A tool for static C/C++ code analysis
This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic
See http://cppcheck.wiki.sourceforge.net/ for more details.
- Developed at devel:tools
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:RISCV/cppcheck && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
cppcheck-2.5.tar.gz | 0003792628 3.62 MB | |
cppcheck.changes | 0000031071 30.3 KB | |
cppcheck.spec | 0000003734 3.65 KB | |
fix-i586.patch | 0000000971 971 Bytes |
Revision 18 (latest revision is 45)
- update to 2.5: * checked that all features in c++11, c++14, c++17 are supported * c++20 support is improved but not complete yet * improved library files, better knowledge about APIs * improved checks to detect more bugs * fixed checks to avoid unwanted warnings * suspicious container/iterator assignment in condition * rethrow without current handled exception - drop 0002-Another-gcc11-fix-3179.patch, 0001-Fix-gcc11-build-errors.patch: upstream
Comments 0