2008-12-18 22:28:57 +01:00
|
|
|
/*
|
2009-01-21 21:04:20 +01:00
|
|
|
* Cppcheck - A tool for static C/C++ code analysis
|
2022-02-05 11:45:17 +01:00
|
|
|
* Copyright (C) 2007-2022 Cppcheck team.
|
2008-12-18 22:28:57 +01:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2009-09-27 17:08:31 +02:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2008-12-18 22:28:57 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "cppcheckexecutor.h"
|
2017-05-27 04:33:47 +02:00
|
|
|
|
2016-12-08 22:46:44 +01:00
|
|
|
#include "analyzerinfo.h"
|
2013-09-04 06:18:22 +02:00
|
|
|
#include "cmdlineparser.h"
|
2021-07-08 21:21:35 +02:00
|
|
|
#include "color.h"
|
2017-05-27 04:33:47 +02:00
|
|
|
#include "config.h"
|
2008-12-18 22:28:57 +01:00
|
|
|
#include "cppcheck.h"
|
2022-01-27 19:03:20 +01:00
|
|
|
#include "errortypes.h"
|
2013-09-04 06:18:22 +02:00
|
|
|
#include "filelister.h"
|
2017-05-27 04:33:47 +02:00
|
|
|
#include "importproject.h"
|
|
|
|
#include "library.h"
|
2013-09-04 06:18:22 +02:00
|
|
|
#include "path.h"
|
|
|
|
#include "pathmatch.h"
|
|
|
|
#include "preprocessor.h"
|
2017-05-27 04:33:47 +02:00
|
|
|
#include "settings.h"
|
|
|
|
#include "suppressions.h"
|
2013-09-04 06:18:22 +02:00
|
|
|
#include "threadexecutor.h"
|
2015-11-14 19:59:22 +01:00
|
|
|
#include "utils.h"
|
2018-02-10 15:34:49 +01:00
|
|
|
#include "checkunusedfunctions.h"
|
2014-06-28 14:05:18 +02:00
|
|
|
|
2022-01-27 19:03:20 +01:00
|
|
|
#include <algorithm>
|
|
|
|
#include <atomic>
|
2017-09-07 13:02:44 +02:00
|
|
|
#include <csignal>
|
|
|
|
#include <cstdio>
|
2009-03-06 01:03:31 +01:00
|
|
|
#include <cstdlib> // EXIT_SUCCESS and EXIT_FAILURE
|
2011-08-11 16:34:59 +02:00
|
|
|
#include <cstring>
|
2022-01-27 19:03:20 +01:00
|
|
|
#include <functional>
|
2014-06-28 14:05:18 +02:00
|
|
|
#include <iostream>
|
2017-05-27 04:33:47 +02:00
|
|
|
#include <list>
|
2020-05-23 07:16:49 +02:00
|
|
|
#include <memory>
|
2022-01-27 19:03:20 +01:00
|
|
|
#include <type_traits>
|
2017-05-27 04:33:47 +02:00
|
|
|
#include <utility>
|
|
|
|
#include <vector>
|
2011-10-09 20:14:44 +02:00
|
|
|
|
2018-04-03 00:41:13 +02:00
|
|
|
#if !defined(NO_UNIX_SIGNAL_HANDLING) && defined(__GNUC__) && !defined(__MINGW32__) && !defined(__OS2__)
|
2014-03-16 12:04:13 +01:00
|
|
|
#define USE_UNIX_SIGNAL_HANDLING
|
2014-11-14 23:40:53 +01:00
|
|
|
#include <unistd.h>
|
2014-11-15 20:10:34 +01:00
|
|
|
#if defined(__APPLE__)
|
|
|
|
# define _XOPEN_SOURCE // ucontext.h APIs can only be used on Mac OSX >= 10.7 if _XOPEN_SOURCE is defined
|
|
|
|
# include <ucontext.h>
|
2017-05-27 04:33:47 +02:00
|
|
|
|
2014-11-15 20:10:34 +01:00
|
|
|
# undef _XOPEN_SOURCE
|
2021-07-20 11:04:20 +02:00
|
|
|
#elif !defined(__OpenBSD__) && !defined(__HAIKU__)
|
2014-11-15 20:10:34 +01:00
|
|
|
# include <ucontext.h>
|
|
|
|
#endif
|
2014-11-14 23:40:53 +01:00
|
|
|
#ifdef __linux__
|
2022-02-01 17:19:19 +01:00
|
|
|
#include <syscall.h>
|
2014-11-14 23:40:53 +01:00
|
|
|
#endif
|
2014-03-16 12:04:13 +01:00
|
|
|
#endif
|
|
|
|
|
2016-11-29 09:44:50 +01:00
|
|
|
#if !defined(NO_UNIX_BACKTRACE_SUPPORT) && defined(USE_UNIX_SIGNAL_HANDLING) && defined(__GNUC__) && defined(__GLIBC__) && !defined(__CYGWIN__) && !defined(__MINGW32__) && !defined(__NetBSD__) && !defined(__SVR4) && !defined(__QNX__)
|
2014-06-28 14:05:18 +02:00
|
|
|
#define USE_UNIX_BACKTRACE_SUPPORT
|
|
|
|
#include <cxxabi.h>
|
|
|
|
#include <execinfo.h>
|
|
|
|
#endif
|
|
|
|
|
2021-08-26 19:36:31 +02:00
|
|
|
#if defined(_WIN32)
|
2014-03-22 09:57:43 +01:00
|
|
|
#if defined(_MSC_VER)
|
2014-03-17 19:11:00 +01:00
|
|
|
#define USE_WINDOWS_SEH
|
2021-08-26 19:36:31 +02:00
|
|
|
#endif
|
2021-10-09 14:49:33 +02:00
|
|
|
#if defined (__MINGW32__)
|
|
|
|
# include <windows.h>
|
|
|
|
# include <dbghelp.h>
|
|
|
|
# include <tchar.h>
|
|
|
|
#else
|
|
|
|
# include <Windows.h>
|
|
|
|
# include <DbgHelp.h>
|
|
|
|
# include <TCHAR.H>
|
|
|
|
#endif
|
2017-05-27 04:33:47 +02:00
|
|
|
#include <excpt.h>
|
2014-03-16 12:04:13 +01:00
|
|
|
#endif
|
|
|
|
|
2015-11-21 16:50:57 +01:00
|
|
|
|
2019-07-15 18:11:11 +02:00
|
|
|
/*static*/ FILE* CppCheckExecutor::mExceptionOutput = stdout;
|
2015-11-21 16:50:57 +01:00
|
|
|
|
2008-12-18 22:28:57 +01:00
|
|
|
CppCheckExecutor::CppCheckExecutor()
|
2022-04-11 07:30:55 +02:00
|
|
|
: mSettings(nullptr), mLatestProgressOutputTime(0), mErrorOutput(nullptr), mShowAllErrors(false)
|
2021-08-07 20:51:18 +02:00
|
|
|
{}
|
2008-12-18 22:28:57 +01:00
|
|
|
|
|
|
|
CppCheckExecutor::~CppCheckExecutor()
|
|
|
|
{
|
2019-07-15 18:16:07 +02:00
|
|
|
delete mErrorOutput;
|
2008-12-18 22:28:57 +01:00
|
|
|
}
|
|
|
|
|
2010-08-31 20:32:26 +02:00
|
|
|
bool CppCheckExecutor::parseFromArgs(CppCheck *cppcheck, int argc, const char* const argv[])
|
|
|
|
{
|
2012-04-06 14:19:26 +02:00
|
|
|
Settings& settings = cppcheck->settings();
|
|
|
|
CmdLineParser parser(&settings);
|
2018-04-23 12:39:47 +02:00
|
|
|
const bool success = parser.parseFromArgs(argc, argv);
|
2010-08-31 20:32:26 +02:00
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (success) {
|
2018-04-23 12:39:47 +02:00
|
|
|
if (parser.getShowVersion() && !parser.getShowErrorMessages()) {
|
2022-03-24 22:44:47 +01:00
|
|
|
if (!settings.cppcheckCfgProductName.empty()) {
|
|
|
|
std::cout << settings.cppcheckCfgProductName << std::endl;
|
|
|
|
} else {
|
|
|
|
const char * const extraVersion = CppCheck::extraVersion();
|
|
|
|
if (*extraVersion != 0)
|
|
|
|
std::cout << "Cppcheck " << CppCheck::version() << " ("
|
|
|
|
<< extraVersion << ')' << std::endl;
|
|
|
|
else
|
|
|
|
std::cout << "Cppcheck " << CppCheck::version() << std::endl;
|
|
|
|
}
|
2010-08-31 20:32:26 +02:00
|
|
|
}
|
|
|
|
|
2018-04-23 12:39:47 +02:00
|
|
|
if (parser.getShowErrorMessages()) {
|
2019-07-15 18:31:12 +02:00
|
|
|
mShowAllErrors = true;
|
2022-07-07 17:35:13 +02:00
|
|
|
std::cout << ErrorMessage::getXMLHeader(settings.cppcheckCfgProductName);
|
2010-08-31 20:32:26 +02:00
|
|
|
cppcheck->getErrorMessages();
|
2020-05-23 07:16:49 +02:00
|
|
|
std::cout << ErrorMessage::getXMLFooter() << std::endl;
|
2010-08-31 20:32:26 +02:00
|
|
|
}
|
2011-01-27 09:30:53 +01:00
|
|
|
|
2018-04-23 12:39:47 +02:00
|
|
|
if (parser.exitAfterPrinting()) {
|
2019-09-20 21:54:30 +02:00
|
|
|
Settings::terminate();
|
2014-06-05 09:28:04 +02:00
|
|
|
return true;
|
|
|
|
}
|
2011-11-05 18:15:03 +01:00
|
|
|
} else {
|
2014-06-05 09:28:04 +02:00
|
|
|
return false;
|
2010-08-31 20:32:26 +02:00
|
|
|
}
|
|
|
|
|
2011-01-09 09:29:38 +01:00
|
|
|
// Check that all include paths exist
|
|
|
|
{
|
2018-04-04 21:11:23 +02:00
|
|
|
for (std::list<std::string>::iterator iter = settings.includePaths.begin();
|
2016-01-03 16:18:17 +01:00
|
|
|
iter != settings.includePaths.end();
|
2021-08-07 20:51:18 +02:00
|
|
|
) {
|
2011-01-11 20:03:18 +01:00
|
|
|
const std::string path(Path::toNativeSeparators(*iter));
|
2011-04-16 11:19:56 +02:00
|
|
|
if (FileLister::isDirectory(path))
|
|
|
|
++iter;
|
2011-10-13 20:53:06 +02:00
|
|
|
else {
|
2015-07-25 17:39:44 +02:00
|
|
|
// If the include path is not found, warn user and remove the non-existing path from the list.
|
2021-02-24 22:00:06 +01:00
|
|
|
if (settings.severity.isEnabled(Severity::information))
|
2016-05-20 21:32:59 +02:00
|
|
|
std::cout << "(information) Couldn't find path given by -I '" << path << '\'' << std::endl;
|
2016-01-03 16:18:17 +01:00
|
|
|
iter = settings.includePaths.erase(iter);
|
2011-01-09 09:29:38 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-23 14:01:33 +02:00
|
|
|
// Output a warning for the user if he tries to exclude headers
|
|
|
|
bool warn = false;
|
2018-04-23 12:39:47 +02:00
|
|
|
const std::vector<std::string>& ignored = parser.getIgnoredPaths();
|
|
|
|
for (const std::string &i : ignored) {
|
|
|
|
if (Path::isHeader(i)) {
|
2015-07-23 14:01:33 +02:00
|
|
|
warn = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (warn) {
|
|
|
|
std::cout << "cppcheck: filename exclusion does not apply to header (.h and .hpp) files." << std::endl;
|
|
|
|
std::cout << "cppcheck: Please use --suppress for ignoring results from the header files." << std::endl;
|
2010-08-31 20:32:26 +02:00
|
|
|
}
|
|
|
|
|
2018-04-23 12:39:47 +02:00
|
|
|
const std::vector<std::string>& pathnames = parser.getPathNames();
|
2011-08-06 11:29:51 +02:00
|
|
|
|
2011-10-02 11:02:07 +02:00
|
|
|
#if defined(_WIN32)
|
2015-07-23 14:01:33 +02:00
|
|
|
// For Windows we want case-insensitive path matching
|
|
|
|
const bool caseSensitive = false;
|
2011-10-02 11:02:07 +02:00
|
|
|
#else
|
2015-07-23 14:01:33 +02:00
|
|
|
const bool caseSensitive = true;
|
2011-10-02 11:02:07 +02:00
|
|
|
#endif
|
2021-11-23 22:51:45 +01:00
|
|
|
if (!mSettings->project.fileSettings.empty() && !mSettings->fileFilters.empty()) {
|
2020-01-10 08:57:37 +01:00
|
|
|
// filter only for the selected filenames from all project files
|
|
|
|
std::list<ImportProject::FileSettings> newList;
|
|
|
|
|
|
|
|
for (const ImportProject::FileSettings &fsetting : settings.project.fileSettings) {
|
2021-11-23 22:51:45 +01:00
|
|
|
if (matchglobs(mSettings->fileFilters, fsetting.filename)) {
|
2020-05-11 13:48:54 +02:00
|
|
|
newList.emplace_back(fsetting);
|
2020-01-10 08:57:37 +01:00
|
|
|
}
|
|
|
|
}
|
2020-01-10 11:31:12 +01:00
|
|
|
if (!newList.empty())
|
2020-01-10 08:57:37 +01:00
|
|
|
settings.project.fileSettings = newList;
|
|
|
|
else {
|
|
|
|
std::cout << "cppcheck: error: could not find any files matching the filter." << std::endl;
|
|
|
|
return false;
|
|
|
|
}
|
2020-01-10 11:31:12 +01:00
|
|
|
} else if (!pathnames.empty()) {
|
2015-07-23 14:01:33 +02:00
|
|
|
// Execute recursiveAddFiles() to each given file parameter
|
2018-04-04 21:02:13 +02:00
|
|
|
const PathMatch matcher(ignored, caseSensitive);
|
2021-04-18 21:52:14 +02:00
|
|
|
for (const std::string &pathname : pathnames) {
|
|
|
|
std::string err = FileLister::recursiveAddFiles(mFiles, Path::toNativeSeparators(pathname), mSettings->library.markupExtensions(), matcher);
|
|
|
|
if (!err.empty()) {
|
|
|
|
std::cout << "cppcheck: " << err << std::endl;
|
|
|
|
}
|
|
|
|
}
|
2010-10-22 17:09:50 +02:00
|
|
|
}
|
2011-01-31 14:25:51 +01:00
|
|
|
|
2019-07-15 18:21:52 +02:00
|
|
|
if (mFiles.empty() && settings.project.fileSettings.empty()) {
|
2015-07-23 14:01:33 +02:00
|
|
|
std::cout << "cppcheck: error: could not find or open any of the paths given." << std::endl;
|
|
|
|
if (!ignored.empty())
|
|
|
|
std::cout << "cppcheck: Maybe all paths were ignored?" << std::endl;
|
2011-01-31 14:25:51 +01:00
|
|
|
return false;
|
2021-11-23 22:51:45 +01:00
|
|
|
} else if (!mSettings->fileFilters.empty() && settings.project.fileSettings.empty()) {
|
2020-01-10 08:57:37 +01:00
|
|
|
std::map<std::string, std::size_t> newMap;
|
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i)
|
2021-11-23 22:51:45 +01:00
|
|
|
if (matchglobs(mSettings->fileFilters, i->first)) {
|
2020-01-10 08:57:37 +01:00
|
|
|
newMap[i->first] = i->second;
|
|
|
|
}
|
|
|
|
mFiles = newMap;
|
|
|
|
if (mFiles.empty()) {
|
|
|
|
std::cout << "cppcheck: error: could not find any files matching the filter." << std::endl;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2020-01-10 11:31:12 +01:00
|
|
|
|
2014-09-02 16:10:51 +02:00
|
|
|
return true;
|
2010-08-31 20:32:26 +02:00
|
|
|
}
|
|
|
|
|
2009-03-06 01:03:31 +01:00
|
|
|
int CppCheckExecutor::check(int argc, const char* const argv[])
|
2008-12-18 22:28:57 +01:00
|
|
|
{
|
2011-05-02 14:58:16 +02:00
|
|
|
Preprocessor::missingIncludeFlag = false;
|
2014-05-03 19:31:15 +02:00
|
|
|
Preprocessor::missingSystemIncludeFlag = false;
|
2011-05-02 14:58:16 +02:00
|
|
|
|
2018-02-10 15:34:49 +01:00
|
|
|
CheckUnusedFunctions::clear();
|
|
|
|
|
2020-05-19 16:04:25 +02:00
|
|
|
CppCheck cppCheck(*this, true, executeCommand);
|
2009-02-19 23:21:18 +01:00
|
|
|
|
2015-11-14 19:59:22 +01:00
|
|
|
const Settings& settings = cppCheck.settings();
|
2019-07-15 18:24:27 +02:00
|
|
|
mSettings = &settings;
|
2012-04-06 14:19:26 +02:00
|
|
|
|
2012-04-08 10:05:44 +02:00
|
|
|
if (!parseFromArgs(&cppCheck, argc, argv)) {
|
2020-05-09 14:45:47 +02:00
|
|
|
mSettings = nullptr;
|
2012-04-08 10:05:44 +02:00
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
2019-09-20 21:54:30 +02:00
|
|
|
if (Settings::terminated()) {
|
2020-05-09 14:45:47 +02:00
|
|
|
mSettings = nullptr;
|
2014-06-05 09:28:04 +02:00
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
2020-05-09 14:45:47 +02:00
|
|
|
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (cppCheck.settings().exceptionHandling)
|
2022-03-21 18:35:53 +01:00
|
|
|
ret = check_wrapper(cppCheck);
|
2020-05-09 14:45:47 +02:00
|
|
|
else
|
2022-03-21 18:35:53 +01:00
|
|
|
ret = check_internal(cppCheck);
|
2020-05-09 14:45:47 +02:00
|
|
|
|
|
|
|
mSettings = nullptr;
|
|
|
|
return ret;
|
2014-03-16 12:04:13 +01:00
|
|
|
}
|
|
|
|
|
2017-08-21 12:52:15 +02:00
|
|
|
void CppCheckExecutor::setSettings(const Settings &settings)
|
|
|
|
{
|
2019-07-15 18:24:27 +02:00
|
|
|
mSettings = &settings;
|
2017-08-21 12:52:15 +02:00
|
|
|
}
|
|
|
|
|
2014-06-29 18:57:48 +02:00
|
|
|
/**
|
|
|
|
* Simple helper function:
|
|
|
|
* \return size of array
|
|
|
|
* */
|
|
|
|
template<typename T, int size>
|
2021-08-07 20:51:18 +02:00
|
|
|
std::size_t getArrayLength(const T (&)[size])
|
2014-06-29 18:57:48 +02:00
|
|
|
{
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-16 12:04:13 +01:00
|
|
|
#if defined(USE_UNIX_SIGNAL_HANDLING)
|
2016-05-20 21:32:59 +02:00
|
|
|
/*
|
|
|
|
* Try to print the callstack.
|
2017-06-06 20:56:59 +02:00
|
|
|
* That is very sensitive to the operating system, hardware, compiler and runtime.
|
|
|
|
* The code is not meant for production environment!
|
|
|
|
* One reason is named first: it's using functions not whitelisted for usage in a signal handler function.
|
2016-05-20 21:32:59 +02:00
|
|
|
*/
|
|
|
|
static void print_stacktrace(FILE* output, bool demangling, int maxdepth, bool lowMem)
|
|
|
|
{
|
2014-06-28 14:05:18 +02:00
|
|
|
#if defined(USE_UNIX_BACKTRACE_SUPPORT)
|
2015-03-08 14:24:54 +01:00
|
|
|
// 32 vs. 64bit
|
|
|
|
#define ADDRESSDISPLAYLENGTH ((sizeof(long)==8)?12:8)
|
2016-05-20 21:32:59 +02:00
|
|
|
const int fd = fileno(output);
|
2019-06-30 21:39:22 +02:00
|
|
|
void *callstackArray[32]= {nullptr}; // the less resources the better...
|
2019-11-20 15:37:09 +01:00
|
|
|
const int currentdepth = backtrace(callstackArray, (int)getArrayLength(callstackArray));
|
2016-05-20 21:32:59 +02:00
|
|
|
const int offset=2; // some entries on top are within our own exception handling code or libc
|
|
|
|
if (maxdepth<0)
|
|
|
|
maxdepth=currentdepth-offset;
|
|
|
|
else
|
|
|
|
maxdepth = std::min(maxdepth, currentdepth);
|
|
|
|
if (lowMem) {
|
|
|
|
fputs("Callstack (symbols only):\n", output);
|
2017-06-06 20:56:59 +02:00
|
|
|
backtrace_symbols_fd(callstackArray+offset, maxdepth, fd);
|
2016-05-20 21:32:59 +02:00
|
|
|
} else {
|
2017-06-06 20:56:59 +02:00
|
|
|
char **symbolStringList = backtrace_symbols(callstackArray, currentdepth);
|
|
|
|
if (symbolStringList) {
|
2016-05-20 21:32:59 +02:00
|
|
|
fputs("Callstack:\n", output);
|
2021-01-06 11:39:24 +01:00
|
|
|
char demangle_buffer[2048]= {0};
|
2016-05-20 21:32:59 +02:00
|
|
|
for (int i = offset; i < maxdepth; ++i) {
|
2017-06-06 20:56:59 +02:00
|
|
|
const char * const symbolString = symbolStringList[i];
|
|
|
|
char * realnameString = nullptr;
|
|
|
|
const char * const firstBracketName = strchr(symbolString, '(');
|
|
|
|
const char * const firstBracketAddress = strchr(symbolString, '[');
|
2016-05-20 21:32:59 +02:00
|
|
|
const char * const secondBracketAddress = strchr(firstBracketAddress, ']');
|
|
|
|
const char * const beginAddress = firstBracketAddress+3;
|
|
|
|
const int addressLen = int(secondBracketAddress-beginAddress);
|
|
|
|
const int padLen = int(ADDRESSDISPLAYLENGTH-addressLen);
|
|
|
|
if (demangling && firstBracketName) {
|
|
|
|
const char * const plus = strchr(firstBracketName, '+');
|
|
|
|
if (plus && (plus>(firstBracketName+1))) {
|
2017-06-06 20:56:59 +02:00
|
|
|
char input_buffer[1024]= {0};
|
2016-05-20 21:32:59 +02:00
|
|
|
strncpy(input_buffer, firstBracketName+1, plus-firstBracketName-1);
|
2021-01-06 11:39:24 +01:00
|
|
|
size_t length = getArrayLength(demangle_buffer);
|
2016-05-20 21:32:59 +02:00
|
|
|
int status=0;
|
2017-06-06 20:56:59 +02:00
|
|
|
// We're violating the specification - passing stack address instead of malloc'ed heap.
|
|
|
|
// Benefit is that no further heap is required, while there is sufficient stack...
|
2021-01-06 11:39:24 +01:00
|
|
|
realnameString = abi::__cxa_demangle(input_buffer, demangle_buffer, &length, &status); // non-NULL on success
|
2015-11-14 19:59:22 +01:00
|
|
|
}
|
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
const int ordinal=i-offset;
|
|
|
|
fprintf(output, "#%-2d 0x",
|
|
|
|
ordinal);
|
|
|
|
if (padLen>0)
|
|
|
|
fprintf(output, "%0*d",
|
|
|
|
padLen, 0);
|
2017-06-06 20:56:59 +02:00
|
|
|
if (realnameString) {
|
2016-05-20 21:32:59 +02:00
|
|
|
fprintf(output, "%.*s in %s\n",
|
|
|
|
(int)(secondBracketAddress-firstBracketAddress-3), firstBracketAddress+3,
|
2017-06-06 20:56:59 +02:00
|
|
|
realnameString);
|
2016-05-20 21:32:59 +02:00
|
|
|
} else {
|
|
|
|
fprintf(output, "%.*s in %.*s\n",
|
|
|
|
(int)(secondBracketAddress-firstBracketAddress-3), firstBracketAddress+3,
|
2017-06-06 20:56:59 +02:00
|
|
|
(int)(firstBracketAddress-symbolString), symbolString);
|
2016-05-20 21:32:59 +02:00
|
|
|
}
|
2014-03-16 18:37:28 +01:00
|
|
|
}
|
2017-06-06 20:56:59 +02:00
|
|
|
free(symbolStringList);
|
2016-05-20 21:32:59 +02:00
|
|
|
} else {
|
|
|
|
fputs("Callstack could not be obtained\n", output);
|
2014-03-16 18:37:28 +01:00
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
}
|
2015-03-08 14:24:54 +01:00
|
|
|
#undef ADDRESSDISPLAYLENGTH
|
2017-05-25 00:19:27 +02:00
|
|
|
#else
|
2022-02-11 19:44:08 +01:00
|
|
|
(void)output;
|
|
|
|
(void)demangling;
|
|
|
|
(void)maxdepth;
|
|
|
|
(void)lowMem;
|
2014-03-16 12:04:13 +01:00
|
|
|
#endif
|
2016-05-20 21:32:59 +02:00
|
|
|
}
|
2014-03-16 12:04:13 +01:00
|
|
|
|
2021-08-04 07:45:50 +02:00
|
|
|
#ifdef __USE_DYNAMIC_STACK_SIZE
|
|
|
|
static const size_t MYSTACKSIZE = 16*1024+32768; // wild guess about a reasonable buffer
|
|
|
|
#else
|
2016-05-20 21:32:59 +02:00
|
|
|
static const size_t MYSTACKSIZE = 16*1024+SIGSTKSZ; // wild guess about a reasonable buffer
|
2021-08-04 07:45:50 +02:00
|
|
|
#endif
|
2016-05-20 21:32:59 +02:00
|
|
|
static char mytstack[MYSTACKSIZE]= {0}; // alternative stack for signal handler
|
|
|
|
static bool bStackBelowHeap=false; // lame attempt to locate heap vs. stack address space. See CppCheckExecutor::check_wrapper()
|
2015-03-07 20:47:27 +01:00
|
|
|
|
2018-12-21 21:23:03 +01:00
|
|
|
/**
|
2016-05-20 21:32:59 +02:00
|
|
|
* \param[in] ptr address to be examined.
|
|
|
|
* \return true if address is supposed to be on stack (contrary to heap). If ptr is 0 false will be returned.
|
|
|
|
* If unknown better return false.
|
|
|
|
*/
|
|
|
|
static bool IsAddressOnStack(const void* ptr)
|
|
|
|
{
|
|
|
|
if (nullptr==ptr)
|
|
|
|
return false;
|
|
|
|
char a;
|
|
|
|
if (bStackBelowHeap)
|
|
|
|
return ptr < &a;
|
|
|
|
else
|
|
|
|
return ptr > &a;
|
|
|
|
}
|
2015-03-07 18:15:25 +01:00
|
|
|
|
2016-05-20 21:32:59 +02:00
|
|
|
/* (declare this list here, so it may be used in signal handlers in addition to main())
|
|
|
|
* A list of signals available in ISO C
|
|
|
|
* Check out http://pubs.opengroup.org/onlinepubs/009695399/basedefs/signal.h.html
|
|
|
|
* For now we only want to detect abnormal behaviour for a few selected signals:
|
|
|
|
*/
|
2015-11-14 19:59:22 +01:00
|
|
|
|
2018-04-08 22:54:10 +02:00
|
|
|
#define DECLARE_SIGNAL(x) std::make_pair(x, #x)
|
2021-01-05 17:51:32 +01:00
|
|
|
using Signalmap_t = std::map<int, std::string>;
|
2018-04-08 22:54:10 +02:00
|
|
|
static const Signalmap_t listofsignals = {
|
|
|
|
DECLARE_SIGNAL(SIGABRT),
|
|
|
|
DECLARE_SIGNAL(SIGBUS),
|
|
|
|
DECLARE_SIGNAL(SIGFPE),
|
|
|
|
DECLARE_SIGNAL(SIGILL),
|
|
|
|
DECLARE_SIGNAL(SIGINT),
|
|
|
|
DECLARE_SIGNAL(SIGQUIT),
|
|
|
|
DECLARE_SIGNAL(SIGSEGV),
|
|
|
|
DECLARE_SIGNAL(SIGSYS),
|
|
|
|
// don't care: SIGTERM
|
|
|
|
DECLARE_SIGNAL(SIGUSR1),
|
|
|
|
//DECLARE_SIGNAL(SIGUSR2) no usage currently
|
|
|
|
};
|
2015-11-25 22:37:38 +01:00
|
|
|
#undef DECLARE_SIGNAL
|
2016-05-20 21:32:59 +02:00
|
|
|
/*
|
|
|
|
* Entry pointer for signal handlers
|
|
|
|
* It uses functions which are not safe to be called from a signal handler,
|
|
|
|
* (http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04 has a whitelist)
|
|
|
|
* but when ending up here something went terribly wrong anyway.
|
|
|
|
* And all which is left is just printing some information and terminate.
|
|
|
|
*/
|
|
|
|
static void CppcheckSignalHandler(int signo, siginfo_t * info, void * context)
|
|
|
|
{
|
|
|
|
int type = -1;
|
2018-03-20 14:24:45 +01:00
|
|
|
pid_t killid;
|
2014-12-31 01:44:50 +01:00
|
|
|
#if defined(__linux__) && defined(REG_ERR)
|
2016-05-20 21:32:59 +02:00
|
|
|
const ucontext_t* const uc = reinterpret_cast<const ucontext_t*>(context);
|
|
|
|
killid = (pid_t) syscall(SYS_gettid);
|
|
|
|
if (uc) {
|
|
|
|
type = (int)uc->uc_mcontext.gregs[REG_ERR] & 2;
|
|
|
|
}
|
2017-05-25 00:19:27 +02:00
|
|
|
#else
|
2022-02-11 19:44:08 +01:00
|
|
|
(void)context;
|
2018-03-20 14:24:45 +01:00
|
|
|
killid = getpid();
|
2014-11-14 23:40:53 +01:00
|
|
|
#endif
|
2017-05-25 00:19:27 +02:00
|
|
|
|
2016-05-20 21:32:59 +02:00
|
|
|
const Signalmap_t::const_iterator it=listofsignals.find(signo);
|
|
|
|
const char * const signame = (it==listofsignals.end()) ? "unknown" : it->second.c_str();
|
2017-06-06 20:56:59 +02:00
|
|
|
bool printCallstack=true; // try to print a callstack?
|
2018-03-20 14:24:45 +01:00
|
|
|
bool lowMem=false; // was low-memory condition detected? Be careful then! Avoid allocating much more memory then.
|
|
|
|
bool unexpectedSignal=true; // unexpected indicates program failure
|
2017-06-06 20:56:59 +02:00
|
|
|
bool terminate=true; // exit process/thread
|
|
|
|
const bool isAddressOnStack = IsAddressOnStack(info->si_addr);
|
2016-05-20 21:32:59 +02:00
|
|
|
FILE* output = CppCheckExecutor::getExceptionOutput();
|
|
|
|
switch (signo) {
|
|
|
|
case SIGABRT:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
2018-03-20 14:24:45 +01:00
|
|
|
fputs(
|
|
|
|
#ifdef NDEBUG
|
2018-03-22 07:14:01 +01:00
|
|
|
" - out of memory?\n",
|
2018-03-20 14:24:45 +01:00
|
|
|
#else
|
2018-03-22 07:14:01 +01:00
|
|
|
" - out of memory or assertion?\n",
|
2018-03-20 14:24:45 +01:00
|
|
|
#endif
|
2018-03-22 07:14:01 +01:00
|
|
|
output);
|
2016-05-20 21:32:59 +02:00
|
|
|
lowMem=true; // educated guess
|
|
|
|
break;
|
|
|
|
case SIGBUS:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
switch (info->si_code) {
|
|
|
|
case BUS_ADRALN: // invalid address alignment
|
|
|
|
fputs(" - BUS_ADRALN", output);
|
|
|
|
break;
|
|
|
|
case BUS_ADRERR: // nonexistent physical address
|
|
|
|
fputs(" - BUS_ADRERR", output);
|
|
|
|
break;
|
|
|
|
case BUS_OBJERR: // object-specific hardware error
|
|
|
|
fputs(" - BUS_OBJERR", output);
|
2015-11-21 16:50:57 +01:00
|
|
|
break;
|
2014-05-25 15:53:26 +02:00
|
|
|
#ifdef BUS_MCEERR_AR
|
2016-05-20 21:32:59 +02:00
|
|
|
case BUS_MCEERR_AR: // Hardware memory error consumed on a machine check;
|
|
|
|
fputs(" - BUS_MCEERR_AR", output);
|
|
|
|
break;
|
2014-05-25 15:53:26 +02:00
|
|
|
#endif
|
|
|
|
#ifdef BUS_MCEERR_AO
|
2016-05-20 21:32:59 +02:00
|
|
|
case BUS_MCEERR_AO: // Hardware memory error detected in process but not consumed
|
|
|
|
fputs(" - BUS_MCEERR_AO", output);
|
|
|
|
break;
|
2014-05-25 15:53:26 +02:00
|
|
|
#endif
|
2016-05-20 21:32:59 +02:00
|
|
|
default:
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
2016-05-20 21:32:59 +02:00
|
|
|
}
|
|
|
|
fprintf(output, " (at 0x%lx).\n",
|
|
|
|
(unsigned long)info->si_addr);
|
|
|
|
break;
|
|
|
|
case SIGFPE:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
switch (info->si_code) {
|
|
|
|
case FPE_INTDIV: // integer divide by zero
|
|
|
|
fputs(" - FPE_INTDIV", output);
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
2016-05-20 21:32:59 +02:00
|
|
|
case FPE_INTOVF: // integer overflow
|
|
|
|
fputs(" - FPE_INTOVF", output);
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
2016-05-20 21:32:59 +02:00
|
|
|
case FPE_FLTDIV: // floating-point divide by zero
|
|
|
|
fputs(" - FPE_FLTDIV", output);
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
2016-05-20 21:32:59 +02:00
|
|
|
case FPE_FLTOVF: // floating-point overflow
|
|
|
|
fputs(" - FPE_FLTOVF", output);
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
2016-05-20 21:32:59 +02:00
|
|
|
case FPE_FLTUND: // floating-point underflow
|
|
|
|
fputs(" - FPE_FLTUND", output);
|
|
|
|
break;
|
|
|
|
case FPE_FLTRES: // floating-point inexact result
|
|
|
|
fputs(" - FPE_FLTRES", output);
|
|
|
|
break;
|
|
|
|
case FPE_FLTINV: // floating-point invalid operation
|
|
|
|
fputs(" - FPE_FLTINV", output);
|
|
|
|
break;
|
|
|
|
case FPE_FLTSUB: // subscript out of range
|
|
|
|
fputs(" - FPE_FLTSUB", output);
|
2014-05-25 15:53:26 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
fprintf(output, " (at 0x%lx).\n",
|
|
|
|
(unsigned long)info->si_addr);
|
|
|
|
break;
|
|
|
|
case SIGILL:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
switch (info->si_code) {
|
|
|
|
case ILL_ILLOPC: // illegal opcode
|
|
|
|
fputs(" - ILL_ILLOPC", output);
|
|
|
|
break;
|
|
|
|
case ILL_ILLOPN: // illegal operand
|
|
|
|
fputs(" - ILL_ILLOPN", output);
|
|
|
|
break;
|
|
|
|
case ILL_ILLADR: // illegal addressing mode
|
|
|
|
fputs(" - ILL_ILLADR", output);
|
|
|
|
break;
|
|
|
|
case ILL_ILLTRP: // illegal trap
|
|
|
|
fputs(" - ILL_ILLTRP", output);
|
|
|
|
break;
|
|
|
|
case ILL_PRVOPC: // privileged opcode
|
|
|
|
fputs(" - ILL_PRVOPC", output);
|
|
|
|
break;
|
|
|
|
case ILL_PRVREG: // privileged register
|
|
|
|
fputs(" - ILL_PRVREG", output);
|
|
|
|
break;
|
|
|
|
case ILL_COPROC: // coprocessor error
|
|
|
|
fputs(" - ILL_COPROC", output);
|
|
|
|
break;
|
|
|
|
case ILL_BADSTK: // internal stack error
|
|
|
|
fputs(" - ILL_BADSTK", output);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2014-05-25 15:53:26 +02:00
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
fprintf(output, " (at 0x%lx).%s\n",
|
|
|
|
(unsigned long)info->si_addr,
|
2017-06-06 20:56:59 +02:00
|
|
|
(isAddressOnStack)?" Stackoverflow?":"");
|
2016-05-20 21:32:59 +02:00
|
|
|
break;
|
|
|
|
case SIGINT:
|
|
|
|
unexpectedSignal=false; // legal usage: interrupt application via CTRL-C
|
|
|
|
fputs("cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
printCallstack=true;
|
|
|
|
fputs(".\n", output);
|
|
|
|
break;
|
|
|
|
case SIGSEGV:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
switch (info->si_code) {
|
|
|
|
case SEGV_MAPERR: // address not mapped to object
|
|
|
|
fputs(" - SEGV_MAPERR", output);
|
|
|
|
break;
|
|
|
|
case SEGV_ACCERR: // invalid permissions for mapped object
|
|
|
|
fputs(" - SEGV_ACCERR", output);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2014-05-25 15:53:26 +02:00
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
fprintf(output, " (%sat 0x%lx).%s\n",
|
2019-01-13 13:18:35 +01:00
|
|
|
// cppcheck-suppress knownConditionTrueFalse ; FP
|
2016-05-20 21:32:59 +02:00
|
|
|
(type==-1)? "" :
|
|
|
|
(type==0) ? "reading " : "writing ",
|
|
|
|
(unsigned long)info->si_addr,
|
2017-06-06 20:56:59 +02:00
|
|
|
(isAddressOnStack)?" Stackoverflow?":""
|
2021-08-07 20:51:18 +02:00
|
|
|
);
|
2016-05-20 21:32:59 +02:00
|
|
|
break;
|
|
|
|
case SIGUSR1:
|
|
|
|
fputs("cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
fputs(".\n", output);
|
2017-06-06 20:56:59 +02:00
|
|
|
terminate=false;
|
2016-05-20 21:32:59 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fputs("Internal error: cppcheck received signal ", output);
|
|
|
|
fputs(signame, output);
|
|
|
|
fputs(".\n", output);
|
|
|
|
break;
|
2015-11-14 19:59:22 +01:00
|
|
|
}
|
2016-05-20 21:32:59 +02:00
|
|
|
if (printCallstack) {
|
|
|
|
print_stacktrace(output, true, -1, lowMem);
|
|
|
|
}
|
|
|
|
if (unexpectedSignal) {
|
|
|
|
fputs("\nPlease report this to the cppcheck developers!\n", output);
|
|
|
|
}
|
|
|
|
fflush(output);
|
|
|
|
|
2017-06-06 20:56:59 +02:00
|
|
|
if (terminate) {
|
|
|
|
// now let things proceed, shutdown and hopefully dump core for post-mortem analysis
|
|
|
|
struct sigaction act;
|
|
|
|
memset(&act, 0, sizeof(act));
|
|
|
|
act.sa_handler=SIG_DFL;
|
|
|
|
sigaction(signo, &act, nullptr);
|
|
|
|
kill(killid, signo);
|
|
|
|
}
|
2014-03-16 12:04:13 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-03-17 19:11:00 +01:00
|
|
|
#ifdef USE_WINDOWS_SEH
|
2015-11-14 19:59:22 +01:00
|
|
|
namespace {
|
|
|
|
const ULONG maxnamelength = 512;
|
|
|
|
struct IMAGEHLP_SYMBOL64_EXT : public IMAGEHLP_SYMBOL64 {
|
2019-11-20 15:37:09 +01:00
|
|
|
TCHAR nameExt[maxnamelength]; // actually no need to worry about character encoding here
|
2015-11-14 19:59:22 +01:00
|
|
|
};
|
|
|
|
typedef BOOL (WINAPI *fpStackWalk64)(DWORD, HANDLE, HANDLE, LPSTACKFRAME64, PVOID, PREAD_PROCESS_MEMORY_ROUTINE64, PFUNCTION_TABLE_ACCESS_ROUTINE64, PGET_MODULE_BASE_ROUTINE64, PTRANSLATE_ADDRESS_ROUTINE64);
|
|
|
|
fpStackWalk64 pStackWalk64;
|
2021-08-07 20:51:18 +02:00
|
|
|
typedef DWORD64 (WINAPI *fpSymGetModuleBase64)(HANDLE, DWORD64);
|
2015-11-14 19:59:22 +01:00
|
|
|
fpSymGetModuleBase64 pSymGetModuleBase64;
|
|
|
|
typedef BOOL (WINAPI *fpSymGetSymFromAddr64)(HANDLE, DWORD64, PDWORD64, PIMAGEHLP_SYMBOL64);
|
|
|
|
fpSymGetSymFromAddr64 pSymGetSymFromAddr64;
|
|
|
|
typedef BOOL (WINAPI *fpSymGetLineFromAddr64)(HANDLE, DWORD64, PDWORD, PIMAGEHLP_LINE64);
|
|
|
|
fpSymGetLineFromAddr64 pSymGetLineFromAddr64;
|
2021-08-07 20:51:18 +02:00
|
|
|
typedef DWORD (WINAPI *fpUnDecorateSymbolName)(const TCHAR*, PTSTR, DWORD, DWORD);
|
2015-11-14 19:59:22 +01:00
|
|
|
fpUnDecorateSymbolName pUnDecorateSymbolName;
|
2021-08-07 20:51:18 +02:00
|
|
|
typedef PVOID (WINAPI *fpSymFunctionTableAccess64)(HANDLE, DWORD64);
|
2015-11-14 19:59:22 +01:00
|
|
|
fpSymFunctionTableAccess64 pSymFunctionTableAccess64;
|
|
|
|
typedef BOOL (WINAPI *fpSymInitialize)(HANDLE, PCSTR, BOOL);
|
|
|
|
fpSymInitialize pSymInitialize;
|
|
|
|
|
|
|
|
HMODULE hLibDbgHelp;
|
2014-06-29 18:57:48 +02:00
|
|
|
// avoid explicit dependency on Dbghelp.dll
|
2015-11-14 19:59:22 +01:00
|
|
|
bool loadDbgHelp()
|
|
|
|
{
|
|
|
|
hLibDbgHelp = ::LoadLibraryW(L"Dbghelp.dll");
|
|
|
|
if (!hLibDbgHelp)
|
|
|
|
return false;
|
|
|
|
pStackWalk64 = (fpStackWalk64) ::GetProcAddress(hLibDbgHelp, "StackWalk64");
|
|
|
|
pSymGetModuleBase64 = (fpSymGetModuleBase64) ::GetProcAddress(hLibDbgHelp, "SymGetModuleBase64");
|
|
|
|
pSymGetSymFromAddr64 = (fpSymGetSymFromAddr64) ::GetProcAddress(hLibDbgHelp, "SymGetSymFromAddr64");
|
|
|
|
pSymGetLineFromAddr64 = (fpSymGetLineFromAddr64)::GetProcAddress(hLibDbgHelp, "SymGetLineFromAddr64");
|
|
|
|
pSymFunctionTableAccess64 = (fpSymFunctionTableAccess64)::GetProcAddress(hLibDbgHelp, "SymFunctionTableAccess64");
|
|
|
|
pSymInitialize = (fpSymInitialize) ::GetProcAddress(hLibDbgHelp, "SymInitialize");
|
|
|
|
pUnDecorateSymbolName = (fpUnDecorateSymbolName)::GetProcAddress(hLibDbgHelp, "UnDecorateSymbolName");
|
|
|
|
return true;
|
|
|
|
}
|
2014-06-29 18:57:48 +02:00
|
|
|
|
|
|
|
|
2019-11-20 15:37:09 +01:00
|
|
|
void printCallstack(FILE* outputFile, PEXCEPTION_POINTERS ex)
|
2015-11-14 19:59:22 +01:00
|
|
|
{
|
|
|
|
if (!loadDbgHelp())
|
|
|
|
return;
|
|
|
|
const HANDLE hProcess = GetCurrentProcess();
|
|
|
|
const HANDLE hThread = GetCurrentThread();
|
2019-01-13 13:06:44 +01:00
|
|
|
pSymInitialize(
|
|
|
|
hProcess,
|
|
|
|
nullptr,
|
|
|
|
TRUE
|
2021-08-07 20:51:18 +02:00
|
|
|
);
|
|
|
|
CONTEXT context = *(ex->ContextRecord);
|
|
|
|
STACKFRAME64 stack= {0};
|
2014-06-29 18:57:48 +02:00
|
|
|
#ifdef _M_IX86
|
2015-11-14 19:59:22 +01:00
|
|
|
stack.AddrPC.Offset = context.Eip;
|
|
|
|
stack.AddrPC.Mode = AddrModeFlat;
|
|
|
|
stack.AddrStack.Offset = context.Esp;
|
|
|
|
stack.AddrStack.Mode = AddrModeFlat;
|
|
|
|
stack.AddrFrame.Offset = context.Ebp;
|
|
|
|
stack.AddrFrame.Mode = AddrModeFlat;
|
2014-06-29 18:57:48 +02:00
|
|
|
#else
|
2015-11-14 19:59:22 +01:00
|
|
|
stack.AddrPC.Offset = context.Rip;
|
|
|
|
stack.AddrPC.Mode = AddrModeFlat;
|
|
|
|
stack.AddrStack.Offset = context.Rsp;
|
|
|
|
stack.AddrStack.Mode = AddrModeFlat;
|
|
|
|
stack.AddrFrame.Offset = context.Rsp;
|
|
|
|
stack.AddrFrame.Mode = AddrModeFlat;
|
2014-06-29 18:57:48 +02:00
|
|
|
#endif
|
2015-11-14 19:59:22 +01:00
|
|
|
IMAGEHLP_SYMBOL64_EXT symbol;
|
|
|
|
symbol.SizeOfStruct = sizeof(IMAGEHLP_SYMBOL64);
|
|
|
|
symbol.MaxNameLength = maxnamelength;
|
|
|
|
DWORD64 displacement = 0;
|
|
|
|
int beyond_main=-1; // emergency exit, see below
|
|
|
|
for (ULONG frame = 0; ; frame++) {
|
2019-01-13 13:06:44 +01:00
|
|
|
BOOL result = pStackWalk64
|
|
|
|
(
|
2014-06-29 18:57:48 +02:00
|
|
|
#ifdef _M_IX86
|
2021-08-07 20:51:18 +02:00
|
|
|
IMAGE_FILE_MACHINE_I386,
|
2014-06-29 18:57:48 +02:00
|
|
|
#else
|
2021-08-07 20:51:18 +02:00
|
|
|
IMAGE_FILE_MACHINE_AMD64,
|
2014-06-29 18:57:48 +02:00
|
|
|
#endif
|
2021-08-07 20:51:18 +02:00
|
|
|
hProcess,
|
|
|
|
hThread,
|
|
|
|
&stack,
|
|
|
|
&context,
|
|
|
|
nullptr,
|
|
|
|
pSymFunctionTableAccess64,
|
|
|
|
pSymGetModuleBase64,
|
|
|
|
nullptr
|
2019-01-13 13:06:44 +01:00
|
|
|
);
|
2015-11-14 19:59:22 +01:00
|
|
|
if (!result) // official end...
|
|
|
|
break;
|
|
|
|
pSymGetSymFromAddr64(hProcess, (ULONG64)stack.AddrPC.Offset, &displacement, &symbol);
|
|
|
|
TCHAR undname[maxnamelength]= {0};
|
2019-11-20 15:37:09 +01:00
|
|
|
pUnDecorateSymbolName((const TCHAR*)symbol.Name, (PTSTR)undname, (DWORD)getArrayLength(undname), UNDNAME_COMPLETE);
|
2015-11-14 19:59:22 +01:00
|
|
|
if (beyond_main>=0)
|
|
|
|
++beyond_main;
|
|
|
|
if (_tcscmp(undname, _T("main"))==0)
|
|
|
|
beyond_main=0;
|
2015-11-28 10:49:08 +01:00
|
|
|
fprintf(outputFile,
|
2015-11-14 19:59:22 +01:00
|
|
|
"%lu. 0x%08I64X in ",
|
|
|
|
frame, (ULONG64)stack.AddrPC.Offset);
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs((const char *)undname, outputFile);
|
|
|
|
fputc('\n', outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
if (0==stack.AddrReturn.Offset || beyond_main>2) // StackWalk64() sometimes doesn't reach any end...
|
|
|
|
break;
|
|
|
|
}
|
2014-07-07 21:25:30 +02:00
|
|
|
|
2015-11-14 19:59:22 +01:00
|
|
|
FreeLibrary(hLibDbgHelp);
|
2018-04-05 08:12:15 +02:00
|
|
|
hLibDbgHelp=nullptr;
|
2015-11-14 19:59:22 +01:00
|
|
|
}
|
2014-06-29 18:57:48 +02:00
|
|
|
|
2015-11-28 10:49:08 +01:00
|
|
|
void writeMemoryErrorDetails(FILE* outputFile, PEXCEPTION_POINTERS ex, const char* description)
|
2015-11-14 19:59:22 +01:00
|
|
|
{
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs(description, outputFile);
|
|
|
|
fprintf(outputFile, " (instruction: 0x%p) ", ex->ExceptionRecord->ExceptionAddress);
|
2015-11-14 19:59:22 +01:00
|
|
|
// Using %p for ULONG_PTR later on, so it must have size identical to size of pointer
|
|
|
|
// This is not the universally portable solution but good enough for Win32/64
|
|
|
|
C_ASSERT(sizeof(void*) == sizeof(ex->ExceptionRecord->ExceptionInformation[1]));
|
|
|
|
switch (ex->ExceptionRecord->ExceptionInformation[0]) {
|
|
|
|
case 0:
|
2015-11-28 10:49:08 +01:00
|
|
|
fprintf(outputFile, "reading from 0x%p",
|
2015-11-14 19:59:22 +01:00
|
|
|
reinterpret_cast<void*>(ex->ExceptionRecord->ExceptionInformation[1]));
|
|
|
|
break;
|
|
|
|
case 1:
|
2015-11-28 10:49:08 +01:00
|
|
|
fprintf(outputFile, "writing to 0x%p",
|
2015-11-14 19:59:22 +01:00
|
|
|
reinterpret_cast<void*>(ex->ExceptionRecord->ExceptionInformation[1]));
|
|
|
|
break;
|
|
|
|
case 8:
|
2015-11-28 10:49:08 +01:00
|
|
|
fprintf(outputFile, "data execution prevention at 0x%p",
|
2015-11-14 19:59:22 +01:00
|
|
|
reinterpret_cast<void*>(ex->ExceptionRecord->ExceptionInformation[1]));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2015-02-20 08:26:02 +01:00
|
|
|
}
|
|
|
|
|
2015-11-14 19:59:22 +01:00
|
|
|
/*
|
|
|
|
* Any evaluation of the exception needs to be done here!
|
|
|
|
*/
|
|
|
|
int filterException(int code, PEXCEPTION_POINTERS ex)
|
|
|
|
{
|
2015-11-28 10:49:08 +01:00
|
|
|
FILE *outputFile = stdout;
|
|
|
|
fputs("Internal error: ", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
switch (ex->ExceptionRecord->ExceptionCode) {
|
|
|
|
case EXCEPTION_ACCESS_VIOLATION:
|
2015-11-28 10:49:08 +01:00
|
|
|
writeMemoryErrorDetails(outputFile, ex, "Access violation");
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Out of array bounds", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_BREAKPOINT:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Breakpoint", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_DATATYPE_MISALIGNMENT:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Misaligned data", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_DENORMAL_OPERAND:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Denormalized floating-point value", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_DIVIDE_BY_ZERO:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Floating-point divide-by-zero", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_INEXACT_RESULT:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Inexact floating-point value", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_INVALID_OPERATION:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Invalid floating-point operation", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_OVERFLOW:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Floating-point overflow", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_STACK_CHECK:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Floating-point stack overflow", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_FLT_UNDERFLOW:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Floating-point underflow", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_GUARD_PAGE:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Page-guard access", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_ILLEGAL_INSTRUCTION:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Illegal instruction", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_IN_PAGE_ERROR:
|
2015-11-28 10:49:08 +01:00
|
|
|
writeMemoryErrorDetails(outputFile, ex, "Invalid page access");
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_INT_DIVIDE_BY_ZERO:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Integer divide-by-zero", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_INT_OVERFLOW:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Integer overflow", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_INVALID_DISPOSITION:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Invalid exception dispatcher", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_INVALID_HANDLE:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Invalid handle", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_NONCONTINUABLE_EXCEPTION:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Non-continuable exception", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_PRIV_INSTRUCTION:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Invalid instruction", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_SINGLE_STEP:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Single instruction step", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
case EXCEPTION_STACK_OVERFLOW:
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Stack overflow", outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
break;
|
|
|
|
default:
|
2015-11-28 10:49:08 +01:00
|
|
|
fprintf(outputFile, "Unknown exception (%d)\n",
|
2015-11-14 19:59:22 +01:00
|
|
|
code);
|
|
|
|
break;
|
|
|
|
}
|
2015-11-28 10:49:08 +01:00
|
|
|
fputc('\n', outputFile);
|
2019-11-20 15:37:09 +01:00
|
|
|
printCallstack(outputFile, ex);
|
2015-11-28 10:49:08 +01:00
|
|
|
fflush(outputFile);
|
2015-11-14 19:59:22 +01:00
|
|
|
return EXCEPTION_EXECUTE_HANDLER;
|
2014-03-17 19:11:00 +01:00
|
|
|
}
|
2014-03-16 18:37:28 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Signal/SEH handling
|
2014-03-18 21:14:09 +01:00
|
|
|
* Has to be clean for using with SEH on windows, i.e. no construction of C++ object instances is allowed!
|
2014-03-16 18:37:28 +01:00
|
|
|
* TODO Check for multi-threading issues!
|
|
|
|
*
|
|
|
|
*/
|
2022-03-21 18:35:53 +01:00
|
|
|
int CppCheckExecutor::check_wrapper(CppCheck& cppcheck)
|
2014-03-16 12:04:13 +01:00
|
|
|
{
|
2014-03-17 19:11:00 +01:00
|
|
|
#ifdef USE_WINDOWS_SEH
|
2015-11-28 10:49:08 +01:00
|
|
|
FILE *outputFile = stdout;
|
2014-03-17 19:11:00 +01:00
|
|
|
__try {
|
2022-03-21 18:35:53 +01:00
|
|
|
return check_internal(cppcheck);
|
2014-03-17 19:11:00 +01:00
|
|
|
} __except (filterException(GetExceptionCode(), GetExceptionInformation())) {
|
2015-03-08 14:24:54 +01:00
|
|
|
// reporting to stdout may not be helpful within a GUI application...
|
2015-11-28 10:49:08 +01:00
|
|
|
fputs("Please report this to the cppcheck developers!\n", outputFile);
|
2014-03-16 18:37:28 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2014-06-28 14:05:18 +02:00
|
|
|
#elif defined(USE_UNIX_SIGNAL_HANDLING)
|
2015-03-07 20:47:27 +01:00
|
|
|
// determine stack vs. heap
|
|
|
|
char stackVariable;
|
|
|
|
char *heapVariable=(char*)malloc(1);
|
|
|
|
bStackBelowHeap = &stackVariable < heapVariable;
|
|
|
|
free(heapVariable);
|
|
|
|
|
|
|
|
// set up alternative stack for signal handler
|
2015-03-07 18:15:25 +01:00
|
|
|
stack_t segv_stack;
|
|
|
|
segv_stack.ss_sp = mytstack;
|
|
|
|
segv_stack.ss_flags = 0;
|
|
|
|
segv_stack.ss_size = MYSTACKSIZE;
|
2015-11-30 22:13:49 +01:00
|
|
|
sigaltstack(&segv_stack, nullptr);
|
2015-03-07 18:15:25 +01:00
|
|
|
|
2015-03-07 20:47:27 +01:00
|
|
|
// install signal handler
|
2014-03-16 18:37:28 +01:00
|
|
|
struct sigaction act;
|
|
|
|
memset(&act, 0, sizeof(act));
|
2015-03-07 18:15:25 +01:00
|
|
|
act.sa_flags=SA_SIGINFO|SA_ONSTACK;
|
2014-03-16 18:37:28 +01:00
|
|
|
act.sa_sigaction=CppcheckSignalHandler;
|
2015-11-14 19:59:22 +01:00
|
|
|
for (std::map<int, std::string>::const_iterator sig=listofsignals.begin(); sig!=listofsignals.end(); ++sig) {
|
2015-11-30 22:13:49 +01:00
|
|
|
sigaction(sig->first, &act, nullptr);
|
2014-03-16 12:04:13 +01:00
|
|
|
}
|
2022-03-21 18:35:53 +01:00
|
|
|
return check_internal(cppcheck);
|
2014-03-16 12:04:13 +01:00
|
|
|
#else
|
2022-03-21 18:35:53 +01:00
|
|
|
return check_internal(cppcheck);
|
2014-03-16 12:04:13 +01:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-03-18 21:14:09 +01:00
|
|
|
/*
|
|
|
|
* That is a method which gets called from check_wrapper
|
|
|
|
* */
|
2022-03-21 18:35:53 +01:00
|
|
|
int CppCheckExecutor::check_internal(CppCheck& cppcheck)
|
2014-03-16 12:04:13 +01:00
|
|
|
{
|
2014-04-07 20:39:19 +02:00
|
|
|
Settings& settings = cppcheck.settings();
|
2019-07-15 18:24:27 +02:00
|
|
|
mSettings = &settings;
|
2022-03-21 18:35:53 +01:00
|
|
|
const bool std = tryLoadLibrary(settings.library, settings.exename, "std.cfg");
|
2019-03-15 06:59:37 +01:00
|
|
|
|
|
|
|
for (const std::string &lib : settings.libraries) {
|
2022-03-21 18:35:53 +01:00
|
|
|
if (!tryLoadLibrary(settings.library, settings.exename, lib.c_str())) {
|
2019-03-15 06:59:37 +01:00
|
|
|
const std::string msg("Failed to load the library " + lib);
|
2020-05-23 07:16:49 +02:00
|
|
|
const std::list<ErrorMessage::FileLocation> callstack;
|
2021-02-24 22:00:06 +01:00
|
|
|
ErrorMessage errmsg(callstack, emptyString, Severity::information, msg, "failedToLoadCfg", Certainty::normal);
|
2019-03-15 06:59:37 +01:00
|
|
|
reportErr(errmsg);
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-21 18:35:53 +01:00
|
|
|
if (!std) {
|
2020-05-23 07:16:49 +02:00
|
|
|
const std::list<ErrorMessage::FileLocation> callstack;
|
2022-03-21 18:35:53 +01:00
|
|
|
const std::string msg("Failed to load std.cfg. Your Cppcheck installation is broken, please re-install.");
|
2019-08-17 10:53:07 +02:00
|
|
|
#ifdef FILESDIR
|
|
|
|
const std::string details("The Cppcheck binary was compiled with FILESDIR set to \""
|
|
|
|
FILESDIR "\" and will therefore search for "
|
|
|
|
"std.cfg in " FILESDIR "/cfg.");
|
2014-01-03 21:59:50 +01:00
|
|
|
#else
|
2022-03-21 18:35:53 +01:00
|
|
|
const std::string cfgfolder(Path::fromNativeSeparators(Path::getPathFromFilename(settings.exename)) + "cfg");
|
2019-08-17 10:53:07 +02:00
|
|
|
const std::string details("The Cppcheck binary was compiled without FILESDIR set. Either the "
|
|
|
|
"std.cfg should be available in " + cfgfolder + " or the FILESDIR "
|
2014-01-03 21:59:50 +01:00
|
|
|
"should be configured.");
|
|
|
|
#endif
|
2021-02-24 22:00:06 +01:00
|
|
|
ErrorMessage errmsg(callstack, emptyString, Severity::information, msg+" "+details, "failedToLoadCfg", Certainty::normal);
|
2013-12-26 11:15:28 +01:00
|
|
|
reportErr(errmsg);
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
2013-12-23 10:06:45 +01:00
|
|
|
|
2012-04-06 14:19:26 +02:00
|
|
|
if (settings.reportProgress)
|
2019-07-15 20:58:07 +02:00
|
|
|
mLatestProgressOutputTime = std::time(nullptr);
|
2010-08-12 21:03:33 +02:00
|
|
|
|
2017-05-30 15:04:28 +02:00
|
|
|
if (!settings.outputFile.empty()) {
|
2019-07-15 18:16:07 +02:00
|
|
|
mErrorOutput = new std::ofstream(settings.outputFile);
|
2017-05-30 15:04:28 +02:00
|
|
|
}
|
|
|
|
|
2016-01-03 16:18:17 +01:00
|
|
|
if (settings.xml) {
|
2022-07-07 17:35:13 +02:00
|
|
|
reportErr(ErrorMessage::getXMLHeader(settings.cppcheckCfgProductName));
|
2009-10-17 08:19:37 +02:00
|
|
|
}
|
2009-02-09 21:51:04 +01:00
|
|
|
|
2016-11-14 20:50:08 +01:00
|
|
|
if (!settings.buildDir.empty()) {
|
2020-12-19 19:02:42 +01:00
|
|
|
settings.loadSummaries();
|
|
|
|
|
2016-12-08 22:46:44 +01:00
|
|
|
std::list<std::string> fileNames;
|
2019-07-15 18:21:52 +02:00
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i)
|
2020-05-11 13:48:54 +02:00
|
|
|
fileNames.emplace_back(i->first);
|
2020-12-19 20:45:51 +01:00
|
|
|
AnalyzerInformation::writeFilesTxt(settings.buildDir, fileNames, settings.userDefines, settings.project.fileSettings);
|
2016-11-14 20:50:08 +01:00
|
|
|
}
|
|
|
|
|
2009-10-17 08:19:37 +02:00
|
|
|
unsigned int returnValue = 0;
|
2016-01-03 16:18:17 +01:00
|
|
|
if (settings.jobs == 1) {
|
2009-10-17 08:19:37 +02:00
|
|
|
// Single process
|
2015-01-07 19:26:16 +01:00
|
|
|
settings.jointSuppressionReport = true;
|
2011-04-19 13:52:32 +02:00
|
|
|
|
2012-07-08 23:39:46 +02:00
|
|
|
std::size_t totalfilesize = 0;
|
2019-07-15 18:21:52 +02:00
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i) {
|
2011-04-19 13:52:32 +02:00
|
|
|
totalfilesize += i->second;
|
|
|
|
}
|
|
|
|
|
2012-07-08 23:39:46 +02:00
|
|
|
std::size_t processedsize = 0;
|
2012-02-19 17:22:59 +01:00
|
|
|
unsigned int c = 0;
|
2019-04-13 20:01:40 +02:00
|
|
|
if (settings.project.fileSettings.empty()) {
|
2019-07-15 18:21:52 +02:00
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i) {
|
2019-07-15 18:24:27 +02:00
|
|
|
if (!mSettings->library.markupFile(i->first)
|
|
|
|
|| !mSettings->library.processMarkupAfterCode(i->first)) {
|
2019-04-13 20:01:40 +02:00
|
|
|
returnValue += cppcheck.check(i->first);
|
|
|
|
processedsize += i->second;
|
|
|
|
if (!settings.quiet)
|
2019-07-15 18:21:52 +02:00
|
|
|
reportStatus(c + 1, mFiles.size(), processedsize, totalfilesize);
|
2019-04-13 20:01:40 +02:00
|
|
|
c++;
|
|
|
|
}
|
2013-10-20 14:09:10 +02:00
|
|
|
}
|
2019-04-13 20:01:40 +02:00
|
|
|
} else {
|
|
|
|
// filesettings
|
2020-01-10 08:57:37 +01:00
|
|
|
// check all files of the project
|
2019-04-13 20:01:40 +02:00
|
|
|
for (const ImportProject::FileSettings &fs : settings.project.fileSettings) {
|
|
|
|
returnValue += cppcheck.check(fs);
|
|
|
|
++c;
|
|
|
|
if (!settings.quiet)
|
|
|
|
reportStatus(c, settings.project.fileSettings.size(), c, settings.project.fileSettings.size());
|
2020-01-31 14:13:52 +01:00
|
|
|
if (settings.clangTidy)
|
|
|
|
cppcheck.analyseClangTidy(fs);
|
2019-04-13 20:01:40 +02:00
|
|
|
}
|
2016-08-13 10:50:03 +02:00
|
|
|
}
|
|
|
|
|
2013-10-31 19:09:01 +01:00
|
|
|
// second loop to parse all markup files which may not work until all
|
2013-10-20 14:09:10 +02:00
|
|
|
// c/cpp files have been parsed and checked
|
2019-07-15 18:21:52 +02:00
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i) {
|
2019-07-15 18:24:27 +02:00
|
|
|
if (mSettings->library.markupFile(i->first) && mSettings->library.processMarkupAfterCode(i->first)) {
|
2014-04-07 20:39:19 +02:00
|
|
|
returnValue += cppcheck.check(i->first);
|
2013-10-20 14:09:10 +02:00
|
|
|
processedsize += i->second;
|
2015-07-25 17:39:44 +02:00
|
|
|
if (!settings.quiet)
|
2019-07-15 18:21:52 +02:00
|
|
|
reportStatus(c + 1, mFiles.size(), processedsize, totalfilesize);
|
2013-10-20 14:09:10 +02:00
|
|
|
c++;
|
|
|
|
}
|
2011-04-23 14:20:55 +02:00
|
|
|
}
|
2018-01-12 08:24:01 +01:00
|
|
|
if (cppcheck.analyseWholeProgram())
|
|
|
|
returnValue++;
|
2011-10-13 20:53:06 +02:00
|
|
|
} else if (!ThreadExecutor::isEnabled()) {
|
2009-10-17 08:19:37 +02:00
|
|
|
std::cout << "No thread support yet implemented for this platform." << std::endl;
|
2011-10-13 20:53:06 +02:00
|
|
|
} else {
|
2009-10-17 08:19:37 +02:00
|
|
|
// Multiple processes
|
2019-07-15 18:21:52 +02:00
|
|
|
ThreadExecutor executor(mFiles, settings, *this);
|
2009-10-17 08:19:37 +02:00
|
|
|
returnValue = executor.check();
|
2009-01-08 22:30:25 +01:00
|
|
|
}
|
2009-10-17 08:19:37 +02:00
|
|
|
|
2019-07-15 18:24:27 +02:00
|
|
|
cppcheck.analyseWholeProgram(mSettings->buildDir, mFiles);
|
2016-11-05 21:26:56 +01:00
|
|
|
|
2021-02-24 22:00:06 +01:00
|
|
|
if (settings.severity.isEnabled(Severity::information) || settings.checkConfiguration) {
|
2016-10-28 12:10:19 +02:00
|
|
|
const bool enableUnusedFunctionCheck = cppcheck.isUnusedFunctionCheckEnabled();
|
2015-01-07 19:26:16 +01:00
|
|
|
|
2019-01-22 19:40:39 +01:00
|
|
|
if (settings.jointSuppressionReport) {
|
2019-07-15 18:21:52 +02:00
|
|
|
for (std::map<std::string, std::size_t>::const_iterator i = mFiles.begin(); i != mFiles.end(); ++i) {
|
2019-01-21 20:33:22 +01:00
|
|
|
const bool err = reportUnmatchedSuppressions(settings.nomsg.getUnmatchedLocalSuppressions(i->first, enableUnusedFunctionCheck));
|
|
|
|
if (err && returnValue == 0)
|
2019-01-19 21:42:01 +01:00
|
|
|
returnValue = settings.exitCode;
|
2015-01-07 19:26:16 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-21 20:33:22 +01:00
|
|
|
const bool err = reportUnmatchedSuppressions(settings.nomsg.getUnmatchedGlobalSuppressions(enableUnusedFunctionCheck));
|
|
|
|
if (err && returnValue == 0)
|
|
|
|
returnValue = settings.exitCode;
|
2015-01-07 19:26:16 +01:00
|
|
|
}
|
2011-05-02 14:58:16 +02:00
|
|
|
|
2013-05-31 15:20:58 +02:00
|
|
|
if (!settings.checkConfiguration) {
|
2014-04-07 20:39:19 +02:00
|
|
|
cppcheck.tooManyConfigsError("",0U);
|
2012-12-26 18:35:49 +01:00
|
|
|
|
2021-02-24 22:00:06 +01:00
|
|
|
if (settings.checks.isEnabled(Checks::missingInclude) && (Preprocessor::missingIncludeFlag || Preprocessor::missingSystemIncludeFlag)) {
|
2020-05-23 07:16:49 +02:00
|
|
|
const std::list<ErrorMessage::FileLocation> callStack;
|
|
|
|
ErrorMessage msg(callStack,
|
|
|
|
emptyString,
|
|
|
|
Severity::information,
|
|
|
|
"Cppcheck cannot find all the include files (use --check-config for details)\n"
|
|
|
|
"Cppcheck cannot find all the include files. Cppcheck can check the code without the "
|
|
|
|
"include files found. But the results will probably be more accurate if all the include "
|
|
|
|
"files are found. Please check your project's include directories and add all of them "
|
|
|
|
"as include directories for Cppcheck. To see what files Cppcheck cannot find use "
|
|
|
|
"--check-config.",
|
|
|
|
Preprocessor::missingIncludeFlag ? "missingInclude" : "missingIncludeSystem",
|
2021-02-24 22:00:06 +01:00
|
|
|
Certainty::normal);
|
2012-06-18 23:15:48 +02:00
|
|
|
reportInfo(msg);
|
2011-05-02 14:58:16 +02:00
|
|
|
}
|
|
|
|
}
|
2011-02-16 02:12:15 +01:00
|
|
|
|
2016-01-03 16:18:17 +01:00
|
|
|
if (settings.xml) {
|
2020-05-23 07:16:49 +02:00
|
|
|
reportErr(ErrorMessage::getXMLFooter());
|
2009-10-17 08:19:37 +02:00
|
|
|
}
|
|
|
|
|
2019-07-15 18:24:27 +02:00
|
|
|
mSettings = nullptr;
|
2010-04-02 07:30:58 +02:00
|
|
|
if (returnValue)
|
2016-01-03 16:18:17 +01:00
|
|
|
return settings.exitCode;
|
2018-04-04 21:11:23 +02:00
|
|
|
return 0;
|
2008-12-18 22:28:57 +01:00
|
|
|
}
|
|
|
|
|
2017-08-21 12:52:15 +02:00
|
|
|
#ifdef _WIN32
|
|
|
|
// fix trac ticket #439 'Cppcheck reports wrong filename for filenames containing 8-bit ASCII'
|
2017-10-03 18:24:18 +02:00
|
|
|
static inline std::string ansiToOEM(const std::string &msg, bool doConvert)
|
2017-08-21 12:52:15 +02:00
|
|
|
{
|
|
|
|
if (doConvert) {
|
2017-08-22 13:15:11 +02:00
|
|
|
const unsigned msglength = msg.length();
|
2017-08-21 12:52:15 +02:00
|
|
|
// convert ANSI strings to OEM strings in two steps
|
2017-08-22 13:15:11 +02:00
|
|
|
std::vector<WCHAR> wcContainer(msglength);
|
|
|
|
std::string result(msglength, '\0');
|
2017-08-21 12:52:15 +02:00
|
|
|
|
|
|
|
// ansi code page characters to wide characters
|
2017-08-22 13:15:11 +02:00
|
|
|
MultiByteToWideChar(CP_ACP, 0, msg.data(), msglength, wcContainer.data(), msglength);
|
2017-08-21 12:52:15 +02:00
|
|
|
// wide characters to oem codepage characters
|
2018-04-05 08:12:15 +02:00
|
|
|
WideCharToMultiByte(CP_OEMCP, 0, wcContainer.data(), msglength, const_cast<char *>(result.data()), msglength, nullptr, nullptr);
|
2017-08-21 12:52:15 +02:00
|
|
|
|
2017-08-22 13:15:11 +02:00
|
|
|
return result; // hope for return value optimization
|
2017-08-21 12:52:15 +02:00
|
|
|
}
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
// no performance regression on non-windows systems
|
2017-08-29 20:23:45 +02:00
|
|
|
#define ansiToOEM(msg, doConvert) (msg)
|
2017-08-21 12:52:15 +02:00
|
|
|
#endif
|
|
|
|
|
2009-01-05 16:49:57 +01:00
|
|
|
void CppCheckExecutor::reportErr(const std::string &errmsg)
|
2008-12-18 22:28:57 +01:00
|
|
|
{
|
2019-07-15 18:16:07 +02:00
|
|
|
if (mErrorOutput)
|
|
|
|
*mErrorOutput << errmsg << std::endl;
|
2017-08-30 17:42:04 +02:00
|
|
|
else {
|
2019-07-15 18:24:27 +02:00
|
|
|
std::cerr << ansiToOEM(errmsg, (mSettings == nullptr) ? true : !mSettings->xml) << std::endl;
|
2017-08-29 16:51:56 +02:00
|
|
|
}
|
2008-12-18 22:28:57 +01:00
|
|
|
}
|
|
|
|
|
2021-07-08 21:21:35 +02:00
|
|
|
void CppCheckExecutor::reportOut(const std::string &outmsg, Color c)
|
2008-12-18 22:28:57 +01:00
|
|
|
{
|
2021-07-08 21:21:35 +02:00
|
|
|
std::cout << c << ansiToOEM(outmsg, true) << Color::Reset << std::endl;
|
2008-12-18 22:28:57 +01:00
|
|
|
}
|
2009-02-01 19:00:47 +01:00
|
|
|
|
2012-07-08 23:39:46 +02:00
|
|
|
void CppCheckExecutor::reportProgress(const std::string &filename, const char stage[], const std::size_t value)
|
2010-08-08 08:45:37 +02:00
|
|
|
{
|
|
|
|
(void)filename;
|
|
|
|
|
2019-07-15 20:58:07 +02:00
|
|
|
if (!mLatestProgressOutputTime)
|
2010-08-12 21:03:33 +02:00
|
|
|
return;
|
|
|
|
|
2010-08-08 08:45:37 +02:00
|
|
|
// Report progress messages every 10 seconds
|
2017-10-14 22:05:58 +02:00
|
|
|
const std::time_t currentTime = std::time(nullptr);
|
2019-07-15 20:58:07 +02:00
|
|
|
if (currentTime >= (mLatestProgressOutputTime + 10)) {
|
|
|
|
mLatestProgressOutputTime = currentTime;
|
2010-08-08 08:45:37 +02:00
|
|
|
|
|
|
|
// format a progress message
|
|
|
|
std::ostringstream ostr;
|
|
|
|
ostr << "progress: "
|
|
|
|
<< stage
|
2012-07-06 13:17:08 +02:00
|
|
|
<< ' ' << value << '%';
|
2010-08-08 08:45:37 +02:00
|
|
|
|
|
|
|
// Report progress message
|
|
|
|
reportOut(ostr.str());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-23 07:16:49 +02:00
|
|
|
void CppCheckExecutor::reportInfo(const ErrorMessage &msg)
|
2012-06-18 23:15:48 +02:00
|
|
|
{
|
2012-07-04 18:21:56 +02:00
|
|
|
reportErr(msg);
|
2012-06-18 23:15:48 +02:00
|
|
|
}
|
|
|
|
|
2012-07-08 23:39:46 +02:00
|
|
|
void CppCheckExecutor::reportStatus(std::size_t fileindex, std::size_t filecount, std::size_t sizedone, std::size_t sizetotal)
|
2009-02-19 23:21:18 +01:00
|
|
|
{
|
2011-10-13 20:53:06 +02:00
|
|
|
if (filecount > 1) {
|
2009-02-19 23:21:18 +01:00
|
|
|
std::ostringstream oss;
|
2017-08-29 16:51:56 +02:00
|
|
|
const long percentDone = (sizetotal > 0) ? static_cast<long>(static_cast<long double>(sizedone) / sizetotal * 100) : 0;
|
2012-02-18 11:55:05 +01:00
|
|
|
oss << fileindex << '/' << filecount
|
2017-08-29 16:51:56 +02:00
|
|
|
<< " files checked " << percentDone
|
2010-04-15 20:08:51 +02:00
|
|
|
<< "% done";
|
2021-07-08 21:21:35 +02:00
|
|
|
std::cout << Color::FgBlue << oss.str() << Color::Reset << std::endl;
|
2009-02-19 23:21:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-23 07:16:49 +02:00
|
|
|
void CppCheckExecutor::reportErr(const ErrorMessage &msg)
|
2009-02-01 19:00:47 +01:00
|
|
|
{
|
2019-07-15 18:31:12 +02:00
|
|
|
if (mShowAllErrors) {
|
2017-07-29 18:56:22 +02:00
|
|
|
reportOut(msg.toXML());
|
2021-04-05 20:09:45 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Alert only about unique errors
|
|
|
|
if (!mShownErrors.insert(msg.toString(mSettings->verbose)).second)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (mSettings->xml)
|
2017-07-29 18:56:22 +02:00
|
|
|
reportErr(msg.toXML());
|
2021-04-05 20:09:45 +02:00
|
|
|
else
|
2019-07-15 18:24:27 +02:00
|
|
|
reportErr(msg.toString(mSettings->verbose, mSettings->templateFormat, mSettings->templateLocation));
|
2009-02-01 19:00:47 +01:00
|
|
|
}
|
2014-05-25 08:47:37 +02:00
|
|
|
|
2019-07-15 18:11:11 +02:00
|
|
|
void CppCheckExecutor::setExceptionOutput(FILE* exceptionOutput)
|
2014-05-25 08:47:37 +02:00
|
|
|
{
|
2019-07-15 18:11:11 +02:00
|
|
|
mExceptionOutput = exceptionOutput;
|
2014-05-25 08:47:37 +02:00
|
|
|
}
|
2014-05-25 15:53:26 +02:00
|
|
|
|
2015-11-25 22:37:38 +01:00
|
|
|
FILE* CppCheckExecutor::getExceptionOutput()
|
2014-05-25 08:47:37 +02:00
|
|
|
{
|
2019-07-15 18:11:11 +02:00
|
|
|
return mExceptionOutput;
|
2014-05-25 08:47:37 +02:00
|
|
|
}
|
2014-05-25 15:53:26 +02:00
|
|
|
|
2022-03-21 18:35:53 +01:00
|
|
|
bool CppCheckExecutor::tryLoadLibrary(Library& destination, const std::string& basepath, const char* filename)
|
2015-01-10 22:18:57 +01:00
|
|
|
{
|
2022-03-21 18:35:53 +01:00
|
|
|
const Library::Error err = destination.load(basepath.c_str(), filename);
|
2015-01-10 22:18:57 +01:00
|
|
|
|
2021-01-08 10:29:01 +01:00
|
|
|
if (err.errorcode == Library::ErrorCode::UNKNOWN_ELEMENT)
|
2015-01-10 22:18:57 +01:00
|
|
|
std::cout << "cppcheck: Found unknown elements in configuration file '" << filename << "': " << err.reason << std::endl;
|
2021-01-08 10:29:01 +01:00
|
|
|
else if (err.errorcode != Library::ErrorCode::OK) {
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "cppcheck: Failed to load library configuration file '" << filename << "'. ";
|
2015-01-10 22:18:57 +01:00
|
|
|
switch (err.errorcode) {
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::OK:
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::FILE_NOT_FOUND:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "File not found";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::BAD_XML:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Bad XML";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::UNKNOWN_ELEMENT:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Unexpected element";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::MISSING_ATTRIBUTE:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Missing attribute";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::BAD_ATTRIBUTE_VALUE:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Bad attribute value";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::UNSUPPORTED_FORMAT:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "File is of unsupported format version";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::DUPLICATE_PLATFORM_TYPE:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Duplicate platform type";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
2021-01-08 10:29:01 +01:00
|
|
|
case Library::ErrorCode::PLATFORM_TYPE_REDEFINED:
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << "Platform type redefined";
|
2015-01-10 22:18:57 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!err.reason.empty())
|
2020-05-13 19:05:15 +02:00
|
|
|
std::cout << " '" + err.reason + "'";
|
|
|
|
std::cout << std::endl;
|
2015-01-10 22:18:57 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2020-05-19 16:04:25 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a shell command and read the output from it. Returns true if command terminated successfully.
|
|
|
|
*/
|
2021-01-09 20:32:38 +01:00
|
|
|
// cppcheck-suppress passedByValue - "exe" copy needed in _WIN32 code
|
2021-07-16 21:55:12 +02:00
|
|
|
bool CppCheckExecutor::executeCommand(std::string exe, std::vector<std::string> args, const std::string &redirect, std::string *output_)
|
2020-05-19 16:04:25 +02:00
|
|
|
{
|
2021-07-16 21:55:12 +02:00
|
|
|
output_->clear();
|
2020-05-19 16:04:25 +02:00
|
|
|
|
|
|
|
std::string joinedArgs;
|
2020-08-23 20:53:44 +02:00
|
|
|
for (const std::string &arg : args) {
|
2020-05-19 16:04:25 +02:00
|
|
|
if (!joinedArgs.empty())
|
|
|
|
joinedArgs += " ";
|
2020-08-30 20:02:18 +02:00
|
|
|
if (arg.find(" ") != std::string::npos)
|
|
|
|
joinedArgs += '"' + arg + '"';
|
|
|
|
else
|
|
|
|
joinedArgs += arg;
|
2020-05-19 16:04:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
// Extra quoutes are needed in windows if filename has space
|
|
|
|
if (exe.find(" ") != std::string::npos)
|
|
|
|
exe = "\"" + exe + "\"";
|
|
|
|
const std::string cmd = exe + " " + joinedArgs + " " + redirect;
|
|
|
|
std::unique_ptr<FILE, decltype(&_pclose)> pipe(_popen(cmd.c_str(), "r"), _pclose);
|
|
|
|
#else
|
|
|
|
const std::string cmd = exe + " " + joinedArgs + " " + redirect;
|
|
|
|
std::unique_ptr<FILE, decltype(&pclose)> pipe(popen(cmd.c_str(), "r"), pclose);
|
|
|
|
#endif
|
|
|
|
if (!pipe)
|
|
|
|
return false;
|
|
|
|
char buffer[1024];
|
|
|
|
while (fgets(buffer, sizeof(buffer), pipe.get()) != nullptr)
|
2021-07-16 21:55:12 +02:00
|
|
|
*output_ += buffer;
|
2020-05-19 16:04:25 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|