You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 102 Next »

Generated Content

This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly.

Version number:

2017.07

Checker

Guideline

ARRAY_VS_SINGLETONARR30-C. Do not form or use out-of-bounds pointers or array subscripts
ASSERT_SIDE_EFFECTMSC11-C. Incorporate diagnostic tests using assertions
ASSERT_SIDE_EFFECTSPRE31-C. Avoid side effects in arguments to unsafe macros
BAD_ALLOC_STRLENMEM35-C. Allocate sufficient memory for an object
BAD_COMPAREEXP16-C. Do not compare function pointers to constant values
BAD_FREEMEM34-C. Only free memory allocated dynamically
CHAR_IOFIO34-C. Distinguish between characters read from a file and EOF or WEOF
CHECKED_RETURNEXP34-C. Do not dereference null pointers
CHECKED_RETURNERR33-C. Detect and handle standard library errors
CHECKED_RETURNPOS54-C. Detect and handle POSIX library errors
CHECKED_RETURNEXP12-C. Do not ignore values returned by functions
CONSTANT_EXPRESSION_RESULTEXP46-C. Do not use a bitwise operator with a Boolean-like operand
DEADCODEMSC07-C. Detect and remove dead code
DEADCODEMSC12-C. Detect and remove code that has no effect or is never executed
DEADLOCKCON35-C. Avoid deadlock by locking in a predefined order
DIVIDE_BY_ZEROINT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
EVALUATION_ORDEREXP30-C. Do not depend on the order of evaluation for side effects
EVALUATION_ORDEREXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
FORWARD_NULLEXP34-C. Do not dereference null pointers
INTEGER_OVERFLOWINT30-C. Ensure that unsigned integer operations do not wrap
LINKAGE_CONFLICTDCL36-C. Do not declare an identifier with conflicting linkage classifications
LOCKCON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction
MISRA_CASTINT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
MISRA_CASTFLP34-C. Ensure that floating-point conversions are within range of the new type
MISSING_BREAKMSC17-C. Finish every set of statements associated with a case label with a break statement
MISSING_LOCKCON43-C. Do not allow data races in multithreaded code
NEGATIVE_RETURNSINT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
NEGATIVE_RETURNSARR30-C. Do not form or use out-of-bounds pointers or array subscripts
NO_EFFECTEXP33-C. Do not read uninitialized memory
NO_EFFECTMSC12-C. Detect and remove code that has no effect or is never executed
NULL_RETURNSEXP34-C. Do not dereference null pointers
OPEN_ARGSFIO03-C. Do not make assumptions about fopen() and file creation
OVERFLOW_BEFORE_WIDENINT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
OVERRUN_DYNAMICARR30-C. Do not form or use out-of-bounds pointers or array subscripts
OVERRUN_STATICARR30-C. Do not form or use out-of-bounds pointers or array subscripts
POINTER_CONVERSION_LOSES_BITSINT36-C. Converting a pointer to integer or integer to pointer
PW.DEPRECATED_STRING_CONVSTR30-C. Do not attempt to modify string literals
PW.PRINTF_ARG_MISMATCHFIO47-C. Use valid format strings
RACE_CONDITIONCON32-C. Prevent data races when accessing bit-fields from multiple threads
READLINKPOS30-C. Use the readlink() function properly
RESOURCE_LEAKMEM31-C. Free dynamically allocated memory when no longer needed
RESOURCE_LEAKMEM00-C. Allocate and free memory in the same module, at the same level of abstraction
RETURN_LOCALDCL30-C. Declare objects with appropriate storage durations
REVERSE_INULLEXP34-C. Do not dereference null pointers
REVERSE_NEGATIVEINT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
REVERSE_NEGATIVEARR32-C. Ensure size arguments for variable length arrays are in a valid range
SECURE_TEMPFIO21-C. Do not create temporary files in shared directories
SIZECHECKMEM35-C. Allocate sufficient memory for an object
STACK_USEMEM05-C. Avoid large stack allocations
STRING_NULLSTR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string
TAINTED_STATICINT32-C. Ensure that operations on signed integers do not result in overflow
TAINTED_STRINGSTR02-C. Sanitize data passed to complex subsystems
TAINTED_STRING_WARNINGFIO30-C. Exclude user input from format strings
TOCTOUFIO01-C. Be careful using functions that use file names for identification
UNCAUGHT_EXCEPTERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure
UNINITEXP33-C. Do not read uninitialized memory
UNREACHABLEMSC07-C. Detect and remove dead code
UNREACHABLEMSC12-C. Detect and remove code that has no effect or is never executed
UNUSED_VALUEMSC13-C. Detect and remove unused values
USE_AFTER_FREEMEM30-C. Do not access freed memory
USE_AFTER_FREEMEM01-C. Store a new value in pointers immediately after free()

>

  • No labels