A tool for static C/C++ code analysis
This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic
See http://cppcheck.wiki.sourceforge.net/ for more details.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/cppcheck && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
cppcheck-2.13.1.tar.gz | 0003642653 3.47 MB | |
cppcheck.changes | 0000043738 42.7 KB | |
cppcheck.spec | 0000004641 4.53 KB |
Revision 38 (latest revision is 46)
- update to 2.13.1: * Show premium autosar/misra/cert style issues even if --enable is not used * Better validation of --premium options * unsafe handling of unconditional #error * unsafe suppressions of critical errors * missing "misra-config" warning, calling unknown function in condition * If --premium=safety is used then go to "safety mode". Do not override this in cppcheck.cfg
Comments 0