From e2b7d370d08257c14d9288d6b7534d45d57c6816 Mon Sep 17 00:00:00 2001 From: David Gibson Date: Wed, 28 Sep 2022 14:33:23 +1000 Subject: cppcheck: Work around false positive NULL pointer dereference error Some versions of cppcheck could errneously report a NULL pointer deference inside a sizeof(). This is now fixed in cppcheck upstream[0]. For systems using an affected version, add a suppression to work around the bug. Also add an unmatchedSuppression suppression so the suppression itself doesn't cause a warning if you *do* have a fixed cppcheck. [0] https://github.com/danmar/cppcheck/pull/4471 Signed-off-by: David Gibson Signed-off-by: Stefano Brivio --- tcp.c | 1 + 1 file changed, 1 insertion(+) (limited to 'tcp.c') diff --git a/tcp.c b/tcp.c index e45dfda..b694792 100644 --- a/tcp.c +++ b/tcp.c @@ -1734,6 +1734,7 @@ static int tcp_update_seqack_wnd(const struct ctx *c, struct tcp_conn *conn, { uint32_t prev_wnd_to_tap = conn->wnd_to_tap << conn->ws_to_tap; uint32_t prev_ack_to_tap = conn->seq_ack_to_tap; + /* cppcheck-suppress [ctunullpointer, unmatchedSuppression] */ socklen_t sl = sizeof(*tinfo); struct tcp_info tinfo_new; uint32_t new_wnd_to_tap = prev_wnd_to_tap; -- cgit v1.2.3