[clang-tidy] Adding static analyzer check to list of clang-tidy checks

Summary:
Since clang-tidy supports use of the static analyzer there
should be documentation of how to invoke the static analyzer
checks.

Reviewers: JonasToth, aaron.ballman, NoQ, Szelethus

Reviewed By: aaron.ballman

Subscribers: nickdesaulniers, lebedev.ri, jfb, NoQ, Eugene.Zelenko, xazax.hun, baloghadamsoftware, a.sidorin, Szelethus, donat.nagy, dkrupp, cfe-commits

Tags: #clang

Differential Revision: https://reviews.llvm.org/D64454

git-svn-id: https://llvm.org/svn/llvm-project/clang-tools-extra/trunk@367694 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst b/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
new file mode 100644
index 0000000..69d1e6e
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.CallAndMessage.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.CallAndMessage
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage
+
+clang-analyzer-core.CallAndMessage
+==================================
+
+The clang-analyzer-core.CallAndMessage check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-callandmessage>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst b/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
new file mode 100644
index 0000000..f3c652f
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.DivideZero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.DivideZero
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero
+
+clang-analyzer-core.DivideZero
+==============================
+
+The clang-analyzer-core.DivideZero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-dividezero>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst b/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
new file mode 100644
index 0000000..e4f8eea
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.DynamicTypePropagation.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.DynamicTypePropagation
+
+clang-analyzer-core.DynamicTypePropagation
+==========================================
+
+Generate dynamic type information
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst b/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
new file mode 100644
index 0000000..3188c29
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.NonNullParamChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NonNullParamChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker
+
+clang-analyzer-core.NonNullParamChecker
+=======================================
+
+The clang-analyzer-core.NonNullParamChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nonnullparamchecker>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst b/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
new file mode 100644
index 0000000..f771c9e
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.NullDereference.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.NullDereference
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference
+
+clang-analyzer-core.NullDereference
+===================================
+
+The clang-analyzer-core.NullDereference check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-nulldereference>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst b/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
new file mode 100644
index 0000000..a3fb111
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.StackAddressEscape.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.StackAddressEscape
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape
+
+clang-analyzer-core.StackAddressEscape
+======================================
+
+The clang-analyzer-core.StackAddressEscape check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-stackaddressescape>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst b/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
new file mode 100644
index 0000000..1e36f6b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.UndefinedBinaryOperatorResult.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.UndefinedBinaryOperatorResult
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult
+
+clang-analyzer-core.UndefinedBinaryOperatorResult
+=================================================
+
+The clang-analyzer-core.UndefinedBinaryOperatorResult check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-undefinedbinaryoperatorresult>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst b/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
new file mode 100644
index 0000000..80e6ba5
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.VLASize.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.VLASize
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize
+
+clang-analyzer-core.VLASize
+===========================
+
+The clang-analyzer-core.VLASize check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-vlasize>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
new file mode 100644
index 0000000..5da6a33
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.ArraySubscript.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.ArraySubscript
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript
+
+clang-analyzer-core.uninitialized.ArraySubscript
+================================================
+
+The clang-analyzer-core.uninitialized.ArraySubscript check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-arraysubscript>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
new file mode 100644
index 0000000..8cc982b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Assign.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Assign
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign
+
+clang-analyzer-core.uninitialized.Assign
+========================================
+
+The clang-analyzer-core.uninitialized.Assign check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-assign>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
new file mode 100644
index 0000000..e0fcd7b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.Branch.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.Branch
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch
+
+clang-analyzer-core.uninitialized.Branch
+========================================
+
+The clang-analyzer-core.uninitialized.Branch check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-branch>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
new file mode 100644
index 0000000..396ce26
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.CapturedBlockVariable.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.CapturedBlockVariable
+
+clang-analyzer-core.uninitialized.CapturedBlockVariable
+=======================================================
+
+Check for blocks that capture uninitialized values
diff --git a/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
new file mode 100644
index 0000000..0575674
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-core.uninitialized.UndefReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-core.uninitialized.UndefReturn
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn
+
+clang-analyzer-core.uninitialized.UndefReturn
+=============================================
+
+The clang-analyzer-core.uninitialized.UndefReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst b/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
new file mode 100644
index 0000000..660284b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-cplusplus.InnerPointer.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.InnerPointer
+
+clang-analyzer-cplusplus.InnerPointer
+=====================================
+
+Check for inner pointers of C++ containers used after re/deallocation
diff --git a/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst b/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
new file mode 100644
index 0000000..b0d663d
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-cplusplus.Move.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.Move
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move
+
+clang-analyzer-cplusplus.Move
+=============================
+
+The clang-analyzer-cplusplus.Move check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-move>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst b/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
new file mode 100644
index 0000000..57964a8
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDelete.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDelete
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete
+
+clang-analyzer-cplusplus.NewDelete
+==================================
+
+The clang-analyzer-cplusplus.NewDelete check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst b/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
new file mode 100644
index 0000000..4601a46
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-cplusplus.NewDeleteLeaks.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.NewDeleteLeaks
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks
+
+clang-analyzer-cplusplus.NewDeleteLeaks
+=======================================
+
+The clang-analyzer-cplusplus.NewDeleteLeaks check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdeleteleaks>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst b/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
new file mode 100644
index 0000000..0bb4121
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-deadcode.DeadStores.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-deadcode.DeadStores
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores
+
+clang-analyzer-deadcode.DeadStores
+==================================
+
+The clang-analyzer-deadcode.DeadStores check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#deadcode-deadstores>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst b/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
new file mode 100644
index 0000000..7ebbb9b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-nullability.NullPassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullPassedToNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull
+
+clang-analyzer-nullability.NullPassedToNonnull
+==============================================
+
+The clang-analyzer-nullability.NullPassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullpassedtononnull>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst b/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
new file mode 100644
index 0000000..e585c7b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-nullability.NullReturnedFromNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullReturnedFromNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull
+
+clang-analyzer-nullability.NullReturnedFromNonnull
+==================================================
+
+The clang-analyzer-nullability.NullReturnedFromNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullreturnedfromnonnull>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst b/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
new file mode 100644
index 0000000..9734863
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-nullability.NullableDereferenced.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableDereferenced
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced
+
+clang-analyzer-nullability.NullableDereferenced
+===============================================
+
+The clang-analyzer-nullability.NullableDereferenced check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullabledereferenced>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst b/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
new file mode 100644
index 0000000..1c9b590
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-nullability.NullablePassedToNonnull.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullablePassedToNonnull
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull
+
+clang-analyzer-nullability.NullablePassedToNonnull
+==================================================
+
+The clang-analyzer-nullability.NullablePassedToNonnull check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#nullability-nullablepassedtononnull>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst b/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
new file mode 100644
index 0000000..c30b530
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-nullability.NullableReturnedFromNonnull.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-nullability.NullableReturnedFromNonnull
+
+clang-analyzer-nullability.NullableReturnedFromNonnull
+======================================================
+
+Warns when a nullable pointer is returned from a function that has _Nonnull return type.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst b/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
new file mode 100644
index 0000000..3380dc3
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.UninitializedObject.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.UninitializedObject
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject
+
+clang-analyzer-optin.cplusplus.UninitializedObject
+==================================================
+
+The clang-analyzer-optin.cplusplus.UninitializedObject check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-uninitializedobject>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst b/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
new file mode 100644
index 0000000..52cf5ff
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.cplusplus.VirtualCall.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.cplusplus.VirtualCall
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall
+
+clang-analyzer-optin.cplusplus.VirtualCall
+==========================================
+
+The clang-analyzer-optin.cplusplus.VirtualCall check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-cplusplus-virtualcall>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst b/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
new file mode 100644
index 0000000..211070c
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.mpi.MPI-Checker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.mpi.MPI-Checker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker
+
+clang-analyzer-optin.mpi.MPI-Checker
+====================================
+
+The clang-analyzer-optin.mpi.MPI-Checker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-mpi-mpi-checker>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst b/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
new file mode 100644
index 0000000..65e9efb
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.osx.OSObjectCStyleCast.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.OSObjectCStyleCast
+
+clang-analyzer-optin.osx.OSObjectCStyleCast
+===========================================
+
+Checker for C-style casts of OSObjects
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst b/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
new file mode 100644
index 0000000..8a8395c
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+=============================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-emptylocalizationcontextchecker>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst b/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
new file mode 100644
index 0000000..dc21471
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker
+
+clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+=======================================================================
+
+The clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#optin-osx-cocoa-localizability-nonlocalizedstringchecker>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst b/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
new file mode 100644
index 0000000..2684f75
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.performance.GCDAntipattern.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.GCDAntipattern
+
+clang-analyzer-optin.performance.GCDAntipattern
+===============================================
+
+Check for performance anti-patterns when using Grand Central Dispatch
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst b/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
new file mode 100644
index 0000000..fc2d730
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.performance.Padding.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.performance.Padding
+
+clang-analyzer-optin.performance.Padding
+========================================
+
+Check for excessively padded structs.
diff --git a/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst b/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
new file mode 100644
index 0000000..07545be
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-optin.portability.UnixAPI.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-optin.portability.UnixAPI
+
+clang-analyzer-optin.portability.UnixAPI
+========================================
+
+Finds implementation-defined behavior in UNIX/Posix functions
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.API.rst b/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
new file mode 100644
index 0000000..b3aae0c
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.API
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-api
+
+clang-analyzer-osx.API
+======================
+
+The clang-analyzer-osx.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-api>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst b/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
new file mode 100644
index 0000000..50fb5a8
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.MIG.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.MIG
+
+clang-analyzer-osx.MIG
+======================
+
+Find violations of the Mach Interface Generator calling convention
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst b/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
new file mode 100644
index 0000000..7471ad1
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.NumberObjectConversion.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.NumberObjectConversion
+
+clang-analyzer-osx.NumberObjectConversion
+=========================================
+
+Check for erroneous conversions of objects representing numbers into numbers
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst b/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
new file mode 100644
index 0000000..8eceb3f
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.OSObjectRetainCount.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.OSObjectRetainCount
+
+clang-analyzer-osx.OSObjectRetainCount
+======================================
+
+Check for leaks and improper reference count management for OSObject
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst b/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
new file mode 100644
index 0000000..0b87cd0
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.ObjCProperty.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.ObjCProperty
+
+clang-analyzer-osx.ObjCProperty
+===============================
+
+Check for proper uses of Objective-C properties
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst b/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
new file mode 100644
index 0000000..130fae5
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.SecKeychainAPI.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.SecKeychainAPI
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi
+
+clang-analyzer-osx.SecKeychainAPI
+=================================
+
+The clang-analyzer-osx.SecKeychainAPI check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-seckeychainapi>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
new file mode 100644
index 0000000..56a98bf
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AtSync.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AtSync
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync
+
+clang-analyzer-osx.cocoa.AtSync
+===============================
+
+The clang-analyzer-osx.cocoa.AtSync check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-atsync>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
new file mode 100644
index 0000000..01fbe4f
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.AutoreleaseWrite.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.AutoreleaseWrite
+
+clang-analyzer-osx.cocoa.AutoreleaseWrite
+=========================================
+
+Warn about potentially crashing writes to autoreleasing objects from different autoreleasing pools in Objective-C
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
new file mode 100644
index 0000000..d6c0bae
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ClassRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ClassRelease
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease
+
+clang-analyzer-osx.cocoa.ClassRelease
+=====================================
+
+The clang-analyzer-osx.cocoa.ClassRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-classrelease>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
new file mode 100644
index 0000000..e02bf63
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Dealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Dealloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc
+
+clang-analyzer-osx.cocoa.Dealloc
+================================
+
+The clang-analyzer-osx.cocoa.Dealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-dealloc>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
new file mode 100644
index 0000000..6aa64e2
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.IncompatibleMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes
+
+clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+================================================
+
+The clang-analyzer-osx.cocoa.IncompatibleMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-incompatiblemethodtypes>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
new file mode 100644
index 0000000..622f80f
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.Loops.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.Loops
+
+clang-analyzer-osx.cocoa.Loops
+==============================
+
+Improved modeling of loops using Cocoa collection types
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
new file mode 100644
index 0000000..a8e4290
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.MissingSuperCall.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.MissingSuperCall
+
+clang-analyzer-osx.cocoa.MissingSuperCall
+=========================================
+
+Warn about Objective-C methods that lack a necessary call to super
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
new file mode 100644
index 0000000..9446850
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSAutoreleasePool.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSAutoreleasePool
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool
+
+clang-analyzer-osx.cocoa.NSAutoreleasePool
+==========================================
+
+The clang-analyzer-osx.cocoa.NSAutoreleasePool check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nsautoreleasepool>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
new file mode 100644
index 0000000..23416fc
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NSError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NSError
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror
+
+clang-analyzer-osx.cocoa.NSError
+================================
+
+The clang-analyzer-osx.cocoa.NSError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nserror>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
new file mode 100644
index 0000000..4b52104
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NilArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NilArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg
+
+clang-analyzer-osx.cocoa.NilArg
+===============================
+
+The clang-analyzer-osx.cocoa.NilArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-nilarg>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
new file mode 100644
index 0000000..a6da9b0
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.NonNilReturnValue.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.NonNilReturnValue
+
+clang-analyzer-osx.cocoa.NonNilReturnValue
+==========================================
+
+Model the APIs that are guaranteed to return a non-nil value
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
new file mode 100644
index 0000000..10e21e3
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.ObjCGenerics.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.ObjCGenerics
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics
+
+clang-analyzer-osx.cocoa.ObjCGenerics
+=====================================
+
+The clang-analyzer-osx.cocoa.ObjCGenerics check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-objcgenerics>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
new file mode 100644
index 0000000..92a72df
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RetainCount.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RetainCount
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount
+
+clang-analyzer-osx.cocoa.RetainCount
+====================================
+
+The clang-analyzer-osx.cocoa.RetainCount check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-retaincount>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
new file mode 100644
index 0000000..67a0519
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+
+clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+===============================================
+
+Check for leaked memory in autorelease pools that will never be drained
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
new file mode 100644
index 0000000..96e559e
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SelfInit.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SelfInit
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit
+
+clang-analyzer-osx.cocoa.SelfInit
+=================================
+
+The clang-analyzer-osx.cocoa.SelfInit check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-selfinit>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
new file mode 100644
index 0000000..598f126
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.SuperDealloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.SuperDealloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc
+
+clang-analyzer-osx.cocoa.SuperDealloc
+=====================================
+
+The clang-analyzer-osx.cocoa.SuperDealloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-superdealloc>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
new file mode 100644
index 0000000..5a12aa4
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.UnusedIvars.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.UnusedIvars
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars
+
+clang-analyzer-osx.cocoa.UnusedIvars
+====================================
+
+The clang-analyzer-osx.cocoa.UnusedIvars check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-unusedivars>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
new file mode 100644
index 0000000..292e7e3
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.cocoa.VariadicMethodTypes.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.cocoa.VariadicMethodTypes
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes
+
+clang-analyzer-osx.cocoa.VariadicMethodTypes
+============================================
+
+The clang-analyzer-osx.cocoa.VariadicMethodTypes check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-cocoa-variadicmethodtypes>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
new file mode 100644
index 0000000..7dab4bd
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFError.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFError
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror
+
+clang-analyzer-osx.coreFoundation.CFError
+=========================================
+
+The clang-analyzer-osx.coreFoundation.CFError check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cferror>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
new file mode 100644
index 0000000..86e117a
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFNumber.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFNumber
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber
+
+clang-analyzer-osx.coreFoundation.CFNumber
+==========================================
+
+The clang-analyzer-osx.coreFoundation.CFNumber check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfnumber>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
new file mode 100644
index 0000000..0865611
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.CFRetainRelease.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.CFRetainRelease
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease
+
+clang-analyzer-osx.coreFoundation.CFRetainRelease
+=================================================
+
+The clang-analyzer-osx.coreFoundation.CFRetainRelease check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-cfretainrelease>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
new file mode 100644
index 0000000..ca1eb75
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.OutOfBounds.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds
+
+clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+========================================================
+
+The clang-analyzer-osx.coreFoundation.containers.OutOfBounds check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
new file mode 100644
index 0000000..fb1fa15
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-osx.coreFoundation.containers.PointerSizedValues.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues
+
+clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+===============================================================
+
+The clang-analyzer-osx.coreFoundation.containers.PointerSizedValues check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst b/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
new file mode 100644
index 0000000..b378a34
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.FloatLoopCounter.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.FloatLoopCounter
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter
+
+clang-analyzer-security.FloatLoopCounter
+========================================
+
+The clang-analyzer-security.FloatLoopCounter check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
new file mode 100644
index 0000000..b4e611b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling
+
+clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+====================================================================
+
+The clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
new file mode 100644
index 0000000..9f050da
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.UncheckedReturn.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.UncheckedReturn
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn
+
+clang-analyzer-security.insecureAPI.UncheckedReturn
+===================================================
+
+The clang-analyzer-security.insecureAPI.UncheckedReturn check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
new file mode 100644
index 0000000..a135ee7
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcmp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcmp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp
+
+clang-analyzer-security.insecureAPI.bcmp
+========================================
+
+The clang-analyzer-security.insecureAPI.bcmp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcmp>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
new file mode 100644
index 0000000..fc8d234
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bcopy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bcopy
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy
+
+clang-analyzer-security.insecureAPI.bcopy
+=========================================
+
+The clang-analyzer-security.insecureAPI.bcopy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bcopy>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
new file mode 100644
index 0000000..c74c2d1
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.bzero.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.bzero
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero
+
+clang-analyzer-security.insecureAPI.bzero
+=========================================
+
+The clang-analyzer-security.insecureAPI.bzero check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-bzero>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
new file mode 100644
index 0000000..4f2b796
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.getpw.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.getpw
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw
+
+clang-analyzer-security.insecureAPI.getpw
+=========================================
+
+The clang-analyzer-security.insecureAPI.getpw check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-getpw>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
new file mode 100644
index 0000000..fc62fe6
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.gets.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.gets
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets
+
+clang-analyzer-security.insecureAPI.gets
+========================================
+
+The clang-analyzer-security.insecureAPI.gets check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-gets>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
new file mode 100644
index 0000000..6c0d811
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mkstemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mkstemp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp
+
+clang-analyzer-security.insecureAPI.mkstemp
+===========================================
+
+The clang-analyzer-security.insecureAPI.mkstemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mkstemp>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
new file mode 100644
index 0000000..153904f
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.mktemp.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.mktemp
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp
+
+clang-analyzer-security.insecureAPI.mktemp
+==========================================
+
+The clang-analyzer-security.insecureAPI.mktemp check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-mktemp>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
new file mode 100644
index 0000000..67c4c87
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.rand.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.rand
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand
+
+clang-analyzer-security.insecureAPI.rand
+========================================
+
+The clang-analyzer-security.insecureAPI.rand check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-rand>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
new file mode 100644
index 0000000..1fcbe16
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.strcpy.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.strcpy
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy
+
+clang-analyzer-security.insecureAPI.strcpy
+==========================================
+
+The clang-analyzer-security.insecureAPI.strcpy check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-strcpy>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
new file mode 100644
index 0000000..c20dea3
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-security.insecureAPI.vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.insecureAPI.vfork
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork
+
+clang-analyzer-security.insecureAPI.vfork
+=========================================
+
+The clang-analyzer-security.insecureAPI.vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-vfork>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.API.rst b/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
new file mode 100644
index 0000000..a3931b2
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.API.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.API
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-api
+
+clang-analyzer-unix.API
+=======================
+
+The clang-analyzer-unix.API check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-api>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst b/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
new file mode 100644
index 0000000..f772674
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.Malloc.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Malloc
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc
+
+clang-analyzer-unix.Malloc
+==========================
+
+The clang-analyzer-unix.Malloc check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-malloc>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst b/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
new file mode 100644
index 0000000..3cc066b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.MallocSizeof.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MallocSizeof
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof
+
+clang-analyzer-unix.MallocSizeof
+================================
+
+The clang-analyzer-unix.MallocSizeof check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst b/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
new file mode 100644
index 0000000..01fc569
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.MismatchedDeallocator.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.MismatchedDeallocator
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator
+
+clang-analyzer-unix.MismatchedDeallocator
+=========================================
+
+The clang-analyzer-unix.MismatchedDeallocator check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst b/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
new file mode 100644
index 0000000..d3f00af
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.Vfork.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.Vfork
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork
+
+clang-analyzer-unix.Vfork
+=========================
+
+The clang-analyzer-unix.Vfork check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst b/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
new file mode 100644
index 0000000..d861faa
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.cstring.BadSizeArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.BadSizeArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg
+
+clang-analyzer-unix.cstring.BadSizeArg
+======================================
+
+The clang-analyzer-unix.cstring.BadSizeArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst b/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
new file mode 100644
index 0000000..17bb6af
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-unix.cstring.NullArg.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-unix.cstring.NullArg
+.. meta::
+   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg
+
+clang-analyzer-unix.cstring.NullArg
+===================================
+
+The clang-analyzer-unix.cstring.NullArg check is an alias, please see
+`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_
+for more information.
diff --git a/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst b/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
new file mode 100644
index 0000000..d693705
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-valist.CopyToSelf.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.CopyToSelf
+
+clang-analyzer-valist.CopyToSelf
+================================
+
+Check for va_lists which are copied onto itself.
diff --git a/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst b/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
new file mode 100644
index 0000000..da3f5db
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-valist.Uninitialized.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Uninitialized
+
+clang-analyzer-valist.Uninitialized
+===================================
+
+Check for usages of uninitialized (or already released) va_lists.
diff --git a/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst b/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
new file mode 100644
index 0000000..d73688b
--- /dev/null
+++ b/docs/clang-tidy/checks/clang-analyzer-valist.Unterminated.rst
@@ -0,0 +1,6 @@
+.. title:: clang-tidy - clang-analyzer-valist.Unterminated
+
+clang-analyzer-valist.Unterminated
+==================================
+
+Check for va_lists which are not released by a va_end call.
diff --git a/docs/clang-tidy/checks/gen-static-analyzer-docs.py b/docs/clang-tidy/checks/gen-static-analyzer-docs.py
new file mode 100644
index 0000000..51956d1
--- /dev/null
+++ b/docs/clang-tidy/checks/gen-static-analyzer-docs.py
@@ -0,0 +1,148 @@
+"""
+Generates documentation based off the available static analyzers checks
+References Checkers.td to determine what checks exist
+"""
+
+import argparse
+import subprocess
+import json
+import os
+import re
+
+"""Get path of script so files are always in correct directory"""
+__location__ = os.path.realpath(
+        os.path.join(os.getcwd(), os.path.dirname(__file__)))
+
+"""Get dict of checker related info and parse for full check names
+
+Returns:
+  checkers: dict of checker info
+"""
+def get_checkers(checkers_td_directory):
+  p = subprocess.Popen(["llvm-tblgen", "--dump-json", "-I",
+                           checkers_td_directory, checkers_td_directory+"Checkers.td"],
+                           stdout=subprocess.PIPE)
+  table_entries = json.loads(p.communicate()[0])
+  documentable_checkers = []
+  checkers = table_entries["!instanceof"]["Checker"]
+  packages = table_entries["!instanceof"]["Package"]
+
+  for checker_ in checkers:
+    checker = table_entries[checker_]
+    checker_name = checker["CheckerName"]
+    package_ = checker["ParentPackage"]["def"]
+    package = table_entries[package_]
+    package_name = package["PackageName"]
+    checker_package_prefix = package_name
+    parent_package_ = package["ParentPackage"]
+    hidden = (checker["Hidden"] != 0) or (package["Hidden"] != 0)
+
+    while(parent_package_ != None):
+      parent_package = table_entries[parent_package_["def"]]
+      checker_package_prefix = parent_package["PackageName"] + "." + checker_package_prefix
+      hidden = hidden or parent_package["Hidden"] != 0
+      parent_package_ = parent_package["ParentPackage"]
+
+    full_package_name = "clang-analyzer-" + checker_package_prefix + "." + checker_name
+    anchor_url = re.sub("\.", "-", checker_package_prefix + "." + checker_name).lower()
+
+    if(not hidden and "alpha" not in full_package_name.lower()):
+      checker["FullPackageName"] = full_package_name
+      checker["AnchorUrl"] = anchor_url
+      documentable_checkers.append(checker)
+
+  documentable_checkers.sort(key=lambda x: x["FullPackageName"])
+  return documentable_checkers
+
+"""Generate documentation for checker
+
+Args:
+  checker: Checker for which to generate documentation.
+  only_help_text: Generate documentation based off the checker description.
+    Used when there is no other documentation to link to.
+"""
+def generate_documentation(checker, only_help_text=False):
+  with open(os.path.join(__location__, checker["FullPackageName"]+".rst"),"w") as f:
+    f.write(".. title:: clang-tidy - %s\n" % checker["FullPackageName"])
+    if(not only_help_text):
+      f.write(".. meta::\n")
+      f.write("   :http-equiv=refresh: 5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#%s\n" % checker["AnchorUrl"])
+    f.write("\n")
+    f.write("%s\n" % checker["FullPackageName"])
+    f.write("=" * len(checker["FullPackageName"]) + "\n")
+    f.write("\n")
+    if(only_help_text):
+      f.write("%s\n" % checker["HelpText"])
+    else:
+      f.write("The %s check is an alias, please see\n" % checker["FullPackageName"])
+      f.write("`Clang Static Analyzer Available Checkers <https://clang.llvm.org/docs/analyzer/checkers.html#%s>`_\n" % checker["AnchorUrl"])
+      f.write("for more information.\n")
+    f.close()
+
+"""Update list.rst to include the new checks
+
+Args:
+  checkers: dict acquired from get_checkers()
+"""
+def update_documentation_list(checkers):
+  with open(os.path.join(__location__, "list.rst"), "r+") as f:
+    f_text = f.read()
+    header, check_text= f_text.split(".. toctree::\n")
+    checks = check_text.split("\n")
+    for checker in checkers:
+      if(("   %s" % checker["FullPackageName"]) not in checks):
+        checks.append("   %s" % checker["FullPackageName"])
+    checks.sort()
+
+    #Overwrite file with new data
+    f.seek(0)
+    f.write(header)
+    f.write(".. toctree::")
+    for check in checks:
+      f.write("%s\n" % check)
+    f.close()
+
+default_path_monorepo = '../../../../clang/include/clang/StaticAnalyzer/Checkers/'
+default_path_in_tree = '../../../../../include/clang/StaticAnalyzer/Checkers/'
+
+def parse_arguments():
+  """Set up and parse command-line arguments
+  Returns:
+    file_path: Path to Checkers.td"""
+  usage = """Parse Checkers.td to generate documentation for static analyzer checks"""
+  parse = argparse.ArgumentParser(description=usage)
+
+  file_path_help = ("""Path to Checkers directory
+                    defaults to ../../../../clang/include/clang/StaticAnalyzer/Checkers/ if it exists
+                    then to ../../../../../include/clang/StaticAnalyzer/Checkers/""")
+
+  default_path=None
+  if(os.path.exists(default_path_monorepo)):
+    default_path = default_path_monorepo
+  elif(os.path.exists(default_path_in_tree)):
+    default_path = default_path_in_tree
+
+  parse.add_argument("file", type=str, help=file_path_help, nargs='?', default=default_path)
+  args = parse.parse_args()
+
+  if(args.file is None):
+    print("Could not find Checkers directory. Please see -h")
+    exit(1)
+
+  return args.file
+
+
+def main():
+  file_path = parse_arguments()
+  checkers = get_checkers(file_path)
+  for checker in checkers:
+    #No documentation nor alpha documentation
+    if(checker["Documentation"][1] == 0 and checker["Documentation"][0] == 0):
+      generate_documentation(checker, True)
+    else:
+      generate_documentation(checker)
+    print("Generated documentation for: %s" % checker["FullPackageName"])
+  update_documentation_list(checkers)
+
+if __name__ == '__main__':
+  main()
diff --git a/docs/clang-tidy/checks/list.rst b/docs/clang-tidy/checks/list.rst
index a04a49f..26fc254 100644
--- a/docs/clang-tidy/checks/list.rst
+++ b/docs/clang-tidy/checks/list.rst
@@ -4,6 +4,7 @@
 =================
 
 .. toctree::
+
    abseil-duration-addition
    abseil-duration-comparison
    abseil-duration-conversion-cast
@@ -102,6 +103,90 @@
    cert-msc51-cpp
    cert-oop11-cpp (redirects to performance-move-constructor-init) <cert-oop11-cpp>
    cert-oop54-cpp (redirects to bugprone-unhandled-self-assignment) <cert-oop54-cpp>
+   clang-analyzer-core.CallAndMessage
+   clang-analyzer-core.DivideZero
+   clang-analyzer-core.DynamicTypePropagation
+   clang-analyzer-core.NonNullParamChecker
+   clang-analyzer-core.NullDereference
+   clang-analyzer-core.StackAddressEscape
+   clang-analyzer-core.UndefinedBinaryOperatorResult
+   clang-analyzer-core.VLASize
+   clang-analyzer-core.uninitialized.ArraySubscript
+   clang-analyzer-core.uninitialized.Assign
+   clang-analyzer-core.uninitialized.Branch
+   clang-analyzer-core.uninitialized.CapturedBlockVariable
+   clang-analyzer-core.uninitialized.UndefReturn
+   clang-analyzer-cplusplus.InnerPointer
+   clang-analyzer-cplusplus.Move
+   clang-analyzer-cplusplus.NewDelete
+   clang-analyzer-cplusplus.NewDeleteLeaks
+   clang-analyzer-deadcode.DeadStores
+   clang-analyzer-nullability.NullPassedToNonnull
+   clang-analyzer-nullability.NullReturnedFromNonnull
+   clang-analyzer-nullability.NullableDereferenced
+   clang-analyzer-nullability.NullablePassedToNonnull
+   clang-analyzer-nullability.NullableReturnedFromNonnull
+   clang-analyzer-optin.cplusplus.UninitializedObject
+   clang-analyzer-optin.cplusplus.VirtualCall
+   clang-analyzer-optin.mpi.MPI-Checker
+   clang-analyzer-optin.osx.OSObjectCStyleCast
+   clang-analyzer-optin.osx.cocoa.localizability.EmptyLocalizationContextChecker
+   clang-analyzer-optin.osx.cocoa.localizability.NonLocalizedStringChecker
+   clang-analyzer-optin.performance.GCDAntipattern
+   clang-analyzer-optin.performance.Padding
+   clang-analyzer-optin.portability.UnixAPI
+   clang-analyzer-osx.API
+   clang-analyzer-osx.MIG
+   clang-analyzer-osx.NumberObjectConversion
+   clang-analyzer-osx.OSObjectRetainCount
+   clang-analyzer-osx.ObjCProperty
+   clang-analyzer-osx.SecKeychainAPI
+   clang-analyzer-osx.cocoa.AtSync
+   clang-analyzer-osx.cocoa.AutoreleaseWrite
+   clang-analyzer-osx.cocoa.ClassRelease
+   clang-analyzer-osx.cocoa.Dealloc
+   clang-analyzer-osx.cocoa.IncompatibleMethodTypes
+   clang-analyzer-osx.cocoa.Loops
+   clang-analyzer-osx.cocoa.MissingSuperCall
+   clang-analyzer-osx.cocoa.NSAutoreleasePool
+   clang-analyzer-osx.cocoa.NSError
+   clang-analyzer-osx.cocoa.NilArg
+   clang-analyzer-osx.cocoa.NonNilReturnValue
+   clang-analyzer-osx.cocoa.ObjCGenerics
+   clang-analyzer-osx.cocoa.RetainCount
+   clang-analyzer-osx.cocoa.RunLoopAutoreleaseLeak
+   clang-analyzer-osx.cocoa.SelfInit
+   clang-analyzer-osx.cocoa.SuperDealloc
+   clang-analyzer-osx.cocoa.UnusedIvars
+   clang-analyzer-osx.cocoa.VariadicMethodTypes
+   clang-analyzer-osx.coreFoundation.CFError
+   clang-analyzer-osx.coreFoundation.CFNumber
+   clang-analyzer-osx.coreFoundation.CFRetainRelease
+   clang-analyzer-osx.coreFoundation.containers.OutOfBounds
+   clang-analyzer-osx.coreFoundation.containers.PointerSizedValues
+   clang-analyzer-security.FloatLoopCounter
+   clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling
+   clang-analyzer-security.insecureAPI.UncheckedReturn
+   clang-analyzer-security.insecureAPI.bcmp
+   clang-analyzer-security.insecureAPI.bcopy
+   clang-analyzer-security.insecureAPI.bzero
+   clang-analyzer-security.insecureAPI.getpw
+   clang-analyzer-security.insecureAPI.gets
+   clang-analyzer-security.insecureAPI.mkstemp
+   clang-analyzer-security.insecureAPI.mktemp
+   clang-analyzer-security.insecureAPI.rand
+   clang-analyzer-security.insecureAPI.strcpy
+   clang-analyzer-security.insecureAPI.vfork
+   clang-analyzer-unix.API
+   clang-analyzer-unix.Malloc
+   clang-analyzer-unix.MallocSizeof
+   clang-analyzer-unix.MismatchedDeallocator
+   clang-analyzer-unix.Vfork
+   clang-analyzer-unix.cstring.BadSizeArg
+   clang-analyzer-unix.cstring.NullArg
+   clang-analyzer-valist.CopyToSelf
+   clang-analyzer-valist.Uninitialized
+   clang-analyzer-valist.Unterminated
    cppcoreguidelines-avoid-c-arrays (redirects to modernize-avoid-c-arrays) <cppcoreguidelines-avoid-c-arrays>
    cppcoreguidelines-avoid-goto
    cppcoreguidelines-avoid-magic-numbers (redirects to readability-magic-numbers) <cppcoreguidelines-avoid-magic-numbers>