b689ca8d89
* Update cppcheckdata.py - added links to cpp-file/function that writes this part of the dump-file - updated documentation (Added list of possible return values for a number of variables) - added MacroUsage isKnownValue - added ValueType reference - added Token isBoolean - added Token isCast - added Token externLang - added Token isComplex - added Token isRestrict - added Token isAttributeExport - added Token originalName - added Scope functions - added Scope definedType - added Function hasVirtualSpecifier - removed Function isVirtual - added Function isAttributeNoreturn - added Function overriddenFunction - added Variable isVolatile - class Container added - added Value movedValue - added Value uninit - added Value bufferSize - removed Value inconclusive and added it to valueKind * Update cppcheckdata.py removed encoding from open (needed to make python 2.7 check pass) where python 2.7 should not be used anymore * Update cppcheckdata.py after feedback made sure that attributes I added to the class always have a value added some missing attributes in the print |
||
---|---|---|
.. | ||
doc | ||
test | ||
README.md | ||
ROS_naming.json | ||
__init__.py | ||
cppcheck.py | ||
cppcheckdata.doxyfile | ||
cppcheckdata.py | ||
findcasts.py | ||
misc.py | ||
misra.py | ||
misra_9.py | ||
naming.json | ||
naming.py | ||
namingng.py | ||
runaddon.py | ||
threadsafety.py | ||
y2038.py |
README.md
Cppcheck addons
Addons are scripts that analyses Cppcheck dump files to check compatibility with secure coding standards and to locate various issues.
Supported addons
- misra.py
Used to verify compliance with MISRA C 2012 - a proprietary set of guidelines to avoid such questionable code, developed for embedded systems. Since this standard is proprietary, cppcheck does not display error text by specifying only the number of violated rules (for example, [c2012-21.3]). If you want to display full texts for violated rules, you will need to create a text file containing MISRA rules, which you will have to pass when calling the script with
--rule-texts
key. Some examples of rule texts files available in tests directory. - y2038.py Checks Linux system for year 2038 problem safety. This required modified environment. See complete description here.
- threadsafety.py Analyse Cppcheck dump files to locate threadsafety issues like static local objects used by multiple threads.
Usage
Command line interface
cppcheck --addon=misc src/test.c
It is also possible to call scripts as follows:
cppcheck --dump --quiet src/test.c
python misc.py src/test.c.dump
python misra.py --rule-texts=~/misra_rules.txt src/test.c.dump
This allows you to add additional parameters when calling the script (for example, --rule-texts
for misra.py
). The full list of available parameters can be found by calling any script with the --help
flag.
GUI
When using the graphical interface cppcheck-gui
, the selection and configuration of addons is carried out on the tab Addons and tools
in the project settings (Edit Project File
):