The QP/C++ distribution contains a "port" to PC-Lint-Plus↑ static analysis tool from Vector↑ , which is a static analysis tool for C and C++ with one of the longest track records and best value of the money in the industry. The "PC-Lint-Plus port" allows you to statically analyze the QP/C++ source code and facilitates static analysis of your application code based on QP/C++ .
The QP/C++ "port" to PC-Lint-Plus is located in the directory qpcpp /ports/lint-plus
and includes also lint configuration files, as well as an example of "linting" application code in the directory qpcpp /examples/arm-cm/dpp_ek-tm4c123gxl/lint-plus
. The following listing describes the most important files in these three directories.
The directory qpcpp /ports/lint-plus
(see listing above) contains also the make.bat batch file for "linting" the QP/C++ source code. The make.bat
batch file invokes PC-Lint-Plus and generates the lint output files. As shown in the listing above, the lint output is collected into four text files lint_qf.log
, lint_qs.log
, lint_qk.log
, lint_qv.log
, and lint_qs.log
, for QEP/QF, QK, QV, QXK and QS components of the QP/C++ framework, respectively.
make.bat
file on your system, you might need to adjust the symbol PCLP_DIR
at the top of the batch file, to the PC-Lint-Plus installation directory on your computer.make.bat
batch file invoked without any command-line options checks the QP/C++ code in the Q_SPY build configuration with software tracing enabled. However, by the nature of software tracing, the Q_SPY configuration transgresses many more MISRA-C rules than the standard configuration. However, the Q_SPY configuration is never used for production code, so the MISRA-C compliance of the QP/C++ framework should not be judged by the deviations that happen only in the Q_SPY configuration.According to the PC-Lint-Plus guidelines, the make.bat
uses two option files: the qpcpp .lnt configuration file discussed before and the options.lnt
configuration file that covers all deviations from the MISRA-C rules within the QP/C++ source code. These deviations are intentionally localized to QP/C++ code and are independent from your application-level code. In other words, a MISRA-C deviation present in the QP/C++ code does not mean that such deviation is somehow allowed or its detection is somehow suppressed in the application-level code. This is because the the options.lnt
configuration file for internals of QP/C++ is not used to "lint" the application-level code.
The QP/C++ baseline code contains an example of MISRA-C compliance checking with PC-Lint-Plus: the DPP example for the EK-TM4C123GLX Cortex-M4F board, located in the directory qpcpp /examples/arm-cm/dpp_ek-tm4c123gxl/lint-plus
. The PC-Lint-Plus analysis is very simple and requires invoking the make.bat file.
PCLP_DIR
at the top of the batch file, to the PC-Lint-Plus installation directory on your computer. YouThe lint-plus
subdirectory contains also the local version of the options.lnt
configuration file with the PC-Lint-Plus options specific to linting the application. Here, you might include linting options for your specific compiler, as described in the "PC-Lint-Plus Manual", Chapter 2 "Installation and Configuration".
PC-Lint-Plus has several places where it reads its currently valid options:
*.lnt
)The QP/C++ source code and example application code has been "linted" only by means of the first alternative (option files) with possibility of adding options via command line. The third alternative–lint comments–is not used and Quantum Leaps does not recommend this alternative.
The structure of the PC-Lint-Plus option files used for "linting" QP/C++ follows the PC-Lint-Plus (PCLP)↑ guidelines for configuring PC-Lint-Plus (See Section 2 "Configuration" in the PC-Lint-Plus Manual). The design and grouping of the lint options also reflects the fact that static code analysis of a software framework, such as QP/C++ , has really two major aspects. First, the source code of the framework itself has to be analyzed. But even more important and helpful to the users of the framework is providing the infrastructure to effectively analyze the application-level code based on the framework. With this in mind, the PC-Lint-Plus options for static analysis of QP/C++ are divided into two groups, located in directories qpcpp /include
and qpcpp /ports/lint
. These two groups are for analyzing QP/C++ applications and QP/C++ source code, respectively.
As shown in the PC-Lint-Plus "port" files description, the directory qpcpp /include
, contains the PC-Lint-Plus options for "linting" the application code along with all platform-independent QP/C++ header files required by the applications. This collocation of lint options with header files simplifies "linting", because specifying just -iqpcpp /include
include directory to PC-Lint-Plus accomplishes both inclusion of QP/C++ header files and PC-Lint-Plus options. Note that the qpcpp /include
directory contains all PC-Lint-Plus option files used in "linting" the code, including the standard MISRA-C:2023 au-misr4.lnt
option file as well as Dan Saks' recommendations au-ds.lnt
, which are copied from the PC-Lint-Plus distribution. This design freezes the lint options for which the compliance has been checked.
According to the PC-Lint-Plus Configuration Guidelines, the file std.lnt file, contains the top-level options, which Quantum Leaps recommends for all projects. These options include the formatting of the PC-Lint-Plus messages and making two passes to perform better cross-module analysis. However, the most important option is -restore_at_end
, which has the effect of surrounding each source file with options -save
and -restore
. This precaution prevents options from "bleeding" from one file to another.
The most important file for "linting" QP/C++ applications is the qpcpp .lnt option file. This file handles all deviations from the MISRA-C:2023 rules, which might arise at the application-level code from the use of the QP/C++ framework. In other words, the qpcpp .lnt option file allows completely clean "linting" of the application-level code, as long as the application code does not violate any of the MISRA-C:2023 rules.
At the same time, the qpcpp .lnt option file has been very carefully designed not to suppress any MISRA-C:2023 rule checking outside the very specific context of the QP/C++ API. In other words, the qpcpp .lnt option file still supports 100% of the MISRA-C:2023 rule checks that PC-Lint-Plus is capable of performing.
-esym(9026, Q_TRAN, Q_SUPER, ...)
, which suppresses the warning only for the specified macros, but does not disable checking of any other macros in the application-level code.