SlideShare a Scribd company logo
Comparing the general static analysis in
Visual Studio 2010 and PVS-Studio by
examples of errors detected in five open
source projects
Authors: Evgeniy Ryzhkov

Date: 20.04.2011


Abstract
The article demonstrates errors detected with the static code analyzer integrated into Visual Studio
2010. The research was performed on five open source projects. The same projects were also checked
with PVS-Studio. Results of comparing these two tools are presented at the end of the article.


Introduction
The article "Difficulties of comparing code analyzers, or don't forget about usability" [1] tells that it is
not so easy to compare two tools as it may seem because the parameter of usability is also highly
significant besides the technical characteristics proper.

Still we cannot do without comparing tools by errors they can detect. Of course, there is no sense in just
calculating the number of errors. So we decided to carry out a practical experiment of error detection in
real projects.

We checked five random open source projects with the static analyzer integrated into Visual Studio
2010 Premium. We looked through the whole message list and chose explicit errors. Then we made the
same steps with PVS-Studio.

Here is a list of projects which participated in the research:

    •   eMule Plus;
    •   Pixie;
    •   VirtualDub;
    •   WinMerge;
    •   XUIFramework.

Let's go!


eMule Plus
The total number of messages generated by the Visual Studio static analyzer is 237, 4 of them being real
errors.

The total number of messages generated by PVS-Studio is 68, 3 of them being real errors.
Visual Studio: warning C6054: String 'szwThemeFile' might not be

zero-terminated. c:emuleplusdialogmintraybtn.hpp 445



WCHAR szwThemeFile[MAX_PATH];

WCHAR szwThemeColor[256];

if (m_themeHelper.GetCurrentThemeName(szwThemeFile,

      ARRSIZE(szwThemeFile), szwThemeColor,

      ARRSIZE(szwThemeColor), NULL, 0) != S_OK)

   return NULL;

WCHAR *p;

if ((p = wcsrchr(szwThemeFile, L'')) == NULL)

Indeed, a line may not end with 0, which will cause potential problems. But in this particular case, this
error is not likely to reveal itself.



Visual Studio: warning C6269: Possibly incorrect order of operations:

dereference ignored. c:emulepluscustomautocomplete.cpp 277



PVS-Studio: V532 Consider inspecting the statement of '*pointer++'

pattern. Probably meant: '(*pointer)++'. customautocomplete.cpp 277



if (pceltFetched != NULL)

   *pceltFetched++;

The programmer here "is not good at" using the (*ptr)++ expression. Although this construct seems to
be rather safe, still this error is widespread.



Visual Studio: warning C6298: Argument '6': using a read-only string

as a writable string argument. This will attempt to write into static

read-only memory and cause random crashes.

c:emuleplusfirewallopener.cpp 183
HRESULT hr = pNSC->AddPortMapping(

   riPortRule.m_strRuleName.AllocSysString(), riPortRule.m_byProtocol,

   riPortRule.m_nPortNumber, riPortRule.m_nPortNumber, 0, L"127.0.0.1",

   ICSTT_IPADDRESS, &pNSPM);

Although it is not an error, the analyzer-generated message is fair. In general, this is a problem of all the
static analyzers. They produce absolutely correct messages but they are far not always real errors. Does
it mean that such tools and messages are useless? No, it does not, because fixing even such warnings
helps to increase an overall quality of code.



Visual Studio: warning C6314: Incorrect order of operations: bitwise-

or has higher precedence than the conditional-expression operator.

Add parentheses to clarify intent. c:emuleplussearchlistctrl.cpp 659



PVS-Studio: V502 Perhaps the '?:' operator works in a different way

than it was expected. The '?:' operator has a lower priority than the

'|' operator.          searchlistctrl.cpp 659



menuSearchFile.AppendMenu( MF_STRING |

   ((iSelectionMark != -1) && (dwSelectedCount > 0) &&

   g_App.m_pServerConnect->IsConnected() &&

   ((pCurServer = g_App.m_pServerConnect->GetCurrentServer())!= NULL)&&

   (pCurServer->GetTCPFlags() & SRV_TCPFLG_RELATEDSEARCH)) ?

      MF_ENABLED : MF_GRAYED, MP_SEARCHRELATED,

         GetResString(IDS_SEARCHRELATED));

Here (because of the construct's complexity) we have wrong priorities of operators. For how long it has
been said... Who prevented the programmer from arranging this code in several separate expressions
instead of writing everything in one line (as it was done in the original program)? No, programmers
would always want to "write it smart".



PVS-Studio: V519 The 'm_clrSample' object is assigned values twice

successively. Perhaps this is a mistake. fontpreviewcombo.cpp 61
CFontPreviewCombo::CFontPreviewCombo()

{

    ...

    m_clrSample = GetSysColor(COLOR_WINDOWTEXT);

    m_clrSample = RGB(60,0,0);

    ...

}



Perhaps the developers wanted to see how the RGB(60,0,0) color would look and forgot to remove it.


Pixie
The total number of messages generated by the Visual Studio static analyzer is 18, 0 of them being real
errors.

The total number of messages generated by PVS-Studio is 65, 5 of them being real errors.

PVS-Studio: V519 The 'numRays' object is assigned values twice

successively. Perhaps this is a mistake. bundles.cpp 579



void CGatherBundle::post() {

 numRays = last;

 numRays = 0;

 last = 0;

 depth++;

}

Oh, how suspicious it is when numRays is first initialized by one value and then by another. Is it an error
or not? Only the code's author knows exactly. But it alerts me!



PVS-Studio: V501 There are identical sub-expressions to the left and

to the right of the '|' operator: PARAMETER_DPDU | PARAMETER_DPDU

quadrics.cpp 880



if (up & (PARAMETER_DPDU | PARAMETER_DPDU)) {
There must be something else here. By the way, here you a general note on fixing errors detected by a
static analyzer. While in some cases correction is obvious and anyone can fix an error, in some other
cases only the author of the code can make out what exactly was intended there. It is on the question if
one could create a tool that can correct errors "like in Word".



PVS-Studio: V501 There are identical sub-expressions to the left and

to the right of the '|' operator: SLC_VECTOR | SLC_VECTOR

expression.cpp 2604



lock(N, getConversion(SLC_VECTOR | SLC_VECTOR,parameters[2]));

SLC_VECTOR mentioned twice in such a context certainly signals an error.



PVS-Studio: V505 The 'alloca' function is used inside the loop.

This can quickly overflow stack. polygons.cpp 1120



inline      void    triangulatePolygon(...) {

  ...

  for (i=1;i<nloops;i++) {

      ...

      do {

        ...

        do {

            ...

            CTriVertex       *snVertex       =    (CTriVertex *)

              alloca(2*sizeof(CTriVertex));

            ...

        } while(dVertex != loops[0]);

        ...

      } while(sVertex != loops[i]);

      ...

  }
...

}

Having deep nesting, the alloca call might cause stack overflow.


VirtualDub
The total number of messages generated by the Visual Studio static analyzer is 24 messages, 0 of them
being real errors.

The total number of messages generated by PVS-Studio is 41, 2 of them being real errors.



PVS-Studio: V547 Expression 'c < 0' is always false.

Unsigned type value is never < 0. lexer.cpp 279



typedef unsigned short wint_t;



wint_t lexgetescape() {

    wint_t c = lexgetc();

    if (c < 0)

     fatal("Newline found in escape sequence");

    ...

}

The code will never be called because the expression is always false.



PVS-Studio: V557 Array overrun is possible. The '9' index is pointing

beyond array bound. f_convolute.cpp 73



struct ConvoluteFilterData {

 long m[9];

 long bias;

 void *dyna_func;

 DWORD dyna_size;

 DWORD dyna_old_protect;
BOOL fClip;

};



static unsigned long __fastcall do_conv(

    unsigned long *data,

    const ConvoluteFilterData *cfd,

    long sflags, long pit)

{

    long rt0=cfd->m[9], gt0=cfd->m[9], bt0=cfd->m[9];

    ...

}

A trivial array overflow.


WinMerge
The total number of messages generated by the Visual Studio static analyzer is 343, 3 of them being real
errors.

The total number of messages generated by PVS-Studio is 69, 12 of them being real errors.

Visual Studio: warning C6313: Incorrect operator: zero-valued flag

cannot be tested with bitwise-and. Use an equality test to check for

zero-valued flags. c:winmergesrcbcmenu.cpp 1489



else if (nFlags&MF_STRING){

 ASSERT(!(nFlags&MF_OWNERDRAW));

 ModifyMenu(pos,nFlags,nID,mdata->GetString());

}

Not very lucky condition. Of course, the programmer wanted to write something different, but it
happened that way.



Visual Studio: warning C6287: Redundant code: the left and right

sub-expressions are identical.

c:winmergesrceditlibccrystaleditview.cpp 1560
PVS-Studio: V501 There are identical sub-expressions to the left and

to the right of the '||' operator: c == '}' || c == '}'

ccrystaleditview.cpp 1560



bool

isclosebrace (TCHAR c)

{

    return c == _T ('}') || c == _T ('}') || c == _T (']')

        || c == _T ('>');

}

Not all the parentheses types are checked. Why? It is usual that "Copy-paste-technology" leads to
errors.



Visual Studio: warning C6287: Redundant code: the left and right

sub-expressions are identical. c:winmergesrcmergedoc.cpp 1165



PVS-Studio: V501 There are identical sub-expressions to the left and

to the right of the '||' operator. mergedoc.cpp 1165



if ((m_nBufferType[nBuffer] == BUFFER_UNNAMED) ||

 (m_nBufferType[nBuffer] == BUFFER_UNNAMED))

     nSaveErrorCode = SAVE_NO_FILENAME;

Another unlucky condition and again it seems to be the copy-paste's fault.



PVS-Studio: V551 The code under this 'case' label is unreachable.

The value range of signed char type: [-128, 127].

ccrystaltextview.cpp 1646



TCHAR ch = strText[i];
switch (ch)

{

    case 0xB7:

    case 0xBB:

      strHTML += ch;

      strHTML += _T("<wbr>");

      bLastCharSpace = FALSE;

      nNonbreakChars = 0;

      break;

And here we have a sample of code which will never be used. Everything seems alright, case is written
and all, but it will never get control because the value range is too narrow. TCHAR in this case is the char
type.



PVS-Studio: V524 It is odd that the body of 'IsValidTextPosX' function

is fully equivalent to the body of 'IsValidTextPos' function

(ccrystaltextview.cpp, line 3700). ccrystaltextview.cpp 3707



bool CCrystalTextView::IsValidTextPos (const CPoint &point)

{

    return GetLineCount () > 0 && m_nTopLine >= 0 &&

             m_nOffsetChar >= 0 && point.y >= 0 &&

             point.y < GetLineCount () && point.x >= 0 &&

             point.x <= GetLineLength (point.y);

}



bool CCrystalTextView::IsValidTextPosX (const CPoint &point)

{

    return GetLineCount () > 0 && m_nTopLine >= 0 &&

             m_nOffsetChar >= 0 && point.y >= 0 &&

             point.y < GetLineCount () && point.x >= 0 &&

             point.x <= GetLineLength (point.y);
}



bool CCrystalTextView::IsValidTextPosY (const CPoint &point)

{

    return GetLineCount () > 0 && m_nTopLine >= 0 &&

             m_nOffsetChar >= 0 && point.y >= 0 &&

             point.y < GetLineCount ();

}

These are very similar functions... The developers copy-pasted again and again and forgot to fix the
result. The IsValidTextPosX() function performs an excess check.



PVS-Studio: V563 It is possible that this 'else' branch must apply to

the previous 'if' statement. bcmenu.cpp 1852



if(IsLunaMenuStyle())

    if(!xp_space_accelerators)return;

else

    if(!original_space_accelerators)return;

Who can look at the code and say exactly to what if else refers? Was it the thing the programmer
wanted to do? Are you sure?



PVS-Studio: V556 The values of different enum types are compared:

switch(ENUM_TYPE_A) { case ENUM_TYPE_B: ... }. diffwrapper.cpp 956



enum output_style {}

...

enum DiffOutputType m_outputStyle;



switch (m_options.m_outputStyle)

{
case OUTPUT_CONTEXT:

enum and switch types were a bit mixed up. But it's alright, isn't it?



PVS-Studio: V530 The return value of function 'empty' is required to

be utilized. diractions.cpp 1307



void CDirView::GetItemFileNames(int sel, String& strLeft,

                                                 String& strRight) const

{

    UINT_PTR diffpos = GetItemKey(sel);

    if (diffpos == (UINT_PTR)SPECIAL_ITEM_POS)

    {

        strLeft.empty();

        strRight.empty();

The case when empty() does not empty. This is an example of an extremely wrong name for a method.



PVS-Studio: V524 It is odd that the body of 'OnUpdateLastdiff'

function is fully equivalent to the body of 'OnUpdateFirstdiff'

function (DirView.cpp, line 2189). dirview.cpp 2220



void CDirView::OnUpdateLastdiff(CCmdUI* pCmdUI)

{

    int firstDiff = GetFirstDifferentItem();

    if (firstDiff > -1)

        pCmdUI->Enable(TRUE);

    else

        pCmdUI->Enable(FALSE);

}



void CDirView::OnUpdateFirstdiff(CCmdUI* pCmdUI)
{

    int firstDiff = GetFirstDifferentItem();

    if (firstDiff > -1)

     pCmdUI->Enable(TRUE);

    else

     pCmdUI->Enable(FALSE);

}

Two more very similar functions...



PVS-Studio: V501 There are identical sub-expressions

'pView1->GetTextBufferEol (line)' to the left and to the right of

the '!=' operator. mergedoclinediffs.cpp 216



if (pView1->GetTextBufferEol(line) !=

     pView1->GetTextBufferEol(line))

{

Either this or that... Or not? Perhaps there must be pView2 here.



PVS-Studio: V530 The return value of function 'empty' is required to

be utilized. varprop.cpp 133



void VariantValue::Clear()

{

    m_vtype = VT_NULL;

    m_bvalue = false;

    m_ivalue = 0;

    m_fvalue = 0;

    m_svalue.empty();

    m_tvalue = 0;

}
Again empty() does not empty the string at all.



PVS-Studio: V510           The 'Format' function is not expected to receive

class-type variable as 'N' actual argument". PropShel 105



String GetSysError(int nerr);

...

CString msg;

msg.Format(

    _T("Failed to open registry key HKCU/%s:nt%d : %s"),

    f_RegDir, retVal, GetSysError(retVal)

    );

When various emergencies occur, WinMerge will try to inform the user about errors but in some cases it
will fail. At first sight everything looks OK but actually the "String" type is just "std::wstring". Therefore
we will print rubbish at best or get an Access Violation error at worst. The correct code must have a call
of c_str().



PVS-Studio: V534 It is likely that a wrong variable is being compared
inside the 'for' operator. Consider reviewing 'i'." BinTrans.cpp 357



// Get length of translated array of bytes from text.

int Text2BinTranslator::iLengthOfTransToBin(

    char* src, int srclen )

{

    ...

    for (k=i; i<srclen; k++)

    {

        if (src[k]=='>')

          break;

    }

    ...
}

The analyzer found a suspicious loop. This code is prone to Access Violation. The loop must go on until it
finds the '>' character or a string with the length of 'srclen' characters comes to an end. But the
programmer by accident used the 'k' variable instead of 'i' for comparison. If the '>' character is not
found, everything will be sad.


XUIFramework
The total number of messages generated by the Visual Studio static analyzer is 93, 2 of them being real
errors.

The total number of messages generated by PVS-Studio is 30, 5 of them being real errors.



Visual Studio: warning C6269: Possibly incorrect order of operations:

dereference ignored

c:xui-gui frameworkwidgetscstatichtmlppdrawmanager.cpp 298



PVS-Studio: V532 Consider inspecting                     the statement of '*pointer++'

pattern. Probably meant: '(*pointer)++'. ppdrawmanager.cpp 298



for (DWORD pixel = 0; pixel < dwWidth * dwHeight; pixel++, *pBits++)

Again the programmer is not good at using *ptr++. As I have said above, this is a widespread error.



Visual Studio: warning C6283: 'pBuffer' is allocated with array new[],

but deleted with scalar delete.

c:xui-gui frameworkwidgetscxstaticcxstatic.cpp 544



BYTE* pBuffer = new BYTE [ nBufferLen ];

...

delete pBuffer;

The programmer confuses delete and delete[]. This causes issues which may occur and may not. But you
should not do so anyway.



PVS-Studio: V519 The 'm_xSt' object is assigned values twice
successively. Perhaps this is a mistake. resizedlg.cpp 244



m_xSt = CST_RESIZE;

m_xSt = CST_RESIZE;

Judging by the code, there must be m_ySt here. But we cannot keep from using copy-paste again and
again, right?



V531 It is odd that a sizeof() operator is multiplied by sizeof().

pphtmldrawer.cpp 258



DWORD dwLen = ::LoadString(hInstDll, dwID, szTemp,

                    (sizeof(szTemp) * sizeof(TCHAR)));

There must be sizeof(szTemp) / sizeof(TCHAR) .



PVS-Studio: V556 The values of different enum types are compared:

enuHAlign == Center. cxstatic.cpp 151



if (enuHAlign == Center)

There must be enuHAlign == Midle. There is also if in the code nearby (enuVAlign == Middle) though it
must be Center. Confusion with enum, in short.



PVS-Studio: V501 There are identical sub-expressions to the left and

to the right of the '||' operator. resizedlg.cpp 157



HDWP CItemCtrl::OnSize(...)

{

    ...

    if (m_styTop == CST_ZOOM ||

          m_styTop == CST_ZOOM ||

          m_styBottom == CST_DELTA_ZOOM ||
m_styBottom == CST_DELTA_ZOOM)

    ...

}

Perhaps the code must look this way:

HDWP CItemCtrl::OnSize(...)

{

    ...

    if (m_styTop == CST_ZOOM ||

          m_styTop == CST_DELTA_ZOOM ||

          m_styBottom == CST_ZOOM ||

          m_styBottom == CST_DELTA_ZOOM)

    ...

}


Comparison results




We do not draw any certain conclusions. One of the tools was better in some projects and the other tool
was better in others.


References
    1. Andrey Karpov, Evgeniy Ryzhkov. Difficulties of comparing code analyzers, or don't forget about
       usability. http://www.viva64.com/en/a/0071/.
Ad

Recommended

PDF
Comparing the general static analysis in Visual Studio 2010 and PVS-Studio by...
PVS-Studio
 
PDF
Checking OpenCV with PVS-Studio
PVS-Studio
 
PDF
Errors detected in the Visual C++ 2012 libraries
PVS-Studio
 
PDF
Analyzing the Blender project with PVS-Studio
PVS-Studio
 
PDF
Top 10 bugs in C++ open source projects, checked in 2016
PVS-Studio
 
PDF
Checking the code of Valgrind dynamic analyzer by a static analyzer
PVS-Studio
 
PDF
A Slipshod Check of the Visual C++ 2013 Library (update 3)
Andrey Karpov
 
PDF
Top 10 C# projects errors found in 2016
PVS-Studio
 
PDF
Serious Sam shooter anniversary - finding bugs in the code of the Serious Eng...
PVS-Studio
 
PDF
Checking the World of Warcraft CMaNGOS open source server
PVS-Studio
 
PDF
Picking Mushrooms after Cppcheck
Andrey Karpov
 
PDF
Why Windows 8 drivers are buggy
PVS-Studio
 
PDF
Checking the Cross-Platform Framework Cocos2d-x
Andrey Karpov
 
PDF
PVS-Studio vs Clang
Andrey Karpov
 
PDF
Checking 7-Zip with PVS-Studio analyzer
PVS-Studio
 
PDF
A Spin-off: CryEngine 3 SDK Checked with CppCat
Andrey Karpov
 
PDF
PVS-Studio vs Chromium - Continuation
PVS-Studio
 
PDF
Reanalyzing the Notepad++ project
PVS-Studio
 
PDF
Dusting the globe: analysis of NASA World Wind project
PVS-Studio
 
PDF
A fresh eye on Oracle VM VirtualBox
PVS-Studio
 
PDF
Checking Clang 11 with PVS-Studio
Andrey Karpov
 
PDF
Rechecking TortoiseSVN with the PVS-Studio Code Analyzer
Andrey Karpov
 
PDF
Re-checking the ReactOS project - a large report
PVS-Studio
 
PDF
Why Windows 8 drivers are buggy
Andrey Karpov
 
PDF
Analysis of Godot Engine's Source Code
PVS-Studio
 
PDF
Errors that static code analysis does not find because it is not used
Andrey Karpov
 
PDF
Linux version of PVS-Studio couldn't help checking CodeLite
PVS-Studio
 
PDF
ChakraCore: analysis of JavaScript-engine for Microsoft Edge
PVS-Studio
 
PDF
Driver Development for Windows 64-bit
PVS-Studio
 
PDF
Comparison of analyzers' diagnostic possibilities at checking 64-bit code
PVS-Studio
 

More Related Content

What's hot (20)

PDF
Serious Sam shooter anniversary - finding bugs in the code of the Serious Eng...
PVS-Studio
 
PDF
Checking the World of Warcraft CMaNGOS open source server
PVS-Studio
 
PDF
Picking Mushrooms after Cppcheck
Andrey Karpov
 
PDF
Why Windows 8 drivers are buggy
PVS-Studio
 
PDF
Checking the Cross-Platform Framework Cocos2d-x
Andrey Karpov
 
PDF
PVS-Studio vs Clang
Andrey Karpov
 
PDF
Checking 7-Zip with PVS-Studio analyzer
PVS-Studio
 
PDF
A Spin-off: CryEngine 3 SDK Checked with CppCat
Andrey Karpov
 
PDF
PVS-Studio vs Chromium - Continuation
PVS-Studio
 
PDF
Reanalyzing the Notepad++ project
PVS-Studio
 
PDF
Dusting the globe: analysis of NASA World Wind project
PVS-Studio
 
PDF
A fresh eye on Oracle VM VirtualBox
PVS-Studio
 
PDF
Checking Clang 11 with PVS-Studio
Andrey Karpov
 
PDF
Rechecking TortoiseSVN with the PVS-Studio Code Analyzer
Andrey Karpov
 
PDF
Re-checking the ReactOS project - a large report
PVS-Studio
 
PDF
Why Windows 8 drivers are buggy
Andrey Karpov
 
PDF
Analysis of Godot Engine's Source Code
PVS-Studio
 
PDF
Errors that static code analysis does not find because it is not used
Andrey Karpov
 
PDF
Linux version of PVS-Studio couldn't help checking CodeLite
PVS-Studio
 
PDF
ChakraCore: analysis of JavaScript-engine for Microsoft Edge
PVS-Studio
 
Serious Sam shooter anniversary - finding bugs in the code of the Serious Eng...
PVS-Studio
 
Checking the World of Warcraft CMaNGOS open source server
PVS-Studio
 
Picking Mushrooms after Cppcheck
Andrey Karpov
 
Why Windows 8 drivers are buggy
PVS-Studio
 
Checking the Cross-Platform Framework Cocos2d-x
Andrey Karpov
 
PVS-Studio vs Clang
Andrey Karpov
 
Checking 7-Zip with PVS-Studio analyzer
PVS-Studio
 
A Spin-off: CryEngine 3 SDK Checked with CppCat
Andrey Karpov
 
PVS-Studio vs Chromium - Continuation
PVS-Studio
 
Reanalyzing the Notepad++ project
PVS-Studio
 
Dusting the globe: analysis of NASA World Wind project
PVS-Studio
 
A fresh eye on Oracle VM VirtualBox
PVS-Studio
 
Checking Clang 11 with PVS-Studio
Andrey Karpov
 
Rechecking TortoiseSVN with the PVS-Studio Code Analyzer
Andrey Karpov
 
Re-checking the ReactOS project - a large report
PVS-Studio
 
Why Windows 8 drivers are buggy
Andrey Karpov
 
Analysis of Godot Engine's Source Code
PVS-Studio
 
Errors that static code analysis does not find because it is not used
Andrey Karpov
 
Linux version of PVS-Studio couldn't help checking CodeLite
PVS-Studio
 
ChakraCore: analysis of JavaScript-engine for Microsoft Edge
PVS-Studio
 

Viewers also liked (20)

PDF
Driver Development for Windows 64-bit
PVS-Studio
 
PDF
Comparison of analyzers' diagnostic possibilities at checking 64-bit code
PVS-Studio
 
PDF
32 OpenMP Traps For C++ Developers
PVS-Studio
 
PDF
Viva64: working up of 64-bit applications
PVS-Studio
 
PDF
Lesson 17. Pattern 9. Mixed arithmetic
PVS-Studio
 
PDF
Difficulties of comparing code analyzers, or don't forget about usability
PVS-Studio
 
PDF
Lesson 24. Phantom errors
PVS-Studio
 
PDF
Development of a static code analyzer for detecting errors of porting program...
PVS-Studio
 
PDF
An eternal question of timing
PVS-Studio
 
PDF
Analysis of the Ultimate Toolbox project
PVS-Studio
 
PDF
Brief description of the VivaCore code analysis library
PVS-Studio
 
PDF
Lesson 23. Pattern 15. Growth of structures' sizes
PVS-Studio
 
PDF
The essence of the VivaCore code analysis library
PVS-Studio
 
PDF
20 issues of porting C++ code on the 64-bit platform
PVS-Studio
 
PDF
Introduction into 64 bits for the beginners or where's again the 64-bit world?
PVS-Studio
 
PDF
Comparing capabilities of PVS-Studio and Visual Studio 2010 in detecting defe...
PVS-Studio
 
PDF
How we test the code analyzer
PVS-Studio
 
PDF
Explanations to the article on Copy-Paste
PVS-Studio
 
PPTX
Static analysis of C++ source code
PVS-Studio
 
PDF
Of complicacy of programming, or won't C# save us?
PVS-Studio
 
Driver Development for Windows 64-bit
PVS-Studio
 
Comparison of analyzers' diagnostic possibilities at checking 64-bit code
PVS-Studio
 
32 OpenMP Traps For C++ Developers
PVS-Studio
 
Viva64: working up of 64-bit applications
PVS-Studio
 
Lesson 17. Pattern 9. Mixed arithmetic
PVS-Studio
 
Difficulties of comparing code analyzers, or don't forget about usability
PVS-Studio
 
Lesson 24. Phantom errors
PVS-Studio
 
Development of a static code analyzer for detecting errors of porting program...
PVS-Studio
 
An eternal question of timing
PVS-Studio
 
Analysis of the Ultimate Toolbox project
PVS-Studio
 
Brief description of the VivaCore code analysis library
PVS-Studio
 
Lesson 23. Pattern 15. Growth of structures' sizes
PVS-Studio
 
The essence of the VivaCore code analysis library
PVS-Studio
 
20 issues of porting C++ code on the 64-bit platform
PVS-Studio
 
Introduction into 64 bits for the beginners or where's again the 64-bit world?
PVS-Studio
 
Comparing capabilities of PVS-Studio and Visual Studio 2010 in detecting defe...
PVS-Studio
 
How we test the code analyzer
PVS-Studio
 
Explanations to the article on Copy-Paste
PVS-Studio
 
Static analysis of C++ source code
PVS-Studio
 
Of complicacy of programming, or won't C# save us?
PVS-Studio
 
Ad

Similar to Comparing the general static analysis in Visual Studio 2010 and PVS-Studio by examples of errors detected in five open source projects (20)

PDF
CppCat Static Analyzer Review
Andrey Karpov
 
PPTX
PVS-Studio team experience: checking various open source projects, or mistake...
Andrey Karpov
 
PDF
Checking WinMerge with PVS-Studio for the second time
PVS-Studio
 
PDF
How to make fewer errors at the stage of code writing. Part N4.
PVS-Studio
 
PDF
Waiting for the Linux-version: Checking the Code of Inkscape Graphics Editor
PVS-Studio
 
PDF
Analyzing Firebird 3.0
Ekaterina Milovidova
 
PDF
Analyzing Firebird 3.0
PVS-Studio
 
PPTX
PVS-Studio and static code analysis technique
Andrey Karpov
 
PDF
Intel IPP Samples for Windows - error correction
PVS-Studio
 
PDF
Date Processing Attracts Bugs or 77 Defects in Qt 6
Andrey Karpov
 
PDF
Intel IPP Samples for Windows - error correction
Andrey Karpov
 
PDF
Intel IPP Samples for Windows - error correction
PVS-Studio
 
PDF
Source code of WPF samples by Microsoft was checked
PVS-Studio
 
PDF
Documenting Bugs in Doxygen
PVS-Studio
 
PPTX
The operation principles of PVS-Studio static code analyzer
Andrey Karpov
 
PDF
Checking Wine with PVS-Studio and Clang Static Analyzer
Andrey Karpov
 
PDF
How to Improve Visual C++ 2017 Libraries Using PVS-Studio
PVS-Studio
 
PDF
PVS-Studio vs Clang
PVS-Studio
 
PDF
A Unicorn Seeking Extraterrestrial Life: Analyzing SETI@home's Source Code
PVS-Studio
 
PDF
PVS-Studio Meets Octave
PVS-Studio
 
CppCat Static Analyzer Review
Andrey Karpov
 
PVS-Studio team experience: checking various open source projects, or mistake...
Andrey Karpov
 
Checking WinMerge with PVS-Studio for the second time
PVS-Studio
 
How to make fewer errors at the stage of code writing. Part N4.
PVS-Studio
 
Waiting for the Linux-version: Checking the Code of Inkscape Graphics Editor
PVS-Studio
 
Analyzing Firebird 3.0
Ekaterina Milovidova
 
Analyzing Firebird 3.0
PVS-Studio
 
PVS-Studio and static code analysis technique
Andrey Karpov
 
Intel IPP Samples for Windows - error correction
PVS-Studio
 
Date Processing Attracts Bugs or 77 Defects in Qt 6
Andrey Karpov
 
Intel IPP Samples for Windows - error correction
Andrey Karpov
 
Intel IPP Samples for Windows - error correction
PVS-Studio
 
Source code of WPF samples by Microsoft was checked
PVS-Studio
 
Documenting Bugs in Doxygen
PVS-Studio
 
The operation principles of PVS-Studio static code analyzer
Andrey Karpov
 
Checking Wine with PVS-Studio and Clang Static Analyzer
Andrey Karpov
 
How to Improve Visual C++ 2017 Libraries Using PVS-Studio
PVS-Studio
 
PVS-Studio vs Clang
PVS-Studio
 
A Unicorn Seeking Extraterrestrial Life: Analyzing SETI@home's Source Code
PVS-Studio
 
PVS-Studio Meets Octave
PVS-Studio
 
Ad

Recently uploaded (20)

PDF
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
PDF
Python Conference Singapore - 19 Jun 2025
ninefyi
 
PDF
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
PPTX
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
PDF
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
PDF
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
PDF
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
PDF
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
PPTX
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
Python Conference Singapore - 19 Jun 2025
ninefyi
 
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 

Comparing the general static analysis in Visual Studio 2010 and PVS-Studio by examples of errors detected in five open source projects

  • 1. Comparing the general static analysis in Visual Studio 2010 and PVS-Studio by examples of errors detected in five open source projects Authors: Evgeniy Ryzhkov Date: 20.04.2011 Abstract The article demonstrates errors detected with the static code analyzer integrated into Visual Studio 2010. The research was performed on five open source projects. The same projects were also checked with PVS-Studio. Results of comparing these two tools are presented at the end of the article. Introduction The article "Difficulties of comparing code analyzers, or don't forget about usability" [1] tells that it is not so easy to compare two tools as it may seem because the parameter of usability is also highly significant besides the technical characteristics proper. Still we cannot do without comparing tools by errors they can detect. Of course, there is no sense in just calculating the number of errors. So we decided to carry out a practical experiment of error detection in real projects. We checked five random open source projects with the static analyzer integrated into Visual Studio 2010 Premium. We looked through the whole message list and chose explicit errors. Then we made the same steps with PVS-Studio. Here is a list of projects which participated in the research: • eMule Plus; • Pixie; • VirtualDub; • WinMerge; • XUIFramework. Let's go! eMule Plus The total number of messages generated by the Visual Studio static analyzer is 237, 4 of them being real errors. The total number of messages generated by PVS-Studio is 68, 3 of them being real errors.
  • 2. Visual Studio: warning C6054: String 'szwThemeFile' might not be zero-terminated. c:emuleplusdialogmintraybtn.hpp 445 WCHAR szwThemeFile[MAX_PATH]; WCHAR szwThemeColor[256]; if (m_themeHelper.GetCurrentThemeName(szwThemeFile, ARRSIZE(szwThemeFile), szwThemeColor, ARRSIZE(szwThemeColor), NULL, 0) != S_OK) return NULL; WCHAR *p; if ((p = wcsrchr(szwThemeFile, L'')) == NULL) Indeed, a line may not end with 0, which will cause potential problems. But in this particular case, this error is not likely to reveal itself. Visual Studio: warning C6269: Possibly incorrect order of operations: dereference ignored. c:emulepluscustomautocomplete.cpp 277 PVS-Studio: V532 Consider inspecting the statement of '*pointer++' pattern. Probably meant: '(*pointer)++'. customautocomplete.cpp 277 if (pceltFetched != NULL) *pceltFetched++; The programmer here "is not good at" using the (*ptr)++ expression. Although this construct seems to be rather safe, still this error is widespread. Visual Studio: warning C6298: Argument '6': using a read-only string as a writable string argument. This will attempt to write into static read-only memory and cause random crashes. c:emuleplusfirewallopener.cpp 183
  • 3. HRESULT hr = pNSC->AddPortMapping( riPortRule.m_strRuleName.AllocSysString(), riPortRule.m_byProtocol, riPortRule.m_nPortNumber, riPortRule.m_nPortNumber, 0, L"127.0.0.1", ICSTT_IPADDRESS, &pNSPM); Although it is not an error, the analyzer-generated message is fair. In general, this is a problem of all the static analyzers. They produce absolutely correct messages but they are far not always real errors. Does it mean that such tools and messages are useless? No, it does not, because fixing even such warnings helps to increase an overall quality of code. Visual Studio: warning C6314: Incorrect order of operations: bitwise- or has higher precedence than the conditional-expression operator. Add parentheses to clarify intent. c:emuleplussearchlistctrl.cpp 659 PVS-Studio: V502 Perhaps the '?:' operator works in a different way than it was expected. The '?:' operator has a lower priority than the '|' operator. searchlistctrl.cpp 659 menuSearchFile.AppendMenu( MF_STRING | ((iSelectionMark != -1) && (dwSelectedCount > 0) && g_App.m_pServerConnect->IsConnected() && ((pCurServer = g_App.m_pServerConnect->GetCurrentServer())!= NULL)&& (pCurServer->GetTCPFlags() & SRV_TCPFLG_RELATEDSEARCH)) ? MF_ENABLED : MF_GRAYED, MP_SEARCHRELATED, GetResString(IDS_SEARCHRELATED)); Here (because of the construct's complexity) we have wrong priorities of operators. For how long it has been said... Who prevented the programmer from arranging this code in several separate expressions instead of writing everything in one line (as it was done in the original program)? No, programmers would always want to "write it smart". PVS-Studio: V519 The 'm_clrSample' object is assigned values twice successively. Perhaps this is a mistake. fontpreviewcombo.cpp 61
  • 4. CFontPreviewCombo::CFontPreviewCombo() { ... m_clrSample = GetSysColor(COLOR_WINDOWTEXT); m_clrSample = RGB(60,0,0); ... } Perhaps the developers wanted to see how the RGB(60,0,0) color would look and forgot to remove it. Pixie The total number of messages generated by the Visual Studio static analyzer is 18, 0 of them being real errors. The total number of messages generated by PVS-Studio is 65, 5 of them being real errors. PVS-Studio: V519 The 'numRays' object is assigned values twice successively. Perhaps this is a mistake. bundles.cpp 579 void CGatherBundle::post() { numRays = last; numRays = 0; last = 0; depth++; } Oh, how suspicious it is when numRays is first initialized by one value and then by another. Is it an error or not? Only the code's author knows exactly. But it alerts me! PVS-Studio: V501 There are identical sub-expressions to the left and to the right of the '|' operator: PARAMETER_DPDU | PARAMETER_DPDU quadrics.cpp 880 if (up & (PARAMETER_DPDU | PARAMETER_DPDU)) {
  • 5. There must be something else here. By the way, here you a general note on fixing errors detected by a static analyzer. While in some cases correction is obvious and anyone can fix an error, in some other cases only the author of the code can make out what exactly was intended there. It is on the question if one could create a tool that can correct errors "like in Word". PVS-Studio: V501 There are identical sub-expressions to the left and to the right of the '|' operator: SLC_VECTOR | SLC_VECTOR expression.cpp 2604 lock(N, getConversion(SLC_VECTOR | SLC_VECTOR,parameters[2])); SLC_VECTOR mentioned twice in such a context certainly signals an error. PVS-Studio: V505 The 'alloca' function is used inside the loop. This can quickly overflow stack. polygons.cpp 1120 inline void triangulatePolygon(...) { ... for (i=1;i<nloops;i++) { ... do { ... do { ... CTriVertex *snVertex = (CTriVertex *) alloca(2*sizeof(CTriVertex)); ... } while(dVertex != loops[0]); ... } while(sVertex != loops[i]); ... }
  • 6. ... } Having deep nesting, the alloca call might cause stack overflow. VirtualDub The total number of messages generated by the Visual Studio static analyzer is 24 messages, 0 of them being real errors. The total number of messages generated by PVS-Studio is 41, 2 of them being real errors. PVS-Studio: V547 Expression 'c < 0' is always false. Unsigned type value is never < 0. lexer.cpp 279 typedef unsigned short wint_t; wint_t lexgetescape() { wint_t c = lexgetc(); if (c < 0) fatal("Newline found in escape sequence"); ... } The code will never be called because the expression is always false. PVS-Studio: V557 Array overrun is possible. The '9' index is pointing beyond array bound. f_convolute.cpp 73 struct ConvoluteFilterData { long m[9]; long bias; void *dyna_func; DWORD dyna_size; DWORD dyna_old_protect;
  • 7. BOOL fClip; }; static unsigned long __fastcall do_conv( unsigned long *data, const ConvoluteFilterData *cfd, long sflags, long pit) { long rt0=cfd->m[9], gt0=cfd->m[9], bt0=cfd->m[9]; ... } A trivial array overflow. WinMerge The total number of messages generated by the Visual Studio static analyzer is 343, 3 of them being real errors. The total number of messages generated by PVS-Studio is 69, 12 of them being real errors. Visual Studio: warning C6313: Incorrect operator: zero-valued flag cannot be tested with bitwise-and. Use an equality test to check for zero-valued flags. c:winmergesrcbcmenu.cpp 1489 else if (nFlags&MF_STRING){ ASSERT(!(nFlags&MF_OWNERDRAW)); ModifyMenu(pos,nFlags,nID,mdata->GetString()); } Not very lucky condition. Of course, the programmer wanted to write something different, but it happened that way. Visual Studio: warning C6287: Redundant code: the left and right sub-expressions are identical. c:winmergesrceditlibccrystaleditview.cpp 1560
  • 8. PVS-Studio: V501 There are identical sub-expressions to the left and to the right of the '||' operator: c == '}' || c == '}' ccrystaleditview.cpp 1560 bool isclosebrace (TCHAR c) { return c == _T ('}') || c == _T ('}') || c == _T (']') || c == _T ('>'); } Not all the parentheses types are checked. Why? It is usual that "Copy-paste-technology" leads to errors. Visual Studio: warning C6287: Redundant code: the left and right sub-expressions are identical. c:winmergesrcmergedoc.cpp 1165 PVS-Studio: V501 There are identical sub-expressions to the left and to the right of the '||' operator. mergedoc.cpp 1165 if ((m_nBufferType[nBuffer] == BUFFER_UNNAMED) || (m_nBufferType[nBuffer] == BUFFER_UNNAMED)) nSaveErrorCode = SAVE_NO_FILENAME; Another unlucky condition and again it seems to be the copy-paste's fault. PVS-Studio: V551 The code under this 'case' label is unreachable. The value range of signed char type: [-128, 127]. ccrystaltextview.cpp 1646 TCHAR ch = strText[i];
  • 9. switch (ch) { case 0xB7: case 0xBB: strHTML += ch; strHTML += _T("<wbr>"); bLastCharSpace = FALSE; nNonbreakChars = 0; break; And here we have a sample of code which will never be used. Everything seems alright, case is written and all, but it will never get control because the value range is too narrow. TCHAR in this case is the char type. PVS-Studio: V524 It is odd that the body of 'IsValidTextPosX' function is fully equivalent to the body of 'IsValidTextPos' function (ccrystaltextview.cpp, line 3700). ccrystaltextview.cpp 3707 bool CCrystalTextView::IsValidTextPos (const CPoint &point) { return GetLineCount () > 0 && m_nTopLine >= 0 && m_nOffsetChar >= 0 && point.y >= 0 && point.y < GetLineCount () && point.x >= 0 && point.x <= GetLineLength (point.y); } bool CCrystalTextView::IsValidTextPosX (const CPoint &point) { return GetLineCount () > 0 && m_nTopLine >= 0 && m_nOffsetChar >= 0 && point.y >= 0 && point.y < GetLineCount () && point.x >= 0 && point.x <= GetLineLength (point.y);
  • 10. } bool CCrystalTextView::IsValidTextPosY (const CPoint &point) { return GetLineCount () > 0 && m_nTopLine >= 0 && m_nOffsetChar >= 0 && point.y >= 0 && point.y < GetLineCount (); } These are very similar functions... The developers copy-pasted again and again and forgot to fix the result. The IsValidTextPosX() function performs an excess check. PVS-Studio: V563 It is possible that this 'else' branch must apply to the previous 'if' statement. bcmenu.cpp 1852 if(IsLunaMenuStyle()) if(!xp_space_accelerators)return; else if(!original_space_accelerators)return; Who can look at the code and say exactly to what if else refers? Was it the thing the programmer wanted to do? Are you sure? PVS-Studio: V556 The values of different enum types are compared: switch(ENUM_TYPE_A) { case ENUM_TYPE_B: ... }. diffwrapper.cpp 956 enum output_style {} ... enum DiffOutputType m_outputStyle; switch (m_options.m_outputStyle) {
  • 11. case OUTPUT_CONTEXT: enum and switch types were a bit mixed up. But it's alright, isn't it? PVS-Studio: V530 The return value of function 'empty' is required to be utilized. diractions.cpp 1307 void CDirView::GetItemFileNames(int sel, String& strLeft, String& strRight) const { UINT_PTR diffpos = GetItemKey(sel); if (diffpos == (UINT_PTR)SPECIAL_ITEM_POS) { strLeft.empty(); strRight.empty(); The case when empty() does not empty. This is an example of an extremely wrong name for a method. PVS-Studio: V524 It is odd that the body of 'OnUpdateLastdiff' function is fully equivalent to the body of 'OnUpdateFirstdiff' function (DirView.cpp, line 2189). dirview.cpp 2220 void CDirView::OnUpdateLastdiff(CCmdUI* pCmdUI) { int firstDiff = GetFirstDifferentItem(); if (firstDiff > -1) pCmdUI->Enable(TRUE); else pCmdUI->Enable(FALSE); } void CDirView::OnUpdateFirstdiff(CCmdUI* pCmdUI)
  • 12. { int firstDiff = GetFirstDifferentItem(); if (firstDiff > -1) pCmdUI->Enable(TRUE); else pCmdUI->Enable(FALSE); } Two more very similar functions... PVS-Studio: V501 There are identical sub-expressions 'pView1->GetTextBufferEol (line)' to the left and to the right of the '!=' operator. mergedoclinediffs.cpp 216 if (pView1->GetTextBufferEol(line) != pView1->GetTextBufferEol(line)) { Either this or that... Or not? Perhaps there must be pView2 here. PVS-Studio: V530 The return value of function 'empty' is required to be utilized. varprop.cpp 133 void VariantValue::Clear() { m_vtype = VT_NULL; m_bvalue = false; m_ivalue = 0; m_fvalue = 0; m_svalue.empty(); m_tvalue = 0; }
  • 13. Again empty() does not empty the string at all. PVS-Studio: V510 The 'Format' function is not expected to receive class-type variable as 'N' actual argument". PropShel 105 String GetSysError(int nerr); ... CString msg; msg.Format( _T("Failed to open registry key HKCU/%s:nt%d : %s"), f_RegDir, retVal, GetSysError(retVal) ); When various emergencies occur, WinMerge will try to inform the user about errors but in some cases it will fail. At first sight everything looks OK but actually the "String" type is just "std::wstring". Therefore we will print rubbish at best or get an Access Violation error at worst. The correct code must have a call of c_str(). PVS-Studio: V534 It is likely that a wrong variable is being compared inside the 'for' operator. Consider reviewing 'i'." BinTrans.cpp 357 // Get length of translated array of bytes from text. int Text2BinTranslator::iLengthOfTransToBin( char* src, int srclen ) { ... for (k=i; i<srclen; k++) { if (src[k]=='>') break; } ...
  • 14. } The analyzer found a suspicious loop. This code is prone to Access Violation. The loop must go on until it finds the '>' character or a string with the length of 'srclen' characters comes to an end. But the programmer by accident used the 'k' variable instead of 'i' for comparison. If the '>' character is not found, everything will be sad. XUIFramework The total number of messages generated by the Visual Studio static analyzer is 93, 2 of them being real errors. The total number of messages generated by PVS-Studio is 30, 5 of them being real errors. Visual Studio: warning C6269: Possibly incorrect order of operations: dereference ignored c:xui-gui frameworkwidgetscstatichtmlppdrawmanager.cpp 298 PVS-Studio: V532 Consider inspecting the statement of '*pointer++' pattern. Probably meant: '(*pointer)++'. ppdrawmanager.cpp 298 for (DWORD pixel = 0; pixel < dwWidth * dwHeight; pixel++, *pBits++) Again the programmer is not good at using *ptr++. As I have said above, this is a widespread error. Visual Studio: warning C6283: 'pBuffer' is allocated with array new[], but deleted with scalar delete. c:xui-gui frameworkwidgetscxstaticcxstatic.cpp 544 BYTE* pBuffer = new BYTE [ nBufferLen ]; ... delete pBuffer; The programmer confuses delete and delete[]. This causes issues which may occur and may not. But you should not do so anyway. PVS-Studio: V519 The 'm_xSt' object is assigned values twice
  • 15. successively. Perhaps this is a mistake. resizedlg.cpp 244 m_xSt = CST_RESIZE; m_xSt = CST_RESIZE; Judging by the code, there must be m_ySt here. But we cannot keep from using copy-paste again and again, right? V531 It is odd that a sizeof() operator is multiplied by sizeof(). pphtmldrawer.cpp 258 DWORD dwLen = ::LoadString(hInstDll, dwID, szTemp, (sizeof(szTemp) * sizeof(TCHAR))); There must be sizeof(szTemp) / sizeof(TCHAR) . PVS-Studio: V556 The values of different enum types are compared: enuHAlign == Center. cxstatic.cpp 151 if (enuHAlign == Center) There must be enuHAlign == Midle. There is also if in the code nearby (enuVAlign == Middle) though it must be Center. Confusion with enum, in short. PVS-Studio: V501 There are identical sub-expressions to the left and to the right of the '||' operator. resizedlg.cpp 157 HDWP CItemCtrl::OnSize(...) { ... if (m_styTop == CST_ZOOM || m_styTop == CST_ZOOM || m_styBottom == CST_DELTA_ZOOM ||
  • 16. m_styBottom == CST_DELTA_ZOOM) ... } Perhaps the code must look this way: HDWP CItemCtrl::OnSize(...) { ... if (m_styTop == CST_ZOOM || m_styTop == CST_DELTA_ZOOM || m_styBottom == CST_ZOOM || m_styBottom == CST_DELTA_ZOOM) ... } Comparison results We do not draw any certain conclusions. One of the tools was better in some projects and the other tool was better in others. References 1. Andrey Karpov, Evgeniy Ryzhkov. Difficulties of comparing code analyzers, or don't forget about usability. http://www.viva64.com/en/a/0071/.