You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 74 Next »

Generated Content

This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly.

Version number:
V. 5.0

C checkers

Guideline

ARRAY_VS_SINGLETON

ARR30-C. Do not form or use out of bounds pointers or array subscripts

ASSERT_SIDE_EFFECT

EXP31-C. Avoid side effects in assertions

ASSERT_SIDE_EFFECT

MSC11-C. Incorporate diagnostic tests using assertions

BAD_ALLOC_STRLEN

MEM35-C. Allocate sufficient memory for an object

BAD_COMPARE

EXP16-C. Do not compare function pointers to constant values

BAD_COMPARE

MSC02-C. Avoid errors of omission

BAD_FREE

MEM34-C. Only free memory allocated dynamically

CHAR_IO

FIO34-C. Use int to capture the return value of character IO functions

CHECKED_RETURN

EXP12-C. Do not ignore values returned by functions

CHECKED_RETURN

EXP34-C. Do not dereference null pointers

CHECKED_RETURN

FIO04-C. Detect and handle input and output errors

CHECKED_RETURN

FIO33-C. Detect and handle input output errors resulting in undefined behavior

CHECKED_RETURN

MEM32-C. Detect and handle memory allocation errors

CONSTANT_EXPRESSION_RESULT

EXP17-C. Do not perform bitwise operations in conditional expressions

DEADCODE

MSC07-C. Detect and remove dead code

EVALUATION_ORDER

EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place

EVALUATION_ORDER

EXP30-C. Do not depend on order of evaluation between sequence points

FORWARD_NULL

EXP34-C. Do not dereference null pointers

MISRA_CAST

FLP34-C. Ensure that floating point conversions are within range of the new type

MISRA_CAST

INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data

MISSING_BREAK

MSC17-C. Finish every set of statements associated with a case label with a break statement

NEGATIVE_RETURNS

ARR30-C. Do not form or use out of bounds pointers or array subscripts

NEGATIVE_RETURNS

ARR32-C. Ensure size arguments for variable length arrays are in a valid range

NEGATIVE_RETURNS

INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data

NO_EFFECT

EXP33-C. Do not reference uninitialized memory

NO_EFFECT

MSC12-C. Detect and remove code that has no effect

NULL_RETURNS

EXP34-C. Do not dereference null pointers

OVERRUN_DYNAMIC

ARR30-C. Do not form or use out of bounds pointers or array subscripts

OVERRUN_DYNAMIC

Rule not foun

OVERRUN_STATIC

ARR30-C. Do not form or use out of bounds pointers or array subscripts

OVERRUN_STATIC

Rule not foun

RESOURCE_LEAK

MEM31-C. Free dynamically allocated memory exactly once

RETURN_LOCAL

DCL30-C. Declare objects with appropriate storage durations

REVERSE_INULL

EXP34-C. Do not dereference null pointers

REVERSE_NEGATIVE

ARR32-C. Ensure size arguments for variable length arrays are in a valid range

REVERSE_NEGATIVE

INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data

SIZECHECK

MEM35-C. Allocate sufficient memory for an object

STACK_USE

MEM05-C. Avoid large stack allocations

UNREACHABLE

MSC07-C. Detect and remove dead code

UNUSED_VALUE

MSC13-C. Detect and remove unused values

USE_AFTER_FREE

MEM00-C. Allocate and free memory in the same module, at the same level of abstraction

USE_AFTER_FREE

MEM01-C. Store a new value in pointers immediately after free()

USE_AFTER_FREE

MEM30-C. Do not access freed memory

USE_AFTER_FREE

MEM31-C. Free dynamically allocated memory exactly once

>

  • No labels