 
                            ...
| Tool | Version | Checker | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée | 
 | chained-errno-function-calls errno-test-after-wrong-call | Supported | ||||||||
| Axivion Bauhaus Suite | 
 | CertC-ERR32 | |||||||||
| Compass/ROSE | Could detect violations of this rule by looking for signal handlers that themselves call  | ||||||||||
| Coverity | 
 | MISRA C 2012 Rule 22.8 MISRA C 2012 Rule 22.9 MISRA C 2012 Rule 22.10 | Implemented | ||||||||
| Cppcheck Premium | 
 | premium-cert-err32-c | |||||||||
| Helix QAC | 
 | C2031 DF4781, DF4782, DF4783 | |||||||||
| Klocwork | 
 | MISRA.INCL.SIGNAL.2012 | |||||||||
| LDRA tool suite | 
 | 44 S | Enhanced enforcement | ||||||||
| Parasoft C/C++test | 
 | CERT_C-ERR32-b | Properly define signal handlers | ||||||||
| 
 | CERT C: Rule ERR32-C | Checks for misuse of errno in a signal handler (rule fully covered) | |||||||||
| RuleCheckerSecurity Reviewer - Static Reviewer | 
 
 
 | chained-errno-function-calls errno-test-after-wrong-call | C34 | Fully implementedSupported | 
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...