Editing PVS static analyzer - 5.0 Release
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 25: | Line 25: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%; text-decoration: line-through;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (27)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v011/ V011]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v011/ V011]</td> | ||
<td style='width: 65%;'>Presence of #line directives may cause some diagnostic messages to have incorrect file name and line number.</td> | <td style='width: 65%;'>Presence of #line directives may cause some diagnostic messages to have incorrect file name and line number.</td> | ||
Line 40: | Line 40: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%; text-decoration: line-through;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (1)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v002/ V002]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v002/ V002]</td> | ||
<td style='width: 65%;'>Some diagnostic messages may contain incorrect line number in this file.</td> | <td style='width: 65%;'>Some diagnostic messages may contain incorrect line number in this file.</td> | ||
Line 5,668: | Line 5,668: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (1485)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v553/ V553]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v553/ V553]</td> | ||
<td style='width: 65%;'>The length of 'octave_lex' function's body is more than 2000 lines long. You should consider refactoring the code.</td> | <td style='width: 65%;'>The length of 'octave_lex' function's body is more than 2000 lines long. You should consider refactoring the code.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3629)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'b->yy_ch_buf' pointer was used unsafely after it was verified against nullptr. Check lines: 3625, 3629.</td> | <td style='width: 65%;'>The 'b->yy_ch_buf' pointer was used unsafely after it was verified against nullptr. Check lines: 3625, 3629.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3619)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | ||
<td style='width: 65%;'>Possible overflow. Consider casting operands of the 'b->yy_buf_size + 2' operator to the 'yy_size_t' type, not the result.</td> | <td style='width: 65%;'>Possible overflow. Consider casting operands of the 'b->yy_buf_size + 2' operator to the 'yy_size_t' type, not the result.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3839)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v779/ V779]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v779/ V779]</td> | ||
<td style='width: 65%;'>Unreachable code detected. It is possible that an error is present.</td> | <td style='width: 65%;'>Unreachable code detected. It is possible that an error is present.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3909)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 3898, 3909.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 3898, 3909.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3943)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 3940, 3943.</td> | <td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 3940, 3943.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (3948)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | ||
<td style='width: 65%;'>Possible overflow. Consider casting operands of the 'b->yy_buf_size + 2' operator to the 'yy_size_t' type, not the result.</td> | <td style='width: 65%;'>Possible overflow. Consider casting operands of the 'b->yy_buf_size + 2' operator to the 'yy_size_t' type, not the result.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4062)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4051, 4062.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4051, 4062.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4080)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4076, 4080.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4076, 4080.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4111)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4108, 4111.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4108, 4111.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4157)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 4154, 4157.</td> | <td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 4154, 4157.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4201)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1028/ V1028]</td> | ||
<td style='width: 65%;'>Possible overflow. Consider casting operands of the '_yybytes_len + 2' operator to the 'yy_size_t' type, not the result.</td> | <td style='width: 65%;'>Possible overflow. Consider casting operands of the '_yybytes_len + 2' operator to the 'yy_size_t' type, not the result.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4209)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'buf' pointer was used unsafely after it was verified against nullptr. Check lines: 4203, 4209.</td> | <td style='width: 65%;'>The 'buf' pointer was used unsafely after it was verified against nullptr. Check lines: 4203, 4209.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4218)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 4212, 4218.</td> | <td style='width: 65%;'>The 'b' pointer was used unsafely after it was verified against nullptr. Check lines: 4212, 4218.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4273)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4270, 4273.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4270, 4273.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4286)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4283, 4286.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4283, 4286.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4348)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4345, 4348.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4345, 4348.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (4363)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1004/ V1004]</td> | ||
<td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4360, 4363.</td> | <td style='width: 65%;'>The 'yyg->yy_buffer_stack' pointer was used unsafely after it was verified against nullptr. Check lines: 4360, 4363.</td> | ||
Line 5,763: | Line 5,763: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td style='width: 30% | <td style='width: 30%;'><div title="/home/pavel/octave/libinterp/parse-tree/lex.cc">lex.cc (389)</div></td> | ||
<td style='width: 5%;'>[https://www.viva64.com/en/w/v1003/ V1003]</td> | <td style='width: 5%;'>[https://www.viva64.com/en/w/v1003/ V1003]</td> | ||
<td style='width: 65%;'>The macro 'YY_STATE_EOF' is a dangerous expression. The parameter 'state' must be surrounded by parentheses.</td> | <td style='width: 65%;'>The macro 'YY_STATE_EOF' is a dangerous expression. The parameter 'state' must be surrounded by parentheses.</td> |