Skip to content

Commit ba0b5b1

Browse files
committed
clean doc
1 parent df8b95c commit ba0b5b1

File tree

5 files changed

+19
-35
lines changed

5 files changed

+19
-35
lines changed

clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/optin.osx.OSObjectCStyleCast.rst

Lines changed: 0 additions & 9 deletions
This file was deleted.

clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.MIG.rst

Lines changed: 0 additions & 9 deletions
This file was deleted.

clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/osx.OSObjectRetainCount.rst

Lines changed: 0 additions & 9 deletions
This file was deleted.

clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.PutenvStackArray.rst

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,13 @@
33
clang-analyzer-security.PutenvStackArray
44
========================================
55

6-
Finds calls to the function 'putenv' which pass a pointer to an automatic
7-
(stack-allocated) array as the argument.
6+
Finds calls to the putenv function which pass a pointer to a stack-allocated
7+
(automatic) array as the argument. Function putenv does not copy the passed
8+
string, only a pointer to the data is stored and this data can be read even by
9+
other threads. Content of a stack-allocated array is likely to be overwritten
10+
after exiting from the function.
811

9-
The clang-analyzer-security.PutenvStackArray check is an alias of
10-
Clang Static Analyzer security.PutenvStackArray.
12+
The `clang-analyzer-security.PutenvStackArray` check is an alias, please see
13+
`Clang Static Analyzer Available Checkers
14+
<https://clang.llvm.org/docs/analyzer/checkers.html#security-putenvstackarray-c>`_
15+
for more information.

clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,14 @@
33
clang-analyzer-security.SetgidSetuidOrder
44
=========================================
55

6-
Warn on possible reversed order of 'setgid(getgid()))' and 'setuid(getuid())'
7-
(CERT: POS36-C).
6+
The checker checks for sequences of ``setuid(getuid())`` and ``setgid(getgid())``
7+
calls (in this order). If such a sequence is found and there is no other
8+
privilege-changing function call (``seteuid``, ``setreuid``, ``setresuid`` and
9+
the GID versions of these) in between, a warning is generated. The checker finds
10+
only exactly ``setuid(getuid())`` calls (and the GID versions), not for example
11+
if the result of ``getuid()`` is stored in a variable.
812

9-
The clang-analyzer-security.SetgidSetuidOrder check is an alias of
10-
Clang Static Analyzer security.SetgidSetuidOrder.
13+
The `clang-analyzer-security.SetgidSetuidOrder` check is an alias, please see
14+
`Clang Static Analyzer Available Checkers
15+
<https://clang.llvm.org/docs/analyzer/checkers.html#security-setgidsetuidorder-c>`_
16+
for more information.

0 commit comments

Comments
 (0)