d977761e76
* addons: Reduce memory consumption Parse dump files incrementaly using ElementTree.iterparse. Clean unused resources during parsing. This method is explained in following article: https://www.ibm.com/developerworks/xml/library/x-hiperfparse/ Memory consumption was reduced about 30% (measured with mprof), execution time increased about 5% (measured with time utility). More description available in PR. * Switch to lxml and update iterparse routines Use lxml module instead default xml.etree. Lxml provides convenient wrappers around iterparse method that accepts `tag` argument. That easer incremental parsing routines to select specific tags from roottree like `dump` and `dumps`. Element.clear() method was replaced by `lxml_clean` because lxml keeps additional information to nodes that should be removed. Added note about large consumption RAM on large dump files. This commit doesn't solve this problem completely, but provides a way to improve current parser to add incremental Configuration serialization later. * Working on iterative parser * Added iterative Configurations parser * fix * Fix varlist iteration * make sure that standards node was loaded |
||
---|---|---|
.. | ||
doc | ||
test | ||
README.md | ||
ROS_naming.json | ||
__init__.py | ||
cert.py | ||
cppcheckdata.doxyfile | ||
cppcheckdata.py | ||
findcasts.py | ||
misc.py | ||
misra.py | ||
naming.json | ||
naming.py | ||
namingng.py | ||
threadsafety.py | ||
y2038.py |
README.md
Cppcheck addons
Addons are scripts that analyses Cppcheck dump files to check compatibility with secure coding standards and to locate various issues.
Supported addons
- cert.py Checks for compliance with the safe programming standard CERT.
- misra.py
Used to verify compliance with MISRA C 2012 - a proprietary set of guidelines to avoid such questionable code, developed for embedded systems. Since this standard is proprietary, cppcheck does not display error text by specifying only the number of violated rules (for example, [c2012-21.3]). If you want to display full texts for violated rules, you will need to create a text file containing MISRA rules, which you will have to pass when calling the script with
--rule-texts
key. Some examples of rule texts files available in tests directory. - y2038.py Checks Linux system for year 2038 problem safety. This required modified environment. See complete description here.
- threadsafety.py Analyse Cppcheck dump files to locate threadsafety issues like static local objects used by multiple threads.
Usage
Command line interface
cppcheck --addon=cert --addon=y2038 src/test.c
It is also possible to call scripts as follows:
cppcheck --dump --quiet src/test.c
python cert.py src/test.c.dump
python misra.py --rules-texts=~/misra_rules.txt src/test.c.dump
This allows you to add additional parameters when calling the script (for example, --rule-tests
for misra.py
). The full list of available parameters can be found by calling any script with the --help
flag.
GUI
When using the graphical interface cppcheck-gui
, the selection and configuration of addons is carried out on the tab Addons and tools
in the project settings (Edit Project File
):