Tool | Version | Checker | Description |
---|
Astrée | |
| Supported via MISRA C:2012 Rules 10.1, 10.3, 10.4, 10.6 and 10.7 |
CodeSonar | | LANG.CAST.PC.AV LANG.CAST.PC.CONST2PTR LANG.CAST.PC.INT LANG.CAST.COERCE LANG.CAST.VALUE ALLOC.SIZE.TRUNC MISC.MEM.SIZE.TRUNC LANG.MEM.TBA
| Cast: arithmetic type/void pointer Conversion: integer constant to pointer Conversion: pointer/integer Coercion alters value Cast alters value Truncation of allocation size Truncation of size Tainted buffer access |
Compass/ROSE |
|
| Can detect violations of this rule. However, false warnings may be raised if limits.h is included |
Coverity* | | NEGATIVE_RETURNS REVERSE_NEGATIVE MISRA_CAST | Can find array accesses, loop bounds, and other expressions that may contain dangerous implied integer conversions that would result in unexpected behavior Can find instances where a negativity check occurs after the negative value has been used for something else Can find instances where an integer expression is implicitly converted to a narrower integer type, where the signedness of an integer value is implicitly converted, or where the type of a complex expression is implicitly converted |
Cppcheck | | memsetValueOutOfRange | Partially implemented The second argument to memset() cannot be represented as unsigned char |
Cppcheck Premium | Include Page |
---|
| Cppcheck Premium_V |
---|
| Cppcheck Premium_V |
---|
|
| memsetValueOutOfRange premium-cert-int31-c | Partially implemented The second argument to memset() cannot be represented as unsigned char |
Helix QAC | | C2850, C2855, C2890, C2895, C2900, C2905, C++2850, C++2855, C++2890, C++2895, C++2900, C++2905, C++3000, C++3010
DF2851, DF2852, DF2853, DF2856, DF2857, DF2858, DF2891, DF2892, DF2893, DF2896, DF2897, DF2898, DF2901, DF2902, DF2903, DF2906, DF2907, DF2908 |
|
Klocwork | | PORTING.CAST.SIZE |
|
LDRA tool suite | | 93 S, 433 S, 434 S | Partially implemented |
Parasoft C/C++test | | CERT_C-INT31-a CERT_C-INT31-b CERT_C-INT31-c CERT_C-INT31-d CERT_C-INT31-e CERT_C-INT31-f CERT_C-INT31-g CERT_C-INT31-h CERT_C-INT31-i CERT_C-INT31-j CERT_C-INT31-k CERT_C-INT31-l CERT_C-INT31-m CERT_C-INT31-n CERT_C-INT31-o CERT_C-INT31-p
| An expression of essentially Boolean type should always be used where an operand is interpreted as a Boolean value An operand of essentially Boolean type should not be used where an operand is interpreted as a numeric value An operand of essentially character type should not be used where an operand is interpreted as a numeric value An operand of essentially enum type should not be used in an arithmetic operation Shift and bitwise operations should not be performed on operands of essentially signed or enum type An operand of essentially signed or enum type should not be used as the right hand operand to the bitwise shifting operator An operand of essentially unsigned type should not be used as the operand to the unary minus operator The value of an expression shall not be assigned to an object with a narrower essential type The value of an expression shall not be assigned to an object of a different essential type category Both operands of an operator in which the usual arithmetic conversions are performed shall have the same essential type category The second and third operands of the ternary operator shall have the same essential type category The value of a composite expression shall not be assigned to an object with wider essential type If a composite expression is used as one operand of an operator in which the usual arithmetic conversions are performed then the other operand shall not have wider essential type If a composite expression is used as one (second or third) operand of a conditional operator then the other operand shall not have wider essential type Avoid data loss when converting between integer types Avoid value change when converting between integer types |
Polyspace Bug Finder | Include Page |
---|
| Polyspace Bug Finder_V |
---|
| Polyspace Bug Finder_V |
---|
|
| CERT C: Rule INT31-C
| Checks for: - Integer conversion overflow
- Call to memset with unintended value
- Sign change integer conversion overflow
- Tainted sign change conversion
- Unsigned integer conversion overflow
Rule partially covered. |
PVS-Studio | | V562, V569, V642, V676, V716, V721, V724, V732, V739, V784, V793, V1019, V1029, V1046
|
|
RuleChecker | Include Page |
---|
| RuleChecker_V |
---|
| RuleChecker_V |
---|
|
|
| Supported via MISRA C:2012 Rules 10.1, 10.3, 10.4, 10.6 and 10.7 |
TrustInSoft Analyzer | Include Page |
---|
| TrustInSoft Analyzer_V |
---|
| TrustInSoft Analyzer_V |
---|
|
| signed_downcast | Exhaustively verified. |