According to the C Standard Annex J.2 (133) [ISO/IEC 9899:20112024], the behavior of a program is undefined when
...
Tool | Version | Checker | Description | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Astrée |
| chained-errno-function-calls errno-test-after-wrong-call | Supported | ||||||||||||||
Axivion Bauhaus Suite |
| CertC-ERR32 | |||||||||||||||
Compass/ROSE | Could detect violations of this rule by looking for signal handlers that themselves call | ||||||||||||||||
Coverity |
| MISRA C 2012 Rule 22.8 MISRA C 2012 Rule 22.9 MISRA C 2012 Rule 22.10 | Implemented | ||||||||||||||
Cppcheck Premium |
| premium-cert-err32-c | Partially implemented | ||||||||||||||
Helix QAC |
| C2031 DF4781, DF4782, DF4783 | |||||||||||||||
Klocwork |
| MISRA.INCL.SIGNAL.2012 | |||||||||||||||
LDRA tool suite |
| 44 S | Enhanced enforcement | ||||||||||||||
Parasoft C/C++test |
| MISRA2012-RULE-22_8, MISRA2012-RULE-22_9, MISRA2012-RULE-22_10 | CERT_C-ERR32-a | Properly use errno value | |||||||||||||
| Implemented
| R2018a |
| CERT C: Rule ERR32-C | Checks for misuse | Misuseof errno in a signal handler | You read errno after calling an errno-setting function in a signal handler(rule fully covered) | ||||||||||
RuleChecker |
| chained-errno-function-calls errno-test-after-wrong-call | Supported |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
[ISO/IEC 9899:20112024] | Subclause 7.14.1.1, "The signal Function" |
...