![]() use of invalidated vector iterators/pointers.misuse of iterators when iterating through a container.unusual pointer arithmetic (such as “abc” + ’d’).misuse of the strtol or sprintf functions.memory leaks in class or function variables.use of deprecated functions (mktemp, gets, scanf).operator= not returning a constant reference to itself.non-virtual destructors for base classes.use of memset, memcpy, etcetera on a class.variables not initialized by a constructor.out-of-bounds errors in arrays and STL.assignment of auto variables to an effective parameter of a function. ![]() pointers to out-of-scope auto variables.You can start using it just by giving it a path to the source code. Its internal preprocessor can handle includes, macros, and several It is versatile, and can check non-standardĬode including various compiler extensions, inline assembly code, etc. What is cppcheckĬppcheck is a command-line tool that tries to detect bugs that yourĬ/C++ compiler doesn’t see. In this tutorial we learn how to install cppcheck on Ubuntu 18.04. cppcheck is tool for static C/C++ code analysis (CLI) Introduction For instance, you can compile (but not necessarily link) with gcc + msvc + your normal target compiler.In this tutorial we learn how to install cppcheck on Ubuntu 18.04. If you want to enforce these you can use compilers. The rules 1.1 and 1.2 will not be handled by Cppcheck. In the table below we show checkers that are included/missing in latest Cppcheck. Together with a C compiler you get full coverage. Cppcheck covers almost all the MISRA C 2012 rules.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |