Чтобы выровнять по ширине дефекты через аннотации кода, используйте имена командной строки или краткие названия, перечисленные в следующей таблице.
Можно также включить обнаружение определенного дефекта при помощи его краткого названия в качестве аргумента -checkers
опция. Вместо того, чтобы перечислить отдельные дефекты, можно также задать группы дефектов названием группы, например, numerical
, data_flow
, и так далее. Смотрите Find defects (-checkers)
.
Дефект | Имя командной строки |
---|---|
*this not returned in copy assignment operator (Polyspace Bug Finder)
|
RETURN_NOT_REF_TO_THIS
|
A move operation may throw (Polyspace Bug Finder) | MOVE_OPERATION_MAY_THROW |
Abnormal termination of exit handler (Polyspace Bug Finder)
|
EXIT_ABNORMAL_HANDLER
|
Absorption of float operand (Polyspace Bug Finder)
|
FLOAT_ABSORPTION
|
Accessing object with temporary lifetime (Polyspace Bug Finder)
|
TEMP_OBJECT_ACCESS
|
Alignment changed after memory reallocation (Polyspace Bug Finder) | ALIGNMENT_CHANGE |
Alternating input and output from a stream without flush or positioning call (Polyspace Bug Finder) | IO_INTERLEAVING |
Ambiguous declaration syntax (Polyspace Bug Finder) | MOST_VEXING_PARSE |
Arithmetic operation with NULL pointer (Polyspace Bug Finder)
|
NULL_PTR_ARITH
|
Array access out of bounds (Polyspace Bug Finder)
|
OUT_BOUND_ARRAY
|
Array access with tainted index (Polyspace Bug Finder)
|
TAINTED_ARRAY_INDEX
|
Assertion (Polyspace Bug Finder)
|
ASSERT
|
Asynchronously cancellable thread (Polyspace Bug Finder) | ASYNCHRONOUSLY_CANCELLABLE_THREAD |
Atomic load and store sequence not atomic (Polyspace Bug Finder) | ATOMIC_VAR_SEQUENCE_NOT_ATOMIC |
Atomic variable accessed twice in an expression (Polyspace Bug Finder) | ATOMIC_VAR_ACCESS_TWICE |
Automatic or thread local variable escaping from a thread (Polyspace Bug Finder) | LOCAL_ADDR_ESCAPE_THREAD |
Bad file access mode or status (Polyspace Bug Finder)
|
BAD_FILE_ACCESS_MODE_STATUS
|
Bad order of dropping privileges (Polyspace Bug Finder)
|
BAD_PRIVILEGE_DROP_ORDER
|
Base class assignment operator not called (Polyspace Bug Finder)
|
MISSING_BASE_ASSIGN_OP_CALL
|
Base class destructor not virtual (Polyspace Bug Finder)
|
DTOR_NOT_VIRTUAL
|
Bitwise and arithmetic operation on the same data (Polyspace Bug Finder)
|
BITWISE_ARITH_MIX
|
Bitwise operation on negative value (Polyspace Bug Finder)
|
BITWISE_NEG
|
Blocking operation while holding lock (Polyspace Bug Finder) | BLOCKING_WHILE_LOCKED |
Buffer overflow from incorrect string format specifier (Polyspace Bug Finder)
|
STR_FORMAT_BUFFER_OVERFLOW
|
Bytewise operations on nontrivial class object (Polyspace Bug Finder) | MEMOP_ON_NONTRIVIAL_OBJ |
C++ reference to const-qualified type with subsequent modification (Polyspace Bug Finder) | WRITE_REFERENCE_TO_CONST_TYPE |
C++ reference type qualified with const or volatile (Polyspace Bug Finder) | CV_QUALIFIED_REFERENCE_TYPE |
Call through non-prototyped function pointer (Polyspace Bug Finder) | UNPROTOTYPED_FUNC_CALL |
Call to memset with unintended value (Polyspace Bug Finder)
|
MEMSET_INVALID_VALUE
|
Character value absorbed into EOF (Polyspace Bug Finder)
|
CHAR_EOF_CONFUSED
|
Closing a previously closed resource (Polyspace Bug Finder)
|
DOUBLE_RESOURCE_CLOSE
|
Code deactivated by constant false condition (Polyspace Bug Finder)
|
DEACTIVATED_CODE
|
Command executed from externally controlled path (Polyspace Bug Finder)
|
TAINTED_PATH_CMD
|
Const parameter values may cause unnecessary data copies (Polyspace Bug Finder) | CONST_PARAMETER_VALUE |
Const return values may cause unnecessary data copies (Polyspace Bug Finder) | CONST_RETURN_VALUE |
Const std::move input may cause a more expensive object copy (Polyspace Bug Finder) | EXPENSIVE_STD_MOVE_CONST_OBJECT |
Constant block cipher initialization vector (Polyspace Bug Finder)
|
CRYPTO_CIPHER_CONSTANT_IV
|
Constant cipher key (Polyspace Bug Finder)
|
CRYPTO_CIPHER_CONSTANT_KEY
|
Context initialized incorrectly for cryptographic operation (Polyspace Bug Finder)
|
CRYPTO_PKEY_INCORRECT_INIT
|
Context initialized incorrectly for digest operation (Polyspace Bug Finder)
|
CRYPTO_MD_BAD_FUNCTION
|
Conversion or deletion of incomplete class pointer (Polyspace Bug Finder) | INCOMPLETE_CLASS_PTR |
Copy constructor not called in initialization list (Polyspace Bug Finder)
|
MISSING_COPY_CTOR_CALL
|
Copy of overlapping memory (Polyspace Bug Finder)
|
OVERLAPPING_COPY
|
Copy operation modifying source operand (Polyspace Bug Finder) | COPY_MODIFYING_SOURCE |
Data race (Polyspace Bug Finder)
|
DATA_RACE
|
Data race including atomic operations (Polyspace Bug Finder)
|
DATA_RACE_ALL
|
Data race on adjacent bit fields (Polyspace Bug Finder) | DATA_RACE_BIT_FIELDS |
Data race through standard library function call (Polyspace Bug Finder)
|
DATA_RACE_STD_LIB
|
Dead code (Polyspace Bug Finder)
|
DEAD_CODE
|
Deadlock (Polyspace Bug Finder)
|
DEADLOCK
|
Deallocation of previously deallocated pointer (Polyspace Bug Finder)
|
DOUBLE_DEALLOCATION
|
Declaration mismatch (Polyspace Bug Finder)
|
DECL_MISMATCH
|
Delete of void pointer (Polyspace Bug Finder)
|
DELETE_OF_VOID_PTR
|
Destination buffer overflow in string manipulation (Polyspace Bug Finder)
|
STRLIB_BUFFER_OVERFLOW
|
Destination buffer underflow in string manipulation (Polyspace Bug Finder)
|
STRLIB_BUFFER_UNDERFLOW
|
Destruction of locked mutex (Polyspace Bug Finder)
|
DESTROY_LOCKED
|
Deterministic random output from constant seed (Polyspace Bug Finder)
|
RAND_SEED_CONSTANT
|
Double lock (Polyspace Bug Finder)
|
DOUBLE_LOCK
|
Double unlock (Polyspace Bug Finder)
|
DOUBLE_UNLOCK
|
Empty destructors may cause unnecessary data copies (Polyspace Bug Finder) | EMPTY_DESTRUCTOR_DEFINED |
Environment pointer invalidated by previous operation (Polyspace Bug Finder)
|
INVALID_ENV_POINTER
|
Errno not checked (Polyspace Bug Finder)
|
ERRNO_NOT_CHECKED
|
Errno not reset (Polyspace Bug Finder)
|
MISSING_ERRNO_RESET
|
Exception caught by value (Polyspace Bug Finder)
|
EXCP_CAUGHT_BY_VALUE
|
Exception handler hidden by previous handler (Polyspace Bug Finder)
|
EXCP_HANDLER_HIDDEN
|
Execution of a binary from a relative path can be controlled by an external actor (Polyspace Bug Finder)
|
RELATIVE_PATH_CMD
|
Execution of externally controlled command (Polyspace Bug Finder)
|
TAINTED_EXTERNAL_CMD
|
Expensive c_str() to std::string construction (Polyspace Bug Finder) | EXPENSIVE_C_STR_STD_STRING_CONSTRUCTION |
Expensive constant std::string construction (Polyspace Bug Finder) | EXPENSIVE_CONSTANT_STD_STRING |
Expensive copy in a range-based for loop iteration (Polyspace Bug Finder) | EXPENSIVE_RANGE_BASED_FOR_LOOP_ITERATION |
Expensive pass by value (Polyspace Bug Finder) | EXPENSIVE_PASS_BY_VALUE |
Expensive return by value (Polyspace Bug Finder) | EXPENSIVE_RETURN_BY_VALUE |
File access between time of check and use (TOCTOU) (Polyspace Bug Finder)
|
TOCTOU
|
File descriptor exposure to child process (Polyspace Bug Finder) | FILE_EXPOSURE_TO_CHILD |
File manipulation after chroot without chdir (Polyspace Bug Finder)
|
CHROOT_MISUSE
|
Float conversion overflow (Polyspace Bug Finder)
|
FLOAT_CONV_OVFL
|
Float division by zero (Polyspace Bug Finder)
|
FLOAT_ZERO_DIV
|
Floating point comparison with equality operators (Polyspace Bug Finder)
|
BAD_FLOAT_OP
|
Float overflow (Polyspace Bug Finder)
|
FLOAT_OVFL
|
Format string specifiers and arguments mismatch (Polyspace Bug Finder)
|
STRING_FORMAT
|
Function called from signal handler not asynchronous-safe (Polyspace Bug Finder) | SIG_HANDLER_ASYNC_UNSAFE |
Function called from signal handler not asynchronous-safe (strict) (Polyspace Bug Finder) | SIG_HANDLER_ASYNC_UNSAFE_STRICT |
Function pointer assigned with absolute address (Polyspace Bug Finder)
|
FUNC_PTR_ABSOLUTE_ADDR
|
Function that can spuriously fail not wrapped in loop (Polyspace Bug Finder) | SPURIOUS_FAILURE_NOT_WRAPPED_IN_LOOP |
Function that can spuriously wake up not wrapped in loop (Polyspace Bug Finder) | SPURIOUS_WAKEUP_NOT_WRAPPED_IN_LOOP |
Hard-coded buffer size (Polyspace Bug Finder)
|
HARD_CODED_BUFFER_SIZE
|
Hard-coded loop boundary (Polyspace Bug Finder)
|
HARD_CODED_LOOP_BOUNDARY
|
Hard-coded object size used to manipulate memory (Polyspace Bug Finder)
|
HARD_CODED_MEM_SIZE
|
Hard-coded sensitive data (Polyspace Bug Finder) | HARD_CODED_SENSITIVE_DATA |
Host change using externally controlled elements (Polyspace Bug Finder)
|
TAINTED_HOSTID
|
Improper array initialization (Polyspace Bug Finder)
|
IMPROPER_ARRAY_INIT
|
Inappropriate I/O operation on device files (Polyspace Bug Finder) | INAPPROPRIATE_IO_ON_DEVICE |
Incompatible padding for RSA algorithm operation (Polyspace Bug Finder)
|
CRYPTO_RSA_BAD_PADDING
|
Incompatible types prevent overriding (Polyspace Bug Finder)
|
VIRTUAL_FUNC_HIDING
|
Inconsistent cipher operations (Polyspace Bug Finder)
|
CRYPTO_CIPHER_BAD_FUNCTION
|
Incorrect data type passed to va_arg (Polyspace Bug Finder)
|
VA_ARG_INCORRECT_TYPE
|
Incorrect key for cryptographic algorithm (Polyspace Bug Finder)
|
CRYPTO_PKEY_INCORRECT_KEY
|
Incorrect order of network connection operations (Polyspace Bug Finder)
|
BAD_NETWORK_CONNECT_ORDER
|
Incorrect pointer scaling (Polyspace Bug Finder)
|
BAD_PTR_SCALING
|
Incorrect type data passed to va_start (Polyspace Bug Finder) | VA_START_INCORRECT_TYPE |
Incorrect use of offsetof in C++ (Polyspace Bug Finder) | OFFSETOF_MISUSE |
Incorrect use of va_start (Polyspace Bug Finder) | VA_START_MISUSE |
Incorrect value forwarding (Polyspace Bug Finder) | INCORRECT_VALUE_FORWARDING |
Incorrect syntax of flexible array member size (Polyspace Bug Finder) | FLEXIBLE_ARRAY_MEMBER_INCORRECT_SIZE |
Incorrectly indented statement (Polyspace Bug Finder) | INCORRECT_INDENTATION |
Inefficient string length computation (Polyspace Bug Finder) | INEFFICIENT_BASIC_STRING_LENGTH |
Information leak via structure padding (Polyspace Bug Finder)
|
PADDING_INFO_LEAK
|
Inline constraint not respected (Polyspace Bug Finder)
|
INLINE_CONSTRAINT_NOT_RESPECTED
|
Integer constant overflow (Polyspace Bug Finder) | INT_CONSTANT_OVFL |
Integer conversion overflow (Polyspace Bug Finder)
|
INT_CONV_OVFL
|
Integer division by zero (Polyspace Bug Finder)
|
INT_ZERO_DIV
|
Integer overflow (Polyspace Bug Finder)
|
INT_OVFL
|
Integer precision exceeded (Polyspace Bug Finder) | INT_PRECISION_EXCEEDED |
Invalid assumptions about memory organization (Polyspace Bug Finder)
|
INVALID_MEMORY_ASSUMPTION
|
Invalid deletion of pointer (Polyspace Bug Finder)
|
BAD_DELETE
|
Invalid file position (Polyspace Bug Finder) | INVALID_FILE_POS |
Invalid free of pointer (Polyspace Bug Finder)
|
BAD_FREE
|
Invalid use of = (assignment) operator (Polyspace Bug Finder)
|
BAD_EQUAL_USE
|
Invalid use of == (equality) operator (Polyspace Bug Finder)
|
BAD_EQUAL_EQUAL_USE
|
Invalid use of standard library floating point routine (Polyspace Bug Finder)
|
FLOAT_STD_LIB
|
Invalid use of standard library integer routine (Polyspace Bug Finder)
|
INT_STD_LIB
|
Invalid use of standard library memory routine (Polyspace Bug Finder)
|
MEM_STD_LIB
|
Invalid use of standard library routine (Polyspace Bug Finder)
|
OTHER_STD_LIB
|
Invalid use of standard library string routine (Polyspace Bug Finder)
|
STR_STD_LIB
|
Invalid va_list argument (Polyspace Bug Finder)
|
INVALID_VA_LIST_ARG
|
Join or detach of a joined or detached thread (Polyspace Bug Finder) | DOUBLE_JOIN_OR_DETACH |
Lambda used as typeid operand (Polyspace Bug Finder) | LAMBDA_TYPE_MISUSE |
Large pass-by-value argument (Polyspace Bug Finder)
|
PASS_BY_VALUE
|
Library loaded from externally controlled path (Polyspace Bug Finder)
|
TAINTED_PATH_LIB
|
Line with more than one statement (Polyspace Bug Finder)
|
MORE_THAN_ONE_STATEMENT
|
Load of library from a relative path can be controlled by an external actor (Polyspace Bug Finder)
|
RELATIVE_PATH_LIB
|
Loop bounded with tainted value (Polyspace Bug Finder)
|
TAINTED_LOOP_BOUNDARY
|
Macro terminated with a semicolon (Polyspace Bug Finder) | SEMICOLON_TERMINATED_MACRO |
Macro with multiple statements (Polyspace Bug Finder) | MULTI_STMT_MACRO |
Member not initialized in constructor (Polyspace Bug Finder)
|
NON_INIT_MEMBER
|
Memory allocation with tainted size (Polyspace Bug Finder)
|
TAINTED_MEMORY_ALLOC_SIZE
|
Memory comparison of float-point values (Polyspace Bug Finder)
|
MEMCMP_FLOAT
|
Memory comparison of padding data (Polyspace Bug Finder)
|
MEMCMP_PADDING_DATA
|
Memory comparison of strings (Polyspace Bug Finder)
|
MEMCMP_STRINGS
|
Memory leak (Polyspace Bug Finder)
|
MEM_LEAK
|
Mismatch between data length and size (Polyspace Bug Finder)
|
DATA_LENGTH_MISMATCH
|
Mismatched alloc/dealloc functions on Windows (Polyspace Bug Finder) | WIN_MISMATCH_DEALLOC |
Missing blinding for RSA algorithm (Polyspace Bug Finder)
|
CRYPTO_RSA_NO_BLINDING
|
Missing block cipher initialization vector (Polyspace Bug Finder)
|
CRYPTO_CIPHER_NO_IV
|
Missing break of switch case (Polyspace Bug Finder)
|
MISSING_SWITCH_BREAK
|
Missing byte reordering when transferring data (Polyspace Bug Finder) | MISSING_BYTESWAP |
Missing case for switch condition (Polyspace Bug Finder)
|
MISSING_SWITCH_CASE
|
Missing certification authority list (Polyspace Bug Finder) | CRYPTO_SSL_NO_CA |
Missing cipher algorithm (Polyspace Bug Finder)
|
CRYPTO_CIPHER_NO_ALGORITHM
|
Missing cipher data to process (Polyspace Bug Finder)
|
CRYPTO_CIPHER_NO_DATA
|
Missing cipher final step (Polyspace Bug Finder)
|
CRYPTO_CIPHER_NO_FINAL
|
Missing cipher key (Polyspace Bug Finder)
|
CRYPTO_CIPHER_NO_KEY
|
Missing constexpr specifier (Polyspace Bug Finder) | MISSING_CONSTEXPR |
Missing data for encryption, decryption or signing operation (Polyspace Bug Finder)
|
CRYPTO_PKEY_NO_DATA
|
Missing explicit keyword (Polyspace Bug Finder)
|
MISSING_EXPLICIT_KEYWORD
|
Missing final step after hashing update operation (Polyspace Bug Finder) | CRYPTO_MD_NO_FINAL |
Missing hash algorithm (Polyspace Bug Finder) | CRYPTO_MD_NO_ALGORITHM |
Missing lock (Polyspace Bug Finder)
|
BAD_UNLOCK
|
Missing null in string array (Polyspace Bug Finder)
|
MISSING_NULL_CHAR
|
Missing or double initialization of thread attribute (Polyspace Bug Finder) | BAD_THREAD_ATTRIBUTE |
Missing overload of allocation or deallocation function (Polyspace Bug Finder) | MISSING_OVERLOAD_NEW_DELETE_PAIR |
Missing padding for RSA algorithm (Polyspace Bug Finder)
|
CRYPTO_RSA_NO_PADDING
|
Missing parameters for key generation (Polyspace Bug Finder)
|
CRYPTO_PKEY_NO_PARAMS
|
Missing peer key (Polyspace Bug Finder)
|
CRYPTO_PKEY_NO_PEER
|
Missing private key (Polyspace Bug Finder)
|
CRYPTO_PKEY_NO_PRIVATE_KEY
|
Missing private key for X.509 certificate (Polyspace Bug Finder) | CRYPTO_SSL_NO_PRIVATE_KEY |
Missing public key (Polyspace Bug Finder)
|
CRYPTO_PKEY_NO_PUBLIC_KEY
|
Missing reset of a freed pointer (Polyspace Bug Finder)
|
MISSING_FREED_PTR_RESET
|
Missing return statement (Polyspace Bug Finder)
|
MISSING_RETURN
|
Missing salt for hashing operation (Polyspace Bug Finder) | CRYPTO_MD_NO_SALT |
Missing unlock (Polyspace Bug Finder)
|
BAD_LOCK
|
Missing virtual inheritance (Polyspace Bug Finder)
|
MISSING_VIRTUAL_INHERITANCE
|
Missing X.509 certificate (Polyspace Bug Finder) | CRYPTO_SSL_NO_CERTIFICATE |
Misuse of a FILE object (Polyspace Bug Finder) | FILE_OBJECT_MISUSE |
Misuse of errno (Polyspace Bug Finder)
|
ERRNO_MISUSE
|
Misuse of errno in a signal handler (Polyspace Bug Finder)
|
SIG_HANDLER_ERRNO_MISUSE
|
Misuse of narrow or wide character string (Polyspace Bug Finder) | NARROW_WIDE_STR_MISUSE |
Misuse of readlink() (Polyspace Bug Finder)
|
READLINK_MISUSE
|
Misuse of return value from nonreentrant standard function (Polyspace Bug Finder)
|
NON_REENTRANT_STD_RETURN
|
Misuse of sign-extended character value (Polyspace Bug Finder)
|
CHARACTER_MISUSE
|
Misuse of structure with flexible array member (Polyspace Bug Finder) | FLEXIBLE_ARRAY_MEMBER_STRUCT_MISUSE |
Modification of internal buffer returned from nonreentrant standard function (Polyspace Bug Finder)
|
WRITE_INTERNAL_BUFFER_RETURNED_FROM_STD_FUNC
|
Move operation on const object (Polyspace Bug Finder) | MOVE_CONST_OBJECT |
Multiple mutexes used with same conditional variable (Polyspace Bug Finder) | MULTI_MUTEX_WITH_ONE_COND_VAR |
Multiple threads waiting on same condition variable (Polyspace Bug Finder) | SIGNALED_COND_VAR_NOT_UNIQUE |
No data added into context (Polyspace Bug Finder) | CRYPTO_MD_NO_DATA |
Noexcept function exits with exception (Polyspace Bug Finder) | NOEXCEPT_FUNCTION_THROWS |
Non-initialized pointer (Polyspace Bug Finder)
|
NON_INIT_PTR
|
Non-initialized variable (Polyspace Bug Finder)
|
NON_INIT_VAR
|
Nonsecure hash algorithm (Polyspace Bug Finder)
|
CRYPTO_MD_WEAK_HASH
|
Nonsecure parameters for key generation (Polyspace Bug Finder)
|
CRYPTO_PKEY_WEAK_PARAMS
|
Nonsecure RSA public exponent (Polyspace Bug Finder)
|
CRYPTO_RSA_LOW_EXPONENT
|
Nonsecure SSL/TLS protocol (Polyspace Bug Finder)
|
CRYPTO_SSL_WEAK_PROTOCOL
|
Null pointer (Polyspace Bug Finder)
|
NULL_PTR
|
Object slicing (Polyspace Bug Finder)
|
OBJECT_SLICING
|
Opening previously opened resource (Polyspace Bug Finder)
|
DOUBLE_RESOURCE_OPEN
|
Operator new not overloaded for possibly overaligned class (Polyspace Bug Finder) | MISSING_OVERLOAD_NEW_FOR_ALIGNED_OBJ |
Overlapping assignment (Polyspace Bug Finder)
|
OVERLAPPING_ASSIGN
|
Partially accessed array (Polyspace Bug Finder)
|
PARTIALLY_ACCESSED_ARRAY
|
Partial override of overloaded virtual functions (Polyspace Bug Finder)
|
PARTIAL_OVERRIDE
|
Pointer access out of bounds (Polyspace Bug Finder)
|
OUT_BOUND_PTR
|
Pointer dereference with tainted offset (Polyspace Bug Finder)
|
TAINTED_PTR_OFFSET
|
Pointer or reference to stack variable leaving scope (Polyspace Bug Finder)
|
LOCAL_ADDR_ESCAPE
|
Pointer to non-initialized value converted to const pointer (Polyspace Bug Finder)
|
NON_INIT_PTR_CONV
|
Possible invalid operation on boolean operand (Polyspace Bug Finder) | INVALID_OPERATION_ON_BOOLEAN |
Possible misuse of sizeof (Polyspace Bug Finder)
|
SIZEOF_MISUSE
|
Possibly inappropriate data type for switch expression (Polyspace Bug Finder) | INAPPROPRIATE_TYPE_IN_SWITCH |
Possibly unintended evaluation of expression because of operator precedence rules (Polyspace Bug Finder)
|
OPERATOR_PRECEDENCE
|
Precision loss in integer to float conversion (Polyspace Bug Finder) | INT_TO_FLOAT_PRECISION_LOSS |
Predefined macro used as an object (Polyspace Bug Finder)
|
MACRO_USED_AS_OBJECT
|
Predictable block cipher initialization vector (Polyspace Bug Finder)
|
CRYPTO_CIPHER_PREDICTABLE_IV
|
Predictable cipher key (Polyspace Bug Finder)
|
CRYPTO_CIPHER_PREDICTABLE_KEY
|
Predictable random output from predictable seed (Polyspace Bug Finder)
|
RAND_SEED_PREDICTABLE
|
Preprocessor directive in macro argument (Polyspace Bug Finder)
|
PRE_DIRECTIVE_MACRO_ARG
|
Privilege drop not verified (Polyspace Bug Finder)
|
MISSING_PRIVILEGE_DROP_CHECK
|
Qualifier removed in conversion (Polyspace Bug Finder)
|
QUALIFIER_MISMATCH
|
Redundant expression in sizeof operand (Polyspace Bug Finder) | SIZEOF_USELESS_OP |
Resource leak (Polyspace Bug Finder)
|
RESOURCE_LEAK
|
Returned value of a sensitive function not checked (Polyspace Bug Finder)
|
RETURN_NOT_CHECKED
|
Return from computational exception signal handler (Polyspace Bug Finder) | SIG_HANDLER_COMP_EXCP_RETURN |
Return of non const handle to encapsulated data member (Polyspace Bug Finder)
|
BREAKING_DATA_ENCAPSULATION
|
Self assignment not tested in operator (Polyspace Bug Finder)
|
MISSING_SELF_ASSIGN_TEST
|
Semicolon on same line as if, for or while statement (Polyspace Bug Finder) | SEMICOLON_CTRL_STMT_SAME_LINE |
Sensitive data printed out (Polyspace Bug Finder)
|
SENSITIVE_DATA_PRINT
|
Sensitive heap memory not cleared before release (Polyspace Bug Finder)
|
SENSITIVE_HEAP_NOT_CLEARED
|
Server certificate common name not checked (Polyspace Bug Finder) | CRYPTO_SSL_HOSTNAME_NOT_CHECKED |
Shared data access within signal handler (Polyspace Bug Finder) | SIG_HANDLER_SHARED_OBJECT |
Shift of a negative value (Polyspace Bug Finder)
|
SHIFT_NEG
|
Shift operation overflow (Polyspace Bug Finder)
|
SHIFT_OVFL
|
Side effect in arguments to unsafe macro (Polyspace Bug Finder) | SIDE_EFFECT_IN_UNSAFE_MACRO_ARG |
Side effect of expression ignored (Polyspace Bug Finder)
|
SIDE_EFFECT_IGNORED
|
Signal call from within signal handler (Polyspace Bug Finder) | SIG_HANDLER_CALLING_SIGNAL |
Signal call in multithreaded program (Polyspace Bug Finder) | SIGNAL_USE_IN_MULTITHREADED_PROGRAM |
Sign change integer conversion overflow (Polyspace Bug Finder)
|
SIGN_CHANGE
|
Standard function call with incorrect arguments (Polyspace Bug Finder)
|
STD_FUNC_ARG_MISMATCH
|
Static uncalled function (Polyspace Bug Finder)
|
UNCALLED_FUNC
|
std::endl may cause an unnecessary flush (Polyspace Bug Finder) | STD_ENDL_USE |
std::move called on an unmovable type (Polyspace Bug Finder) | STD_MOVE_UNMOVABLE_TYPE |
Stream argument with possibly unintended side effects (Polyspace Bug Finder)
|
STREAM_WITH_SIDE_EFFECT
|
Subtraction or comparison between pointers to different arrays (Polyspace Bug Finder) | PTR_TO_DIFF_ARRAY |
Tainted division operand (Polyspace Bug Finder)
|
TAINTED_INT_DIVISION
|
Tainted modulo operand (Polyspace Bug Finder)
|
TAINTED_INT_MOD
|
Tainted NULL or non-null-terminated string (Polyspace Bug Finder)
|
TAINTED_STRING
|
Tainted sign change conversion (Polyspace Bug Finder)
|
TAINTED_SIGN_CHANGE
|
Tainted size of variable length array (Polyspace Bug Finder)
|
TAINTED_VLA_SIZE
|
Tainted string format (Polyspace Bug Finder)
|
TAINTED_STRING_FORMAT
|
Thread-specific memory leak (Polyspace Bug Finder) | THREAD_MEM_LEAK |
Throw argument raises unexpected exception (Polyspace Bug Finder) | THROW_ARGUMENT_EXPRESSION_THROWS |
TLS/SSL connection method not set (Polyspace Bug Finder) | CRYPTO_SSL_NO_ROLE |
TLS/SSL connection method set incorrectly (Polyspace Bug Finder) | CRYPTO_SSL_BAD_ROLE |
Too many va_arg calls for current argument list (Polyspace Bug Finder)
|
TOO_MANY_VA_ARG_CALLS
|
Typedef mismatch (Polyspace Bug Finder)
|
TYPEDEF_MISMATCH
|
Umask used with chmod-style arguments (Polyspace Bug Finder)
|
BAD_UMASK
|
Uncleared sensitive data in stack (Polyspace Bug Finder)
|
SENSITIVE_STACK_NOT_CLEARED
|
Universal character name from token concatenation (Polyspace Bug Finder)
|
PRE_UCNAME_JOIN_TOKENS
|
Unmodified variable not const-qualified (Polyspace Bug Finder) | UNMODIFIED_VAR_NOT_CONST |
Unnamed namespace in header file (Polyspace Bug Finder) | UNNAMED_NAMESPACE_IN_HEADER |
Unprotected dynamic memory allocation (Polyspace Bug Finder)
|
UNPROTECTED_MEMORY_ALLOCATION
|
Unreachable code (Polyspace Bug Finder)
|
UNREACHABLE
|
Unreliable cast of function pointer (Polyspace Bug Finder)
|
FUNC_CAST
|
Unreliable cast of pointer (Polyspace Bug Finder)
|
PTR_CAST
|
Unsafe call to a system function (Polyspace Bug Finder) | UNSAFE_SYSTEM_CALL |
Unsafe conversion between pointer and integer (Polyspace Bug Finder)
|
BAD_INT_PTR_CAST
|
Unsafe conversion from string to numerical value (Polyspace Bug Finder)
|
UNSAFE_STR_TO_NUMERIC
|
Unsafe standard encryption function (Polyspace Bug Finder)
|
UNSAFE_STD_CRYPT
|
Unsafe standard function (Polyspace Bug Finder)
|
UNSAFE_STD_FUNC
|
Unsigned integer constant overflow (Polyspace Bug Finder) | UINT_CONSTANT_OVFL |
Unsigned integer conversion overflow (Polyspace Bug Finder)
|
UINT_CONV_OVFL
|
Unsigned integer overflow (Polyspace Bug Finder)
|
UINT_OVFL
|
Unused parameter (Polyspace Bug Finder)
|
UNUSED_PARAMETER
|
Use of a forbidden function (Polyspace Bug Finder) | FORBIDDEN_FUNC |
Useless if (Polyspace Bug Finder)
|
USELESS_IF
|
Use of automatic variable as putenv-family function argument (Polyspace Bug Finder) | PUTENV_AUTO_VAR |
Use of dangerous standard function (Polyspace Bug Finder)
|
DANGEROUS_STD_FUNC
|
Use of externally controlled environment variable (Polyspace Bug Finder)
|
TAINTED_ENV_VARIABLE
|
Use of indeterminate string (Polyspace Bug Finder) | INDETERMINATE_STRING |
Use of memset with size argument zero (Polyspace Bug Finder)
|
MEMSET_INVALID_SIZE
|
Use of non-secure temporary file (Polyspace Bug Finder)
|
NON_SECURE_TEMP_FILE
|
Use of obsolete standard function (Polyspace Bug Finder)
|
OBSOLETE_STD_FUNC
|
Use of path manipulation function without maximum sized buffer checking (Polyspace Bug Finder)
|
PATH_BUFFER_OVERFLOW
|
Use of plain char type for numerical value (Polyspace Bug Finder)
|
BAD_PLAIN_CHAR_USE
|
Use of previously closed resource (Polyspace Bug Finder)
|
CLOSED_RESOURCE_USE
|
Use of previously freed pointer (Polyspace Bug Finder)
|
FREED_PTR
|
Use of tainted pointer (Polyspace Bug Finder) | TAINTED_PTR |
Use of setjmp/longjmp (Polyspace Bug Finder)
|
SETJMP_LONGJMP_USE
|
Use of undefined thread ID (Polyspace Bug Finder) | UNDEFINED_THREAD_ID |
Use of signal to kill thread (Polyspace Bug Finder) | THREAD_KILLED_WITH_SIGNAL |
Variable length array with nonpositive size (Polyspace Bug Finder)
|
NON_POSITIVE_VLA_SIZE
|
Variable shadowing (Polyspace Bug Finder)
|
VAR_SHADOWING
|
Vulnerable path manipulation (Polyspace Bug Finder)
|
PATH_TRAVERSAL
|
Vulnerable permission assignments (Polyspace Bug Finder)
|
DANGEROUS_PERMISSIONS
|
Vulnerable pseudo-random number generator (Polyspace Bug Finder)
|
VULNERABLE_PRNG
|
Weak cipher algorithm (Polyspace Bug Finder)
|
CRYPTO_CIPHER_WEAK_CIPHER
|
Weak cipher mode (Polyspace Bug Finder)
|
CRYPTO_CIPHER_WEAK_MODE
|
Weak padding for RSA algorithm (Polyspace Bug Finder)
|
CRYPTO_RSA_WEAK_PADDING
|
Write without a further read (Polyspace Bug Finder)
|
USELESS_WRITE
|
Writing to const qualified object (Polyspace Bug Finder)
|
CONSTANT_OBJECT_WRITE
|
Writing to read-only resource (Polyspace Bug Finder)
|
READ_ONLY_RESOURCE_WRITE
|
Wrong allocated object size for cast (Polyspace Bug Finder)
|
OBJECT_SIZE_MISMATCH
|
Wrong type used in sizeof (Polyspace Bug Finder) |
PTR_SIZEOF_MISMATCH
|
X.509 peer certificate not checked (Polyspace Bug Finder) | CRYPTO_SSL_CERT_NOT_CHECKED |