Checker | Guideline |
---|
Abnormal termination of exit handler | ENV32-C. All exit handlers must return normally |
Absorption of float operand | FLP00-C. Understand the limitations of floating-point numbers |
Accessing object with temporary lifetime | EXP35-C. Do not modify objects with temporary lifetime |
Alignment changed after memory allocation | MEM36-C. Do not modify the alignment of objects by calling realloc() |
Alternating input and output from a stream without flush or positioning call | FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call |
Arithmetic operation with NULL pointer | EXP34-C. Do not dereference null pointers |
Array access out of bounds | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
Array access out of bounds | ARR38-C. Guarantee that library functions do not form invalid pointers |
Array access out of bounds | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Array access out of bounds | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Array access out of bounds | ARR00-C. Understand how arrays work |
Array access out of bounds | MSC15-C. Do not depend on undefined behavior |
Array access with tainted index | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
Array access with tainted index | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Array access with tainted index | INT04-C. Enforce limits on integer values originating from tainted sources |
Bad file access mode or status | EXP37-C. Call functions with the correct number and type of arguments |
Bad file access mode or status | FIO11-C. Take care when specifying the mode parameter of fopen() |
Bad order of dropping privileges | POS36-C. Observe correct revocation order while relinquishing privileges |
Bitwise and arithmetic operation on the same data | INT14-C. Avoid performing bitwise and arithmetic operations on the same data |
Bitwise operation on negative value | INT13-C. Use bitwise operators only on unsigned operands |
Buffer overflow from incorrect string format specifier | ARR38-C. Guarantee that library functions do not form invalid pointers |
Buffer overflow from incorrect string format specifier | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Buffer overflow from incorrect string format specifier | STR03-C. Do not inadvertently truncate a string |
Call to memset with unintended value | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
Character value absorbed into EOF | FIO34-C. Distinguish between characters read from a file and EOF or WEOF |
Closing a previously closed resource | FIO46-C. Do not access a closed file |
Command executed from an externally controlled path | ENV33-C. Do not call system() |
Command executed from externally controlled path | STR02-C. Sanitize data passed to complex subsystems |
Constant block cipher initialization vector | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Constant cipher key | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Copy of overlapping memory | EXP43-C. Avoid undefined behavior when using restrict-qualified pointers |
Copy of overlapping memory | MSC15-C. Do not depend on undefined behavior |
Data race | CON32-C. Prevent data races when accessing bit-fields from multiple threads |
Data race | CON43-C. Do not allow data races in multithreaded code |
Data race | POS49-C. When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed |
Data race | CON09-C. Avoid the ABA problem when using lock-free algorithms |
Data race through standard library function call | CON33-C. Avoid race conditions when using library functions |
Dead code | MSC01-C. Strive for logical completeness |
Dead code | MSC07-C. Detect and remove dead code |
Dead code | MSC12-C. Detect and remove code that has no effect or is never executed |
Deadlock | CON35-C. Avoid deadlock by locking in a predefined order |
Deadlock | POS51-C. Avoid deadlock with POSIX threads by locking in predefined order |
Deallocation of previously deallocated pointer | MEM30-C. Do not access freed memory |
Deallocation of previously deallocated pointer | MEM00-C. Allocate and free memory in the same module, at the same level of abstraction |
Declaration mismatch | DCL40-C. Do not create incompatible declarations of the same function or object |
Declaration mismatch | EXP37-C. Call functions with the correct number and type of arguments |
Declaration mismatch | MSC15-C. Do not depend on undefined behavior |
Destination buffer overflow in string manipulation | ARR38-C. Guarantee that library functions do not form invalid pointers |
Destination buffer overflow in string manipulation | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Destination buffer overflow in string manipulation | STR38-C. Do not confuse narrow and wide character strings and functions |
Destination buffer overflow in string manipulation | ENV01-C. Do not make assumptions about the size of an environment variable |
Destination buffer overflow in string manipulation | STR07-C. Use the bounds-checking interfaces for string manipulation |
Destination buffer underflow in string manipulation | ARR38-C. Guarantee that library functions do not form invalid pointers |
Destruction of locked mutex | CON31-C. Do not destroy a mutex while it is locked |
Destruction of locked mutex | POS48-C. Do not unlock or destroy another POSIX thread's mutex |
Deterministic random output from constant seed | MSC32-C. Properly seed pseudorandom number generators |
Double lock | CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction |
Double unlock | CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction |
Environment pointer invalidated by previous operation | ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it |
Errno not checked | ERR33-C. Detect and handle standard library errors |
Errno not reset | ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure |
Execution of externally controlled command | ENV33-C. Do not call system() |
Execution of externally controlled command | STR02-C. Sanitize data passed to complex subsystems |
File access between time of check and use (TOCTOU) | FIO45-C. Avoid TOCTOU race conditions while accessing files |
File access between time of check and use (TOCTOU) | POS35-C. Avoid race conditions while checking for the existence of a symbolic link |
File access between time of check and use (TOCTOU) | FIO01-C. Be careful using functions that use file names for identification |
File descriptor exposure to child process | POS38-C. Beware of race conditions when using fork and file descriptors |
File manipulation after chroot() without chdir("/") | POS05-C. Limit access to files by creating a jail |
Float conversion overflow | FLP34-C. Ensure that floating-point conversions are within range of the new type |
Float conversion overflow | FLP03-C. Detect and handle floating-point errors |
Float division by zero | FLP03-C. Detect and handle floating-point errors |
Float overflow | FLP03-C. Detect and handle floating-point errors |
Float overflow | FLP06-C. Convert integers to floating point for floating-point operations |
Floating point comparison with equality operators | FLP02-C. Avoid using floating-point numbers when precise computation is needed |
Format string specifiers and arguments mismatch | EXP37-C. Call functions with the correct number and type of arguments |
Format string specifiers and arguments mismatch | DCL10-C. Maintain the contract between the writer and caller of variadic functions |
Format string specifiers and arguments mismatch | DCL11-C. Understand the type issues associated with variadic functions |
Format string specifiers and arguments mismatch | INT00-C. Understand the data model used by your implementation(s) |
Format string specifiers and arguments mismatch | MSC15-C. Do not depend on undefined behavior |
Function called from signal-handler not asynchronous safe | SIG30-C. Call only asynchronous-safe functions within signal handlers |
Function called from signal-handler not asynchronous safe (strict) | SIG30-C. Call only asynchronous-safe functions within signal handlers |
Hard coded buffer size | DCL06-C. Use meaningful symbolic constants to represent literal values |
Hard coded loop boundary | DCL06-C. Use meaningful symbolic constants to represent literal values |
Hard-coded object size used to manipulate memory | EXP09-C. Use sizeof to determine the size of a type or variable |
Improper array initialization | ARR00-C. Understand how arrays work |
Improper array initialization | ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer |
Incorrect data type passed to va_arg | EXP47-C. Do not call va_arg with an argument of the incorrect type |
Incorrect pointer scaling | ARR39-C. Do not add or subtract a scaled integer to a pointer |
Incorrect pointer scaling | EXP08-C. Ensure pointer arithmetic is used correctly |
Information leak via structure padding | DCL39-C. Avoid information leakage when passing a structure across a trust boundary |
Inline constraint not respected | MSC40-C. Do not violate constraints |
Integer conversion overflow | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
Integer conversion overflow | FLP34-C. Ensure that floating-point conversions are within range of the new type |
Integer conversion overflow | INT02-C. Understand integer conversion rules |
Integer conversion overflow | INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression |
Integer conversion overflow | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
Integer division by zero | INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors |
Integer overflow | INT32-C. Ensure that operations on signed integers do not result in overflow |
Integer overflow | INT00-C. Understand the data model used by your implementation(s) |
Integer overflow | INT02-C. Understand integer conversion rules |
Integer overflow | INT08-C. Verify that all integer values are in range |
Integer overflow | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
Integer overflow | MSC15-C. Do not depend on undefined behavior |
Invalid assumptions about memory organization | ARR37-C. Do not add or subtract an integer to a pointer to a non-array object |
Invalid file position | FIO44-C. Only use values for fsetpos() that are returned from fgetpos() |
Invalid free of pointer | MEM34-C. Only free memory allocated dynamically |
Invalid free of pointer | MEM00-C. Allocate and free memory in the same module, at the same level of abstraction |
Invalid use of = operator | EXP45-C. Do not perform assignments in selection statements |
Invalid use of standard library floating point routine | FLP32-C. Prevent or detect domain and range errors in math functions |
Invalid use of standard library floating point routine | FLP03-C. Detect and handle floating-point errors |
Invalid use of standard library integer routine | STR37-C. Arguments to character-handling functions must be representable as an unsigned char |
Invalid use of standard library memory routine | EXP34-C. Do not dereference null pointers |
Invalid use of standard library memory routine | ARR38-C. Guarantee that library functions do not form invalid pointers |
Invalid use of standard library memory routine | ARR39-C. Do not add or subtract a scaled integer to a pointer |
Invalid use of standard library memory routine | API00-C. Functions should validate their parameters |
Invalid use of standard library memory routine | EXP08-C. Ensure pointer arithmetic is used correctly |
Invalid use of standard library memory routine | MSC15-C. Do not depend on undefined behavior |
Invalid use of standard library routine | API00-C. Functions should validate their parameters |
Invalid use of standard library routine | MSC15-C. Do not depend on undefined behavior |
Invalid use of standard library string routine | ARR38-C. Guarantee that library functions do not form invalid pointers |
Invalid use of standard library string routine | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Invalid use of standard library string routine | STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string |
Invalid use of standard library string routine | MEM30-C. Do not access freed memory |
Invalid use of standard library string routine | API00-C. Functions should validate their parameters |
Invalid use of standard library string routine | MSC15-C. Do not depend on undefined behavior |
Invalid va_list argument | MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value |
Library loaded from externally controlled path | STR02-C. Sanitize data passed to complex subsystems |
Library loaded from externally controlled path | WIN00-C. Be specific when dynamically loading libraries |
Load of library from a relative path can be controlled by an external actor | WIN00-C. Be specific when dynamically loading libraries |
Loop bounded with tainted value | INT04-C. Enforce limits on integer values originating from tainted sources |
Loop bounded with tainted value | MSC21-C. Use robust loop termination conditions |
Memory allocated with tainted size | ARR32-C. Ensure size arguments for variable length arrays are in a valid range |
Memory allocation with tainted size | MEM35-C. Allocate sufficient memory for an object |
Memory allocation with tainted size | INT04-C. Enforce limits on integer values originating from tainted sources |
Memory allocation with tainted size | MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap |
Memory allocation with tainted size | MEM10-C. Define and use a pointer validation function |
Memory allocation with tainted size | MEM11-C. Do not assume infinite heap space |
Memory comparison of float-point values | FLP37-C. Do not use object representations to compare floating-point values |
Memory comparison of padding data | EXP42-C. Do not compare padding data |
Memory leak | MEM31-C. Free dynamically allocated memory when no longer needed |
Memory leak | MEM11-C. Do not assume infinite heap space |
Memory leak | MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources |
Mismatch between data length and size | ARR38-C. Guarantee that library functions do not form invalid pointers |
Mismatched alloc/dealloc functions on Windows | WIN30-C. Properly pair allocation and deallocation functions |
MISRA C:2012 Dir 4.5 | DCL02-C. Use visually distinct identifiers |
MISRA C:2012 Dir 4.6 | INT00-C. Understand the data model used by your implementation(s) |
MISRA C:2012 Dir 4.8 | DCL12-C. Implement abstract data types using opaque types |
MISRA C:2012 Dir 4.9 | PRE00-C. Prefer inline or static functions to function-like macros |
MISRA C:2012 Dir 4.10 | PRE06-C. Enclose header files in an include guard |
MISRA C:2012 Dir 4.13 | MEM30-C. Do not access freed memory |
MISRA C:2012 Dir 4.14 | INT04-C. Enforce limits on integer values originating from tainted sources |
MISRA C:2012 Dir 4.14 | INT10-C. Do not assume a positive remainder when using the % operator |
MISRA C:2012 Dir 4.14 | STR02-C. Sanitize data passed to complex subsystems |
MISRA C:2012 Directive 4.14 | EXP34-C. Do not dereference null pointers |
MISRA C:2012 Rule 1.2 | MSC04-C. Use comments consistently and in a readable fashion |
MISRA C:2012 Rule 2.1 | MSC07-C. Detect and remove dead code |
MISRA C:2012 Rule 2.1 | MSC12-C. Detect and remove code that has no effect or is never executed |
MISRA C:2012 Rule 2.2 | DCL22-C. Use volatile for data that cannot be cached |
MISRA C:2012 Rule 2.2 | MSC12-C. Detect and remove code that has no effect or is never executed |
MISRA C:2012 Rule 3.1 | MSC04-C. Use comments consistently and in a readable fashion |
MISRA C:2012 Rule 4.2 | PRE07-C. Avoid using repeated question marks |
MISRA C:2012 Rule 5.1 | DCL40-C. Do not create incompatible declarations of the same function or object |
MISRA C:2012 Rule 5.1 | DCL23-C. Guarantee that mutually visible identifiers are unique |
MISRA C:2012 Rule 5.2 | DCL23-C. Guarantee that mutually visible identifiers are unique |
MISRA C:2012 Rule 5.3 | DCL01-C. Do not reuse variable names in subscopes |
MISRA C:2012 Rule 5.3 | DCL23-C. Guarantee that mutually visible identifiers are unique |
MISRA C:2012 Rule 5.4 | DCL23-C. Guarantee that mutually visible identifiers are unique |
MISRA C:2012 Rule 5.5 | DCL23-C. Guarantee that mutually visible identifiers are unique |
MISRA C:2012 Rule 6.1 | INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression |
MISRA C:2012 Rule 7.1 | DCL18-C. Do not begin integer constants with 0 when specifying a decimal value |
MISRA C:2012 Rule 7.3 | DCL16-C. Use "L," not "l," to indicate a long value |
MISRA C:2012 Rule 8.1 | DCL31-C. Declare identifiers before using them |
MISRA C:2012 Rule 8.2 | DCL36-C. Do not declare an identifier with conflicting linkage classifications |
MISRA C:2012 Rule 8.2 | DCL07-C. Include the appropriate type information in function declarators |
MISRA C:2012 Rule 8.2 | DCL20-C. Explicitly specify void when a function accepts no arguments |
MISRA C:2012 Rule 8.3 | DCL40-C. Do not create incompatible declarations of the same function or object |
MISRA C:2012 Rule 8.3 | EXP37-C. Call functions with the correct number and type of arguments |
MISRA C:2012 Rule 8.4 | DCL36-C. Do not declare an identifier with conflicting linkage classifications |
MISRA C:2012 Rule 8.7 | DCL15-C. Declare file-scope objects or functions that do not need external linkage as static |
MISRA C:2012 Rule 8.7 | DCL19-C. Minimize the scope of variables and functions |
MISRA C:2012 Rule 8.8 | DCL36-C. Do not declare an identifier with conflicting linkage classifications |
MISRA C:2012 Rule 8.8 | DCL15-C. Declare file-scope objects or functions that do not need external linkage as static |
MISRA C:2012 Rule 8.9 | DCL19-C. Minimize the scope of variables and functions |
MISRA C:2012 Rule 8.11 | ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer |
MISRA C:2012 Rule 8.12 | INT09-C. Ensure enumeration constants map to unique values |
MISRA C:2012 Rule 8.13 | DCL13-C. Declare function parameters that are pointers to values not changed by the function as const |
MISRA C:2012 Rule 8.14 | EXP43-C. Avoid undefined behavior when using restrict-qualified pointers |
MISRA C:2012 Rule 9.5 | ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer |
MISRA C:2012 Rule 10.1 | EXP46-C. Do not use a bitwise operator with a Boolean-like operand |
MISRA C:2012 Rule 10.1 | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
MISRA C:2012 Rule 10.1 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 10.1 | INT07-C. Use only explicitly signed or unsigned char type for numeric values |
MISRA C:2012 Rule 10.1 | INT13-C. Use bitwise operators only on unsigned operands |
MISRA C:2012 Rule 10.1 | INT16-C. Do not make assumptions about representation of signed integers |
MISRA C:2012 Rule 10.1 | STR04-C. Use plain char for characters in the basic character set |
MISRA C:2012 Rule 10.2 | STR04-C. Use plain char for characters in the basic character set |
MISRA C:2012 Rule 10.3 | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
MISRA C:2012 Rule 10.3 | FLP06-C. Convert integers to floating point for floating-point operations |
MISRA C:2012 Rule 10.3 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 10.3 | INT07-C. Use only explicitly signed or unsigned char type for numeric values |
MISRA C:2012 Rule 10.3 | STR04-C. Use plain char for characters in the basic character set |
MISRA C:2012 Rule 10.4 | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
MISRA C:2012 Rule 10.4 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 10.4 | INT07-C. Use only explicitly signed or unsigned char type for numeric values |
MISRA C:2012 Rule 10.4 | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
MISRA C:2012 Rule 10.4 | STR04-C. Use plain char for characters in the basic character set |
MISRA C:2012 Rule 10.6 | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
MISRA C:2012 Rule 10.6 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 10.6 | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
MISRA C:2012 Rule 10.7 | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
MISRA C:2012 Rule 10.7 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 10.7 | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
MISRA C:2012 Rule 10.8 | INT02-C. Understand integer conversion rules |
MISRA C:2012 Rule 11.1 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
MISRA C:2012 Rule 11.1 | EXP37-C. Call functions with the correct number and type of arguments |
MISRA C:2012 Rule 11.1 | DCL07-C. Include the appropriate type information in function declarators |
MISRA C:2012 Rule 11.2 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
MISRA C:2012 Rule 11.3 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
MISRA C:2012 Rule 11.3 | EXP39-C. Do not access a variable through a pointer of an incompatible type |
MISRA C:2012 Rule 11.5 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
MISRA C:2012 Rule 11.6 | INT36-C. Converting a pointer to integer or integer to pointer |
MISRA C:2012 Rule 11.7 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
MISRA C:2012 Rule 11.8 | EXP32-C. Do not access a volatile object through a nonvolatile reference |
MISRA C:2012 Rule 11.8 | EXP05-C. Do not cast away a const qualification |
MISRA C:2012 Rule 12.1 | EXP00-C. Use parentheses for precedence of operation |
MISRA C:2012 Rule 12.5 | ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array |
MISRA C:2012 Rule 13.2 | PRE31-C. Avoid side effects in arguments to unsafe macros |
MISRA C:2012 Rule 13.2 | EXP30-C. Do not depend on the order of evaluation for side effects |
MISRA C:2012 Rule 13.2 | EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place |
MISRA C:2012 Rule 13.6 | EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic |
MISRA C:2012 Rule 14.1 | FLP30-C. Do not use floating-point variables as loop counters |
MISRA C:2012 Rule 15.6 | EXP19-C. Use braces for the body of an if, for, or while statement |
MISRA C:2012 Rule 16.1 | DCL41-C. Do not declare variables inside a switch statement before the first case label |
MISRA C:2012 Rule 16.2 | MSC20-C. Do not use a switch statement to transfer control into a complex block |
MISRA C:2012 Rule 17.1 | DCL10-C. Maintain the contract between the writer and caller of variadic functions |
MISRA C:2012 Rule 17.1 | DCL11-C. Understand the type issues associated with variadic functions |
MISRA C:2012 Rule 17.1 | ERR00-C. Adopt and implement a consistent and comprehensive error-handling policy |
MISRA C:2012 Rule 17.2 | MEM05-C. Avoid large stack allocations |
MISRA C:2012 Rule 17.3 | DCL31-C. Declare identifiers before using them |
MISRA C:2012 Rule 17.3 | DCL36-C. Do not declare an identifier with conflicting linkage classifications |
MISRA C:2012 Rule 17.3 | EXP37-C. Call functions with the correct number and type of arguments |
MISRA C:2012 Rule 17.7 | ERR33-C. Detect and handle standard library errors |
MISRA C:2012 Rule 18.1 | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
MISRA C:2012 Rule 18.1 | ARR39-C. Do not add or subtract a scaled integer to a pointer |
MISRA C:2012 Rule 18.1 | EXP08-C. Ensure pointer arithmetic is used correctly |
MISRA C:2012 Rule 18.2 | ARR36-C. Do not subtract or compare two pointers that do not refer to the same array |
MISRA C:2012 Rule 18.2 | EXP08-C. Ensure pointer arithmetic is used correctly |
MISRA C:2012 Rule 18.3 | EXP08-C. Ensure pointer arithmetic is used correctly |
MISRA C:2012 Rule 18.6 | DCL30-C. Declare objects with appropriate storage durations |
MISRA C:2012 Rule 18.6 | MEM30-C. Do not access freed memory |
MISRA C:2012 Rule 20.7 | PRE01-C. Use parentheses within macros around parameter names |
MISRA C:2012 Rule 21.1 | DCL37-C. Do not declare or define a reserved identifier |
MISRA C:2012 Rule 21.2 | DCL37-C. Do not declare or define a reserved identifier |
MISRA C:2012 Rule 21.3 | API03-C. Create consistent interfaces and capabilities across related functions |
MISRA C:2012 Rule 21.16 | EXP42-C. Do not compare padding data |
MISRA C:2012 Rule 21.17 | STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string |
MISRA C:2012 Rule 21.19 | ENV30-C. Do not modify the object referenced by the return value of certain functions |
MISRA C:2012 Rule 22.1 | MEM30-C. Do not access freed memory |
MISRA C:2012 Rule 22.1 | FIO42-C. Close files when they are no longer needed | MISRA C:2012 Rule 22.2 | MEM30-C. Do not access freed memory |
MISRA C:2012 Rule 22.2 | MEM34-C. Only free memory allocated dynamically |
MISRA C:2012 Rule 22.7 | FIO34-C. Distinguish between characters read from a file and EOF or WEOF |
MISRA C:2012 Rule 22.8 | ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure |
MISRA C:2012 Rule 22.9 | ERR33-C. Detect and handle standard library errors |
MISRA C:2012 Rule 22.10 | ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure |
Missing break of switch case | MSC17-C. Finish every set of statements associated with a case label with a break statement |
Missing byte reordering when transferring data | POS39-C. Use the correct byte ordering when transferring data between systems |
Missing case for switch condition | MSC01-C. Strive for logical completeness |
Missing case for switch condition | MSC07-C. Detect and remove dead code |
Missing lock | CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction |
Missing null in string array | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Missing null in string array | STR11-C. Do not specify the bound of a character array initialized with a string literal |
Missing reset of a freed pointer | MEM01-C. Store a new value in pointers immediately after free() |
Missing return statement | MSC37-C. Ensure that control never reaches the end of a non-void function |
Missing unlock | CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction |
Missing unlock | MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources |
Misuse of a FILE object | FIO38-C. Do not copy a FILE object |
Misuse of errno | ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure |
Misuse of errno in a signal handler | ERR32-C. Do not rely on indeterminate values of errno |
Misuse of readlink() | POS30-C. Use the readlink() function properly |
Misuse of return value from nonreentrant standard function | ENV34-C. Do not store pointers returned by certain functions |
Misuse of sign-extended character value | STR34-C. Cast characters to unsigned char before converting to larger integer sizes |
Misuse of sign-extended character value | STR37-C. Arguments to character-handling functions must be representable as an unsigned char |
Misuse of structure with flexible-array member | MEM33-C. Allocate and copy structures containing a flexible array member dynamically |
Modification of internal buffer returned from nonreentrant standard function | ENV30-C. Do not modify the object referenced by the return value of certain functions |
Modification of internal buffer returned from nonreentrant standard function | STR06-C. Do not assume that strtok() leaves the parse string unchanged |
Non-initialized pointer | EXP33-C. Do not read uninitialized memory |
Non-initialized pointer | MSC15-C. Do not depend on undefined behavior |
Non-initialized variable | EXP33-C. Do not read uninitialized memory |
Non-initialized variable | MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value |
Non-initialized variable | MSC15-C. Do not depend on undefined behavior |
Null pointer | EXP34-C. Do not dereference null pointers |
Null pointer | MSC15-C. Do not depend on undefined behavior |
Opening previously opened resource | FIO24-C. Do not open a file that is already open |
Overlapping assignment | MSC15-C. Do not depend on undefined behavior |
Pointer access out of bounds | EXP39-C. Do not access a variable through a pointer of an incompatible type |
Pointer access out of bounds | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
Pointer access out of bounds | ARR38-C. Guarantee that library functions do not form invalid pointers |
Pointer access out of bounds | ARR39-C. Do not add or subtract a scaled integer to a pointer |
Pointer access out of bounds | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Pointer access out of bounds | MEM35-C. Allocate sufficient memory for an object |
Pointer access out of bounds | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Pointer access out of bounds | EXP08-C. Ensure pointer arithmetic is used correctly |
Pointer access out of bounds | MSC15-C. Do not depend on undefined behavior |
Pointer dereference with tainted offset | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
Pointer dereference with tainted offset | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Pointer or reference to stack variable leaving scope | DCL30-C. Declare objects with appropriate storage durations |
Possible misuse of sizeof | ARR38-C. Guarantee that library functions do not form invalid pointers |
Possible misuse of sizeof | ARR39-C. Do not add or subtract a scaled integer to a pointer |
Possible misuse of sizeof | ARR00-C. Understand how arrays work |
Possible misuse of sizeof | ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array |
Possibly unintended evaluation of expression because of operator precedence rules | EXP00-C. Use parentheses for precedence of operation |
Possibly unintended evaluation of expression because of operator precedence rules | EXP13-C. Treat relational and equality operators as if they were nonassociative |
Predefined macro used as object | MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro |
Predictable block cipher initialization vector | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Predictable cipher key | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Predictable random output from predictable seed | MSC32-C. Properly seed pseudorandom number generators |
Preprocessor directive in macro argument | PRE32-C. Do not use preprocessor directives in invocations of function-like macros |
Privilege drop not verified | POS37-C. Ensure that privilege relinquishment is successful |
Qualifier removed in conversion | EXP32-C. Do not access a volatile object through a nonvolatile reference |
Qualifier removed in conversion | EXP37-C. Call functions with the correct number and type of arguments |
Qualifier removed in conversion | EXP05-C. Do not cast away a const qualification | Resource leak | FIO42-C. Close files when they are no longer needed |
Resource leak | MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources |
Return from computational exception signal handler | SIG35-C. Do not return from a computational exception signal handler |
Return value of a sensitive function not checked | ERR33-C. Detect and handle standard library errors |
Returned value of a sensitive function not checked | POS54-C. Detect and handle POSIX library errors |
Returned value of a sensitive function not checked | EXP12-C. Do not ignore values returned by functions |
Sensitive data printed out | MEM06-C. Ensure that sensitive data is not written out to disk |
Sensitive heap memory not cleared before release | MEM03-C. Clear sensitive information stored in reusable resources |
Sensitive heap memory not cleared before release | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Shared data access within signal handler | SIG31-C. Do not access shared objects in signal handlers |
Shift of a negative value | INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand |
Shift operation overflow | INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand |
Side effect of expression ignored | EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic |
Sign change integer conversion overflow | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
Signal call from within signal handler | SIG34-C. Do not call signal() from within interruptible signal handlers |
Standard function call with incorrect arguments | EXP37-C. Call functions with the correct number and type of arguments |
Standard function call with incorrect arguments | STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string |
Standard function call with incorrect arguments | FIO46-C. Do not access a closed file |
Standard function call with incorrect arguments | API00-C. Functions should validate their parameters |
Standard function call with incorrect arguments | MSC15-C. Do not depend on undefined behavior |
Stream argument with possibly unintended side effects | FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects |
Subtraction or comparison between pointers to different arrays | ARR36-C. Do not subtract or compare two pointers that do not refer to the same array |
Tainted Data Defects | API00-C. Functions should validate their parameters |
Tainted division operand | INT32-C. Ensure that operations on signed integers do not result in overflow |
Tainted division operand | INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors |
Tainted modulo operand | INT32-C. Ensure that operations on signed integers do not result in overflow |
Tainted modulo operand | INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors |
Tainted modulo operand | INT10-C. Do not assume a positive remainder when using the % operator |
Tainted NULL or non-null-terminated string | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Tainted NULL or non-null-terminated string | STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string |
Tainted NULL or non-null-terminated string | ENV01-C. Do not make assumptions about the size of an environment variable |
Tainted NULL or non-null-terminated string | FIO17-C. Do not rely on an ending null character when using fread() |
Tainted sign change conversion | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
Tainted sign change conversion | INT02-C. Understand integer conversion rules |
Tainted sign change conversion | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
Tainted sign change conversion | MEM04-C. Beware of zero-length allocations |
Tainted sign change conversion | MEM11-C. Do not assume infinite heap space |
Tainted sign change conversion | MSC21-C. Use robust loop termination conditions |
Tainted size of variable length array | ARR32-C. Ensure size arguments for variable length arrays are in a valid range |
Tainted size of variable length array | INT04-C. Enforce limits on integer values originating from tainted sources |
Tainted size of variable length array | MEM04-C. Beware of zero-length allocations |
Tainted size of variable length array | MEM05-C. Avoid large stack allocations |
Tainted string format | FIO30-C. Exclude user input from format strings |
Too many va_arg calls for current argument list | EXP47-C. Do not call va_arg with an argument of the incorrect type |
Umask used with chmod-style arguments | FIO06-C. Create files with appropriate access permissions |
Uncleared sensitive data in stack | MEM03-C. Clear sensitive information stored in reusable resources |
Uncleared sensitive data in stack | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Universal character name from token concatenation | PRE30-C. Do not create a universal character name through concatenation |
Unprotected dynamic memory allocation | ERR33-C. Detect and handle standard library errors |
Unprotected dynamic memory allocation | MEM10-C. Define and use a pointer validation function |
Unprotected dynamic memory allocation | MEM11-C. Do not assume infinite heap space |
Unreachable code | MSC01-C. Strive for logical completeness |
Unreachable code | MSC07-C. Detect and remove dead code |
Unreachable code | MSC12-C. Detect and remove code that has no effect or is never executed |
Unreliable cast of function pointer | EXP37-C. Call functions with the correct number and type of arguments |
Unreliable cast of function pointer | MSC15-C. Do not depend on undefined behavior |
Unreliable cast of pointer | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
Unreliable cast of pointer | EXP39-C. Do not access a variable through a pointer of an incompatible type |
Unreliable cast of pointer | STR38-C. Do not confuse narrow and wide character strings and functions |
Unreliable cast of pointer | MSC15-C. Do not depend on undefined behavior |
Unsafe call to a system function | ENV33-C. Do not call system() |
Unsafe conversion between pointer and integer | INT36-C. Converting a pointer to integer or integer to pointer |
Unsafe conversion from string to numeric value | ERR34-C. Detect errors when converting a string to a number |
Unsafe standard encryption function | MSC18-C. Be careful while handling sensitive data, such as passwords, in program code |
Unsigned integer conversion overflow | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
Unsigned integer conversion overflow | FLP34-C. Ensure that floating-point conversions are within range of the new type |
Unsigned integer conversion overflow | INT02-C. Understand integer conversion rules |
Unsigned integer conversion overflow | INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
Unsigned integer overflow | INT30-C. Ensure that unsigned integer operations do not wrap |
Unused parameter | MSC13-C. Detect and remove unused values |
Use of automatic variable as putenv-family function argument | POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument |
Use of dangerous standard function | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
Use of dangerous standard function | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Use of dangerous standard function | ENV01-C. Do not make assumptions about the size of an environment variable |
Use of dangerous standard function | PRE09-C. Do not replace secure functions with deprecated or obsolescent functions |
Use of dangerous standard function | STR07-C. Use the bounds-checking interfaces for string manipulation |
Use of indeterminate string | FIO40-C. Reset strings on fgets() or fgetws() failure |
Use of memset with size argument zero | MSC12-C. Detect and remove code that has no effect or is never executed |
Use of non-secure temporary file | FIO03-C. Do not make assumptions about fopen() and file creation |
Use of non-secure temporary file | FIO21-C. Do not create temporary files in shared directories |
Use of obsolete standard function | MSC33-C. Do not pass invalid data to the asctime() function |
Use of obsolete standard function | POS33-C. Do not use vfork() |
Use of obsolete standard function | MSC24-C. Do not use deprecated or obsolescent functions |
Use of obsolete standard function | PRE09-C. Do not replace secure functions with deprecated or obsolescent functions |
Use of plain char type for numerical value | INT07-C. Use only explicitly signed or unsigned char type for numeric values |
Use of previously closed resource | FIO46-C. Do not access a closed file |
Use of previously freed pointer | MEM30-C. Do not access freed memory |
Use of previously freed pointer | MEM00-C. Allocate and free memory in the same module, at the same level of abstraction |
Use of setjmp/longjmp | MSC22-C. Use the setjmp(), longjmp() facility securely |
Use of tainted pointer | EXP34-C. Do not dereference null pointers |
Use of tainted pointer | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
Use of tainted pointer | ARR38-C. Guarantee that library functions do not form invalid pointers |
Use of tainted pointer | API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size |
Use of tainted pointer | MEM10-C. Define and use a pointer validation function |
Use of tainted pointer | MSC15-C. Do not depend on undefined behavior |
Variable length array with nonpositive size | MEM04-C. Beware of zero-length allocations |
Variable length array with nonpositive size | MEM05-C. Avoid large stack allocations |
Variable shadowing | DCL01-C. Do not reuse variable names in subscopes |
Vulnerable path manipulation | FIO02-C. Canonicalize path names originating from tainted sources |
Vulnerable permission assignments | FIO06-C. Create files with appropriate access permissions |
Vulnerable pseudo-random number generator | MSC30-C. Do not use the rand() function for generating pseudorandom numbers |
Write without a further read | DCL22-C. Use volatile for data that cannot be cached |
Write without a further read | MSC13-C. Detect and remove unused values |
Writing to const qualified object | EXP40-C. Do not modify constant objects |
Writing to const qualified object | STR30-C. Do not attempt to modify string literals |
Writing to const qualified object | MSC15-C. Do not depend on undefined behavior |
Writing to const qualified object | STR05-C. Use pointers to const when referring to string literals |
Writing to const qualified object | STR06-C. Do not assume that strtok() leaves the parse string unchanged |
Wrong allocated object size for cast | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
Wrong allocated object size for cast | STR38-C. Do not confuse narrow and wide character strings and functions |
Wrong allocated object size for cast | MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type |
Wrong type used in sizeof | MEM35-C. Allocate sufficient memory for an object |
Wrong type used in sizeof | ARR00-C. Understand how arrays work |
Wrong type used in sizeof | ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array |
Wrong type used in sizeof | MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type |