Oracle® Solaris Studio 12.4: C User's Guide

Exit Print View

Updated: March 2015
 
 

4.6.1 Diagnostics Performed by lint

lint-specific diagnostics are issued for three broad categories of conditions: inconsistent use, nonportable code, and questionable constructs. This section reviews examples of lint’s behavior in each of these areas, and suggests possible responses to the issues they raise.

4.6.1.1 Consistency Checks

Inconsistent use of variables, arguments, and functions is checked within files as well as across them. Generally speaking, the same checks are performed for prototype uses, declarations, and parameters as lint checks for old-style functions. If your program does not use function prototypes, lint checks the number and types of parameters in each call to a function more strictly than the compiler. lint also identifies mismatches of conversion specifications and arguments in [fs]printf() and [fs]scanf() control strings.

Examples:

  • Within files, lint flags non-void functions that return without giving a value to the invoking function. In the past, programmers often indicated that a function was not meant to return a value by omitting the return type: fun() {}. That convention has no meaning to the compiler, which assumes fun() has the return type int. Declare the function with the return type void to eliminate the problem.

  • Across files, lint detects cases where a non-void function does not return a value but is used in an expression as if it did, and the opposite problem where a function returns a value that is sometimes or always ignored. If the value is always ignored, an inefficiency in the function definition might be present, while sometimes ignoring the value could be bad programming style (typically, not testing for error conditions). If you do not need to check the return values of string functions like strcat(), strcpy(), and sprintf(), or output functions like printf() and putchar(), cast the offending calls to void.

  • lint identifies variables or functions that are declared but not used or defined, used, but not defined, or defined, but not used. When lint is applied to some but not all files of a collection to be loaded together, it issues error messages about functions and variables that are in the following situations:

    • Declared in those files but defined or used elsewhere

    • Used in those files but defined elsewhere

    • Defined in those files but used elsewhere

    Invoke the-x option to suppress the first situation, and -u to suppress the latter two.

4.6.1.2 Portability Checks

Some nonportable code is flagged by lint in its default behavior, and a few more cases are diagnosed when lint is invoked with -p or -pedantic. The latter causes lint to check for constructs that do not conform to the ISO C standard. For the messages issued under -p and-pedantic, see lint Libraries.

Examples:

  • In some C language implementations, character variables that are not explicitly declared signed or unsigned are treated as signed quantities with a range typically from -128 to 127. In other implementations, they are treated as nonnegative quantities with a range typically from 0 to 255. The following test, where EOF has the value -1, always fails on machines where character variables take on nonnegative values.

    char c;
    c = getchar();
    if (c == EOF) ...

    lint invoked with -p checks all comparisons that imply a plain char may have a negative value. However, declaring c as a signed char in the example eliminates the diagnostic, not the problem. getchar() must return all possible characters and a distinct EOF value, so a char cannot store its value. This example, perhaps the most common one arising from implementation-defined sign-extension, shows how a thoughtful application of lint’s portability option can help you discover bugs not related to portability. In any case, declare c as an int.

  • A similar issue arises with bit-fields. When constant values are assigned to bit-fields, the field may be too small to hold the value. On a machine that treats bit-fields of type int as unsigned quantities, the values allowed for int x:3 range from 0 to 7, whereas on machines that treat them as signed quantities, they range from -4 to 3. However, a three-bit field declared type int cannot hold the value 4 on the latter machines. lint invoked with -p flags all bit-field types other than unsigned int or signed int. These are the only portable bit-field types. The compiler supports int, char, short, and long bit-field types that may be unsigned, signed, or plain. It also supports the enum bit-field type.

  • Problems can arise when a larger-sized type is assigned to a smaller-sized type. If significant bits are truncated, accuracy is lost:

    short s;
    long l;
    s = l;

    lint flags all such assignments by default; the diagnostic can be suppressed by invoking the -a option. Bear in mind that you may be suppressing other diagnostics when you invoke lint with this or any other option. Check the list in lint Libraries for the options that suppress more than one diagnostic.

  • A cast of a pointer to one object type to a pointer to an object type with stricter alignment requirements might not be portable. lint flags the following example because, on most machines, an int cannot start on an arbitrary byte boundary, whereas a char can.

    int *fun(y)
    char *y;
    {
        return(int *)y;
    }

    You can suppress the diagnostic by invoking lint with -h, although, again, you may be disabling other messages. Better still, eliminate the problem by using the generic pointer void *.

  • ISO C leaves the order of evaluation of complicated expressions undefined. That is, when function calls, nested assignment statements, or the increment and decrement operators cause side effects when a variable is changed as a by-product of the evaluation of an expression, the order in which the side effects take place is highly machine-dependent. By default, lint flags any variable changed by a side effect and used elsewhere in the same expression:

    int a[10];
    main()
    {
        int i = 1;
        a[i++] = i;
    }

    In this example, the value of a[1] could be 1 with one compiler and 2 with a different compiler. The bitwise logical operator & can give rise to this diagnostic when it is mistakenly used in place of the logical operator &&:

    if ((c = getchar()) != EOF & c != ’0’)

4.6.1.3 Questionable Constructs

lint flags a miscellany of legal constructs that might not represent what the programmer intended. Examples:

  • An unsigned variable always has a nonnegative value. So the following test always fails:

    unsigned x;
    if (x < 0) ...

    The following test:

    unsigned x;
    if (x > 0) ...

    is equivalent to:

    if (x != 0) ...

    This result might not be the intended action. lint flags questionable comparisons of unsigned variables with negative constants or 0. To compare an unsigned variable to the bit pattern of a negative number, cast it to unsigned:

    if (u == (unsigned) -1) ...

    Or use the U suffix:

    if (u == -1U) ...
  • lint flags expressions without side effects that are used in a context where side effects are expected, that is, where the expression might not represent what the programmer intends. It issues an additional warning whenever the equality operator is found where the assignment operator is expected, that is, where a side effect is expected:

    int fun()
    {
        int a, b, x, y;
        (a = x) && (b == y);
    }
  • lint cautions you to parenthesize expressions that mix both the logical and bitwise operators (specifically, &, |, ^, <<, >>), where misunderstanding of operator precedence may lead to incorrect results. For example, because the precedence of bitwise & falls below logical ==, the expression:

    if (x & a == 0) ...

    is evaluated as:

    if (x & (a == 0)) ...

    This result is most likely not what was intended. Invoking lint with -h disables the diagnostic.