A tool for static C/C++ code analysis

Edit Package cppcheck
http://cppcheck.wiki.sourceforge.net/

This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:

* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic

See http://cppcheck.wiki.sourceforge.net/ for more details.

Refresh
Refresh
Source Files
Filename Size Changed
cppcheck-2.10.3.tar.gz 0003447010 3.29 MB
cppcheck.changes 0000038339 37.4 KB
cppcheck.spec 0000004748 4.64 KB
Revision 32 (latest revision is 46)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1075209 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 32)
- switch on Tumbleweed temporarily to gcc 12 to avoid
  "allocator_traits<A>::rebind_alloc<A::value_type> must be A"
  (as mentioned on https://gcc.gnu.org/gcc-13/porting_to.html)
Comments 0
openSUSE Build Service is sponsored by