Author: Congcong Cai
Date: 2024-12-13T07:18:42+08:00
New Revision: 602bbf2fd2ee1dadf0982e05192ee8791b35c657

URL: 
https://github.com/llvm/llvm-project/commit/602bbf2fd2ee1dadf0982e05192ee8791b35c657
DIFF: 
https://github.com/llvm/llvm-project/commit/602bbf2fd2ee1dadf0982e05192ee8791b35c657.diff

LOG: [clang-tidy][NFC][doc] clean out-dated clang-static-analyzer checks 
(#119580)

Added: 
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.SelfAssignment.rst

Modified: 
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
    clang-tools-extra/docs/clang-tidy/checks/list.rst

Removed: 
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst


################################################################################
diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
deleted file mode 100644
index 9fab628b80d443..00000000000000
--- 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.PureVirtualCall.rst
+++ /dev/null
@@ -1,9 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-cplusplus.PureVirtualCall
-
-clang-analyzer-cplusplus.PureVirtualCall
-========================================
-
-Check pure virtual function calls during construction/destruction.
-
-The clang-analyzer-cplusplus.PureVirtualCall check is an alias of
-Clang Static Analyzer cplusplus.PureVirtualCall.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.SelfAssignment.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.SelfAssignment.rst
new file mode 100644
index 00000000000000..62e300660828ba
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.SelfAssignment.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.SelfAssignment
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-selfassignment
+
+clang-analyzer-cplusplus.SelfAssignment
+=======================================
+
+Checks C++ copy and move assignment operators for self assignment.
+
+The `clang-analyzer-cplusplus.SelfAssignment` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
deleted file mode 100644
index c2fef59f568943..00000000000000
--- 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst
+++ /dev/null
@@ -1,9 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast
-
-clang-analyzer-optin.osx.OSObjectCStyleCast
-===========================================
-
-Checker for C-style casts of OSObjects.
-
-The clang-analyzer-optin.osx.OSObjectCStyleCast check is an alias of
-Clang Static Analyzer optin.osx.OSObjectCStyleCast.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
deleted file mode 100644
index a7b8a1cfb14cdc..00000000000000
--- a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst
+++ /dev/null
@@ -1,9 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-osx.MIG
-
-clang-analyzer-osx.MIG
-======================
-
-Find violations of the Mach Interface Generator calling convention.
-
-The clang-analyzer-osx.MIG check is an alias of
-Clang Static Analyzer osx.MIG.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
deleted file mode 100644
index c32982d407c286..00000000000000
--- 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst
+++ /dev/null
@@ -1,9 +0,0 @@
-.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount
-
-clang-analyzer-osx.OSObjectRetainCount
-======================================
-
-Check for leaks and improper reference count management for OSObject.
-
-The clang-analyzer-osx.OSObjectRetainCount check is an alias of
-Clang Static Analyzer osx.OSObjectRetainCount.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst
index 0a5feff8d3ca82..55506ed16c83a2 100644
--- 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst
@@ -3,8 +3,13 @@
 clang-analyzer-security.PutenvStackArray
 ========================================
 
-Finds calls to the function 'putenv' which pass a pointer to an automatic
-(stack-allocated) array as the argument.
+Finds calls to the putenv function which pass a pointer to a stack-allocated
+(automatic) array as the argument. Function putenv does not copy the passed
+string, only a pointer to the data is stored and this data can be read even by
+other threads. Content of a stack-allocated array is likely to be overwritten
+after exiting from the function.
 
-The clang-analyzer-security.PutenvStackArray check is an alias of
-Clang Static Analyzer security.PutenvStackArray.
+The `clang-analyzer-security.PutenvStackArray` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-putenvstackarray-c>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
index 82f22b11f77fb4..af9ca517e02cfb 100644
--- 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
@@ -3,8 +3,14 @@
 clang-analyzer-security.SetgidSetuidOrder
 =========================================
 
-Warn on possible reversed order of 'setgid(getgid()))' and 'setuid(getuid())'
-(CERT: POS36-C).
+The checker checks for sequences of ``setuid(getuid())`` and 
``setgid(getgid())``
+calls (in this order). If such a sequence is found and there is no other
+privilege-changing function call (``seteuid``, ``setreuid``, ``setresuid`` and
+the GID versions of these) in between, a warning is generated. The checker 
finds
+only exactly ``setuid(getuid())`` calls (and the GID versions), not for example
+if the result of ``getuid()`` is stored in a variable.
 
-The clang-analyzer-security.SetgidSetuidOrder check is an alias of
-Clang Static Analyzer security.SetgidSetuidOrder.
+The `clang-analyzer-security.SetgidSetuidOrder` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#security-setgidsetuidorder-c>`_
+for more information.

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst 
b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 41f8f958e9e181..c85466618ec0a4 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -459,7 +459,7 @@ Check aliases
    :doc:`clang-analyzer-cplusplus.NewDelete 
<clang-analyzer/cplusplus.NewDelete>`, `Clang Static Analyzer 
cplusplus.NewDelete 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_,
    :doc:`clang-analyzer-cplusplus.NewDeleteLeaks 
<clang-analyzer/cplusplus.NewDeleteLeaks>`, `Clang Static Analyzer 
cplusplus.NewDeleteLeaks 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_,
    :doc:`clang-analyzer-cplusplus.PlacementNew 
<clang-analyzer/cplusplus.PlacementNew>`, `Clang Static Analyzer 
cplusplus.PlacementNew 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-placementnew>`_,
-   :doc:`clang-analyzer-cplusplus.PureVirtualCall 
<clang-analyzer/cplusplus.PureVirtualCall>`, Clang Static Analyzer 
cplusplus.PureVirtualCall,
+   :doc:`clang-analyzer-cplusplus.SelfAssignment 
<clang-analyzer/cplusplus.SelfAssignment>`, `Clang Static Analyzer 
cplusplus.SelfAssignment 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-selfassignment>`_,
    :doc:`clang-analyzer-cplusplus.StringChecker 
<clang-analyzer/cplusplus.StringChecker>`, `Clang Static Analyzer 
cplusplus.StringChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-stringchecker>`_,
    :doc:`clang-analyzer-deadcode.DeadStores 
<clang-analyzer/deadcode.DeadStores>`, `Clang Static Analyzer 
deadcode.DeadStores 
<https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_,
    :doc:`clang-analyzer-fuchsia.HandleChecker 
<clang-analyzer/fuchsia.HandleChecker>`, `Clang Static Analyzer 
fuchsia.HandleChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#fuchsia-handlechecker>`_,
@@ -472,7 +472,6 @@ Check aliases
    :doc:`clang-analyzer-optin.cplusplus.UninitializedObject 
<clang-analyzer/optin.cplusplus.UninitializedObject>`, `Clang Static Analyzer 
optin.cplusplus.UninitializedObject 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_,
    :doc:`clang-analyzer-optin.cplusplus.VirtualCall 
<clang-analyzer/optin.cplusplus.VirtualCall>`, `Clang Static Analyzer 
optin.cplusplus.VirtualCall 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_,
    :doc:`clang-analyzer-optin.mpi.MPI-Checker 
<clang-analyzer/optin.mpi.MPI-Checker>`, `Clang Static Analyzer 
optin.mpi.MPI-Checker 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_,
-   :doc:`clang-analyzer-optin.osx.OSObjectCStyleCast 
<clang-analyzer/optin.osx.OSObjectCStyleCast>`, Clang Static Analyzer 
optin.osx.OSObjectCStyleCast,
    
:doc:`clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
 
<clang-analyzer/optin.osx.cocoa.localizability.EmptyLocalizationContextChecker>`,
 `Clang Static Analyzer 
optin.osx.cocoa.localizability.EmptyLocalizationContextChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_,
    
:doc:`clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker 
<clang-analyzer/optin.osx.cocoa.localizability.NonLocalizedStringChecker>`, 
`Clang Static Analyzer optin.osx.cocoa.localizability.NonLocalizedStringChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_,
    :doc:`clang-analyzer-optin.performance.GCDAntipattern 
<clang-analyzer/optin.performance.GCDAntipattern>`, `Clang Static Analyzer 
optin.performance.GCDAntipattern 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-performance-gcdantipattern>`_,
@@ -480,9 +479,7 @@ Check aliases
    :doc:`clang-analyzer-optin.portability.UnixAPI 
<clang-analyzer/optin.portability.UnixAPI>`, `Clang Static Analyzer 
optin.portability.UnixAPI 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-portability-unixapi>`_,
    :doc:`clang-analyzer-optin.taint.TaintedAlloc 
<clang-analyzer/optin.taint.TaintedAlloc>`, `Clang Static Analyzer 
optin.taint.TaintedAlloc 
<https://clang.llvm.org/docs/analyzer/checkers.html#optin-taint-taintedalloc>`_,
    :doc:`clang-analyzer-osx.API <clang-analyzer/osx.API>`, `Clang Static 
Analyzer osx.API <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_,
-   :doc:`clang-analyzer-osx.MIG <clang-analyzer/osx.MIG>`, Clang Static 
Analyzer osx.MIG,
    :doc:`clang-analyzer-osx.NumberObjectConversion 
<clang-analyzer/osx.NumberObjectConversion>`, `Clang Static Analyzer 
osx.NumberObjectConversion 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-numberobjectconversion>`_,
-   :doc:`clang-analyzer-osx.OSObjectRetainCount 
<clang-analyzer/osx.OSObjectRetainCount>`, Clang Static Analyzer 
osx.OSObjectRetainCount,
    :doc:`clang-analyzer-osx.ObjCProperty <clang-analyzer/osx.ObjCProperty>`, 
`Clang Static Analyzer osx.ObjCProperty 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-objcproperty>`_,
    :doc:`clang-analyzer-osx.SecKeychainAPI 
<clang-analyzer/osx.SecKeychainAPI>`, `Clang Static Analyzer osx.SecKeychainAPI 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_,
    :doc:`clang-analyzer-osx.cocoa.AtSync <clang-analyzer/osx.cocoa.AtSync>`, 
`Clang Static Analyzer osx.cocoa.AtSync 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_,
@@ -509,15 +506,14 @@ Check aliases
    :doc:`clang-analyzer-osx.coreFoundation.containers.OutOfBounds 
<clang-analyzer/osx.coreFoundation.containers.OutOfBounds>`, `Clang Static 
Analyzer osx.coreFoundation.containers.OutOfBounds 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_,
    :doc:`clang-analyzer-osx.coreFoundation.containers.PointerSizedValues 
<clang-analyzer/osx.coreFoundation.containers.PointerSizedValues>`, `Clang 
Static Analyzer osx.coreFoundation.containers.PointerSizedValues 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_,
    :doc:`clang-analyzer-security.FloatLoopCounter 
<clang-analyzer/security.FloatLoopCounter>`, `Clang Static Analyzer 
security.FloatLoopCounter 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_,
-   :doc:`clang-analyzer-security.PutenvStackArray 
<clang-analyzer/security.PutenvStackArray>`, Clang Static Analyzer 
security.PutenvStackArray,
-   :doc:`clang-analyzer-security.SetgidSetuidOrder 
<clang-analyzer/security.SetgidSetuidOrder>`, Clang Static Analyzer 
security.SetgidSetuidOrder,
+   :doc:`clang-analyzer-security.PutenvStackArray 
<clang-analyzer/security.PutenvStackArray>`, `Clang Static Analyzer 
security.PutenvStackArray 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-putenvstackarray-c>`_,
+   :doc:`clang-analyzer-security.SetgidSetuidOrder 
<clang-analyzer/security.SetgidSetuidOrder>`, `Clang Static Analyzer 
security.SetgidSetuidOrder 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-setgidsetuidorder-c>`_,
    :doc:`clang-analyzer-security.cert.env.InvalidPtr 
<clang-analyzer/security.cert.env.InvalidPtr>`, `Clang Static Analyzer 
security.cert.env.InvalidPtr 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-cert-env-invalidptr>`_,
    :doc:`clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling>`, `Clang 
Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_,
    :doc:`clang-analyzer-security.insecureAPI.UncheckedReturn 
<clang-analyzer/security.insecureAPI.UncheckedReturn>`, `Clang Static Analyzer 
security.insecureAPI.UncheckedReturn 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_,
    :doc:`clang-analyzer-security.insecureAPI.bcmp 
<clang-analyzer/security.insecureAPI.bcmp>`, `Clang Static Analyzer 
security.insecureAPI.bcmp 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_,
    :doc:`clang-analyzer-security.insecureAPI.bcopy 
<clang-analyzer/security.insecureAPI.bcopy>`, `Clang Static Analyzer 
security.insecureAPI.bcopy 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_,
    :doc:`clang-analyzer-security.insecureAPI.bzero 
<clang-analyzer/security.insecureAPI.bzero>`, `Clang Static Analyzer 
security.insecureAPI.bzero 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_,
-   :doc:`clang-analyzer-security.insecureAPI.decodeValueOfObjCType 
<clang-analyzer/security.insecureAPI.decodeValueOfObjCType>`, Clang Static 
Analyzer security.insecureAPI.decodeValueOfObjCType,
    :doc:`clang-analyzer-security.insecureAPI.getpw 
<clang-analyzer/security.insecureAPI.getpw>`, `Clang Static Analyzer 
security.insecureAPI.getpw 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_,
    :doc:`clang-analyzer-security.insecureAPI.gets 
<clang-analyzer/security.insecureAPI.gets>`, `Clang Static Analyzer 
security.insecureAPI.gets 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_,
    :doc:`clang-analyzer-security.insecureAPI.mkstemp 
<clang-analyzer/security.insecureAPI.mkstemp>`, `Clang Static Analyzer 
security.insecureAPI.mkstemp 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_,
@@ -536,9 +532,6 @@ Check aliases
    :doc:`clang-analyzer-unix.Vfork <clang-analyzer/unix.Vfork>`, `Clang Static 
Analyzer unix.Vfork 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_,
    :doc:`clang-analyzer-unix.cstring.BadSizeArg 
<clang-analyzer/unix.cstring.BadSizeArg>`, `Clang Static Analyzer 
unix.cstring.BadSizeArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_,
    :doc:`clang-analyzer-unix.cstring.NullArg 
<clang-analyzer/unix.cstring.NullArg>`, `Clang Static Analyzer 
unix.cstring.NullArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_,
-   :doc:`clang-analyzer-valist.CopyToSelf <clang-analyzer/valist.CopyToSelf>`, 
Clang Static Analyzer valist.CopyToSelf,
-   :doc:`clang-analyzer-valist.Uninitialized 
<clang-analyzer/valist.Uninitialized>`, Clang Static Analyzer 
valist.Uninitialized,
-   :doc:`clang-analyzer-valist.Unterminated 
<clang-analyzer/valist.Unterminated>`, Clang Static Analyzer 
valist.Unterminated,
    :doc:`clang-analyzer-webkit.NoUncountedMemberChecker 
<clang-analyzer/webkit.NoUncountedMemberChecker>`, `Clang Static Analyzer 
webkit.NoUncountedMemberChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-nouncountedmemberchecker>`_,
    :doc:`clang-analyzer-webkit.RefCntblBaseVirtualDtor 
<clang-analyzer/webkit.RefCntblBaseVirtualDtor>`, `Clang Static Analyzer 
webkit.RefCntblBaseVirtualDtor 
<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-refcntblbasevirtualdtor>`_,
    :doc:`clang-analyzer-webkit.UncountedLambdaCapturesChecker 
<clang-analyzer/webkit.UncountedLambdaCapturesChecker>`, `Clang Static Analyzer 
webkit.UncountedLambdaCapturesChecker 
<https://clang.llvm.org/docs/analyzer/checkers.html#webkit-uncountedlambdacaptureschecker>`_,


        
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to