CERT C++ rules mapped to Klocwork and Klocwork community checkers

The following table lists the Klocwork and Klocwork community C++ checkers that map to the secure coding standard defined by the computer emergency response team (CERT).

Rule Checker name and description
ARR37-C(L2)

CERT.ARR.PTR.ARITH   Pointer is used in arithmetic expression

ARR39-C(L2)

CERT.ARR.PTR.ARITH   Pointer is used in arithmetic expression

CON33-C(L3)

CERT.CONC.LIB_FUNC_USE   Avoid race conditions when using library functions

CON37-C(L2)

MISRA.STDLIB.SIGNAL   Use of the signal handling facilities of signal.h

CON40-C(L2)

CERT.CONC.ATOMIC_TWICE_EXPR   Do not refer to an atomic variable twice in an expression

CON41-C(L3)

CERT.CONC.ATOMIC_COMP_FAIL_IN_LOOP   Wrap functions that can spuriously fail up in a loop

CON50-CPP(L3)

CERT.CONC.MUTEX.DESTROY_WHILE_LOCKED   Do not destroy a mutex while it is locked

CON54-CPP(L3)

CERT.CONC.WAKE_IN_LOOP   Wrap functions that can spuriously wake up in a loop

CON55-CPP(L3)

CERT.CONC.UNSAFE_COND_VAR   Preserve thread safety and liveness when using condition variables

CTR50-CPP(L2)

ABV.ANY_SIZE_ARRAY   Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL   Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL.MULTIDIMENSION   Buffer Overflow - Array Index Out of Bounds

ABV.STACK   Buffer Overflow - Local Array Index Out of Bounds

ABV.TAINTED   Buffer Overflow from Unvalidated Input

SV.TAINTED.ALLOC_SIZE   Use of Unvalidated Integer in Memory Allocation

SV.TAINTED.CALL.INDEX_ACCESS   Use of Unvalidated Integer as Array Index by Function Call

SV.TAINTED.CALL.LOOP_BOUND   Use of Unvalidated Integer in Loop Condition through a Function Call

CTR50-CPP:(L2)

SV.TAINTED.INDEX_ACCESS   Use of Unvalidated Integer as Array Index

CTR51-CPP(L2)

ITER.CONTAINER.MODIFIED   Use of invalid iterator

DCL50-CPP(L1)

MISRA.FUNC.VARARG   Function with variable number of arguments

DCL51-CPP(L3)

MISRA.DEFINE.WRONGNAME   Usage of a name from the standard library for naming a macro

MISRA.DEFINE.WRONGNAME.UNDERSCORE   Usage of a reserved name for naming a macro

MISRA.STDLIB.WRONGNAME   Reused name of standard library macro, object or function

MISRA.STDLIB.WRONGNAME.UNDERSCORE   Usage of a reserved name for naming a language entity

MISRA.UNDEF.WRONGNAME   Undefinition of a name from the standard library

MISRA.UNDEF.WRONGNAME.UNDERSCORE   Undefinition of a reserved name

DCL52-CPP(L3)

CERT.DCL.REF_TYPE.CONST_OR_VOLATILE   Never qualify a reference type with const or volatile

DCL53-CPP(L3)

CERT.DCL.AMBIGUOUS_DECL   Do not write syntactically ambiguous declarations

DCL54-CPP(L2)

CERT.DCL.SAME_SCOPE_ALLOC_DEALLOC   Overload allocation and deallocation functions as a pair in the same scope

DCL57-CPP(L2)

MISRA.DTOR.THROW   Throw in destructor

DCL58-CPP(L2)

CERT.DCL.STD_NS_MODIFIED   Do not modify the standard namespaces

DCL59-CPP(L3)

MISRA.NAMESPACE.UNMD   Unnamed namespace in header file

ENV30-C(L3)

CXX.STDLIB.ILLEGAL_WRITE   The pointers returned by the Standard Library functions localeconv, getenv, setlocale or, strerror shall only be used as if they have pointer to const-qualified type

ENV32-C(L1)

CERT.EXIT.HANDLER_TERMINATE   All exit handlers must return normally

ENV33-C(L1)

SV.CODE_INJECTION.SHELL_EXEC   Command Injection into Shell Execution

ENV34-C(L3)

CXX.STDLIB.ILLEGAL_REUSE   The pointer returned by the Standard Library functions asctime and similar shall not be used following a subsequent call to the same function

ERR33-C(L1)

NPD.CHECK.MUST   Pointer will be dereferenced after it was positively checked for NULL

NPD.FUNC.MUST   Result of function that may return NULL will be dereferenced

SV.RVT.RETVAL_NOTTESTED   Ignored Return Value

ERR50-CPP(L3)

CERT.ERR.ABRUPT_TERM   Do not abruptly terminate the program

MISRA.TERMINATE   terminate() function is called explicitly

ERR51-CPP(L3)

MISRA.CATCH.ALL   No ellipsis exception handler in a try-catch block

ERR52-CPP(L3)

MISRA.STDLIB.LONGJMP   Use of setjmp macro or longjmp function

ERR53-CPP(L3)

MISRA.CTOR.TRY.NON_STATIC   Function try/catch block of constructor or destructor references non-static members

ERR54-CPP(L1)

MISRA.CATCH.NOALL   Ellipsis exception handler is not the last one in a try-catch block

MISRA.CATCH.WRONGORD   Handler for a base exception class precedes to a handler for a derived exception class in a try-catch block

ERR57-CPP(L3)

CL.MLK   Memory Leak - in destructor

MLK.MIGHT   Memory Leak - possible

MLK.MUST   Memory Leak

MLK.RET.MIGHT   Memory Leak - possible

MLK.RET.MUST   Memory Leak

RH.LEAK   Resource leak

ERR61-CPP(L3)

MISRA.CATCH.BY_VALUE   Exception object of class type is caught by value

ERR62-CPP(L3)

CERT.ERR.CONV.STR_TO_NUM   Detect errors when converting a string to a number

EXP34-C(L1)

NPD.CHECK.CALL.MIGHT   Pointer may be passed to function that can dereference it after it was positively checked for NULL

NPD.CHECK.CALL.MUST   Pointer will be passed to function that may dereference it after it was positively checked for NULL

NPD.CHECK.MIGHT   Pointer may be dereferenced after it was positively checked for NULL

NPD.CHECK.MUST   Pointer will be dereferenced after it was positively checked for NULL

NPD.CONST.CALL   NULL is passed to function that can dereference it

NPD.CONST.DEREF   NULL is dereferenced

NPD.FUNC.CALL.MIGHT   Result of function that may return NULL may be passed to another function that may dereference it

NPD.FUNC.CALL.MUST   Result of function that may return NULL will be passed to another function that may dereference it

NPD.FUNC.MIGHT   Result of function that can return NULL may be dereferenced

NPD.FUNC.MUST   Result of function that may return NULL will be dereferenced

NPD.GEN.CALL.MIGHT   Null pointer may be passed to function that may dereference it

NPD.GEN.CALL.MUST   Null pointer will be passed to function that may dereference it

NPD.GEN.MIGHT   Null pointer may be dereferenced

NPD.GEN.MUST   Null pointer will be dereferenced

RNPD.CALL   Suspicious dereference of pointer in function call before NULL check

RNPD.DEREF   Suspicious dereference of pointer before NULL check

EXP39-C(L3)

CXX.CAST.OBJ_PTR_TO_OBJ_PTR   Cast between a pointer to object type and a pointer to a different object type

EXP42-C(L2)

CERT.MEMCMP.PADDED_DATA   Do not compare padding data

EXP47-C(L2)

CERT.VA_ARG.TYPE   Do not call va_arg with an argument of the incorrect type

EXP50-CPP(L2)

CERT.EXPR.PARENS   The precedence of operators within expressions should be made explicit.

MISRA.EXPR.PARENS.INSUFFICIENT   Limited dependence required for operator precedence rules in expressions

MISRA.INCR_DECR.OTHER   Increment or decrement operator is mixed with other operators in expression

PORTING.VAR.EFFECTS   Variable used twice in one expression where one usage is subject to side-effects

EXP51-CPP(L3)

CERT.EXPR.DELETE_ARR.BASE_PTR   Do not delete an array through a pointer of the incorrect type

EXP52-CPP(L3)

MISRA.SIZEOF.SIDE_EFFECT   Operand of sizeof has side effects

EXP53-CPP(L1)

UNINIT.CTOR.MIGHT   Uninitialized Variable in Constructor - possible

UNINIT.CTOR.MUST   Uninitialized Variable in Constructor

UNINIT.HEAP.MIGHT   Uninitialized Heap Use - possible

UNINIT.HEAP.MUST   Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT   Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST   Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST   Partially Uninitialized Array

UNINIT.STACK.MIGHT   Uninitialized Variable - possible

UNINIT.STACK.MUST   Uninitialized Variable

EXP54-CPP(L2)

CL.FFM.ASSIGN   Use of free memory (double free) - no operator=

CL.FFM.COPY   Use of free memory (double free) - no copy constructor

LOCRET.ARG   Function returns address of local variable

LOCRET.GLOB   Function returns address of local variable

LOCRET.RET   Function returns address of local variable

UFM.DEREF.MIGHT   Use of free memory (access) - possible

UFM.DEREF.MUST   Use of Freed Memory by Pointer

UFM.FFM.MIGHT   Use of free memory (double free) - possible

UFM.FFM.MUST   Freeing Freed Memory

UFM.RETURN.MIGHT   Use of freed memory (return) - possible

UFM.RETURN.MUST   Use of Freed Memory on Return

UFM.USE.MIGHT   Use of free memory - possible

UFM.USE.MUST   Use of Freed Memory

UNINIT.HEAP.MIGHT   Uninitialized Heap Use - possible

UNINIT.HEAP.MUST   Uninitialized Heap Use

UNINIT.STACK.ARRAY.MIGHT   Uninitialized Array - possible

UNINIT.STACK.ARRAY.MUST   Uninitialized Array

UNINIT.STACK.ARRAY.PARTIAL.MUST   Partially Uninitialized Array

UNINIT.STACK.MIGHT   Uninitialized Variable - possible

UNINIT.STACK.MUST   Uninitialized Variable

EXP55-CPP(L2)

MISRA.CAST.CONST   Cast operation removes const or volatile modifier from a pointer or reference

EXP56-CPP(L3)

MISRA.CAST.PTR.UNRELATED   Object of pointer type cast to unrelated type

MISRA.CAST.PTR_TO_INT   Cast between a pointer and an integral type

PORTING.CAST.PTR   Cast between types that are not both pointers or not pointers

PORTING.CAST.PTR.FLTPNT   Cast of a pointer to a floating point expression to a non floating point type pointer

PORTING.CAST.PTR.SIZE   Attempt to cast an expression to a type of a potentially incompatible size

EXP57-CPP(L3)

CERT.EXPR.DELETE_PTR.INCOMPLETE_TYPE   Do not delete a pointer to an incomplete type

EXP58-CPP(L3)

CERT.VA_START.TYPE   Pass an object of the correct type to va_start

EXP60-CPP(L1)

CERT.EXPR.PASS_NON_STD_LAYOUT   Do not pass a nonstandard-layout type object across execution boundaries

EXP61-CPP(L2)

LOCRET.RET   Function returns address of local variable

EXP62-CPP(L2)

CERT.MEMCMP.PADDED_DATA   Do not compare padding data

CWARN.MEM.NONPOD   Memory manipulation routine applied to a non-POD object

FIO30-C(L1)

SV.FMTSTR.GENERIC   Format String Vulnerability

SV.TAINTED.FMTSTR   Use of Unvalidated Data in a Format String

FIO34-C(L1)

CWARN.CMPCHR.EOF   A 'char' expression compared with EOF constant

FIO38-C(L3)

CERT.FILE_PTR.DEREF   A pointer to a FILE object shall not be dereferenced

CERT.FILE_PTR.DEREF.CAST   Object is casted to a FILE pointer, and it shall not be dereferenced

CERT.FILE_PTR.DEREF.INDIRECT   A pointer to a FILE object shall not be indirectly dereferenced by a system function

CERT.FILE_PTR.DEREF.RETURN   A pointer to a FILE object (returned by function) shall not be dereferenced

MISRA.FILE_PTR.DEREF.2012   A pointer to a FILE object shall not be dereferenced

MISRA.FILE_PTR.DEREF.CAST.2012   Object is casted to a FILE pointer, and it shall not be dereferenced

MISRA.FILE_PTR.DEREF.INDIRECT.2012   A pointer to a FILE object shall not be indirectly dereferenced by a system function

MISRA.FILE_PTR.DEREF.RETURN.2012   A pointer to a FILE object (returned by function) shall not be dereferenced

FIO39-C(L2)

CERT.FIO.NO_FLUSH   Flush or positioning function call missing

FIO42-C(L3)

RH.LEAK   Resource leak

FIO44-C(L3)

CERT.FSETPOS.VALUE   Only use values for fsetpos() that are returned from fgetpos()

FIO45-C(L2)

SV.TOCTOU.FILE_ACCESS   Time of Creation/Time of Use Race condition in File Access

FIO46-C(L3)

SV.INCORRECT_RESOURCE_HANDLING.URH   Insecure Resource Handling

FIO47-C(L2)

SV.FMT_STR.PRINT_FORMAT_MISMATCH.BAD   Incompatible type of a print function parameter

SV.FMT_STR.PRINT_FORMAT_MISMATCH.UNDESIRED   Unexpected type of a print function parameter

SV.FMT_STR.PRINT_IMPROP_LENGTH   Improper use of length modifier in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.FEW   Too few arguments in a print function call

SV.FMT_STR.PRINT_PARAMS_WRONGNUM.MANY   Too many arguments in a print function call

SV.FMT_STR.SCAN_FORMAT_MISMATCH.BAD   Incompatible type of a scan function parameter

SV.FMT_STR.SCAN_FORMAT_MISMATCH.UNDESIRED   Unexpected type of a scan function parameter

SV.FMT_STR.SCAN_IMPROP_LENGTH   Improper use of length modifier in a scan function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.FEW   Too few arguments in a scan function call

SV.FMT_STR.SCAN_PARAMS_WRONGNUM.MANY   Too many arguments in a scan function call

SV.FMT_STR.UNKWN_FORMAT   Unknown format specifier in a print function call

FIO51-CPP(L3)

RH.LEAK   Resource leak

FLP30-C(L2)

MISRA.FOR.COUNTER.FLT   For loop counter has a floating point type

FLP34-C(L3)

MISRA.CAST.FLOAT.WIDER   Cast of floating point expression to a wider floating point type

MISRA.CAST.FLOAT_INT   Cast of floating point expression to integral type

MISRA.CAST.INT_FLOAT   Cast of integral expression to floating point type

MISRA.CONV.FLOAT   Implicit floating-point conversion

FLP36-C(L3)

PORTING.CAST.FLTPNT   Cast of a floating point expression to a non floating point type

FLP37-C(L3)

CERT.MEMCMP.FLOAT_MEMBER   Do not compare when member is floating point

INT32-C(L2)

CWARN.NOEFFECT.OUTOFRANGE   Value outside of range

NUM.OVERFLOW   Possible Overflow

NUM.OVERFLOW.DF   Possible numeric overflow or wraparound

INT34-C(L3)

MISRA.SHIFT.RANGE.2012   Right operand of shift operation is out of range - greater or equal to the essential type size of left operand, or is negative

MEM50-CPP(L1)

UFM.DEREF.MIGHT   Use of free memory (access) - possible

UFM.DEREF.MUST   Use of Freed Memory by Pointer

UFM.FFM.MIGHT   Use of free memory (double free) - possible

UFM.FFM.MUST   Freeing Freed Memory

UFM.RETURN.MIGHT   Use of freed memory (return) - possible

UFM.RETURN.MUST   Use of Freed Memory on Return

UFM.USE.MIGHT   Use of free memory - possible

UFM.USE.MUST   Use of Freed Memory

MEM51-CPP(L1)

CL.FFM.ASSIGN   Use of free memory (double free) - no operator=

CL.FFM.COPY   Use of free memory (double free) - no copy constructor

CL.FMM   Freeing Mismatched Memory - in destructor

CL.SHALLOW.ASSIGN   Use of free memory (double free) - shallow copy in operator=

CL.SHALLOW.COPY   Use of free memory (double free) - shallow copy in copy constructor

FMM.MIGHT   Freeing Mismatched Memory - possible

FMM.MUST   Freeing Mismatched Memory

FNH.MIGHT   Freeing Non-Heap Memory - possible

FNH.MUST   Freeing Non-Heap Memory

FUM.GEN.MIGHT   Freeing Unallocated Memory - possible

FUM.GEN.MUST   Freeing Unallocated Memory

UNINIT.CTOR.MIGHT   Uninitialized Variable in Constructor - possible

UNINIT.CTOR.MUST   Uninitialized Variable in Constructor

UNINIT.HEAP.MIGHT   Uninitialized Heap Use - possible

UNINIT.HEAP.MUST   Uninitialized Heap Use

MEM52-CPP(L1)

NPD.CHECK.CALL.MIGHT   Pointer may be passed to function that can dereference it after it was positively checked for NULL

NPD.CHECK.CALL.MUST   Pointer will be passed to function that may dereference it after it was positively checked for NULL

NPD.CHECK.MIGHT   Pointer may be dereferenced after it was positively checked for NULL

NPD.CHECK.MUST   Pointer will be dereferenced after it was positively checked for NULL

NPD.CONST.CALL   NULL is passed to function that can dereference it

NPD.CONST.DEREF   NULL is dereferenced

NPD.FUNC.CALL.MIGHT   Result of function that may return NULL may be passed to another function that may dereference it

NPD.FUNC.CALL.MUST   Result of function that may return NULL will be passed to another function that may dereference it

NPD.FUNC.MIGHT   Result of function that can return NULL may be dereferenced

NPD.FUNC.MUST   Result of function that may return NULL will be dereferenced

NPD.GEN.CALL.MIGHT   Null pointer may be passed to function that may dereference it

NPD.GEN.CALL.MUST   Null pointer will be passed to function that may dereference it

NPD.GEN.MIGHT   Null pointer may be dereferenced

NPD.GEN.MUST   Null pointer will be dereferenced

RNPD.CALL   Suspicious dereference of pointer in function call before NULL check

RNPD.DEREF   Suspicious dereference of pointer before NULL check

MEM55-CPP(L1)

CERT.MEM.OVERRIDE.DELETE   Honor replacement dynamic storage management requirements for 'delete'

CERT.MEM.OVERRIDE.NEW   Honor replacement dynamic storage management requirements for 'new'

MSC30-C(L2)

CERT.MSC.STD_RAND_CALL   Do not use std::rand() for generating pseudorandom numbers

MSC32-C(L1)

CERT.MSC.SEED_RANDOM   Properly seed pseudorandom number generators

MSC33-C(L1)

CERT.MSC.ASCTIME   Do not pass invalid data to the asctime() function

MSC37-C(L2)

FUNCRET.GEN   Non-void function does not return value

FUNCRET.IMPLICIT   Non-void function implicitly returning int does not return value

MSC39-C(L3)

VA.LIST.INDETERMINATE   Attempt to call va_arg() on a va_list that has an indeterminate value

MSC41-C(L1)

CXX.SV.PWD.PLAIN   Attempt to set password using a plain string

CXX.SV.PWD.PLAIN.LENGTH   Attempt to set password with a length less than 15 characters

CXX.SV.PWD.PLAIN.LENGTH.ZERO   Attempt to set password with a length of zero characters

HCC   Use of hardcoded credentials

HCC.PWD   Use of a hardcoded password

HCC.USER   Use of a hardcoded user name

MSC50-CPP(L2)

CERT.MSC.STD_RAND_CALL   Do not use std::rand() for generating pseudorandom numbers

MSC51-CPP(L1)

AUTOSAR.STDLIB.RANDOM.NBR_GEN_DEFAULT_INIT   Random number engines shall not be default-initialized

MSC52-CPP(L2)

FUNCRET.GEN   Non-void function does not return value

FUNCRET.IMPLICIT   Non-void function implicitly returning int does not return value

MSC53-CPP(L3)

CERT.MSC.NORETURN_FUNC_RETURNS   Do not return from a function declared [[noreturn]]

MSC54-CPP(L2)

CERT.MSC.SIG_HANDLER.POF   A signal handler must be a plain old function

OOP50-CPP(L3)

CERT.OOP.CTOR.VIRTUAL_FUNC   Do not invoke virtual functions from constructors or destructors

OOP52-CPP(L2)

CL.MLK.VIRTUAL   Memory Leak - possible in destructor

CWARN.DTOR.NONVIRT.DELETE   Delete expression for an object of a class with virtual methods and no virtual destructor

OOP53-CPP(L3)

CERT.OOP.CTOR.INIT_ORDER   Write constructor member initializers in the canonical order

OOP54-CPP(L3)

CL.SELF-ASSIGN   Use of free memory (double free) - in operator=

OOP55-CPP(L2)

CERT.OOP.PTR_MEMBER.NO_MEMBER   Do not use pointer-to-member operators to access nonexistent members

OOP57-CPP(L2)

CERT.OOP.CSTD_FUNC_USE   Prefer special member functions and overloaded operators to C Standard Library functions

OOP58-CPP(L2)

CERT.OOP.COPY_MUTATES   Copy operations must not mutate the source object

POS30-C(L1)

ABV.GENERAL   Buffer Overflow - Array Index Out of Bounds

ABV.GENERAL.MULTIDIMENSION   Buffer Overflow - Array Index Out of Bounds

POS34-C(L2)

CERT.PUTENV.AUTO_VARIABLE   Do not call putenv() with a pointer to an automatic variable as the argument

POS35-C(L1)

CERT.STR.ASSIGN.CONST_TO_NONCONST   Do not assign a const char pointer to a non-const char pointer

SV.TOCTOU.FILE_ACCESS   Time of Creation/Time of Use Race condition in File Access

POS36-C(L1)

SV.USAGERULES.PERMISSIONS   Use of Privilege Elevation

POS37-C(L1)

SV.USAGERULES.PERMISSIONS   Use of Privilege Elevation

POS39-C(L1)

BYTEORDER.HTON.SEND   Missed conversion from host to network byte order

BYTEORDER.HTON.WRITE   Missed conversion from host to network byte order

BYTEORDER.NTOH.READ   Missed conversion from network to host byte order

BYTEORDER.NTOH.RECV   Missed conversion from network to host byte order

POS44-C(L2)

MISRA.INCL.SIGNAL.2012   The standard header file signal.h shall not be used

POS47-C(L1)

CERT.POS.THREAD.ASYNC_CANCEL   Do not use threads that can be canceled asynchronously

POS51-C(L3)

CONC.DL   Deadlock

CONC.NO_UNLOCK   Missing unlock for variable

POS52-C(L3)

CONC.SLEEP   Function may block in critical section

POS54-C(L1)

SV.RVT.RETVAL_NOTTESTED   Ignored Return Value

PRE30-C(L3)

MISRA.DEFINE.SHARP   # or ## operator in a macro definition

PRE32-C(L3)

MISRA.EXPANSION.DIRECTIVE   Directive-like tokens within a macro argument

SIG35-C(L3)

CERT.STDLIB.SIGNAL   Do not return from a computational exception signal handler

STR30-C(L2)

CERT.STR.ARG.CONST_TO_NONCONST   Do not pass a const char pointer to a non-const char pointer argument

CERT.STR.ASSIGN.CONST_TO_NONCONST   Do not assign a const char pointer to a non-const char pointer

STR34-C(L2)

CXX.CAST.SIGNED_CHAR_TO_INTEGER   Cast char to unsigned char before converting to larger integer sizes

STR37-C(L3)

AUTOSAR.STDLIB.CCTYPE.UCHAR   Arguments to character-handling functions defined in <cctype> shall be representable as an unsigned char

STR38-C(L1)

CXX.DIFF.WIDTH.STR_AND_FUNC   Implicit cast between narrow and wide character string while calling function

STR50-CPP(L1)

NNTS.MIGHT   Buffer Overflow - Non-null Terminated String

NNTS.MUST   Buffer Overflow - Non-null Terminated String

NNTS.TAINTED   Unvalidated User Input Causing Buffer Overflow - Non-Null Terminated String

SV.UNBOUND_STRING_INPUT.CIN   Usage of cin for unbounded string input

STR51-CPP(L1)

NPD.CHECK.CALL.MIGHT   Pointer may be passed to function that can dereference it after it was positively checked for NULL

NPD.CHECK.CALL.MUST   Pointer will be passed to function that may dereference it after it was positively checked for NULL

NPD.CHECK.MIGHT   Pointer may be dereferenced after it was positively checked for NULL

NPD.CHECK.MUST   Pointer will be dereferenced after it was positively checked for NULL

NPD.CONST.CALL   NULL is passed to function that can dereference it

NPD.CONST.DEREF   NULL is dereferenced

NPD.FUNC.CALL.MIGHT   Result of function that may return NULL may be passed to another function that may dereference it

NPD.FUNC.CALL.MUST   Result of function that may return NULL will be passed to another function that may dereference it

NPD.FUNC.MIGHT   Result of function that can return NULL may be dereferenced

NPD.FUNC.MUST   Result of function that may return NULL will be dereferenced

NPD.GEN.CALL.MIGHT   Null pointer may be passed to function that may dereference it

NPD.GEN.CALL.MUST   Null pointer will be passed to function that may dereference it

NPD.GEN.MIGHT   Null pointer may be dereferenced

NPD.GEN.MUST   Null pointer will be dereferenced

RNPD.CALL   Suspicious dereference of pointer in function call before NULL check

RNPD.DEREF   Suspicious dereference of pointer before NULL check

"MISRA", "MISRA C" and "MISRA C++" are registered trademarks of The MISRA Consortium Limited. ​