Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Remove Nav buttons in footer.

Anchor
abnormal termination
abnormal termination

abnormal termination [Open Group 08]
Abnormal termination occurs when requested by the abort() function or when some signals are received. See also normal termination.

Anchor
application binary interface
application binary interface

application binary interface
An interface application binary interface is an interface between two independently compiled modules of a program.   An Application Binary Interface document specifies a set of conventions such as the order and location of function arguments that compilers must adhere to in order to achieve interoperability between such modules.

Anchor
asynchronous-safe asynchronous-safe
asynchronous-safe [GNU Pth]
A function is asynchronous-safe, or asynchronous-signal safe, if it can be called safely and without side effects from within a signal handler context. That is, it must be able to be interrupted at any point and run linearly out of sequence without causing an inconsistent state. It must also function properly when global data might itself be in an inconsistent state. Some asynchronous-safe operations are listed here:

  • Call the signal() function to reinstall a signal handler
  • Unconditionally modify a volatile sig_atomic_t variable (as modification to this type is atomic)
  • Call the _Exit() function to immediately terminate program execution
  • Invoke an asynchronous-safe function, as specified by your implementation

Few functions are asynchronous-safe. If a function performs any other operations, it is probably not asynchronous-safe.

...

basic exception safety
basic exception safety

basic exception safety [Stroustrup 01, Sutter 00]
The basic exception safety guarantee is a property of an operation such that, if the operation terminates by raising an exception, it preserves program state invariants and prevents resource leaks. (See also exception safety and strong exception safety.)

Anchor
clang
clang

Clang
Clang is an open source C and C++ compiler. More information can be found at http://clang.llvm.org/.

Anchor
condition predicate
condition predicate

condition predicate
A condition predicate is an expression constructed from the variables of a function that must be true for a thread to be allowed to continue execution.

Anchor
conforming program
conforming program

conforming [ISO/IEC 14882-2014]
Conforming programs may depend on nonportable features of a conforming implementation.

Anchor
criticalsections
criticalsections

critical sections
Critical sections are code that accesses shared data and that would otherwise be protected from data races.

Anchor
cvqualify
cvqualify

cv-qualify
To cv-qualify a type is to add const or volatile (or both) to the type.

Anchor
data race
data race

data race [ISO/IEC 14882-2014]
The execution of a program contains a data race if it contains two potentially concurrent conflicting actions, at least one of which is not atomic, and neither happens before the other. [An exception is]that two accesses to the same object of type volatile sig_atomic_t do not result in a data race if both occur in the same thread, even if one or more occurs in a signal handler.

Anchor
deadlock
deadlock

deadlock [ISO/IEC 14882-2014]
A deadlock is when one or more threads are unable to continue execution because each is blocked waiting for one or more of the others to satisfy some condition

Anchor
denial-of-service
denial-of-service

denial-of-service attack
A denial-of-service attack is an attempt to make a computer resource unavailable to its intended users.

Anchor
diagnostic message
diagnostic message

diagnostic message
 [ISO/IEC 14882-2014]
A diagnostic message is a message belonging to an implementation-defined subset of the implementation’s message output. A diagnostic message may indicate a constraint violation or a valid, but questionable, language construct. Messages typically include the file name and line number pointing to the offending code construct. In addition, implementations also often indicate the severity of the problem. Although the C++ Standard does not specify any such requirement, the most severe problems often cause implementations to fail to fully translate a translation unit. Diagnostics output in such cases are termed errors. Other problems may cause implementations simply to issue a warning message and continue translating the rest of the program. (See error message and warning message.)

Anchor
error
error
 
Anchor
error message
error message

error message

An error message is a diagnostic message generated when source code is encountered that prevents an implementation from translating a translation unit. (See diagnostic message and warning message.)

Anchor
exception safety
exception safety

exception safety [Stroustrup 01]
An operation on an object is said to be exception safe if that operation leaves the object in a valid state when the operation is terminated by throwing an exception. (See also basic exception safety and strong exception safety.)

Anchor
exploit
exploit

exploit [Seacord 2005]
An exploit is a piece of software or technique that takes advantage of a security vulnerability to violate an explicit or implicit security policy.

Anchor
fatal diagnostic
fatal diagnostic

fatal diagnostic

A fatal diagnostic is a message that causes an implementation not to perform the translation.

Anchor
free store
free store

free store [ISO/IEC 14882-2014]
The free store is storage managed by the C++ allocation and deallocation functions ::operator new(std::size_t), ::operator delete(void*), their array forms ::operator new[](std::size_t), ::operator delete[](void*), overloads of said functions on std::nothrow_t, any user-defined replacements for said functions, as well as any such functions defined as a member of a class. Storage in the free store is distinct from storage managed by the C functions calloc(), free(), malloc(), and realloc().

Anchor
gcc
gcc

GCC
GCC is an open source C and C++ compiler. More information can be found at https://gcc.gnu.org/.

Anchor
ill-formed
ill-formed
Anchor
ill-formed program
ill-formed program

ill-formed program [ISO/IEC 14882-2014]
An ill-formed program is a C++ program that is not well-formed; that is, a program not constructed according to the syntax rules, diagnosable semantic rules, and the one-definition rule.

Anchor
implementation
implementation

implementation [ISO/IEC 9899:2011]
An implementation is a particular set of software, running in a particular translation environment, under particular control options, that performs translation of programs for, and supports execution of functions in, a particular execution environment.

Anchor
implementation-defined behavior
implementation-defined behavior

implementation-defined behavior [ISO/IEC 14882-2014]
Implementation-defined behavior is behavior, for a well-formed program construct and correct data, that depends on the implementation and that each implementation documents.

Anchor
incomplete type
incomplete type

incomplete type [ISO/IEC 14882-2014]
A class that has been declared but not defined, an enumeration type in certain contexts, an array of unknown size or of incomplete element type, and the void type are incomplete types. These types lack the information required to determine the size of the type.

Anchor
indeterminate value
indeterminate value

indeterminate value [ISO/IEC 14882-2014]
When storage for an object with automatic or dynamic storage duration is obtained, the object has an indeterminate value, and if no initialization is performed for the object, that object retains an indeterminate value until that value is replaced.

Anchor
invalid pointer
invalid pointer

invalid pointer
An invalid pointer is a pointer that is not a valid pointer.

Anchor
libcxx
libcxx

libc++
libc++ is an open source Standard Template Library (STL) implementation. More information can be found at http://libcxx.llvm.org/.

Anchor
libstdcxx
libstdcxx

libstdc++
libstdc++ is an open source Standard Template Library (STL) implementation

...

critical sections

Code that accesses shared data, and that would otherwise be protected from data races.

...

cv-qualify

A type that is qualified by either const or volatile.

Anchor data race data race data race [ISO/IEC N3000]
The execution of a program contains a data race if it contains two conflicting actions in different threads, at least one of which is not atomic, and neither happens before the other. Any such data race results in undefined behavior. Anchordeadlockdeadlock deadlock
A condition where one or more threads is unable to continue execution because it is blocked waiting for some thread (including itself) to satisfy some condition. Anchor denial-of-service denial-of-service denial-of-service attack
An attempt to make a computer resource unavailable to its intended users. Anchordiagnostic messagediagnostic messagediagnostic message [ISO/IEC 14882-2014]
A diagnostic message is a message belonging to an implementation-defined subset of the implementation’s message output. A diagnostic message may indicate a constraint violation or a valid but questionable language construct. Messages typically include the file name and line number pointing to the offending code construct. In addition, implementations also often indicate the severity of the problem. Although the C++ Standard does not specify any such requirement, the most severe problems often cause implementations to fail to fully translate a translation unit. Diagnostics output in such cases are termed errors. Other problems may cause implementations simply to issue a warning message and continue translating the rest of the program. See error message and warning message. Anchorerrorerror  Anchorerror messageerror messageerror message
A diagnostic message generated when source code is encountered that prevents an implementation from translating a translation unit. See diagnostic message and warning message. Anchor error tolerance error tolerance error tolerance [IEEE Std 610.12 1990]
The ability of a system or component to continue normal operation despite the presence of erroneous inputs. Anchor exception safety exception safety exception safety [Stroustrup 01]
An operation on an object is said to be exception safe if that operation leaves the object in a valid state when the operation is terminated by throwing an exception. See also basic exception safety, strong exception safety, and no-throw guarantee. Anchor exploit exploit exploit [Seacord 05a]
An exploit is a piece of software or technique that takes advantage of a security vulnerability to violate an explicit or implicit security policy. Anchor fail safe fail safe fail safe [IEEE Std 610.12 1990]
Pertaining to a system or component that automatically places itself in a safe operating mode in the event of a failure; for example, a traffic light that reverts to blinking red in all directions when normal operation fails. Anchor fail soft fail soft fail soft [IEEE Std 610.12 1990]
Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures; for example, a traffic light that continues to alternate between red and green if the yellow light fails. Anchorfatal diagnosticfatal diagnosticfatal diagnostic
A diagnostic message which causes an implementation not to perform the translation. Anchor fault tolerance fault tolerance fault tolerance [IEEE Std 610.12 1990]
The ability of a system or component to continue normal operation despite the presence of hardware or software faults. Anchor free store free store free store [ISO/IEC 14882-2003]
Storage managed by the C++ allocation and deallocation functions ::operator new(std::size_t), ::operator delete(void*), their array forms ::operator new[](std::size_t), ::operator delete[](void*), overloads of said functions on std::nothrow_t, any user-defined replacements for said functions, as well as any such functions defined as a member of a class. Storage in the free store is distinct from storage managed by the C functions calloc, free, malloc, and realloc. Anchor freestanding environment freestanding environment Anchor freestanding implementation freestanding implementation freestanding implementation [ISO/IEC 14882-2003]
A freestanding implementation is one in which execution may take place without the benefit of an operating system, and has an implementation-defined set of libraries that includes certain language-support libraries. Also referred to as freestanding environment. Anchorgccgccgcc
An open source C and C++ compiler. More information can be found at https://gcc.gnu.org/onlinedocs/libstdc++/.

Anchor
hosted environmentliveness hosted environment
liveness
Anchor
hosted implementation hosted implementation
hosted implementation
liveness
Liveness is when every operation or method invocation executes to completion without interruptions, even if it goes against safety.

Anchor
lvalue
lvalue

lvalue [ISO/IEC 14882-20032014]
An implementation that is not freestanding. Program startup occurs at main(), complex types are implemented, and all C++ standard library facilities are available. Also referred to as hosted environment. Anchorill-formedill-formed Anchorill-formed programill-formed program ill-formed program [ISO/IEC 14882-2003]
A C++ program that is not well-formed, that is a program not constructed according to the syntax rules, diagnosable semantic rules, and the one-definition rule. Anchor implementation implementation implementation [ISO/IEC 9899-1999]
Particular set of software, running in a particular translation environment under particular control options, that performs translation of programs for, and supports execution of functions in, a particular execution environment. Anchorimplementation-defined behaviorimplementation-defined behavior implementation-defined behavior [ISO/IEC 14882-2003]
Behavior, for a well-formed program construct and correct data, that depends on the implementation and that each implementation shall document. Anchor incomplete type incomplete type incomplete type [ISO/IEC 14882-2003]
A type that describes objects but lacks information needed to determine their sizes. Anchor indeterminate value indeterminate value indeterminate value [ISO/IEC 9899-1999]
Either an unspecified value or a trap representation. Anchor invalid pointer invalid pointer invalid pointer
A pointer that is not a valid pointer. Anchorlibcxxlibcxxlibc++
An open source Standard Template Library (STL) implementation. More information can be found at http://libcxx.llvm.org/. Anchorlibstdcxxlibstdcxxlibstdc++
An open source Standard Template Library (STL) implementation. More information can be found at https://gcc.gnu.org/onlinedocs/libstdc++/. Anchorlivenesslivenessliveness
Every operation or method invocation executes to completion without interruptions, even if it goes against safety. Anchor locale-specific behavior locale-specific behavior locale-specific behavior [ISO/IEC 14882-2003]
Behavior that depends on local conventions of nationality, culture, and language that each implementation documents. Anchor lvalue lvalue lvalue [ISO/IEC 9899-1999]
An lvalue is an expression with an object type or an incomplete type other than void. The name lvalue comes originally from the assignment expression E1 = E2 in which the left operand E1 is required to be a (modifiable) lvalue. It is perhaps better considered as representing an object "locator value." AnchormsvcmsvcMicrosoft Visual Studio
A commercial C and C++ compiler. More information can be found at https://www.visualstudio.com/. Anchormsvc stlmsvc stlMicrosoft Visual Studio STL
A commercial Standard Template Library (STL) implementation. More information can be found at https://msdn.microsoft.com/en-us/library/cscc687y.aspx Anchor mitigation mitigation mitigation [Seacord 05a]
Mitigations are methods, techniques, processes, tools, or runtime libraries that can prevent or limit exploits against vulnerabilities. Anchor normal termination normal termination normal termination [Open Group 08]
Normal termination occurs by a return from main(), when requested with the exit(), _exit(), or _Exit() functions; or when the last thread in the process terminates by returning from its start function, by calling the pthread_exit() function, or through cancellation. See also abnormal termination. Anchor no-throw guarantee no-throw guarantee no-throw guarantee [Sutter 00]
The no-throw guarantee is a property of an operation such that it is guaranteed to complete successfully without raising or propagating an exception. See also exception safety, basic exception safety, and strong exception safety. Anchorone definition ruleone definition rule Anchorodrodr one-definition rule (ODR) [ISO/IEC 14882-2014]
A fundamental C++ rule that states that no translation unit shall contain more than one definition of any variable, function, class type, enumeration type or template, and that every program shall contain exactly one definition of every non-inline function or variable. Some definitions may be duplicated in multiple translation units, subject to strict rules. Anchorodr-useodr-use

ODR-use [ISO/IEC 14882-2014]

A function or object is ODR-used if the address of the entity is taken, the function is called, or a reference is bound to the object. When a function or object is ODR-used, its definition must exist within the program or else the program is ill-formed.

...

RAII (Resource Acquisition Is Initialization)

An acronym that stands for: Resource Acquisition Is Initialization. Holding a resource is a class invariant where the allocation of the resource (acquisition) is inseparable from the initialization of the object during its construction. Further, deallocation of the resource is performed during the destruction of the object. Thus, the resource is held when initialization completes and remains held until finalization begins, ensuring there are no resource leaks unless the object owning the resource is also leaked.

...

NOTE
If the value does not conform, either the path is diverted to avoid using the value or a different, known-conforming value is substituted—for example, adding a null character to the end of a buffer before passing it as an argument to the strlen function.

...

lvalue (so called, historically, because lvalues could appear on the left-hand side of an assignment expression) designates a function or an object.

Anchor
msvc
msvc

Microsoft Visual Studio
Microsoft Visual Studio is a commercial C and C++ compiler. More information can be found at https://www.visualstudio.com/.

Anchor
msvc stl
msvc stl

Microsoft Visual Studio STL
The Microsoft Visual Studio STL is a commercial Standard Template Library (STL) implementation. More information can be found at https://msdn.microsoft.com/en-us/library/cscc687y.aspx

Anchor
mitigation
mitigation

mitigation [Seacord 2005]
A mitigation is a method, technique, process, tool, or runtime library that can prevent or limit exploits against vulnerabilities.

Anchor
one definition rule
one definition rule
Anchor
odr
odr

one-definition rule (ODR) [ISO/IEC 14882-2014]
A fundamental C++ rule that states that no translation unit shall contain more than one definition of any variable, function, class type, enumeration type or template, and that every program shall contain exactly one definition of every non-inline function or variable. Some definitions may be duplicated in multiple translation units, subject to strict rules.

Anchor
odr-use
odr-use

ODR-use [ISO/IEC 14882-2014]
A function or object is ODR-used if the address of the entity is taken, the function is called, or a reference is bound to the object. When a function or object is ODR-used, its definition must exist within the program or else the program is ill-formed.

Anchor
RAII
RAII

RAII (Resource Acquisition Is Initialization)
RAII is a design principle supported by C++. Holding a resource is a class invariant where the allocation of the resource (acquisition) is inseparable from the initialization of the object during its construction. Further, deallocation of the resource is performed during the destruction of the object. Thus, the resource is held when initialization completes and remains held until finalization begins, ensuring there are no resource leaks unless the object owning the resource is also leaked.

Anchor
reliability
reliability

reliability [IEEE Std 610.12 1990]
Reliability is the ability of a system or component to perform its required functions under stated conditions for a specified period of time.

Anchor
restricted sink
restricted sink

restricted sink [ISO/IEC 9899:2011]
A restricted sink is an operand or argument whose domain is a subset of the domain described by its type.

Anchor
rvalue
rvalue

rvalue [ISO/IEC 14882-2014]
An rvalue (so called, historically, because rvalues could appear on the right-hand side of an assignment expression), is an xvalue, a temporary object or subobject thereof, or a value that is not associated with an object.

Anchor
security flaw
security flaw

security flaw [Seacord 2005]
A security flaw is a software defect that poses a potential security risk.

Anchor
security policy
security policy

security policy [Internet Society 2000]
A security policy is a set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

Anchor
strong exception safety
strong exception safety

strong exception safety [Stroustrup 2001, Sutter 2000]
The strong exception safety guarantee is a property of an operation such that, in addition to satisfying the basic exception safety guarantee, if the operation terminates by raising an exception, it has no observable effects on program state. (See also exception safety and basic exception safety.)

Anchor
SFINAE
SFINAE

SFINAE
SFINAE (Substitution Failure Is Not An Error) is a language rule applied by the compiler during overload resolution involving templates. In some contexts, when substituting a template type parameter fails, the specialization is discarded from the overload set instead of causing a compile error. This feature is used in template metaprogramming.

Anchor
tainted source
tainted source

tainted source [ISO/IEC TS 17961:2012]
A tainted source is an external source of untrusted data.

Anchor
tainted value
tainted value

tainted value [ISO/IEC TS 17961:2012]
A tainted value is a value derived from a tainted source that has not been sanitized

...

NOTE 
Tainted sources include

    • parameters to the main() function
    • the returned values from localeconv()fgetc()getcgetchar()fgetwc()getwc(), and getwchar()
    • the strings produced by getenv()fscanf()vfscanf()vscanf()fgets()fread()fwscanf()vfwscanf()vwscanf()wscanf(), and fgetws()

Anchortainted valuetainted valuetainted value [ISO/IEC TS 17961:2013]
Value derived from a tainted source that has not been sanitized. Anchortrap representationtrap representation trap representation [ISO/IEC 9899-1999]
Object representation that does not represent a value of the object type. Attempting to read the value of an object that has a trap representation other than by an expression that has a character type is undefined. Producing such a representation by a side effect that modifies all or any part of the object other than by an expression that has a character type is undefined.

Anchor
trust boundary
trust boundary

trust boundary
A trust boundary is a boundary between a trusted execution context (or trusted data source) in which all sub-execution contexts (or data sources) are trusted by the system and a nontrusted execution context (or nontrusted data sink).

Anchor
undefined behavior
undefined behavior

undefined behavior [ISO/IEC 14882-20032014]
Behavior Undefined behavior is behavior, such as might arise upon use of an erroneous program construct or erroneous data, for which the C++ Standard imposes no requirements. Undefined behavior may also be expected when the C++ Standard omits the description of any explicit definition of behavior , or defines the behavior to be ill-formed, with no diagnostic required.

Anchor
unspecified behavior
unspecified behavior

unspecified behavior [ISO/IEC 14882-20032014]
Behavior Unspecified behavior is behavior, for a well-formed program construct and correct data, that depends on the implementation. The implementation is not required to document which behavior occurs.

Anchor
unspecified value
unspecified value

unspecified value [ISO/IEC 9899-1999:2011]
A valid  An unspecified value is a valid value of the relevant type where the C++ Standard imposes no requirements on which value is chosen in any instance. An unspecified value cannot be a trap representationin any instance.

Anchor
valid pointer
valid pointer

valid pointer
A valid pointer is a pointer that refers to an element within an array or one past the last element of an array. For the purposes of this definition, a pointer to an object that is not an element of an array behaves the same as a pointer to the first element of an array of length one with the type of the object as its element type. (Cf 6.5.8p3)
For the purposes of this definition, an object can be considered to be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof operator. Anchor validation validation validation [IEC 61508-4]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled. Anchor verification verification verification [IEC 61508-4]
Confirmation by examination and provision of objective evidence that the requirements have been fulfilledto be an array of a certain number of bytes; that number is the size of the object, as produced by the sizeof operator.

Anchor
vtable
vtable

vtable
A common vtable is a common implementation technique to support dynamic method dispatch, where a class object instance includes a hidden data member that is a pointer to an array of function pointers used to resolve virtual function calls at runtime.

Anchor
vulnerability
vulnerability

vulnerability [Seacord 05a]
A vulnerability is a set of conditions that allows an attacker to violate an explicit or implicit security policy.  Anchorwarningwarning Anchorwarning messagewarning messagewarning message
A diagnostic message generated when source code is encountered that does not prevent an implementation from translating a translation unit. See diagnostic message and error message.2005]
A vulnerability is a set of conditions that allows an attacker to violate an explicit or implicit security policy.

Anchor
warning
warning
Anchor
warning message
warning message

warning message

A warning message is a diagnostic message generated when source code is encountered that does not prevent an implementation from translating a translation unit. (See diagnostic message and error message.)

Anchor
well-formed
well-formed
Anchor
well-formed program
well-formed program

well-formed program [ISO/IEC 14882-2014]
A well-formed program is a C++ program constructed according to the syntax rules, diagnosable semantic rules, and the one-definition rule. (See also ill-formed program.)

Anchor
xvalue
xvalue

xvalue  Anchorwell-formedwell-formed Anchorwell-formed programwell-formed programwell-formed program [ISO/IEC 14882-2003]
A C++ program constructed according to the syntax rules, diagnosable semantic rules, and the one-definition rule. See also ill-formed program.

 

2014]
An xvalue (an "eXpiring" value) also refers to an object, usually near the end of its lifetime (so that its resources may be moved, for example). An xvalue is the result of certain kinds of expressions involving rvalue references.

 Image Removed Image Removed Image Removed