cat /build/scottz/t2.cpp && aCC -V && aCC -c +w /build/scottz/t2.cpp
#include <cstdlib>
int main()
{
static char * test = 0;
if (!test) {
test = (char *)std::malloc (12345);
*test = '\0';
}
return 0;
}
aCC: HP C/aC++ B3910B A.06.16 [Nov 26 2007]
"/build/scottz/t2.cpp", line 8, procedure main: warning #20200-D:
Potential
null pointer dereference through test is detected (null
definition:/build/scottz/t2.cpp, line 7)
this test case shows that the warning is bogus because the pointer
"test" is pointing to a valid location in memory after std::malloc is
performed.