - `fuchsia-trailing-return `_, - `fuchsia-virtual-inheritance `_, - `google-build-explicit-make-pair `_, - `google-build-namespaces `_, - `google-build-using-namespace `_, - `google-default-arguments `_, - `google-explicit-constructor `_, "Yes" - `google-global-names-in-headers `_, - `google-objc-avoid-nsobject-new `_, - `google-objc-avoid-throwing-exception `_, - `google-objc-function-naming `_, - `google-objc-global-variable-declaration `_, - `google-readability-avoid-underscore-in-googletest-name `_, - `google-readability-casting `_, - `google-readability-todo `_, - `google-runtime-int `_, - `google-runtime-operator `_, - `google-upgrade-googletest-case `_, "Yes" - `hicpp-exception-baseclass `_, - `hicpp-multiway-paths-covered `_, - `hicpp-no-assembler `_, - `hicpp-signed-bitwise `_, - `linuxkernel-must-use-errs `_, - `llvm-header-guard `_, - `llvm-include-order `_, "Yes" - `llvm-namespace-comment `_, - `llvm-prefer-isa-or-dyn-cast-in-conditionals `_, "Yes" - `llvm-prefer-register-over-unsigned `_, "Yes" - `llvm-twine-local `_, "Yes" - `llvmlibc-callee-namespace `_, - `llvmlibc-implementation-in-namespace `_, - `llvmlibc-inline-function-decl `_, "Yes" - `llvmlibc-restrict-system-libc-headers `_, "Yes" - `misc-confusable-identifiers `_, - `misc-const-correctness `_, "Yes" - `misc-definitions-in-headers `_, "Yes" - `misc-header-include-cycle `_, - `misc-include-cleaner `_, "Yes" - `misc-misleading-bidirectional `_, - `misc-misleading-identifier `_, - `misc-misplaced-const `_, - `misc-new-delete-overloads `_, - `misc-no-recursion `_, - `misc-non-copyable-objects `_, - `misc-non-private-member-variables-in-classes `_, - `misc-redundant-expression `_, "Yes" - `misc-static-assert `_, "Yes" - `misc-throw-by-value-catch-by-reference `_, - `misc-unconventional-assign-operator `_, - `misc-uniqueptr-reset-release `_, "Yes" - `misc-unused-alias-decls `_, "Yes" - `misc-unused-parameters `_, "Yes" - `misc-unused-using-decls `_, "Yes" - `misc-use-anonymous-namespace `_, - `modernize-avoid-bind `_, "Yes" - `modernize-avoid-c-arrays `_, - `modernize-concat-nested-namespaces `_, "Yes" - `modernize-deprecated-headers `_, "Yes" - `modernize-deprecated-ios-base-aliases `_, "Yes" - `modernize-loop-convert `_, "Yes" - `modernize-macro-to-enum `_, "Yes" - `modernize-make-shared `_, "Yes" - `modernize-make-unique `_, "Yes" - `modernize-pass-by-value `_, "Yes" - `modernize-raw-string-literal `_, "Yes" - `modernize-redundant-void-arg `_, "Yes" - `modernize-replace-auto-ptr `_, "Yes" - `modernize-replace-disallow-copy-and-assign-macro `_, "Yes" - `modernize-replace-random-shuffle `_, "Yes" - `modernize-return-braced-init-list `_, "Yes" - `modernize-shrink-to-fit `_, "Yes" - `modernize-type-traits `_, "Yes" - `modernize-unary-static-assert `_, "Yes" - `modernize-use-auto `_, "Yes" - `modernize-use-bool-literals `_, "Yes" - `modernize-use-constraints `_, "Yes" - `modernize-use-default-member-init `_, "Yes" - `modernize-use-emplace `_, "Yes" - `modernize-use-equals-default `_, "Yes" - `modernize-use-equals-delete `_, "Yes" - `modernize-use-nodiscard `_, "Yes" - `modernize-use-noexcept `_, "Yes" - `modernize-use-nullptr `_, "Yes" - `modernize-use-override `_, "Yes" - `modernize-use-std-print `_, "Yes" - `modernize-use-trailing-return-type `_, "Yes" - `modernize-use-transparent-functors `_, "Yes" - `modernize-use-uncaught-exceptions `_, "Yes" - `modernize-use-using `_, "Yes" - `mpi-buffer-deref `_, "Yes" - `mpi-type-mismatch `_, "Yes" - `objc-assert-equals `_, "Yes" - `objc-avoid-nserror-init `_, - `objc-dealloc-in-category `_, - `objc-forbidden-subclassing `_, - `objc-missing-hash `_, - `objc-nsdate-formatter `_, - `objc-nsinvocation-argument-lifetime `_, "Yes" - `objc-property-declaration `_, "Yes" - `objc-super-self `_, "Yes" - `openmp-exception-escape `_, - `openmp-use-default-none `_, - `performance-avoid-endl `_, "Yes" - `performance-enum-size `_, - `performance-faster-string-find `_, "Yes" - `performance-for-range-copy `_, "Yes" - `performance-implicit-conversion-in-loop `_, - `performance-inefficient-algorithm `_, "Yes" - `performance-inefficient-string-concatenation `_, - `performance-inefficient-vector-operation `_, "Yes" - `performance-move-const-arg `_, "Yes" - `performance-move-constructor-init `_, - `performance-no-automatic-move `_, - `performance-no-int-to-ptr `_, - `performance-noexcept-destructor `_, "Yes" - `performance-noexcept-move-constructor `_, "Yes" - `performance-noexcept-swap `_, "Yes" - `performance-trivially-destructible `_, "Yes" - `performance-type-promotion-in-math-fn `_, "Yes" - `performance-unnecessary-copy-initialization `_, "Yes" - `performance-unnecessary-value-param `_, "Yes" - `portability-restrict-system-includes `_, "Yes" - `portability-simd-intrinsics `_, - `portability-std-allocator-const `_, - `readability-avoid-const-params-in-decls `_, "Yes" - `readability-avoid-unconditional-preprocessor-if `_, - `readability-braces-around-statements `_, "Yes" - `readability-const-return-type `_, "Yes" - `readability-container-contains `_, "Yes" - `readability-container-data-pointer `_, "Yes" - `readability-container-size-empty `_, "Yes" - `readability-convert-member-functions-to-static `_, "Yes" - `readability-delete-null-pointer `_, "Yes" - `readability-duplicate-include `_, "Yes" - `readability-else-after-return `_, "Yes" - `readability-function-cognitive-complexity `_, - `readability-function-size `_, - `readability-identifier-length `_, - `readability-identifier-naming `_, "Yes" - `readability-implicit-bool-conversion `_, "Yes" - `readability-inconsistent-declaration-parameter-name `_, "Yes" - `readability-isolate-declaration `_, "Yes" - `readability-magic-numbers `_, - `readability-make-member-function-const `_, "Yes" - `readability-misleading-indentation `_, - `readability-misplaced-array-index `_, "Yes" - `readability-named-parameter `_, "Yes" - `readability-non-const-parameter `_, "Yes" - `readability-operators-representation `_, "Yes" - `readability-qualified-auto `_, "Yes" - `readability-redundant-access-specifiers `_, "Yes" - `readability-redundant-control-flow `_, "Yes" - `readability-redundant-declaration `_, "Yes" - `readability-redundant-function-ptr-dereference `_, "Yes" - `readability-redundant-member-init `_, "Yes" - `readability-redundant-preprocessor `_, - `readability-redundant-smartptr-get `_, "Yes" - `readability-redundant-string-cstr `_, "Yes" - `readability-redundant-string-init `_, "Yes" - `readability-reference-to-constructed-temporary `_, - `readability-simplify-boolean-expr `_, "Yes" - `readability-simplify-subscript-expr `_, "Yes" - `readability-static-accessed-through-instance `_, "Yes" - `readability-static-definition-in-anonymous-namespace `_, "Yes" - `readability-string-compare `_, "Yes" - `readability-suspicious-call-argument `_, - `readability-uniqueptr-delete-release `_, "Yes" - `readability-uppercase-literal-suffix `_, "Yes" - `readability-use-anyofallof `_, - `zircon-temporary-objects `_, + :doc:`abseil-cleanup-ctad `, "Yes" + :doc:`abseil-duration-addition `, "Yes" + :doc:`abseil-duration-comparison `, "Yes" + :doc:`abseil-duration-conversion-cast `, "Yes" + :doc:`abseil-duration-division `, "Yes" + :doc:`abseil-duration-factory-float `, "Yes" + :doc:`abseil-duration-factory-scale `, "Yes" + :doc:`abseil-duration-subtraction `, "Yes" + :doc:`abseil-duration-unnecessary-conversion `, "Yes" + :doc:`abseil-faster-strsplit-delimiter `, "Yes" + :doc:`abseil-no-internal-dependencies `, + :doc:`abseil-no-namespace `, + :doc:`abseil-redundant-strcat-calls `, "Yes" + :doc:`abseil-str-cat-append `, "Yes" + :doc:`abseil-string-find-startswith `, "Yes" + :doc:`abseil-string-find-str-contains `, "Yes" + :doc:`abseil-time-comparison `, "Yes" + :doc:`abseil-time-subtraction `, "Yes" + :doc:`abseil-upgrade-duration-conversions `, "Yes" + :doc:`altera-id-dependent-backward-branch `, + :doc:`altera-kernel-name-restriction `, + :doc:`altera-single-work-item-barrier `, + :doc:`altera-struct-pack-align `, "Yes" + :doc:`altera-unroll-loops `, + :doc:`android-cloexec-accept `, "Yes" + :doc:`android-cloexec-accept4 `, "Yes" + :doc:`android-cloexec-creat `, "Yes" + :doc:`android-cloexec-dup `, "Yes" + :doc:`android-cloexec-epoll-create `, "Yes" + :doc:`android-cloexec-epoll-create1 `, "Yes" + :doc:`android-cloexec-fopen `, "Yes" + :doc:`android-cloexec-inotify-init `, "Yes" + :doc:`android-cloexec-inotify-init1 `, "Yes" + :doc:`android-cloexec-memfd-create `, "Yes" + :doc:`android-cloexec-open `, "Yes" + :doc:`android-cloexec-pipe `, "Yes" + :doc:`android-cloexec-pipe2 `, "Yes" + :doc:`android-cloexec-socket `, "Yes" + :doc:`android-comparison-in-temp-failure-retry `, + :doc:`boost-use-to-string `, "Yes" + :doc:`bugprone-argument-comment `, "Yes" + :doc:`bugprone-assert-side-effect `, + :doc:`bugprone-assignment-in-if-condition `, + :doc:`bugprone-bad-signal-to-kill-thread `, + :doc:`bugprone-bool-pointer-implicit-conversion `, "Yes" + :doc:`bugprone-branch-clone `, + :doc:`bugprone-copy-constructor-init `, "Yes" + :doc:`bugprone-dangling-handle `, + :doc:`bugprone-dynamic-static-initializers `, + :doc:`bugprone-easily-swappable-parameters `, + :doc:`bugprone-empty-catch `, + :doc:`bugprone-exception-escape `, + :doc:`bugprone-fold-init-type `, + :doc:`bugprone-forward-declaration-namespace `, + :doc:`bugprone-forwarding-reference-overload `, + :doc:`bugprone-implicit-widening-of-multiplication-result `, "Yes" + :doc:`bugprone-inaccurate-erase `, "Yes" + :doc:`bugprone-inc-dec-in-conditions `, + :doc:`bugprone-incorrect-roundings `, + :doc:`bugprone-infinite-loop `, + :doc:`bugprone-integer-division `, + :doc:`bugprone-lambda-function-name `, + :doc:`bugprone-macro-parentheses `, "Yes" + :doc:`bugprone-macro-repeated-side-effects `, + :doc:`bugprone-misplaced-operator-in-strlen-in-alloc `, "Yes" + :doc:`bugprone-misplaced-pointer-arithmetic-in-alloc `, "Yes" + :doc:`bugprone-misplaced-widening-cast `, + :doc:`bugprone-move-forwarding-reference `, "Yes" + :doc:`bugprone-multi-level-implicit-pointer-conversion `, + :doc:`bugprone-multiple-new-in-one-expression `, + :doc:`bugprone-multiple-statement-macro `, + :doc:`bugprone-no-escape `, + :doc:`bugprone-non-zero-enum-to-bool-conversion `, + :doc:`bugprone-not-null-terminated-result `, "Yes" + :doc:`bugprone-optional-value-conversion `, "Yes" + :doc:`bugprone-parent-virtual-call `, "Yes" + :doc:`bugprone-posix-return `, "Yes" + :doc:`bugprone-redundant-branch-condition `, "Yes" + :doc:`bugprone-reserved-identifier `, "Yes" + :doc:`bugprone-shared-ptr-array-mismatch `, "Yes" + :doc:`bugprone-signal-handler `, + :doc:`bugprone-signed-char-misuse `, + :doc:`bugprone-sizeof-container `, + :doc:`bugprone-sizeof-expression `, + :doc:`bugprone-spuriously-wake-up-functions `, + :doc:`bugprone-standalone-empty `, "Yes" + :doc:`bugprone-string-constructor `, "Yes" + :doc:`bugprone-string-integer-assignment `, "Yes" + :doc:`bugprone-string-literal-with-embedded-nul `, + :doc:`bugprone-stringview-nullptr `, "Yes" + :doc:`bugprone-suspicious-enum-usage `, + :doc:`bugprone-suspicious-include `, + :doc:`bugprone-suspicious-memory-comparison `, + :doc:`bugprone-suspicious-memset-usage `, "Yes" + :doc:`bugprone-suspicious-missing-comma `, + :doc:`bugprone-suspicious-realloc-usage `, + :doc:`bugprone-suspicious-semicolon `, "Yes" + :doc:`bugprone-suspicious-string-compare `, "Yes" + :doc:`bugprone-swapped-arguments `, "Yes" + :doc:`bugprone-switch-missing-default-case `, + :doc:`bugprone-terminating-continue `, "Yes" + :doc:`bugprone-throw-keyword-missing `, + :doc:`bugprone-too-small-loop-variable `, + :doc:`bugprone-unchecked-optional-access `, + :doc:`bugprone-undefined-memory-manipulation `, + :doc:`bugprone-undelegated-constructor `, + :doc:`bugprone-unhandled-exception-at-new `, + :doc:`bugprone-unhandled-self-assignment `, + :doc:`bugprone-unique-ptr-array-mismatch `, "Yes" + :doc:`bugprone-unsafe-functions `, + :doc:`bugprone-unused-raii `, "Yes" + :doc:`bugprone-unused-return-value `, + :doc:`bugprone-use-after-move `, + :doc:`bugprone-virtual-near-miss `, "Yes" + :doc:`cert-dcl21-cpp `, "Yes" + :doc:`cert-dcl50-cpp `, + :doc:`cert-dcl58-cpp `, + :doc:`cert-env33-c `, + :doc:`cert-err33-c `, + :doc:`cert-err34-c `, + :doc:`cert-err52-cpp `, + :doc:`cert-err58-cpp `, + :doc:`cert-err60-cpp `, + :doc:`cert-flp30-c `, + :doc:`cert-mem57-cpp `, + :doc:`cert-msc50-cpp `, + :doc:`cert-msc51-cpp `, + :doc:`cert-oop57-cpp `, + :doc:`cert-oop58-cpp `, + :doc:`concurrency-mt-unsafe `, + :doc:`concurrency-thread-canceltype-asynchronous `, + :doc:`cppcoreguidelines-avoid-capturing-lambda-coroutines `, + :doc:`cppcoreguidelines-avoid-const-or-ref-data-members `, + :doc:`cppcoreguidelines-avoid-do-while `, + :doc:`cppcoreguidelines-avoid-goto `, + :doc:`cppcoreguidelines-avoid-non-const-global-variables `, + :doc:`cppcoreguidelines-avoid-reference-coroutine-parameters `, + :doc:`cppcoreguidelines-init-variables `, "Yes" + :doc:`cppcoreguidelines-interfaces-global-init `, + :doc:`cppcoreguidelines-macro-usage `, + :doc:`cppcoreguidelines-misleading-capture-default-by-value `, "Yes" + :doc:`cppcoreguidelines-missing-std-forward `, + :doc:`cppcoreguidelines-narrowing-conversions `, + :doc:`cppcoreguidelines-no-malloc `, + :doc:`cppcoreguidelines-no-suspend-with-lock `, + :doc:`cppcoreguidelines-owning-memory `, + :doc:`cppcoreguidelines-prefer-member-initializer `, "Yes" + :doc:`cppcoreguidelines-pro-bounds-array-to-pointer-decay `, + :doc:`cppcoreguidelines-pro-bounds-constant-array-index `, "Yes" + :doc:`cppcoreguidelines-pro-bounds-pointer-arithmetic `, + :doc:`cppcoreguidelines-pro-type-const-cast `, + :doc:`cppcoreguidelines-pro-type-cstyle-cast `, "Yes" + :doc:`cppcoreguidelines-pro-type-member-init `, "Yes" + :doc:`cppcoreguidelines-pro-type-reinterpret-cast `, + :doc:`cppcoreguidelines-pro-type-static-cast-downcast `, "Yes" + :doc:`cppcoreguidelines-pro-type-union-access `, + :doc:`cppcoreguidelines-pro-type-vararg `, + :doc:`cppcoreguidelines-rvalue-reference-param-not-moved `, + :doc:`cppcoreguidelines-slicing `, + :doc:`cppcoreguidelines-special-member-functions `, + :doc:`cppcoreguidelines-virtual-class-destructor `, "Yes" + :doc:`darwin-avoid-spinlock `, + :doc:`darwin-dispatch-once-nonstatic `, "Yes" + :doc:`fuchsia-default-arguments-calls `, + :doc:`fuchsia-default-arguments-declarations `, "Yes" + :doc:`fuchsia-multiple-inheritance `, + :doc:`fuchsia-overloaded-operator `, + :doc:`fuchsia-statically-constructed-objects `, + :doc:`fuchsia-trailing-return `, + :doc:`fuchsia-virtual-inheritance `, + :doc:`google-build-explicit-make-pair `, + :doc:`google-build-namespaces `, + :doc:`google-build-using-namespace `, + :doc:`google-default-arguments `, + :doc:`google-explicit-constructor `, "Yes" + :doc:`google-global-names-in-headers `, + :doc:`google-objc-avoid-nsobject-new `, + :doc:`google-objc-avoid-throwing-exception `, + :doc:`google-objc-function-naming `, + :doc:`google-objc-global-variable-declaration `, + :doc:`google-readability-avoid-underscore-in-googletest-name `, + :doc:`google-readability-casting `, + :doc:`google-readability-todo `, + :doc:`google-runtime-int `, + :doc:`google-runtime-operator `, + :doc:`google-upgrade-googletest-case `, "Yes" + :doc:`hicpp-exception-baseclass `, + :doc:`hicpp-multiway-paths-covered `, + :doc:`hicpp-no-assembler `, + :doc:`hicpp-signed-bitwise `, + :doc:`linuxkernel-must-use-errs `, + :doc:`llvm-header-guard `, + :doc:`llvm-include-order `, "Yes" + :doc:`llvm-namespace-comment `, + :doc:`llvm-prefer-isa-or-dyn-cast-in-conditionals `, "Yes" + :doc:`llvm-prefer-register-over-unsigned `, "Yes" + :doc:`llvm-twine-local `, "Yes" + :doc:`llvmlibc-callee-namespace `, + :doc:`llvmlibc-implementation-in-namespace `, + :doc:`llvmlibc-inline-function-decl `, "Yes" + :doc:`llvmlibc-restrict-system-libc-headers `, "Yes" + :doc:`misc-confusable-identifiers `, + :doc:`misc-const-correctness `, "Yes" + :doc:`misc-definitions-in-headers `, "Yes" + :doc:`misc-header-include-cycle `, + :doc:`misc-include-cleaner `, "Yes" + :doc:`misc-misleading-bidirectional `, + :doc:`misc-misleading-identifier `, + :doc:`misc-misplaced-const `, + :doc:`misc-new-delete-overloads `, + :doc:`misc-no-recursion `, + :doc:`misc-non-copyable-objects `, + :doc:`misc-non-private-member-variables-in-classes `, + :doc:`misc-redundant-expression `, "Yes" + :doc:`misc-static-assert `, "Yes" + :doc:`misc-throw-by-value-catch-by-reference `, + :doc:`misc-unconventional-assign-operator `, + :doc:`misc-uniqueptr-reset-release `, "Yes" + :doc:`misc-unused-alias-decls `, "Yes" + :doc:`misc-unused-parameters `, "Yes" + :doc:`misc-unused-using-decls `, "Yes" + :doc:`misc-use-anonymous-namespace `, + :doc:`modernize-avoid-bind `, "Yes" + :doc:`modernize-avoid-c-arrays `, + :doc:`modernize-concat-nested-namespaces `, "Yes" + :doc:`modernize-deprecated-headers `, "Yes" + :doc:`modernize-deprecated-ios-base-aliases `, "Yes" + :doc:`modernize-loop-convert `, "Yes" + :doc:`modernize-macro-to-enum `, "Yes" + :doc:`modernize-make-shared `, "Yes" + :doc:`modernize-make-unique `, "Yes" + :doc:`modernize-pass-by-value `, "Yes" + :doc:`modernize-raw-string-literal `, "Yes" + :doc:`modernize-redundant-void-arg `, "Yes" + :doc:`modernize-replace-auto-ptr `, "Yes" + :doc:`modernize-replace-disallow-copy-and-assign-macro `, "Yes" + :doc:`modernize-replace-random-shuffle `, "Yes" + :doc:`modernize-return-braced-init-list `, "Yes" + :doc:`modernize-shrink-to-fit `, "Yes" + :doc:`modernize-type-traits `, "Yes" + :doc:`modernize-unary-static-assert `, "Yes" + :doc:`modernize-use-auto `, "Yes" + :doc:`modernize-use-bool-literals `, "Yes" + :doc:`modernize-use-constraints `, "Yes" + :doc:`modernize-use-default-member-init `, "Yes" + :doc:`modernize-use-emplace `, "Yes" + :doc:`modernize-use-equals-default `, "Yes" + :doc:`modernize-use-equals-delete `, "Yes" + :doc:`modernize-use-nodiscard `, "Yes" + :doc:`modernize-use-noexcept `, "Yes" + :doc:`modernize-use-nullptr `, "Yes" + :doc:`modernize-use-override `, "Yes" + :doc:`modernize-use-std-print `, "Yes" + :doc:`modernize-use-trailing-return-type `, "Yes" + :doc:`modernize-use-transparent-functors `, "Yes" + :doc:`modernize-use-uncaught-exceptions `, "Yes" + :doc:`modernize-use-using `, "Yes" + :doc:`mpi-buffer-deref `, "Yes" + :doc:`mpi-type-mismatch `, "Yes" + :doc:`objc-assert-equals `, "Yes" + :doc:`objc-avoid-nserror-init `, + :doc:`objc-dealloc-in-category `, + :doc:`objc-forbidden-subclassing `, + :doc:`objc-missing-hash `, + :doc:`objc-nsdate-formatter `, + :doc:`objc-nsinvocation-argument-lifetime `, "Yes" + :doc:`objc-property-declaration `, "Yes" + :doc:`objc-super-self `, "Yes" + :doc:`openmp-exception-escape `, + :doc:`openmp-use-default-none `, + :doc:`performance-avoid-endl `, "Yes" + :doc:`performance-enum-size `, + :doc:`performance-faster-string-find `, "Yes" + :doc:`performance-for-range-copy `, "Yes" + :doc:`performance-implicit-conversion-in-loop `, + :doc:`performance-inefficient-algorithm `, "Yes" + :doc:`performance-inefficient-string-concatenation `, + :doc:`performance-inefficient-vector-operation `, "Yes" + :doc:`performance-move-const-arg `, "Yes" + :doc:`performance-move-constructor-init `, + :doc:`performance-no-automatic-move `, + :doc:`performance-no-int-to-ptr `, + :doc:`performance-noexcept-destructor `, "Yes" + :doc:`performance-noexcept-move-constructor `, "Yes" + :doc:`performance-noexcept-swap `, "Yes" + :doc:`performance-trivially-destructible `, "Yes" + :doc:`performance-type-promotion-in-math-fn `, "Yes" + :doc:`performance-unnecessary-copy-initialization `, "Yes" + :doc:`performance-unnecessary-value-param `, "Yes" + :doc:`portability-restrict-system-includes `, "Yes" + :doc:`portability-simd-intrinsics `, + :doc:`portability-std-allocator-const `, + :doc:`readability-avoid-const-params-in-decls `, "Yes" + :doc:`readability-avoid-unconditional-preprocessor-if `, + :doc:`readability-braces-around-statements `, "Yes" + :doc:`readability-const-return-type `, "Yes" + :doc:`readability-container-contains `, "Yes" + :doc:`readability-container-data-pointer `, "Yes" + :doc:`readability-container-size-empty `, "Yes" + :doc:`readability-convert-member-functions-to-static `, "Yes" + :doc:`readability-delete-null-pointer `, "Yes" + :doc:`readability-duplicate-include `, "Yes" + :doc:`readability-else-after-return `, "Yes" + :doc:`readability-function-cognitive-complexity `, + :doc:`readability-function-size `, + :doc:`readability-identifier-length `, + :doc:`readability-identifier-naming `, "Yes" + :doc:`readability-implicit-bool-conversion `, "Yes" + :doc:`readability-inconsistent-declaration-parameter-name `, "Yes" + :doc:`readability-isolate-declaration `, "Yes" + :doc:`readability-magic-numbers `, + :doc:`readability-make-member-function-const `, "Yes" + :doc:`readability-misleading-indentation `, + :doc:`readability-misplaced-array-index `, "Yes" + :doc:`readability-named-parameter `, "Yes" + :doc:`readability-non-const-parameter `, "Yes" + :doc:`readability-operators-representation `, "Yes" + :doc:`readability-qualified-auto `, "Yes" + :doc:`readability-redundant-access-specifiers `, "Yes" + :doc:`readability-redundant-control-flow `, "Yes" + :doc:`readability-redundant-declaration `, "Yes" + :doc:`readability-redundant-function-ptr-dereference `, "Yes" + :doc:`readability-redundant-member-init `, "Yes" + :doc:`readability-redundant-preprocessor `, + :doc:`readability-redundant-smartptr-get `, "Yes" + :doc:`readability-redundant-string-cstr `, "Yes" + :doc:`readability-redundant-string-init `, "Yes" + :doc:`readability-reference-to-constructed-temporary `, + :doc:`readability-simplify-boolean-expr `, "Yes" + :doc:`readability-simplify-subscript-expr `, "Yes" + :doc:`readability-static-accessed-through-instance `, "Yes" + :doc:`readability-static-definition-in-anonymous-namespace `, "Yes" + :doc:`readability-string-compare `, "Yes" + :doc:`readability-suspicious-call-argument `, + :doc:`readability-uniqueptr-delete-release `, "Yes" + :doc:`readability-uppercase-literal-suffix `, "Yes" + :doc:`readability-use-anyofallof `, + :doc:`zircon-temporary-objects `, .. csv-table:: Aliases.. :header: "Name", "Redirect", "Offers fixes" - `bugprone-narrowing-conversions `_, `cppcoreguidelines-narrowing-conversions `_, - `cert-con36-c `_, `bugprone-spuriously-wake-up-functions `_, - `cert-con54-cpp `_, `bugprone-spuriously-wake-up-functions `_, - `cert-dcl03-c `_, `misc-static-assert `_, "Yes" - `cert-dcl16-c `_, `readability-uppercase-literal-suffix `_, "Yes" - `cert-dcl37-c `_, `bugprone-reserved-identifier `_, "Yes" - `cert-dcl51-cpp `_, `bugprone-reserved-identifier `_, "Yes" - `cert-dcl54-cpp `_, `misc-new-delete-overloads `_, - `cert-dcl59-cpp `_, `google-build-namespaces `_, - `cert-err09-cpp `_, `misc-throw-by-value-catch-by-reference `_, - `cert-err61-cpp `_, `misc-throw-by-value-catch-by-reference `_, - `cert-exp42-c `_, `bugprone-suspicious-memory-comparison `_, - `cert-fio38-c `_, `misc-non-copyable-objects `_, - `cert-flp37-c `_, `bugprone-suspicious-memory-comparison `_, - `cert-msc24-c `_, `bugprone-unsafe-functions `_, - `cert-msc30-c `_, `cert-msc50-cpp `_, - `cert-msc32-c `_, `cert-msc51-cpp `_, - `cert-msc33-c `_, `bugprone-unsafe-functions `_, - `cert-msc54-cpp `_, `bugprone-signal-handler `_, - `cert-oop11-cpp `_, `performance-move-constructor-init `_, - `cert-oop54-cpp `_, `bugprone-unhandled-self-assignment `_, - `cert-pos44-c `_, `bugprone-bad-signal-to-kill-thread `_, - `cert-pos47-c `_, `concurrency-thread-canceltype-asynchronous `_, - `cert-sig30-c `_, `bugprone-signal-handler `_, - `cert-str34-c `_, `bugprone-signed-char-misuse `_, - `clang-analyzer-core.CallAndMessage `_, `Clang Static Analyzer core.CallAndMessage `_, - `clang-analyzer-core.DivideZero `_, `Clang Static Analyzer core.DivideZero `_, - `clang-analyzer-core.NonNullParamChecker `_, `Clang Static Analyzer core.NonNullParamChecker `_, - `clang-analyzer-core.NullDereference `_, `Clang Static Analyzer core.NullDereference `_, - `clang-analyzer-core.StackAddressEscape `_, `Clang Static Analyzer core.StackAddressEscape `_, - `clang-analyzer-core.UndefinedBinaryOperatorResult `_, `Clang Static Analyzer core.UndefinedBinaryOperatorResult `_, - `clang-analyzer-core.VLASize `_, `Clang Static Analyzer core.VLASize `_, - `clang-analyzer-core.uninitialized.ArraySubscript `_, `Clang Static Analyzer core.uninitialized.ArraySubscript `_, - `clang-analyzer-core.uninitialized.Assign `_, `Clang Static Analyzer core.uninitialized.Assign `_, - `clang-analyzer-core.uninitialized.Branch `_, `Clang Static Analyzer core.uninitialized.Branch `_, - `clang-analyzer-core.uninitialized.CapturedBlockVariable `_, `Clang Static Analyzer core.uninitialized.CapturedBlockVariable `_, - `clang-analyzer-core.uninitialized.NewArraySize `_, `Clang Static Analyzer core.uninitialized.NewArraySize `_, - `clang-analyzer-core.uninitialized.UndefReturn `_, `Clang Static Analyzer core.uninitialized.UndefReturn `_, - `clang-analyzer-cplusplus.InnerPointer `_, `Clang Static Analyzer cplusplus.InnerPointer `_, - `clang-analyzer-cplusplus.Move `_, Clang Static Analyzer cplusplus.Move, - `clang-analyzer-cplusplus.NewDelete `_, `Clang Static Analyzer cplusplus.NewDelete `_, - `clang-analyzer-cplusplus.NewDeleteLeaks `_, `Clang Static Analyzer cplusplus.NewDeleteLeaks `_, - `clang-analyzer-cplusplus.PlacementNew `_, `Clang Static Analyzer cplusplus.PlacementNew `_, - `clang-analyzer-cplusplus.PureVirtualCall `_, Clang Static Analyzer cplusplus.PureVirtualCall, - `clang-analyzer-cplusplus.StringChecker `_, `Clang Static Analyzer cplusplus.StringChecker `_, - `clang-analyzer-deadcode.DeadStores `_, `Clang Static Analyzer deadcode.DeadStores `_, - `clang-analyzer-fuchsia.HandleChecker `_, `Clang Static Analyzer fuchsia.HandleChecker `_, - `clang-analyzer-nullability.NullPassedToNonnull `_, `Clang Static Analyzer nullability.NullPassedToNonnull `_, - `clang-analyzer-nullability.NullReturnedFromNonnull `_, `Clang Static Analyzer nullability.NullReturnedFromNonnull `_, - `clang-analyzer-nullability.NullableDereferenced `_, `Clang Static Analyzer nullability.NullableDereferenced `_, - `clang-analyzer-nullability.NullablePassedToNonnull `_, `Clang Static Analyzer nullability.NullablePassedToNonnull `_, - `clang-analyzer-nullability.NullableReturnedFromNonnull `_, `Clang Static Analyzer nullability.NullableReturnedFromNonnull `_, - `clang-analyzer-optin.cplusplus.UninitializedObject `_, `Clang Static Analyzer optin.cplusplus.UninitializedObject `_, - `clang-analyzer-optin.cplusplus.VirtualCall `_, `Clang Static Analyzer optin.cplusplus.VirtualCall `_, - `clang-analyzer-optin.mpi.MPI-Checker `_, `Clang Static Analyzer optin.mpi.MPI-Checker `_, - `clang-analyzer-optin.osx.OSObjectCStyleCast `_, Clang Static Analyzer optin.osx.OSObjectCStyleCast, - `clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, `Clang Static Analyzer optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, - `clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, `Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, - `clang-analyzer-optin.performance.GCDAntipattern `_, `Clang Static Analyzer optin.performance.GCDAntipattern `_, - `clang-analyzer-optin.performance.Padding `_, `Clang Static Analyzer optin.performance.Padding `_, - `clang-analyzer-optin.portability.UnixAPI `_, `Clang Static Analyzer optin.portability.UnixAPI `_, - `clang-analyzer-osx.API `_, `Clang Static Analyzer osx.API `_, - `clang-analyzer-osx.MIG `_, Clang Static Analyzer osx.MIG, - `clang-analyzer-osx.NumberObjectConversion `_, `Clang Static Analyzer osx.NumberObjectConversion `_, - `clang-analyzer-osx.OSObjectRetainCount `_, Clang Static Analyzer osx.OSObjectRetainCount, - `clang-analyzer-osx.ObjCProperty `_, `Clang Static Analyzer osx.ObjCProperty `_, - `clang-analyzer-osx.SecKeychainAPI `_, `Clang Static Analyzer osx.SecKeychainAPI `_, - `clang-analyzer-osx.cocoa.AtSync `_, `Clang Static Analyzer osx.cocoa.AtSync `_, - `clang-analyzer-osx.cocoa.AutoreleaseWrite `_, `Clang Static Analyzer osx.cocoa.AutoreleaseWrite `_, - `clang-analyzer-osx.cocoa.ClassRelease `_, `Clang Static Analyzer osx.cocoa.ClassRelease `_, - `clang-analyzer-osx.cocoa.Dealloc `_, `Clang Static Analyzer osx.cocoa.Dealloc `_, - `clang-analyzer-osx.cocoa.IncompatibleMethodTypes `_, `Clang Static Analyzer osx.cocoa.IncompatibleMethodTypes `_, - `clang-analyzer-osx.cocoa.Loops `_, `Clang Static Analyzer osx.cocoa.Loops `_, - `clang-analyzer-osx.cocoa.MissingSuperCall `_, `Clang Static Analyzer osx.cocoa.MissingSuperCall `_, - `clang-analyzer-osx.cocoa.NSAutoreleasePool `_, `Clang Static Analyzer osx.cocoa.NSAutoreleasePool `_, - `clang-analyzer-osx.cocoa.NSError `_, `Clang Static Analyzer osx.cocoa.NSError `_, - `clang-analyzer-osx.cocoa.NilArg `_, `Clang Static Analyzer osx.cocoa.NilArg `_, - `clang-analyzer-osx.cocoa.NonNilReturnValue `_, `Clang Static Analyzer osx.cocoa.NonNilReturnValue `_, - `clang-analyzer-osx.cocoa.ObjCGenerics `_, `Clang Static Analyzer osx.cocoa.ObjCGenerics `_, - `clang-analyzer-osx.cocoa.RetainCount `_, `Clang Static Analyzer osx.cocoa.RetainCount `_, - `clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak `_, `Clang Static Analyzer osx.cocoa.RunLoopAutoreleaseLeak `_, - `clang-analyzer-osx.cocoa.SelfInit `_, `Clang Static Analyzer osx.cocoa.SelfInit `_, - `clang-analyzer-osx.cocoa.SuperDealloc `_, `Clang Static Analyzer osx.cocoa.SuperDealloc `_, - `clang-analyzer-osx.cocoa.UnusedIvars `_, `Clang Static Analyzer osx.cocoa.UnusedIvars `_, - `clang-analyzer-osx.cocoa.VariadicMethodTypes `_, `Clang Static Analyzer osx.cocoa.VariadicMethodTypes `_, - `clang-analyzer-osx.coreFoundation.CFError `_, `Clang Static Analyzer osx.coreFoundation.CFError `_, - `clang-analyzer-osx.coreFoundation.CFNumber `_, `Clang Static Analyzer osx.coreFoundation.CFNumber `_, - `clang-analyzer-osx.coreFoundation.CFRetainRelease `_, `Clang Static Analyzer osx.coreFoundation.CFRetainRelease `_, - `clang-analyzer-osx.coreFoundation.containers.OutOfBounds `_, `Clang Static Analyzer osx.coreFoundation.containers.OutOfBounds `_, - `clang-analyzer-osx.coreFoundation.containers.PointerSizedValues `_, `Clang Static Analyzer osx.coreFoundation.containers.PointerSizedValues `_, - `clang-analyzer-security.FloatLoopCounter `_, `Clang Static Analyzer security.FloatLoopCounter `_, - `clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, `Clang Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, - `clang-analyzer-security.insecureAPI.UncheckedReturn `_, `Clang Static Analyzer security.insecureAPI.UncheckedReturn `_, - `clang-analyzer-security.insecureAPI.bcmp `_, `Clang Static Analyzer security.insecureAPI.bcmp `_, - `clang-analyzer-security.insecureAPI.bcopy `_, `Clang Static Analyzer security.insecureAPI.bcopy `_, - `clang-analyzer-security.insecureAPI.bzero `_, `Clang Static Analyzer security.insecureAPI.bzero `_, - `clang-analyzer-security.insecureAPI.decodeValueOfObjCType `_, Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType, - `clang-analyzer-security.insecureAPI.getpw `_, `Clang Static Analyzer security.insecureAPI.getpw `_, - `clang-analyzer-security.insecureAPI.gets `_, `Clang Static Analyzer security.insecureAPI.gets `_, - `clang-analyzer-security.insecureAPI.mkstemp `_, `Clang Static Analyzer security.insecureAPI.mkstemp `_, - `clang-analyzer-security.insecureAPI.mktemp `_, `Clang Static Analyzer security.insecureAPI.mktemp `_, - `clang-analyzer-security.insecureAPI.rand `_, `Clang Static Analyzer security.insecureAPI.rand `_, - `clang-analyzer-security.insecureAPI.strcpy `_, `Clang Static Analyzer security.insecureAPI.strcpy `_, - `clang-analyzer-security.insecureAPI.vfork `_, `Clang Static Analyzer security.insecureAPI.vfork `_, - `clang-analyzer-unix.API `_, `Clang Static Analyzer unix.API `_, - `clang-analyzer-unix.Malloc `_, `Clang Static Analyzer unix.Malloc `_, - `clang-analyzer-unix.MallocSizeof `_, `Clang Static Analyzer unix.MallocSizeof `_, - `clang-analyzer-unix.MismatchedDeallocator `_, `Clang Static Analyzer unix.MismatchedDeallocator `_, - `clang-analyzer-unix.Vfork `_, `Clang Static Analyzer unix.Vfork `_, - `clang-analyzer-unix.cstring.BadSizeArg `_, `Clang Static Analyzer unix.cstring.BadSizeArg `_, - `clang-analyzer-unix.cstring.NullArg `_, `Clang Static Analyzer unix.cstring.NullArg `_, - `clang-analyzer-valist.CopyToSelf `_, Clang Static Analyzer valist.CopyToSelf, - `clang-analyzer-valist.Uninitialized `_, Clang Static Analyzer valist.Uninitialized, - `clang-analyzer-valist.Unterminated `_, Clang Static Analyzer valist.Unterminated, - `clang-analyzer-webkit.NoUncountedMemberChecker `_, `Clang Static Analyzer webkit.NoUncountedMemberChecker `_, - `clang-analyzer-webkit.RefCntblBaseVirtualDtor `_, `Clang Static Analyzer webkit.RefCntblBaseVirtualDtor `_, - `clang-analyzer-webkit.UncountedLambdaCapturesChecker `_, `Clang Static Analyzer webkit.UncountedLambdaCapturesChecker `_, - `cppcoreguidelines-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, - `cppcoreguidelines-avoid-magic-numbers `_, `readability-magic-numbers `_, - `cppcoreguidelines-c-copy-assignment-signature `_, `misc-unconventional-assign-operator `_, - `cppcoreguidelines-explicit-virtual-functions `_, `modernize-use-override `_, "Yes" - `cppcoreguidelines-macro-to-enum `_, `modernize-macro-to-enum `_, "Yes" - `cppcoreguidelines-noexcept-destructor `_, `performance-noexcept-destructor `_, "Yes" - `cppcoreguidelines-noexcept-move-operations `_, `performance-noexcept-move-constructor `_, "Yes" - `cppcoreguidelines-noexcept-swap `_, `performance-noexcept-swap `_, "Yes" - `cppcoreguidelines-non-private-member-variables-in-classes `_, `misc-non-private-member-variables-in-classes `_, - `cppcoreguidelines-use-default-member-init `_, `modernize-use-default-member-init `_, "Yes" - `fuchsia-header-anon-namespaces `_, `google-build-namespaces `_, - `google-readability-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" - `google-readability-function-size `_, `readability-function-size `_, - `google-readability-namespace-comments `_, `llvm-namespace-comment `_, - `hicpp-avoid-c-arrays `_, `modernize-avoid-c-arrays `_, - `hicpp-avoid-goto `_, `cppcoreguidelines-avoid-goto `_, - `hicpp-braces-around-statements `_, `readability-braces-around-statements `_, "Yes" - `hicpp-deprecated-headers `_, `modernize-deprecated-headers `_, "Yes" - `hicpp-explicit-conversions `_, `google-explicit-constructor `_, "Yes" - `hicpp-function-size `_, `readability-function-size `_, - `hicpp-invalid-access-moved `_, `bugprone-use-after-move `_, - `hicpp-member-init `_, `cppcoreguidelines-pro-type-member-init `_, "Yes" - `hicpp-move-const-arg `_, `performance-move-const-arg `_, "Yes" - `hicpp-named-parameter `_, `readability-named-parameter `_, "Yes" - `hicpp-new-delete-operators `_, `misc-new-delete-overloads `_, - `hicpp-no-array-decay `_, `cppcoreguidelines-pro-bounds-array-to-pointer-decay `_, - `hicpp-no-malloc `_, `cppcoreguidelines-no-malloc `_, - `hicpp-noexcept-move `_, `performance-noexcept-move-constructor `_, "Yes" - `hicpp-special-member-functions `_, `cppcoreguidelines-special-member-functions `_, - `hicpp-static-assert `_, `misc-static-assert `_, "Yes" - `hicpp-undelegated-constructor `_, `bugprone-undelegated-constructor `_, - `hicpp-uppercase-literal-suffix `_, `readability-uppercase-literal-suffix `_, "Yes" - `hicpp-use-auto `_, `modernize-use-auto `_, "Yes" - `hicpp-use-emplace `_, `modernize-use-emplace `_, "Yes" - `hicpp-use-equals-default `_, `modernize-use-equals-default `_, "Yes" - `hicpp-use-equals-delete `_, `modernize-use-equals-delete `_, "Yes" - `hicpp-use-noexcept `_, `modernize-use-noexcept `_, "Yes" - `hicpp-use-nullptr `_, `modernize-use-nullptr `_, "Yes" - `hicpp-use-override `_, `modernize-use-override `_, "Yes" - `hicpp-vararg `_, `cppcoreguidelines-pro-type-vararg `_, - `llvm-else-after-return `_, `readability-else-after-return `_, "Yes" - `llvm-qualified-auto `_, `readability-qualified-auto `_, "Yes" + :doc:`bugprone-narrowing-conversions `, :doc:`cppcoreguidelines-narrowing-conversions `, + :doc:`cert-con36-c `, :doc:`bugprone-spuriously-wake-up-functions `, + :doc:`cert-con54-cpp `, :doc:`bugprone-spuriously-wake-up-functions `, + :doc:`cert-dcl03-c `, :doc:`misc-static-assert `, "Yes" + :doc:`cert-dcl16-c `, :doc:`readability-uppercase-literal-suffix `, "Yes" + :doc:`cert-dcl37-c `, :doc:`bugprone-reserved-identifier `, "Yes" + :doc:`cert-dcl51-cpp `, :doc:`bugprone-reserved-identifier `, "Yes" + :doc:`cert-dcl54-cpp `, :doc:`misc-new-delete-overloads `, + :doc:`cert-dcl59-cpp `, :doc:`google-build-namespaces `, + :doc:`cert-err09-cpp `, :doc:`misc-throw-by-value-catch-by-reference `, + :doc:`cert-err61-cpp `, :doc:`misc-throw-by-value-catch-by-reference `, + :doc:`cert-exp42-c `, :doc:`bugprone-suspicious-memory-comparison `, + :doc:`cert-fio38-c `, :doc:`misc-non-copyable-objects `, + :doc:`cert-flp37-c `, :doc:`bugprone-suspicious-memory-comparison `, + :doc:`cert-msc24-c `, :doc:`bugprone-unsafe-functions `, + :doc:`cert-msc30-c `, :doc:`cert-msc50-cpp `, + :doc:`cert-msc32-c `, :doc:`cert-msc51-cpp `, + :doc:`cert-msc33-c `, :doc:`bugprone-unsafe-functions `, + :doc:`cert-msc54-cpp `, :doc:`bugprone-signal-handler `, + :doc:`cert-oop11-cpp `, :doc:`performance-move-constructor-init `, + :doc:`cert-oop54-cpp `, :doc:`bugprone-unhandled-self-assignment `, + :doc:`cert-pos44-c `, :doc:`bugprone-bad-signal-to-kill-thread `, + :doc:`cert-pos47-c `, :doc:`concurrency-thread-canceltype-asynchronous `, + :doc:`cert-sig30-c `, :doc:`bugprone-signal-handler `, + :doc:`cert-str34-c `, :doc:`bugprone-signed-char-misuse `, + :doc:`clang-analyzer-core.BitwiseShift `, `Clang Static Analyzer core.BitwiseShift `_, + :doc:`clang-analyzer-core.CallAndMessage `, `Clang Static Analyzer core.CallAndMessage `_, + :doc:`clang-analyzer-core.DivideZero `, `Clang Static Analyzer core.DivideZero `_, + :doc:`clang-analyzer-core.NonNullParamChecker `, `Clang Static Analyzer core.NonNullParamChecker `_, + :doc:`clang-analyzer-core.NullDereference `, `Clang Static Analyzer core.NullDereference `_, + :doc:`clang-analyzer-core.StackAddressEscape `, `Clang Static Analyzer core.StackAddressEscape `_, + :doc:`clang-analyzer-core.UndefinedBinaryOperatorResult `, `Clang Static Analyzer core.UndefinedBinaryOperatorResult `_, + :doc:`clang-analyzer-core.VLASize `, `Clang Static Analyzer core.VLASize `_, + :doc:`clang-analyzer-core.uninitialized.ArraySubscript `, `Clang Static Analyzer core.uninitialized.ArraySubscript `_, + :doc:`clang-analyzer-core.uninitialized.Assign `, `Clang Static Analyzer core.uninitialized.Assign `_, + :doc:`clang-analyzer-core.uninitialized.Branch `, `Clang Static Analyzer core.uninitialized.Branch `_, + :doc:`clang-analyzer-core.uninitialized.CapturedBlockVariable `, `Clang Static Analyzer core.uninitialized.CapturedBlockVariable `_, + :doc:`clang-analyzer-core.uninitialized.NewArraySize `, `Clang Static Analyzer core.uninitialized.NewArraySize `_, + :doc:`clang-analyzer-core.uninitialized.UndefReturn `, `Clang Static Analyzer core.uninitialized.UndefReturn `_, + :doc:`clang-analyzer-cplusplus.InnerPointer `, `Clang Static Analyzer cplusplus.InnerPointer `_, + :doc:`clang-analyzer-cplusplus.Move `, Clang Static Analyzer cplusplus.Move, + :doc:`clang-analyzer-cplusplus.NewDelete `, `Clang Static Analyzer cplusplus.NewDelete `_, + :doc:`clang-analyzer-cplusplus.NewDeleteLeaks `, `Clang Static Analyzer cplusplus.NewDeleteLeaks `_, + :doc:`clang-analyzer-cplusplus.PlacementNew `, `Clang Static Analyzer cplusplus.PlacementNew `_, + :doc:`clang-analyzer-cplusplus.PureVirtualCall `, Clang Static Analyzer cplusplus.PureVirtualCall, + :doc:`clang-analyzer-cplusplus.StringChecker `, `Clang Static Analyzer cplusplus.StringChecker `_, + :doc:`clang-analyzer-deadcode.DeadStores `, `Clang Static Analyzer deadcode.DeadStores `_, + :doc:`clang-analyzer-fuchsia.HandleChecker `, `Clang Static Analyzer fuchsia.HandleChecker `_, + :doc:`clang-analyzer-nullability.NullPassedToNonnull `, `Clang Static Analyzer nullability.NullPassedToNonnull `_, + :doc:`clang-analyzer-nullability.NullReturnedFromNonnull `, `Clang Static Analyzer nullability.NullReturnedFromNonnull `_, + :doc:`clang-analyzer-nullability.NullableDereferenced `, `Clang Static Analyzer nullability.NullableDereferenced `_, + :doc:`clang-analyzer-nullability.NullablePassedToNonnull `, `Clang Static Analyzer nullability.NullablePassedToNonnull `_, + :doc:`clang-analyzer-nullability.NullableReturnedFromNonnull `, `Clang Static Analyzer nullability.NullableReturnedFromNonnull `_, + :doc:`clang-analyzer-optin.cplusplus.UninitializedObject `, `Clang Static Analyzer optin.cplusplus.UninitializedObject `_, + :doc:`clang-analyzer-optin.cplusplus.VirtualCall `, `Clang Static Analyzer optin.cplusplus.VirtualCall `_, + :doc:`clang-analyzer-optin.mpi.MPI-Checker `, `Clang Static Analyzer optin.mpi.MPI-Checker `_, + :doc:`clang-analyzer-optin.osx.OSObjectCStyleCast `, Clang Static Analyzer optin.osx.OSObjectCStyleCast, + :doc:`clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `, `Clang Static Analyzer optin.osx.cocoa.localizability.EmptyLocalizationContextChecker `_, + :doc:`clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker `, `Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker `_, + :doc:`clang-analyzer-optin.performance.GCDAntipattern `, `Clang Static Analyzer optin.performance.GCDAntipattern `_, + :doc:`clang-analyzer-optin.performance.Padding `, `Clang Static Analyzer optin.performance.Padding `_, + :doc:`clang-analyzer-optin.portability.UnixAPI `, `Clang Static Analyzer optin.portability.UnixAPI `_, + :doc:`clang-analyzer-osx.API `, `Clang Static Analyzer osx.API `_, + :doc:`clang-analyzer-osx.MIG `, Clang Static Analyzer osx.MIG, + :doc:`clang-analyzer-osx.NumberObjectConversion `, `Clang Static Analyzer osx.NumberObjectConversion `_, + :doc:`clang-analyzer-osx.OSObjectRetainCount `, Clang Static Analyzer osx.OSObjectRetainCount, + :doc:`clang-analyzer-osx.ObjCProperty `, `Clang Static Analyzer osx.ObjCProperty `_, + :doc:`clang-analyzer-osx.SecKeychainAPI `, `Clang Static Analyzer osx.SecKeychainAPI `_, + :doc:`clang-analyzer-osx.cocoa.AtSync `, `Clang Static Analyzer osx.cocoa.AtSync `_, + :doc:`clang-analyzer-osx.cocoa.AutoreleaseWrite `, `Clang Static Analyzer osx.cocoa.AutoreleaseWrite `_, + :doc:`clang-analyzer-osx.cocoa.ClassRelease `, `Clang Static Analyzer osx.cocoa.ClassRelease `_, + :doc:`clang-analyzer-osx.cocoa.Dealloc `, `Clang Static Analyzer osx.cocoa.Dealloc `_, + :doc:`clang-analyzer-osx.cocoa.IncompatibleMethodTypes `, `Clang Static Analyzer osx.cocoa.IncompatibleMethodTypes `_, + :doc:`clang-analyzer-osx.cocoa.Loops `, `Clang Static Analyzer osx.cocoa.Loops `_, + :doc:`clang-analyzer-osx.cocoa.MissingSuperCall `, `Clang Static Analyzer osx.cocoa.MissingSuperCall `_, + :doc:`clang-analyzer-osx.cocoa.NSAutoreleasePool `, `Clang Static Analyzer osx.cocoa.NSAutoreleasePool `_, + :doc:`clang-analyzer-osx.cocoa.NSError `, `Clang Static Analyzer osx.cocoa.NSError `_, + :doc:`clang-analyzer-osx.cocoa.NilArg `, `Clang Static Analyzer osx.cocoa.NilArg `_, + :doc:`clang-analyzer-osx.cocoa.NonNilReturnValue `, `Clang Static Analyzer osx.cocoa.NonNilReturnValue `_, + :doc:`clang-analyzer-osx.cocoa.ObjCGenerics `, `Clang Static Analyzer osx.cocoa.ObjCGenerics `_, + :doc:`clang-analyzer-osx.cocoa.RetainCount `, `Clang Static Analyzer osx.cocoa.RetainCount `_, + :doc:`clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak `, `Clang Static Analyzer osx.cocoa.RunLoopAutoreleaseLeak `_, + :doc:`clang-analyzer-osx.cocoa.SelfInit `, `Clang Static Analyzer osx.cocoa.SelfInit `_, + :doc:`clang-analyzer-osx.cocoa.SuperDealloc `, `Clang Static Analyzer osx.cocoa.SuperDealloc `_, + :doc:`clang-analyzer-osx.cocoa.UnusedIvars `, `Clang Static Analyzer osx.cocoa.UnusedIvars `_, + :doc:`clang-analyzer-osx.cocoa.VariadicMethodTypes `, `Clang Static Analyzer osx.cocoa.VariadicMethodTypes `_, + :doc:`clang-analyzer-osx.coreFoundation.CFError `, `Clang Static Analyzer osx.coreFoundation.CFError `_, + :doc:`clang-analyzer-osx.coreFoundation.CFNumber `, `Clang Static Analyzer osx.coreFoundation.CFNumber `_, + :doc:`clang-analyzer-osx.coreFoundation.CFRetainRelease `, `Clang Static Analyzer osx.coreFoundation.CFRetainRelease `_, + :doc:`clang-analyzer-osx.coreFoundation.containers.OutOfBounds `, `Clang Static Analyzer osx.coreFoundation.containers.OutOfBounds `_, + :doc:`clang-analyzer-osx.coreFoundation.containers.PointerSizedValues `, `Clang Static Analyzer osx.coreFoundation.containers.PointerSizedValues `_, + :doc:`clang-analyzer-security.FloatLoopCounter `, `Clang Static Analyzer security.FloatLoopCounter `_, + :doc:`clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling `, `Clang Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling `_, + :doc:`clang-analyzer-security.insecureAPI.UncheckedReturn `, `Clang Static Analyzer security.insecureAPI.UncheckedReturn `_, + :doc:`clang-analyzer-security.insecureAPI.bcmp `, `Clang Static Analyzer security.insecureAPI.bcmp `_, + :doc:`clang-analyzer-security.insecureAPI.bcopy `, `Clang Static Analyzer security.insecureAPI.bcopy `_, + :doc:`clang-analyzer-security.insecureAPI.bzero `, `Clang Static Analyzer security.insecureAPI.bzero `_, + :doc:`clang-analyzer-security.insecureAPI.decodeValueOfObjCType `, Clang Static Analyzer security.insecureAPI.decodeValueOfObjCType, + :doc:`clang-analyzer-security.insecureAPI.getpw `, `Clang Static Analyzer security.insecureAPI.getpw `_, + :doc:`clang-analyzer-security.insecureAPI.gets `, `Clang Static Analyzer security.insecureAPI.gets `_, + :doc:`clang-analyzer-security.insecureAPI.mkstemp `, `Clang Static Analyzer security.insecureAPI.mkstemp `_, + :doc:`clang-analyzer-security.insecureAPI.mktemp `, `Clang Static Analyzer security.insecureAPI.mktemp `_, + :doc:`clang-analyzer-security.insecureAPI.rand `, `Clang Static Analyzer security.insecureAPI.rand `_, + :doc:`clang-analyzer-security.insecureAPI.strcpy `, `Clang Static Analyzer security.insecureAPI.strcpy `_, + :doc:`clang-analyzer-security.insecureAPI.vfork `, `Clang Static Analyzer security.insecureAPI.vfork `_, + :doc:`clang-analyzer-unix.API `, `Clang Static Analyzer unix.API `_, + :doc:`clang-analyzer-unix.Malloc `, `Clang Static Analyzer unix.Malloc `_, + :doc:`clang-analyzer-unix.MallocSizeof `, `Clang Static Analyzer unix.MallocSizeof `_, + :doc:`clang-analyzer-unix.MismatchedDeallocator `, `Clang Static Analyzer unix.MismatchedDeallocator `_, + :doc:`clang-analyzer-unix.Vfork `, `Clang Static Analyzer unix.Vfork `_, + :doc:`clang-analyzer-unix.cstring.BadSizeArg `, `Clang Static Analyzer unix.cstring.BadSizeArg `_, + :doc:`clang-analyzer-unix.cstring.NullArg `, `Clang Static Analyzer unix.cstring.NullArg `_, + :doc:`clang-analyzer-valist.CopyToSelf `, Clang Static Analyzer valist.CopyToSelf, + :doc:`clang-analyzer-valist.Uninitialized `, Clang Static Analyzer valist.Uninitialized, + :doc:`clang-analyzer-valist.Unterminated `, Clang Static Analyzer valist.Unterminated, + :doc:`clang-analyzer-webkit.NoUncountedMemberChecker `, `Clang Static Analyzer webkit.NoUncountedMemberChecker `_, + :doc:`clang-analyzer-webkit.RefCntblBaseVirtualDtor `, `Clang Static Analyzer webkit.RefCntblBaseVirtualDtor `_, + :doc:`clang-analyzer-webkit.UncountedLambdaCapturesChecker `, `Clang Static Analyzer webkit.UncountedLambdaCapturesChecker `_, + :doc:`cppcoreguidelines-avoid-c-arrays `, :doc:`modernize-avoid-c-arrays `, + :doc:`cppcoreguidelines-avoid-magic-numbers `, :doc:`readability-magic-numbers `, + :doc:`cppcoreguidelines-c-copy-assignment-signature `, :doc:`misc-unconventional-assign-operator `, + :doc:`cppcoreguidelines-explicit-virtual-functions `, :doc:`modernize-use-override `, "Yes" + :doc:`cppcoreguidelines-macro-to-enum `, :doc:`modernize-macro-to-enum `, "Yes" + :doc:`cppcoreguidelines-noexcept-destructor `, :doc:`performance-noexcept-destructor `, "Yes" + :doc:`cppcoreguidelines-noexcept-move-operations `, :doc:`performance-noexcept-move-constructor `, "Yes" + :doc:`cppcoreguidelines-noexcept-swap `, :doc:`performance-noexcept-swap `, "Yes" + :doc:`cppcoreguidelines-non-private-member-variables-in-classes `, :doc:`misc-non-private-member-variables-in-classes `, + :doc:`cppcoreguidelines-use-default-member-init `, :doc:`modernize-use-default-member-init `, "Yes" + :doc:`fuchsia-header-anon-namespaces `, :doc:`google-build-namespaces `, + :doc:`google-readability-braces-around-statements `, :doc:`readability-braces-around-statements `, "Yes" + :doc:`google-readability-function-size `, :doc:`readability-function-size `, + :doc:`google-readability-namespace-comments `, :doc:`llvm-namespace-comment `, + :doc:`hicpp-avoid-c-arrays `, :doc:`modernize-avoid-c-arrays `, + :doc:`hicpp-avoid-goto `, :doc:`cppcoreguidelines-avoid-goto `, + :doc:`hicpp-braces-around-statements `, :doc:`readability-braces-around-statements `, "Yes" + :doc:`hicpp-deprecated-headers `, :doc:`modernize-deprecated-headers `, "Yes" + :doc:`hicpp-explicit-conversions `, :doc:`google-explicit-constructor `, "Yes" + :doc:`hicpp-function-size `, :doc:`readability-function-size `, + :doc:`hicpp-invalid-access-moved `, :doc:`bugprone-use-after-move `, + :doc:`hicpp-member-init `, :doc:`cppcoreguidelines-pro-type-member-init `, "Yes" + :doc:`hicpp-move-const-arg `, :doc:`performance-move-const-arg `, "Yes" + :doc:`hicpp-named-parameter `, :doc:`readability-named-parameter `, "Yes" + :doc:`hicpp-new-delete-operators `, :doc:`misc-new-delete-overloads `, + :doc:`hicpp-no-array-decay `, :doc:`cppcoreguidelines-pro-bounds-array-to-pointer-decay `, + :doc:`hicpp-no-malloc `, :doc:`cppcoreguidelines-no-malloc `, + :doc:`hicpp-noexcept-move `, :doc:`performance-noexcept-move-constructor `, "Yes" + :doc:`hicpp-special-member-functions `, :doc:`cppcoreguidelines-special-member-functions `, + :doc:`hicpp-static-assert `, :doc:`misc-static-assert `, "Yes" + :doc:`hicpp-undelegated-constructor `, :doc:`bugprone-undelegated-constructor `, + :doc:`hicpp-uppercase-literal-suffix `, :doc:`readability-uppercase-literal-suffix `, "Yes" + :doc:`hicpp-use-auto `, :doc:`modernize-use-auto `, "Yes" + :doc:`hicpp-use-emplace `, :doc:`modernize-use-emplace `, "Yes" + :doc:`hicpp-use-equals-default `, :doc:`modernize-use-equals-default `, "Yes" + :doc:`hicpp-use-equals-delete `, :doc:`modernize-use-equals-delete `, "Yes" + :doc:`hicpp-use-noexcept `, :doc:`modernize-use-noexcept `, "Yes" + :doc:`hicpp-use-nullptr `, :doc:`modernize-use-nullptr `, "Yes" + :doc:`hicpp-use-override `, :doc:`modernize-use-override `, "Yes" + :doc:`hicpp-vararg `, :doc:`cppcoreguidelines-pro-type-vararg `, + :doc:`llvm-else-after-return `, :doc:`readability-else-after-return `, "Yes" + :doc:`llvm-qualified-auto `, :doc:`readability-qualified-auto `, "Yes" diff --git a/clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst b/clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst index 8fd04e542acd9..3632c886fc151 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/llvm/else-after-return.rst @@ -5,7 +5,7 @@ llvm-else-after-return ====================== -The llvm-else-after-return check is an alias, please see -`readability-else-after-return <../readability/else-after-return.html>`_ +The `llvm-else-after-return` check is an alias, please see +:doc:`readability-else-after-return <../readability/else-after-return>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst b/clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst index 95c98d3f74f60..2052b8bbe10b8 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/llvm/qualified-auto.rst @@ -5,6 +5,6 @@ llvm-qualified-auto =================== -The llvm-qualified-auto check is an alias, please see -`readability-qualified-auto <../readability/qualified-auto.html>`_ +The `llvm-qualified-auto check` is an alias, please see +:doc:`readability-qualified-auto <../readability/qualified-auto>` for more information. diff --git a/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst b/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst index f51d792cc153a..b5a59fa691da4 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/misc/const-correctness.rst @@ -46,10 +46,10 @@ The check can analyze values, pointers and references but not (yet) pointees: The automatic code transformation is only applied to variables that are declared in single declarations. You may want to prepare your code base with -`readability-isolate-declaration <../readability/isolate-declaration.html>`_ first. +:doc:`readability-isolate-declaration <../readability/isolate-declaration>` first. Note that there is the check -`cppcoreguidelines-avoid-non-const-global-variables <../cppcoreguidelines/avoid-non-const-global-variables.html>`_ +:doc:`cppcoreguidelines-avoid-non-const-global-variables <../cppcoreguidelines/avoid-non-const-global-variables>` to enforce ``const`` correctness on all globals. Known Limitations diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst index db90240e9c623..9cd4f9d1522e0 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/modernize/use-default.rst @@ -8,4 +8,4 @@ modernize-use-default ===================== This check has been renamed to -`modernize-use-equals-default <../modernize/use-equals-default.html>`_. +:doc:`modernize-use-equals-default <../modernize/use-equals-default>`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst b/clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst index 351b4a5386159..fc8bf5d851710 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/performance/implicit-cast-in-loop.rst @@ -7,6 +7,6 @@ performance-implicit-cast-in-loop ================================= -This check has been renamed to `performance-implicit-conversion-in-loop -<../performance/implicit-conversion-in-loop.html>`_. +This check has been renamed to :doc:`performance-implicit-conversion-in-loop +<../performance/implicit-conversion-in-loop>`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst b/clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst index 4edc2c191fca3..641cb83d6df04 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability/convert-member-functions-to-static.rst @@ -10,5 +10,5 @@ After applying modifications as suggested by the check, running the check again might find more opportunities to mark member functions ``static``. After making a member function ``static``, you might want to run the check -`readability-static-accessed-through-instance <../readability/static-accessed-through-instance.html>`_ to replace calls like +:doc:`readability-static-accessed-through-instance <../readability/static-accessed-through-instance>` to replace calls like ``Instance.method()`` by ``Class::method()``. diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst b/clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst index ce81f651bbd19..9ad5fbbeff0eb 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability/implicit-bool-cast.rst @@ -7,5 +7,5 @@ readability-implicit-bool-cast ============================== -This check has been renamed to `readability-implicit-bool-conversion -<../readability/implicit-bool-conversion.html>`_. +This check has been renamed to :doc:`readability-implicit-bool-conversion +<../readability/implicit-bool-conversion>`. diff --git a/clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst b/clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst index 3b507c00abdd6..5d1f8d1239b01 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/readability/make-member-function-const.rst @@ -37,7 +37,7 @@ In addition, this check ignores functions that * are templated or part of a class template * have an empty body * do not (implicitly) use ``this`` at all - (see `readability-convert-member-functions-to-static <../readability/convert-member-functions-to-static.html>`_). + (see :doc:`readability-convert-member-functions-to-static <../readability/convert-member-functions-to-static>`). The following real-world examples will be preserved by the check: