diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2022-09-28 14:33:23 +1000 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2022-09-29 12:22:13 +0200 |
commit | e2b7d370d08257c14d9288d6b7534d45d57c6816 (patch) | |
tree | 2d983354d69bf8cad6e58497bb22802293db911a /util.h | |
parent | df74984c520cb7a5141e7a46c5c1c71bf31355b7 (diff) | |
download | passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar.gz passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar.bz2 passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar.lz passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar.xz passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.tar.zst passt-e2b7d370d08257c14d9288d6b7534d45d57c6816.zip |
cppcheck: Work around false positive NULL pointer dereference error
Some versions of cppcheck could errneously report a NULL pointer deference
inside a sizeof(). This is now fixed in cppcheck upstream[0]. For systems
using an affected version, add a suppression to work around the bug. Also
add an unmatchedSuppression suppression so the suppression itself doesn't
cause a warning if you *do* have a fixed cppcheck.
[0] https://github.com/danmar/cppcheck/pull/4471
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'util.h')
0 files changed, 0 insertions, 0 deletions