Error: CLANG_WARNING: [#def1] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/bitstream.cc:93:21: warning[core.NullDereference]: Access to field 'quantval' results in a dereference of a null pointer (loaded from variable 'quant_table') # 91| } # 92| int precision = 0; # 93|-> for (UINT16 q : quant_table->quantval) { # 94| if (q > 255) { # 95| precision = 1; Error: CLANG_WARNING: [#def2] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/color_quantize.cc:39:34: warning[core.DivideZero]: Division by zero # 37| # 38| int GetColorComponent(int i, int N) { # 39|-> return (i * 255 + (N - 1) / 2) / (N - 1); # 40| } # 41| Error: CLANG_WARNING: [#def3] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/destination_manager.cc:138:7: warning[core.NullDereference]: Dereference of null pointer (loaded from variable 'outbuffer') # 136| dest->output = outbuffer; # 137| dest->output_size = outsize; # 138|-> if (*outbuffer == nullptr || *outsize == 0) { # 139| dest->temp_buffer = # 140| reinterpret_cast<uint8_t*>(malloc(jpegli::kDestBufferSize)); Error: CLANG_WARNING: [#def4] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/destination_manager.cc:138:32: warning[core.NullDereference]: Dereference of null pointer (loaded from variable 'outsize') # 136| dest->output = outbuffer; # 137| dest->output_size = outsize; # 138|-> if (*outbuffer == nullptr || *outsize == 0) { # 139| dest->temp_buffer = # 140| reinterpret_cast<uint8_t*>(malloc(jpegli::kDestBufferSize)); Error: CLANG_WARNING: [#def5] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/destination_manager.cc:142:14: warning[core.NullDereference]: Dereference of null pointer (loaded from variable 'outsize') # 140| reinterpret_cast<uint8_t*>(malloc(jpegli::kDestBufferSize)); # 141| *outbuffer = dest->temp_buffer; # 142|-> *outsize = jpegli::kDestBufferSize; # 143| } # 144| dest->current_buffer = *outbuffer; Error: CLANG_WARNING: [#def6] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/entropy_coding.cc:645:3: warning[core.NonNullParamChecker]: Null pointer passed to 2nd parameter expecting 'nonnull' # 643| // Copy Huffman table to the end of the list and save slot id. # 644| slot_id_map[*num_huffman_tables] = index + (is_dc ? 0 : 0x10); # 645|-> memcpy(&huffman_tables[*num_huffman_tables], table, sizeof(JHUFF_TBL)); # 646| ++(*num_huffman_tables); # 647| } Error: CLANG_WARNING: [#def7] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jpegli/quant.cc:717:17: warning[core.NullDereference]: Array access (via field 'quantval') results in a null pointer dereference # 715| } # 716| for (size_t k = 0; k < DCTSIZE2; k++) { # 717|-> int val = quant_table->quantval[k]; # 718| if (val == 0) { # 719| JPEGLI_ERROR("Invalid quantval 0."); Error: CLANG_WARNING: [#def8] jpegxl-0.10.2-build/libjxl-0.10.2/lib/jxl/enc_fast_lossless.cc:336:30: warning[core.BitwiseShift]: Left shift by '18446744073709551362' overflows the capacity of 'unsigned int' # 334| assert(precision < 15); # 335| assert(n <= kMaxNumSymbols); # 336|-> std::vector<T> dynp(((1U << precision) + 1) * (n + 1), infty); # 337| auto d = [&](size_t sym, size_t off) -> T& { # 338| return dynp[sym * ((1 << precision) + 1) + off]; Error: CPPCHECK_WARNING: [#def9] jpegxl-0.10.2-build/libjxl-0.10.2/third_party/sjpeg/src/colors_rgb.cc: information[normalCheckLevelMaxBranches]: Limiting analysis of branches. Use --check-level=exhaustive to analyze all branches. Error: GCC_ANALYZER_WARNING (CWE-415): [#def10] jpegxl-0.10.2-build/libjxl-0.10.2/tools/jxlinfo.c:63:24: warning[-Wanalyzer-double-free]: double-‘free’ of ‘data’ # 61| // resize the buffer to append one more chunk of data # 62| // TODO(lode): avoid unnecessary reallocations # 63|-> data = (uint8_t*)realloc(data, remaining + chunk_size); # 64| // append bytes read from the file behind the remaining bytes # 65| size_t read_size = fread(data + remaining, 1, chunk_size, file);
analyzer-version-clang | 18.1.7 |
analyzer-version-cppcheck | 2.14.2 |
analyzer-version-gcc | 14.1.1 |
analyzer-version-gcc-analyzer | 14.1.1 |
analyzer-version-shellcheck | 0.10.0 |
diffbase-analyzer-version-clang | 18.1.7 |
diffbase-analyzer-version-cppcheck | 2.14.2 |
diffbase-analyzer-version-gcc | 14.1.1 |
diffbase-analyzer-version-gcc-analyzer | 14.1.1 |
diffbase-analyzer-version-shellcheck | 0.10.0 |
diffbase-enabled-plugins | clang, cppcheck, gcc, shellcheck |
diffbase-exit-code | 0 |
diffbase-host | ip-172-16-1-113.us-west-2.compute.internal |
diffbase-mock-config | fedora-41-x86_64 |
diffbase-project-name | jpegxl-0.8.2-6.fc40 |
diffbase-store-results-to | /tmp/tmpqy7sep0_/jpegxl-0.8.2-6.fc40.tar.xz |
diffbase-time-created | 2024-07-03 13:30:01 |
diffbase-time-finished | 2024-07-03 13:41:49 |
diffbase-tool | csmock |
diffbase-tool-args | '/usr/bin/csmock' '-r' 'fedora-41-x86_64' '-t' 'cppcheck,gcc,clang,shellcheck' '-o' '/tmp/tmpqy7sep0_/jpegxl-0.8.2-6.fc40.tar.xz' '--gcc-analyze' '/tmp/tmpqy7sep0_/jpegxl-0.8.2-6.fc40.src.rpm' |
diffbase-tool-version | csmock-3.5.3-1.el9 |
enabled-plugins | clang, cppcheck, gcc, shellcheck |
exit-code | 0 |
host | ip-172-16-1-113.us-west-2.compute.internal |
mock-config | fedora-41-x86_64 |
project-name | jpegxl-0.10.2-5.fc41 |
store-results-to | /tmp/tmpexevdykl/jpegxl-0.10.2-5.fc41.tar.xz |
time-created | 2024-07-03 13:42:00 |
time-finished | 2024-07-03 13:52:29 |
title | Newly introduced defects |
tool | csmock |
tool-args | '/usr/bin/csmock' '-r' 'fedora-41-x86_64' '-t' 'cppcheck,gcc,clang,shellcheck' '-o' '/tmp/tmpexevdykl/jpegxl-0.10.2-5.fc41.tar.xz' '--gcc-analyze' '/tmp/tmpexevdykl/jpegxl-0.10.2-5.fc41.src.rpm' |
tool-version | csmock-3.5.3-1.el9 |