How to Install and Uninstall cppcheck Package on Ubuntu 16.04 LTS (Xenial Xerus)
Last updated: November 05,2024
1. Install "cppcheck" package
Please follow the guidelines below to install cppcheck on Ubuntu 16.04 LTS (Xenial Xerus)
$
sudo apt update
Copied
$
sudo apt install
cppcheck
Copied
2. Uninstall "cppcheck" package
This tutorial shows how to uninstall cppcheck on Ubuntu 16.04 LTS (Xenial Xerus):
$
sudo apt remove
cppcheck
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the cppcheck package on Ubuntu 16.04 LTS (Xenial Xerus)
Package: cppcheck
Priority: optional
Section: universe/devel
Installed-Size: 2963
Maintainer: Ubuntu Developers
Original-Maintainer: Joachim Reichel
Architecture: amd64
Version: 1.72-1
Depends: libc6 (>= 2.15), libgcc1 (>= 1:3.0), libpcre3, libstdc++6 (>= 5.2), libtinyxml2-2v5 (>= 2.0.2), python:any (>= 2.6~), python-pygments
Filename: pool/universe/c/cppcheck/cppcheck_1.72-1_amd64.deb
Size: 741832
MD5sum: becbd848378fe449f3182c39227d7f66
SHA1: 75a036da89f5e9de0fa9a71f6d2bff24db37ceef
SHA256: b35449c08f4b18c65a6afeb4ec6a4861ff38f8c4be96deebe320fed2250b0bce
Description-en: tool for static C/C++ code analysis (CLI)
Cppcheck is a command-line tool that tries to detect bugs that your
C/C++ compiler doesn't see. It is versatile, and can check non-standard
code including various compiler extensions, inline assembly code, etc.
Its internal preprocessor can handle includes, macros, and several
preprocessor commands. While Cppcheck is highly configurable,
you can start using it just by giving it a path to the source code.
.
It includes checks for:
* pointers to out-of-scope auto variables;
* assignment of auto variables to an effective parameter of a function;
* out-of-bounds errors in arrays and STL;
* missing class constructors;
* variables not initialized by a constructor;
* use of memset, memcpy, etcetera on a class;
* non-virtual destructors for base classes;
* operator= not returning a constant reference to itself;
* use of deprecated functions (mktemp, gets, scanf);
* exceptions thrown in destructors;
* memory leaks in class or function variables;
* C-style pointer cast in C++ code;
* redundant if;
* misuse of the strtol or sprintf functions;
* unsigned division or division by zero;
* unused functions and struct members;
* passing parameters by value;
* misuse of signed char variables;
* unusual pointer arithmetic (such as "abc" + 'd');
* dereferenced null pointers;
* incomplete statements;
* misuse of iterators when iterating through a container;
* dereferencing of erased iterators;
* use of invalidated vector iterators/pointers;
.
This package contains the command-line interface for cppcheck.
Description-md5: 903a51c0b0f5f635f1aa4d34e54a42f3
Homepage: http://sourceforge.net/p/cppcheck/wiki/Home/
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu
Priority: optional
Section: universe/devel
Installed-Size: 2963
Maintainer: Ubuntu Developers
Original-Maintainer: Joachim Reichel
Architecture: amd64
Version: 1.72-1
Depends: libc6 (>= 2.15), libgcc1 (>= 1:3.0), libpcre3, libstdc++6 (>= 5.2), libtinyxml2-2v5 (>= 2.0.2), python:any (>= 2.6~), python-pygments
Filename: pool/universe/c/cppcheck/cppcheck_1.72-1_amd64.deb
Size: 741832
MD5sum: becbd848378fe449f3182c39227d7f66
SHA1: 75a036da89f5e9de0fa9a71f6d2bff24db37ceef
SHA256: b35449c08f4b18c65a6afeb4ec6a4861ff38f8c4be96deebe320fed2250b0bce
Description-en: tool for static C/C++ code analysis (CLI)
Cppcheck is a command-line tool that tries to detect bugs that your
C/C++ compiler doesn't see. It is versatile, and can check non-standard
code including various compiler extensions, inline assembly code, etc.
Its internal preprocessor can handle includes, macros, and several
preprocessor commands. While Cppcheck is highly configurable,
you can start using it just by giving it a path to the source code.
.
It includes checks for:
* pointers to out-of-scope auto variables;
* assignment of auto variables to an effective parameter of a function;
* out-of-bounds errors in arrays and STL;
* missing class constructors;
* variables not initialized by a constructor;
* use of memset, memcpy, etcetera on a class;
* non-virtual destructors for base classes;
* operator= not returning a constant reference to itself;
* use of deprecated functions (mktemp, gets, scanf);
* exceptions thrown in destructors;
* memory leaks in class or function variables;
* C-style pointer cast in C++ code;
* redundant if;
* misuse of the strtol or sprintf functions;
* unsigned division or division by zero;
* unused functions and struct members;
* passing parameters by value;
* misuse of signed char variables;
* unusual pointer arithmetic (such as "abc" + 'd');
* dereferenced null pointers;
* incomplete statements;
* misuse of iterators when iterating through a container;
* dereferencing of erased iterators;
* use of invalidated vector iterators/pointers;
.
This package contains the command-line interface for cppcheck.
Description-md5: 903a51c0b0f5f635f1aa4d34e54a42f3
Homepage: http://sourceforge.net/p/cppcheck/wiki/Home/
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu