2015-01-30 07:52:32 +01:00
|
|
|
|
|
|
|
// Test library configuration for posix.cfg
|
|
|
|
//
|
|
|
|
// Usage:
|
2015-02-16 22:19:51 +01:00
|
|
|
// $ cppcheck --check-library --library=posix --enable=information --error-exitcode=1 --inline-suppr --suppress=missingIncludeSystem test/cfg/posix.c
|
2015-01-30 07:52:32 +01:00
|
|
|
// =>
|
|
|
|
// No warnings about bad library configuration, unmatched suppressions, etc. exitcode=0
|
|
|
|
//
|
|
|
|
|
2015-03-08 15:21:50 +01:00
|
|
|
#include <stdlib.h>
|
2015-02-15 18:11:09 +01:00
|
|
|
#include <stdio.h> // <- FILE
|
|
|
|
#include <dirent.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <sys/socket.h>
|
2021-05-03 09:39:33 +02:00
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
2019-01-10 21:14:37 +01:00
|
|
|
#include <dlfcn.h>
|
2015-02-15 18:11:09 +01:00
|
|
|
#include <fcntl.h>
|
2015-03-15 13:28:16 +01:00
|
|
|
// unavailable on some linux systems #include <ndbm.h>
|
2015-02-21 11:08:58 +01:00
|
|
|
#include <netdb.h>
|
2015-02-20 20:50:20 +01:00
|
|
|
#include <regex.h>
|
2015-03-11 18:59:34 +01:00
|
|
|
#include <time.h>
|
|
|
|
#include <unistd.h>
|
2018-07-21 17:52:12 +02:00
|
|
|
#include <pthread.h>
|
2019-09-06 10:16:11 +02:00
|
|
|
#include <syslog.h>
|
|
|
|
#include <stdarg.h>
|
2020-02-22 14:49:36 +01:00
|
|
|
#include <ctype.h>
|
|
|
|
#include <stdbool.h>
|
2021-07-10 18:41:36 +02:00
|
|
|
#include <wchar.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
2021-07-11 16:42:19 +02:00
|
|
|
char * overlappingWriteFunction_stpcpy(char *src, char *dest)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
(void) stpcpy(dest, src);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
return stpcpy(src, src);
|
|
|
|
}
|
|
|
|
|
2021-07-11 16:38:25 +02:00
|
|
|
void overlappingWriteFunction_bcopy(char *buf, const size_t count)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
// cppcheck-suppress bcopyCalled
|
|
|
|
bcopy(&buf[0], &buf[3], count); // size is not known
|
|
|
|
// cppcheck-suppress bcopyCalled
|
|
|
|
bcopy(&buf[0], &buf[3], 3U); // no-overlap
|
|
|
|
// cppcheck-suppress bcopyCalled
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
bcopy(&buf[0], &buf[3], 4U);
|
|
|
|
}
|
|
|
|
|
2021-07-10 18:41:36 +02:00
|
|
|
void overlappingWriteFunction_memccpy(unsigned char *src, unsigned char *dest, int c, size_t count)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
(void)memccpy(dest, src, c, count);
|
|
|
|
(void)memccpy(dest, src, 42, count);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
(void)memccpy(dest, dest, c, 4);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
(void)memccpy(dest, dest+3, c, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
void overlappingWriteFunction_stpncpy(char *src, char *dest, ssize_t n)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
(void) stpncpy(dest, src, n);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
(void)stpncpy(src, src+3, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
wchar_t* overlappingWriteFunction_wcpncpy(wchar_t *src, wchar_t *dest, ssize_t n)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
(void) wcpncpy(dest, src, n);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
return wcpncpy(src, src+3, 4);
|
|
|
|
}
|
2020-02-22 14:49:36 +01:00
|
|
|
|
2021-07-10 18:28:26 +02:00
|
|
|
void overlappingWriteFunction_swab(char *src, char *dest, ssize_t n)
|
|
|
|
{
|
|
|
|
// No warning shall be shown:
|
|
|
|
swab(dest, src, n);
|
|
|
|
// cppcheck-suppress overlappingWriteFunction
|
|
|
|
swab(src, src+3, 4);
|
|
|
|
}
|
|
|
|
|
2020-02-22 14:49:36 +01:00
|
|
|
bool invalidFunctionArgBool_isascii(bool b, int c)
|
|
|
|
{
|
|
|
|
// cppcheck-suppress invalidFunctionArgBool
|
|
|
|
(void)isascii(b);
|
|
|
|
// cppcheck-suppress invalidFunctionArgBool
|
|
|
|
return isascii(c != 0);
|
|
|
|
}
|
2015-02-15 18:11:09 +01:00
|
|
|
|
2019-10-21 10:09:20 +02:00
|
|
|
void uninitvar_putenv(char * envstr)
|
|
|
|
{
|
|
|
|
// No warning is expected
|
|
|
|
(void)putenv(envstr);
|
|
|
|
|
|
|
|
char * p;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
(void)putenv(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
void nullPointer_putenv(char * envstr)
|
|
|
|
{
|
|
|
|
// No warning is expected
|
|
|
|
(void)putenv(envstr);
|
|
|
|
|
|
|
|
char * p=NULL;
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
(void)putenv(p);
|
|
|
|
}
|
|
|
|
|
2019-05-25 23:32:28 +02:00
|
|
|
void memleak_scandir(void)
|
|
|
|
{
|
|
|
|
struct dirent **namelist;
|
|
|
|
int n = scandir(".", &namelist, NULL, alphasort);
|
|
|
|
if (n == -1) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// http://man7.org/linux/man-pages/man3/scandir.3.html
|
|
|
|
/* The scandir() function scans the directory dirp, calling filter() on
|
|
|
|
each directory entry. Entries for which filter() returns nonzero are
|
|
|
|
stored in strings allocated via malloc(3), sorted using qsort(3) with
|
|
|
|
the comparison function compar(), and collected in array namelist
|
|
|
|
which is allocated via malloc(3). If filter is NULL, all entries are
|
|
|
|
selected.*/
|
|
|
|
|
|
|
|
// TODO: cppcheck-suppress memleak
|
|
|
|
}
|
|
|
|
|
|
|
|
void no_memleak_scandir(void)
|
|
|
|
{
|
|
|
|
struct dirent **namelist;
|
|
|
|
int n = scandir(".", &namelist, NULL, alphasort);
|
|
|
|
if (n == -1) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
while (n--) {
|
|
|
|
free(namelist[n]);
|
|
|
|
}
|
|
|
|
free(namelist);
|
|
|
|
}
|
|
|
|
|
2019-09-06 10:16:11 +02:00
|
|
|
void validCode(va_list valist_arg1, va_list valist_arg2)
|
2019-05-03 16:35:15 +02:00
|
|
|
{
|
|
|
|
void *ptr;
|
|
|
|
if (posix_memalign(&ptr, sizeof(void *), sizeof(void *)) == 0)
|
|
|
|
free(ptr);
|
2019-09-06 10:16:11 +02:00
|
|
|
syslog(LOG_ERR, "err %u", 0U);
|
|
|
|
syslog(LOG_WARNING, "warn %d %d", 5, 1);
|
|
|
|
vsyslog(LOG_EMERG, "emerg %d", valist_arg1);
|
|
|
|
vsyslog(LOG_INFO, "test %s %d %p", valist_arg2);
|
2019-09-06 16:37:51 +02:00
|
|
|
|
|
|
|
void* handle = dlopen("/lib.so", RTLD_NOW);
|
|
|
|
if (handle) {
|
|
|
|
dlclose(handle);
|
|
|
|
}
|
2019-05-03 16:35:15 +02:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void bufferAccessOutOfBounds(int fd)
|
|
|
|
{
|
|
|
|
char a[5];
|
|
|
|
read(fd,a,5);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
read(fd,a,6);
|
|
|
|
write(fd,a,5);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
write(fd,a,6);
|
|
|
|
recv(fd,a,5,0);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
recv(fd,a,6,0);
|
|
|
|
recvfrom(fd,a,5,0,0x0,0x0);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
recvfrom(fd,a,6,0,0x0,0x0);
|
|
|
|
send(fd,a,5,0);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
send(fd,a,6,0);
|
|
|
|
sendto(fd,a,5,0,0x0,0x0);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
sendto(fd,a,6,0,0x0,0x0);
|
|
|
|
// cppcheck-suppress constStatement
|
|
|
|
0;
|
2018-05-09 18:20:45 +02:00
|
|
|
readlink("path", a, 5);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
readlink("path", a, 6);
|
|
|
|
readlinkat(1, "path", a, 5);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
readlinkat(1, "path", a, 6);
|
2018-07-18 09:40:06 +02:00
|
|
|
// This is valid
|
|
|
|
gethostname(a, 5);
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
gethostname(a, 6);
|
2015-02-10 17:29:36 +01:00
|
|
|
}
|
|
|
|
|
2018-07-21 17:52:12 +02:00
|
|
|
void nullPointer(char *p, int fd, pthread_mutex_t mutex)
|
2015-08-14 01:36:44 +02:00
|
|
|
{
|
2015-03-13 18:29:46 +01:00
|
|
|
// cppcheck-suppress ignoredReturnValue
|
2015-08-14 01:36:44 +02:00
|
|
|
isatty(0);
|
|
|
|
mkdir(p, 0);
|
|
|
|
getcwd(0, 0);
|
2015-01-30 07:52:32 +01:00
|
|
|
// cppcheck-suppress nullPointer
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress readdirCalled
|
2015-08-14 01:36:44 +02:00
|
|
|
readdir(0);
|
2015-03-08 14:43:25 +01:00
|
|
|
// cppcheck-suppress nullPointer
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress utimeCalled
|
2015-03-08 14:43:25 +01:00
|
|
|
utime(NULL, NULL);
|
2017-04-29 17:57:16 +02:00
|
|
|
// not implemented yet: cppcheck-suppress nullPointer
|
2017-04-26 14:25:14 +02:00
|
|
|
read(fd,NULL,42);
|
2017-04-29 17:57:16 +02:00
|
|
|
read(fd,NULL,0);
|
|
|
|
// not implemented yet: cppcheck-suppress nullPointer
|
2017-04-26 14:25:14 +02:00
|
|
|
write(fd,NULL,42);
|
2017-04-29 17:57:16 +02:00
|
|
|
write(fd,NULL,0);
|
2018-01-18 13:56:36 +01:00
|
|
|
// cppcheck-suppress leakReturnValNotUsed
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
open(NULL, 0);
|
|
|
|
// cppcheck-suppress leakReturnValNotUsed
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
open(NULL, 0, 0);
|
2018-01-22 14:54:14 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
int ret = access(NULL, 0);
|
2018-01-29 11:19:31 +01:00
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
// cppcheck-suppress leakReturnValNotUsed
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
fdopen(fd, NULL);
|
2018-01-31 10:58:30 +01:00
|
|
|
// cppcheck-suppress strtokCalled
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
strtok(p, NULL);
|
2018-07-21 17:52:12 +02:00
|
|
|
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
pthread_mutex_init(NULL, NULL);
|
|
|
|
// Second argument can be NULL
|
|
|
|
pthread_mutex_init(&mutex, NULL);
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
pthread_mutex_destroy(NULL);
|
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
pthread_mutex_lock(NULL);
|
|
|
|
// cppcheck-suppress nullPointer
|
2019-07-07 12:57:02 +02:00
|
|
|
(void)pthread_mutex_trylock(NULL);
|
2018-07-21 17:52:12 +02:00
|
|
|
// cppcheck-suppress nullPointer
|
|
|
|
pthread_mutex_unlock(NULL);
|
2015-01-30 07:52:32 +01:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void memleak_getaddrinfo()
|
|
|
|
{
|
|
|
|
//TODO: nothing to report yet, see http://sourceforge.net/p/cppcheck/discussion/general/thread/d9737d5d/
|
|
|
|
struct addrinfo * res=NULL;
|
|
|
|
getaddrinfo("node", NULL, NULL, &res);
|
|
|
|
freeaddrinfo(res);
|
2015-02-21 11:08:58 +01:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void memleak_mmap(int fd)
|
|
|
|
{
|
2021-05-13 23:08:58 +02:00
|
|
|
// cppcheck-suppress unusedAllocatedMemory
|
2015-02-16 22:19:51 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
2015-02-15 18:11:09 +01:00
|
|
|
void *addr = mmap(NULL, 255, PROT_NONE, MAP_PRIVATE, fd, 0);
|
|
|
|
// cppcheck-suppress memleak
|
|
|
|
}
|
|
|
|
|
2020-10-29 13:17:33 +01:00
|
|
|
void * memleak_mmap2() // #8327
|
|
|
|
{
|
|
|
|
void * data = mmap(NULL, 10, PROT_READ, MAP_PRIVATE, 1, 0);
|
|
|
|
if (data != MAP_FAILED)
|
|
|
|
return data;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-01-30 08:43:15 +01:00
|
|
|
void resourceLeak_fdopen(int fd)
|
|
|
|
{
|
2018-01-29 11:19:31 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
2015-02-15 18:11:09 +01:00
|
|
|
FILE *f = fdopen(fd, "r");
|
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
}
|
|
|
|
|
2019-05-16 15:53:22 +02:00
|
|
|
void resourceLeak_mkstemp(char *template)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fp = mkstemp(template);
|
|
|
|
// cppcheck-suppress resourceLeak
|
2019-05-16 15:53:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void no_resourceLeak_mkstemp_01(char *template)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
int fp = mkstemp(template);
|
|
|
|
close(fp);
|
2019-05-16 15:53:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int no_resourceLeak_mkstemp_02(char *template)
|
|
|
|
{
|
2019-05-17 09:32:14 +02:00
|
|
|
return mkstemp(template);
|
2019-05-16 15:53:22 +02:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void resourceLeak_fdopendir(int fd)
|
|
|
|
{
|
2015-02-16 22:19:51 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
2015-02-15 18:11:09 +01:00
|
|
|
DIR* leak1 = fdopendir(fd);
|
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void resourceLeak_opendir(void)
|
|
|
|
{
|
2015-02-16 22:19:51 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
2015-02-15 18:11:09 +01:00
|
|
|
DIR* leak1 = opendir("abc");
|
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void resourceLeak_socket(void)
|
|
|
|
{
|
2015-02-16 22:19:51 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
2015-02-15 18:11:09 +01:00
|
|
|
int s = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
}
|
|
|
|
|
2018-01-18 13:56:36 +01:00
|
|
|
void resourceLeak_open1(void)
|
|
|
|
{
|
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fd = open("file", O_RDWR | O_CREAT);
|
2018-01-19 23:26:28 +01:00
|
|
|
// cppcheck-suppress resourceLeak
|
2018-01-18 13:56:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void resourceLeak_open2(void)
|
|
|
|
{
|
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
int fd = open("file", O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
2018-01-19 23:26:28 +01:00
|
|
|
// cppcheck-suppress resourceLeak
|
2018-01-18 13:56:36 +01:00
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void noleak(int x, int y, int z)
|
|
|
|
{
|
|
|
|
DIR *p1 = fdopendir(x);
|
|
|
|
closedir(p1);
|
|
|
|
DIR *p2 = opendir("abc");
|
|
|
|
closedir(p2);
|
|
|
|
int s = socket(AF_INET,SOCK_STREAM,0);
|
|
|
|
close(s);
|
2018-01-18 13:56:36 +01:00
|
|
|
int fd1 = open("a", O_RDWR | O_CREAT);
|
|
|
|
close(fd1);
|
|
|
|
int fd2 = open("a", O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
|
|
|
close(fd2);
|
2015-08-14 01:36:44 +02:00
|
|
|
/* TODO: add configuration for open/fdopen
|
|
|
|
// #2830
|
|
|
|
int fd = open("path", O_RDONLY);
|
|
|
|
FILE *f = fdopen(fd, "rt");
|
|
|
|
fclose(f);
|
|
|
|
*/
|
2015-02-15 18:11:09 +01:00
|
|
|
}
|
2015-02-16 16:25:27 +01:00
|
|
|
|
|
|
|
|
|
|
|
// unused return value
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void ignoredReturnValue(void *addr, int fd)
|
|
|
|
{
|
2015-02-16 22:19:51 +01:00
|
|
|
// cppcheck-suppress ignoredReturnValue
|
2015-02-16 16:25:27 +01:00
|
|
|
// cppcheck-suppress leakReturnValNotUsed
|
|
|
|
mmap(addr, 255, PROT_NONE, MAP_PRIVATE, fd, 0);
|
|
|
|
// cppcheck-suppress ignoredReturnValue
|
2015-02-16 22:19:51 +01:00
|
|
|
getuid();
|
2018-01-22 14:54:14 +01:00
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
access("filename", 1);
|
2020-09-30 15:44:06 +02:00
|
|
|
// no ignoredReturnValue shall be shown for
|
|
|
|
setuid(42);
|
2015-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// valid range
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void invalidFunctionArg()
|
|
|
|
{
|
2015-02-16 16:25:27 +01:00
|
|
|
// cppcheck-suppress invalidFunctionArg
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress usleepCalled
|
2015-02-16 16:25:27 +01:00
|
|
|
usleep(-1);
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress usleepCalled
|
2015-02-16 16:25:27 +01:00
|
|
|
usleep(0);
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress usleepCalled
|
2015-02-16 16:25:27 +01:00
|
|
|
usleep(999999);
|
|
|
|
// cppcheck-suppress invalidFunctionArg
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress usleepCalled
|
2015-02-16 16:25:27 +01:00
|
|
|
usleep(1000000);
|
|
|
|
}
|
2015-02-17 18:08:19 +01:00
|
|
|
|
2019-04-21 12:28:17 +02:00
|
|
|
void invalidFunctionArg_close(int fd)
|
|
|
|
{
|
|
|
|
if (fd < 0) {
|
|
|
|
// cppcheck-suppress invalidFunctionArg
|
|
|
|
(void)close(fd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void uninitvar(int fd)
|
|
|
|
{
|
2019-03-02 19:38:11 +01:00
|
|
|
int x1, x2, x3, x4;
|
2015-02-17 18:08:19 +01:00
|
|
|
char buf[2];
|
2015-08-14 01:36:44 +02:00
|
|
|
int decimal, sign;
|
2015-03-08 15:21:50 +01:00
|
|
|
double d;
|
2015-09-10 11:50:47 +02:00
|
|
|
void *p;
|
2019-03-02 19:38:11 +01:00
|
|
|
pthread_mutex_t mutex, mutex1, mutex2, mutex3;
|
2015-02-17 18:08:19 +01:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
write(x1,"ab",2);
|
2018-01-10 15:52:06 +01:00
|
|
|
// TODO cppcheck-suppress uninitvar
|
2015-09-10 13:23:34 +02:00
|
|
|
write(fd,buf,2); // #6325
|
2015-02-17 18:08:19 +01:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
write(fd,"ab",x2);
|
2015-09-10 11:50:47 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
write(fd,p,2);
|
2015-08-14 01:36:44 +02:00
|
|
|
|
|
|
|
|
2015-02-20 20:50:20 +01:00
|
|
|
/* int regcomp(regex_t *restrict preg, const char *restrict pattern, int cflags); */
|
|
|
|
regex_t reg;
|
|
|
|
const char * pattern;
|
2019-03-02 19:38:11 +01:00
|
|
|
int cflags1, cflags2;
|
2015-02-20 20:50:20 +01:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
regcomp(®, pattern, cflags1);
|
2015-02-20 20:50:20 +01:00
|
|
|
pattern="";
|
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
regcomp(®, pattern, cflags2);
|
2015-08-14 01:36:44 +02:00
|
|
|
regerror(0, ®, 0, 0);
|
2018-02-22 12:27:46 +01:00
|
|
|
#ifndef __CYGWIN__
|
2015-03-01 20:18:26 +01:00
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
// cppcheck-suppress unreadVariable
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress ecvtCalled
|
2015-03-01 20:18:26 +01:00
|
|
|
char *buffer = ecvt(d, 11, &decimal, &sign);
|
2018-02-22 12:27:46 +01:00
|
|
|
#endif
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress gcvtCalled
|
2015-03-14 19:40:13 +01:00
|
|
|
gcvt(3.141, 2, buf);
|
2015-08-14 01:36:44 +02:00
|
|
|
|
2015-03-08 21:38:43 +01:00
|
|
|
char *filename;
|
|
|
|
struct utimbuf *times;
|
|
|
|
// cppcheck-suppress uninitvar
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress utimeCalled
|
2015-03-08 21:38:43 +01:00
|
|
|
utime(filename, times);
|
|
|
|
struct timeval times1[2];
|
|
|
|
// cppcheck-suppress uninitvar
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress utimeCalled
|
2015-03-08 21:38:43 +01:00
|
|
|
utime(filename, times1);
|
2018-01-23 18:15:37 +01:00
|
|
|
|
2018-01-22 14:54:14 +01:00
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
int access_ret = access("file", x3);
|
2018-01-29 11:19:31 +01:00
|
|
|
|
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
// cppcheck-suppress leakReturnValNotUsed
|
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
fdopen(x4, "rw");
|
2018-01-31 10:58:30 +01:00
|
|
|
|
|
|
|
char *strtok_arg1;
|
|
|
|
// cppcheck-suppress strtokCalled
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
strtok(strtok_arg1, ";");
|
2018-07-21 17:52:12 +02:00
|
|
|
|
2021-05-22 07:39:27 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
pthread_mutex_lock(&mutex1);
|
2021-05-22 07:39:27 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-07-07 12:57:02 +02:00
|
|
|
(void)pthread_mutex_trylock(&mutex2);
|
2021-05-22 07:39:27 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
pthread_mutex_unlock(&mutex3);
|
2018-07-21 17:52:12 +02:00
|
|
|
// after initialization it must be OK to call lock, trylock and unlock for this mutex
|
|
|
|
pthread_mutex_init(&mutex, NULL);
|
|
|
|
pthread_mutex_lock(&mutex);
|
2019-07-07 12:57:02 +02:00
|
|
|
(void)pthread_mutex_trylock(&mutex);
|
2018-07-21 17:52:12 +02:00
|
|
|
pthread_mutex_unlock(&mutex);
|
2015-02-17 18:08:19 +01:00
|
|
|
}
|
2015-02-17 18:16:29 +01:00
|
|
|
|
2015-11-25 11:02:32 +01:00
|
|
|
void uninitvar_getcwd(void)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
size_t size;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
(void)getcwd(buf,size);
|
|
|
|
}
|
|
|
|
|
2015-03-08 21:38:43 +01:00
|
|
|
|
2015-08-14 01:36:44 +02:00
|
|
|
void uninitvar_types(void)
|
|
|
|
{
|
2015-02-17 19:58:07 +01:00
|
|
|
// cppcheck-suppress unassignedVariable
|
2015-02-17 18:16:29 +01:00
|
|
|
blkcnt_t b;
|
|
|
|
// cppcheck-suppress uninitvar
|
2015-02-17 19:58:07 +01:00
|
|
|
b + 1;
|
2015-02-17 18:16:29 +01:00
|
|
|
|
2015-02-17 19:58:07 +01:00
|
|
|
struct dirent d;
|
2019-03-09 15:41:07 +01:00
|
|
|
// TODO cppcheck-suppress uninitvar
|
2015-02-17 19:58:07 +01:00
|
|
|
d.d_ino + 1;
|
2015-02-17 18:16:29 +01:00
|
|
|
}
|
2015-03-11 18:59:34 +01:00
|
|
|
|
2015-09-09 08:53:12 +02:00
|
|
|
void timet_h(struct timespec* ptp1)
|
2015-08-14 01:36:44 +02:00
|
|
|
{
|
2019-03-02 19:38:11 +01:00
|
|
|
clockid_t clk_id1, clk_id2, clk_id3;
|
2015-08-14 01:36:44 +02:00
|
|
|
struct timespec* ptp;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
clock_settime(CLOCK_REALTIME, ptp);
|
2015-09-09 08:53:12 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
clock_settime(clk_id1, ptp);
|
2015-09-09 08:53:12 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
clock_settime(clk_id2, ptp1);
|
2015-09-09 08:53:12 +02:00
|
|
|
|
|
|
|
struct timespec tp;
|
2018-01-10 15:52:06 +01:00
|
|
|
// TODO cppcheck-suppress uninitvar
|
2015-09-09 08:53:12 +02:00
|
|
|
clock_settime(CLOCK_REALTIME, &tp); // #6577 - false negative
|
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-02 19:38:11 +01:00
|
|
|
clock_settime(clk_id3, &tp);
|
2015-08-14 01:36:44 +02:00
|
|
|
|
|
|
|
time_t clock = time(0);
|
|
|
|
char buf[26];
|
2015-11-22 17:52:47 +01:00
|
|
|
// cppcheck-suppress ctime_rCalled
|
2015-08-14 01:36:44 +02:00
|
|
|
ctime_r(&clock, buf);
|
2015-03-11 18:59:34 +01:00
|
|
|
}
|
2019-01-10 21:14:37 +01:00
|
|
|
|
|
|
|
void dl(const char* libname, const char* func)
|
|
|
|
{
|
|
|
|
void* lib = dlopen(libname, RTLD_NOW);
|
2019-09-04 13:38:19 +02:00
|
|
|
// cppcheck-suppress redundantInitialization
|
2019-01-10 21:14:37 +01:00
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
lib = dlopen(libname, RTLD_LAZY);
|
|
|
|
const char* funcname;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
// cppcheck-suppress unreadVariable
|
|
|
|
void* sym = dlsym(lib, funcname);
|
2019-01-12 21:50:02 +01:00
|
|
|
// cppcheck-suppress ignoredReturnValue
|
|
|
|
dlsym(lib, "foo");
|
2019-01-10 21:14:37 +01:00
|
|
|
void* uninit;
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
dlclose(uninit);
|
|
|
|
// cppcheck-suppress resourceLeak
|
|
|
|
}
|
2019-03-17 14:22:26 +01:00
|
|
|
|
|
|
|
void asctime_r_test(struct tm * tm, char * bufSizeUnknown)
|
|
|
|
{
|
|
|
|
struct tm tm_uninit_data;
|
|
|
|
struct tm * tm_uninit_pointer;
|
|
|
|
char bufSize5[5];
|
|
|
|
char bufSize25[25];
|
|
|
|
char bufSize26[26];
|
|
|
|
char bufSize100[100];
|
|
|
|
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
asctime_r(tm, bufSize5);
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
asctime_r(tm, bufSize25);
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
asctime_r(tm, bufSize26);
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
asctime_r(tm, bufSize100);
|
|
|
|
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
2021-05-22 07:39:27 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-17 14:22:26 +01:00
|
|
|
asctime_r(&tm_uninit_data, bufSize100);
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
asctime_r(tm_uninit_pointer, bufSize100);
|
|
|
|
|
|
|
|
// cppcheck-suppress asctime_rCalled
|
|
|
|
asctime_r(tm, bufSizeUnknown);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ctime_r_test(time_t * timep, char * bufSizeUnknown)
|
|
|
|
{
|
|
|
|
time_t time_t_uninit_data;
|
|
|
|
time_t * time_t_uninit_pointer;
|
|
|
|
char bufSize5[5];
|
|
|
|
char bufSize25[25];
|
|
|
|
char bufSize26[26];
|
|
|
|
char bufSize100[100];
|
|
|
|
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
ctime_r(timep, bufSize5);
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
// cppcheck-suppress bufferAccessOutOfBounds
|
|
|
|
ctime_r(timep, bufSize25);
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
ctime_r(timep, bufSize26);
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
ctime_r(timep, bufSize100);
|
|
|
|
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
2021-05-22 07:39:27 +02:00
|
|
|
// cppcheck-suppress uninitvar
|
2019-03-17 14:22:26 +01:00
|
|
|
ctime_r(&time_t_uninit_data, bufSize100);
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
// cppcheck-suppress uninitvar
|
|
|
|
ctime_r(time_t_uninit_pointer, bufSize100);
|
|
|
|
|
|
|
|
// cppcheck-suppress ctime_rCalled
|
|
|
|
ctime_r(timep, bufSizeUnknown);
|
|
|
|
}
|