2015-02-16 22:06:08 +01:00
|
|
|
|
|
|
|
// Test library configuration for gnu.cfg
|
|
|
|
//
|
|
|
|
// Usage:
|
2015-02-16 22:19:51 +01:00
|
|
|
// $ cppcheck --check-library --library=gnu --enable=information --enable=style --error-exitcode=1 --suppress=missingIncludeSystem --inline-suppr test/cfg/gnu.c
|
2015-02-16 22:06:08 +01:00
|
|
|
// =>
|
|
|
|
// No warnings about bad library configuration, unmatched suppressions, etc. exitcode=0
|
|
|
|
//
|
|
|
|
|
|
|
|
#include <string.h>
|
2018-10-27 18:25:05 +02:00
|
|
|
#include <stdlib.h>
|
2018-10-28 21:36:28 +01:00
|
|
|
#include <stdint.h>
|
2019-02-27 15:17:34 +01:00
|
|
|
#include <stdio.h>
|
2019-09-09 15:02:55 +02:00
|
|
|
#include <stdarg.h>
|
2019-09-08 19:17:15 +02:00
|
|
|
#include <sys/time.h>
|
2018-09-29 16:49:12 +02:00
|
|
|
#ifndef __CYGWIN__
|
2018-09-25 09:07:49 +02:00
|
|
|
#include <sys/epoll.h>
|
2018-09-29 16:49:12 +02:00
|
|
|
#endif
|
2015-02-16 22:06:08 +01:00
|
|
|
|
2019-09-08 19:17:15 +02:00
|
|
|
// #9323, #9331
|
2019-09-10 11:51:47 +02:00
|
|
|
void syntaxError_timercmp(struct timeval t)
|
2019-09-08 19:17:15 +02:00
|
|
|
{
|
|
|
|
(void)timercmp(&t, &t, <);
|
|
|
|
(void)timercmp(&t, &t, <=);
|
|
|
|
(void)timercmp(&t, &t, ==);
|
|
|
|
(void)timercmp(&t, &t, !=);
|
|
|
|
(void)timercmp(&t, &t, >=);
|
|
|
|
(void)timercmp(&t, &t, >);
|
|
|
|
}
|
|
|
|
|
2019-09-10 11:51:47 +02:00
|
|
|
// False negative: #9346
|
|
|
|
void uninitvar_timercmp(struct timeval t)
|
|
|
|
{
|
|
|
|
struct timeval uninit;
|
|
|
|
(void)timercmp(&t, &uninit, <);
|
|
|
|
(void)timercmp(&uninit, &t, <=);
|
|
|
|
(void)timercmp(&uninit, &uninit, ==);
|
|
|
|
}
|
|
|
|
|
|
|
|
void nullPointer_timercmp(struct timeval t)
|
|
|
|
{
|
|
|
|
struct timeval *p=0;
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
(void)timercmp(&t, p, <);
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
(void)timercmp(p, &t, <=);
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
(void)timercmp(p, p, ==);
|
|
|
|
}
|
|
|
|
|
2019-07-16 08:12:21 +02:00
|
|
|
// Declaration necessary because there is no specific / portable header.
|
|
|
|
extern void *xcalloc(size_t nmemb, size_t size);
|
|
|
|
extern void *xmalloc(size_t size);
|
|
|
|
extern void *xrealloc(void *block, size_t newsize);
|
2019-08-02 07:41:32 +02:00
|
|
|
extern void xfree(void *ptr);
|
2019-07-16 08:12:21 +02:00
|
|
|
|
2019-05-16 17:49:33 +02:00
|
|
|
void resourceLeak_mkostemps(char *template, int suffixlen, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fp = mkostemps(template, suffixlen, flags);
|
|
|
|
// cppcheck-suppress resourceLeak
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void no_resourceLeak_mkostemps_01(char *template, int suffixlen, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
int fp = mkostemps(template, suffixlen, flags);
|
|
|
|
close(fp);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int no_resourceLeak_mkostemps_02(char *template, int suffixlen, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
return mkostemps(template, suffixlen, flags);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void resourceLeak_mkstemps(char *template, int suffixlen)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fp = mkstemps(template, suffixlen);
|
|
|
|
// cppcheck-suppress resourceLeak
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void no_resourceLeak_mkstemps_01(char *template, int suffixlen)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
int fp = mkstemps(template, suffixlen);
|
|
|
|
close(fp);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int no_resourceLeak_mkstemps_02(char *template, int suffixlen)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
return mkstemps(template, suffixlen);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void resourceLeak_mkostemp(char *template, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fp = mkostemp(template, flags);
|
|
|
|
// cppcheck-suppress resourceLeak
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void no_resourceLeak_mkostemp_01(char *template, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
int fp = mkostemp(template, flags);
|
|
|
|
close(fp);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int no_resourceLeak_mkostemp_02(char *template, int flags)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
return mkostemp(template, flags);
|
2019-05-16 17:49:33 +02:00
|
|
|
}
|
2019-03-19 15:24:02 +01:00
|
|
|
|
2019-10-10 10:23:21 +02:00
|
|
|
void valid_code(int argInt1, va_list valist_arg, int * parg)
|
2019-03-19 15:24:02 +01:00
|
|
|
{
|
2019-08-02 07:41:32 +02:00
|
|
|
char *p;
|
|
|
|
|
2019-03-19 15:24:02 +01:00
|
|
|
if (__builtin_expect(argInt1, 0)) {}
|
|
|
|
if (__builtin_expect_with_probability(argInt1 + 1, 2, 0.5)) {}
|
2019-10-10 10:23:21 +02:00
|
|
|
void *ax1 = __builtin_assume_aligned(parg, 16);
|
|
|
|
printf("%p", ax1);
|
|
|
|
void *ax2 = __builtin_assume_aligned(parg, 32, 8);
|
|
|
|
printf("%p", ax2);
|
2019-08-02 07:41:32 +02:00
|
|
|
|
|
|
|
p = (char *)malloc(10);
|
|
|
|
free(p);
|
|
|
|
p = (char *)malloc(5);
|
|
|
|
xfree(p);
|
|
|
|
p = (char *)xmalloc(10);
|
|
|
|
free(p);
|
|
|
|
p = (char *)xmalloc(5);
|
|
|
|
xfree(p);
|
2019-08-02 12:27:46 +02:00
|
|
|
|
|
|
|
// cppcheck-suppress allocaCalled
|
|
|
|
p = __builtin_alloca(5);
|
|
|
|
p[0] = 1;
|
|
|
|
// TODO cppcheck-suppress arrayIndexOutOfBounds
|
|
|
|
p[5] = 1;
|
|
|
|
__builtin_prefetch(p, 0, 1);
|
|
|
|
|
|
|
|
if (__builtin_types_compatible_p(int, char)) {}
|
2019-09-09 15:02:55 +02:00
|
|
|
|
|
|
|
char * pStr = NULL;
|
|
|
|
if (vasprintf(&pStr, "%d %d", valist_arg) != -1) {
|
|
|
|
free(pStr);
|
|
|
|
}
|
2019-09-19 12:27:21 +02:00
|
|
|
|
|
|
|
printf("%d", 0b010);
|
|
|
|
printf("%d", __extension__ 0b10001000);
|
2019-03-19 15:24:02 +01:00
|
|
|
}
|
|
|
|
|
2018-10-27 18:25:05 +02:00
|
|
|
void ignoreleak(void)
|
|
|
|
{
|
|
|
|
char *p = (char *)malloc(10);
|
|
|
|
__builtin_memset(&(p[0]), 0, 10);
|
2019-07-03 08:39:44 +02:00
|
|
|
// cppcheck-suppress memleak
|
2018-10-27 18:25:05 +02:00
|
|
|
}
|
|
|
|
|
2019-02-27 15:17:34 +01:00
|
|
|
void memleak_asprintf(char **ptr, const char *fmt, const int arg)
|
|
|
|
{
|
2019-02-27 15:38:31 +01:00
|
|
|
// No warning is expected for
|
2019-02-27 15:17:34 +01:00
|
|
|
if (-1 != asprintf(ptr,fmt,arg)) {
|
|
|
|
free(ptr);
|
|
|
|
}
|
|
|
|
if (-1 != asprintf(ptr,fmt,arg)) {
|
|
|
|
// TODO: Related to #8980 cppcheck-suppress memleak
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-02 07:41:32 +02:00
|
|
|
void memleak_xmalloc()
|
|
|
|
{
|
|
|
|
char *p = (char*)xmalloc(10);
|
|
|
|
p[9] = 0;
|
|
|
|
// cppcheck-suppress memleak
|
|
|
|
}
|
|
|
|
|
2018-10-27 18:25:05 +02:00
|
|
|
void uninitvar__builtin_memset(void)
|
|
|
|
{
|
|
|
|
void *s;
|
|
|
|
int c;
|
|
|
|
size_t n;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
(void)__builtin_memset(s,c,n);
|
|
|
|
}
|
|
|
|
|
|
|
|
void bufferAccessOutOfBounds__builtin_memset(void)
|
|
|
|
{
|
|
|
|
uint8_t buf[42];
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
(void)__builtin_memset(buf,0,1000);
|
|
|
|
}
|
|
|
|
|
2018-07-18 09:40:06 +02:00
|
|
|
void bufferAccessOutOfBounds()
|
|
|
|
{
|
2019-03-14 09:26:27 +01:00
|
|
|
char buf[2] = "a";
|
2018-07-18 09:40:06 +02:00
|
|
|
// This is valid
|
|
|
|
sethostname(buf, 2);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
sethostname(buf, 4);
|
2019-03-21 10:44:18 +01:00
|
|
|
|
|
|
|
char * pAlloc1 = xcalloc(2, 4);
|
|
|
|
memset(pAlloc1, 0, 8);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
memset(pAlloc1, 0, 9);
|
|
|
|
free(pAlloc1);
|
2019-07-16 08:12:21 +02:00
|
|
|
|
|
|
|
char * pAlloc2 = xmalloc(4);
|
|
|
|
memset(pAlloc2, 0, 4);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
memset(pAlloc2, 0, 5);
|
|
|
|
|
|
|
|
pAlloc2 = xrealloc(pAlloc2, 10);
|
|
|
|
memset(pAlloc2, 0, 10);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
memset(pAlloc2, 0, 11);
|
|
|
|
|
|
|
|
free(pAlloc2);
|
2018-07-18 09:40:06 +02:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void leakReturnValNotUsed()
|
|
|
|
{
|
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
char* ptr = (char*)strdupa("test");
|
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
strdupa("test");
|
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
char* ptr2 = (char*)strndupa("test", 1);
|
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
strndupa("test", 1);
|
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
strcasestr("test", NULL);
|
|
|
|
|
2019-01-25 17:03:16 +01:00
|
|
|
// FIXME cppcheck-suppress knownConditionTrueFalse
|
2016-07-20 12:21:00 +02:00
|
|
|
// cppcheck-suppress duplicateExpression
|
2015-08-14 01:36:44 +02:00
|
|
|
if (42 == __builtin_expect(42, 0))
|
|
|
|
return;
|
2015-02-16 22:06:08 +01:00
|
|
|
}
|
2018-09-25 09:07:49 +02:00
|
|
|
|
2018-09-29 16:49:12 +02:00
|
|
|
#ifndef __CYGWIN__
|
2018-09-25 09:07:49 +02:00
|
|
|
int nullPointer_epoll_ctl(int epfd, int op, int fd, struct epoll_event *event)
|
|
|
|
{
|
|
|
|
// no warning is expected
|
|
|
|
(void)epoll_ctl(epfd, op, fd, event);
|
|
|
|
|
|
|
|
// No nullpointer warning is expected in case op is set to EPOLL_CTL_DEL
|
|
|
|
// EPOLL_CTL_DEL
|
|
|
|
// Remove (deregister) the target file descriptor fd from the
|
|
|
|
// epoll instance referred to by epfd. The event is ignored and
|
|
|
|
// can be NULL.
|
|
|
|
return epoll_ctl(epfd, EPOLL_CTL_DEL, fd, NULL);
|
|
|
|
}
|
2018-09-29 16:49:12 +02:00
|
|
|
#endif
|