cppcheck/addons
Sebastian 8d114a40e4
misra-test.c: Add more tests for rule 14.2 (including FP and FN) (#2399)
Adding more tests for rule 14.2 revealed a false negative when the
loop counter is changed inside the loop.
Corresponding line in the example suite:
https://gitlab.com/MISRA/MISRA-C/MISRA-C-2012/Example-Suite/blob/master/R_14_02.c#L39
Also a false positive has been revealed when the loop counter is
initialized in a function that is called in the first `for` clause.
Corresponding line in the example suite:
https://gitlab.com/MISRA/MISRA-C/MISRA-C-2012/Example-Suite/blob/master/R_14_02.c#L43
2019-11-30 11:27:31 +01:00
..
doc Addons: Add README (#2047) 2019-07-28 07:51:03 +02:00
test misra-test.c: Add more tests for rule 14.2 (including FP and FN) (#2399) 2019-11-30 11:27:31 +01:00
README.md addons: fixup image in README (#2277) 2019-10-17 07:08:10 +02:00
ROS_naming.json Feature/ros naming check (#1511) 2019-01-09 18:16:51 +01:00
__init__.py misra.py: Fix up and improve load rules parser. (#1895) 2019-06-17 21:17:29 +02:00
cert.py cert.py: Add ENV33-C-EX1 exception (#2396) 2019-11-24 10:31:08 +01:00
cppcheckdata.doxyfile
cppcheckdata.py addons: Clean up and clarify addons usage. (#2359) 2019-11-15 20:14:30 +01:00
findcasts.py addons: Change shebang to use Python 3 instead of Python 2 (#2361) 2019-11-15 21:38:20 +01:00
misc.py addons: Change shebang to use Python 3 instead of Python 2 (#2361) 2019-11-15 21:38:20 +01:00
misra.py misra.py: Fix 5.3 FP (#2405) 2019-11-30 10:05:57 +01:00
naming.json Feature/ros naming check (#1511) 2019-01-09 18:16:51 +01:00
naming.py Check for JSON error when parsing addon .json files + fixes (#2374) 2019-11-20 15:37:09 +01:00
namingng.py addons/namingng.py: Fix some PEP 8 and Inspections warnings (#2351) 2019-11-12 09:47:48 +01:00
threadsafety.py addons: Change shebang to use Python 3 instead of Python 2 (#2361) 2019-11-15 21:38:20 +01:00
y2038.py addons: Change shebang to use Python 3 instead of Python 2 (#2361) 2019-11-15 21:38:20 +01:00

README.md

Cppcheck addons

Addons are scripts that analyses Cppcheck dump files to check compatibility with secure coding standards and to locate various issues.

Supported addons

  • cert.py Checks for compliance with the safe programming standard CERT.
  • misra.py Used to verify compliance with MISRA C 2012 - a proprietary set of guidelines to avoid such questionable code, developed for embedded systems. Since this standard is proprietary, cppcheck does not display error text by specifying only the number of violated rules (for example, [c2012-21.3]). If you want to display full texts for violated rules, you will need to create a text file containing MISRA rules, which you will have to pass when calling the script with --rule-texts key. Some examples of rule texts files available in tests directory.
  • y2038.py Checks Linux system for year 2038 problem safety. This required modified environment. See complete description here.
  • threadsafety.py Analyse Cppcheck dump files to locate threadsafety issues like static local objects used by multiple threads.

Usage

Command line interface

cppcheck --addon=cert --addon=y2038 src/test.c

It is also possible to call scripts as follows:

cppcheck --dump --quiet src/test.c
python cert.py src/test.c.dump
python misra.py --rules-texts=~/misra_rules.txt src/test.c.dump

This allows you to add additional parameters when calling the script (for example, --rule-tests for misra.py). The full list of available parameters can be found by calling any script with the --help flag.

GUI

When using the graphical interface cppcheck-gui, the selection and configuration of addons is carried out on the tab Addons and tools in the project settings (Edit Project File):

Screenshot