MISRA C

From HandWiki
Revision as of 14:18, 6 February 2024 by John Stpola (talk | contribs) (fix)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Software development standard for the C programming language

MISRA C is a set of software development guidelines for the C programming language developed by The MISRA Consortium. Its aims are to facilitate code safety, security, portability and reliability in the context of embedded systems, specifically those systems programmed in ISO C / C90 / C99.[1]

There is also a set of guidelines for MISRA C++ not covered by this article.

History

  • Draft: 1997[2]
  • First edition: 1998 (rules, required/advisory)
  • Second edition: 2004 (rules, required/advisory)
  • Third edition: 2012 (directives; rules, Decidable/Undecidable)
  • MISRA compliance: 2016, updated 2020
  • MISRA C:2023 (MISRA C Third edition, Second revision)

For the first two editions of MISRA-C (1998 and 2004) all Guidelines were considered as Rules. With the publication of MISRA C:2012 a new category of Guideline was introduced - the Directive whose compliance is more open to interpretation, or relates to process or procedural matters.

Adoption

Although originally specifically targeted at the automotive industry, MISRA C has evolved as a widely accepted model for best practices by leading developers in sectors including automotive, aerospace, telecom, medical devices, defense, railway, and others. For example:

  • The Joint Strike Fighter project C++ Coding Standards[3] are based on MISRA-C:1998.
  • The NASA Jet Propulsion Laboratory C Coding Standards[4] are based on MISRA-C:2004.
  • IEC 81001-5-1:2021 Health software and health IT systems safety, effectiveness and security - Part 5-1: Security - Activities in the product lifecycle cites MISRA C as an example of secure coding best practices.
  • ISO 26262 Functional Safety - Road Vehicles cites MISRA C as being an appropriate sub-set of the C language:
    • ISO 26262-6:2011 Part 6: Product development at the software level[5] cites MISRA-C:2004 and MISRA AC AGC.
    • ISO 26262-6:2018 Part 6: Product development at the software level[6] cites MISRA C:2012.
  • The AUTOSAR General Software Specification (SRS_BSW_00007) likewise cites MISRA C:
    • The AUTOSAR 4.2 General Software Specification[7] requires that If the BSW Module implementation is written in C language, then it shall conform to the MISRA C:2004 Standard.
    • The AUTOSAR 4.3 General Software Specification[8] requires that If the BSW Module implementation is written in C language, then it shall conform to the MISRA C:2012 Standard.

Guideline classification and categorization

When a new software project is started, the latest MISRA standard should be used. Previous standards are still available for use with legacy software projects that need to refer to it.[9]

Classification

Each Guideline is classified[10] as Mandatory (new for MISRA C:2012), Required or Advisory. Furthermore, the MISRA Compliance document permits Advisory guidelines to be Disapplied.

  • Mandatory guidelines shall always be complied with
  • Required guidelines shall be complied with, unless subject to a Deviation
  • Advisory guidelines are considered good practice, but compliance is less formal.

Categorization

The rules can be divided logically into a number of categories:

  • Avoiding possible compiler differences, for example, the size of C's int type may vary but int16_t (standardized in C99) is always 16 bits.
  • Avoiding using functions and constructs that are prone to failure, for example, malloc may fail.
  • Produce maintainable and debuggable code, for example, naming conventions and commenting.
  • Best practice rules.
  • Complexity limits.

Scope

MISRA C:2012 separately classifies each guideline as either Single Translation Unit or System.[10]

Decidability

MISRA C:2012 classifies the rules (but not the directives) as Decidable or Undecidable.

Achieving compliance

MISRA compliance

MISRA published documents to provide additional guidance to understand and achieve MISRA compliance.

  • MISRA Compliance:2016, was released by MISRA in April 2016.[11]
  • MISRA Compliance:2020, revised edition, was released in February 2020.[12]

Compliance

In order for a piece of software to claim to be compliant to the MISRA C Guidelines, all mandatory rules shall be met and all required rules and directives shall either be met or subject to a formal deviation. Advisory rules may be disapplied without a formal deviation, but this should still be recorded in the project documentation.

Note: For compliance purposes, there is no distinction between rules and directives.

Deviations

Many MISRA C rules can be characterized as guidelines because under certain condition software engineers may deviate from rules and still be considered compliant with the standard. Deviations must be documented either in the code or in a file. In addition; proof must be provided that the software engineer has considered the safety of the system and that deviating from the rule will not have a negative impact, requirements for deviations also include:

  • The rule deviated from.
  • Rationale for deviation.[13]

Published documents

MISRA C:1998

The first edition of MISRA C, "Guidelines for the use of the C language in vehicle based software", which was published in 1998 and is officially known as MISRA-C:1998.[14]

MISRA-C:1998 has 127 rules, of which 93 are required and 34 are advisory; the rules are numbered in sequence from 1 to 127.

MISRA C:2004

In 2004, a second edition "Guidelines for the use of the C language in critical systems", or MISRA-C:2004 was produced, with many substantial changes to the guidelines, including a complete renumbering of the rules.

MISRA-C:2004 contains 142 rules, of which 122 are "required" and 20 are "advisory"; they are divided into 21 topical categories, from "Environment" to "Run-time failures".

MISRA C:2012

Main document

In 2013, the third edition, MISRA C:2012, was published. MISRA C:2012 extends support to the C99 version of the C language (while maintaining guidelines for C90), in addition to including a number of improvements that can reduce the cost and complexity of compliance, whilst aiding consistent, safe use of C in critical systems.[15]

MISRA-C:2012 contains 143 rules and 16 "directives" (that is, rules whose compliance is more open to interpretation, or relates to process or procedural matters); each of which is classified as mandatory, required, or advisory. They are separately classified as either Single Translation Unit or System. Additionally, the rules are classified as Decidable or Undecidable.

Amendment 1

In April 2016, MISRA published (as a free download) MISRA C:2012 - Amendment 1: Additional Security Guidelines[16] which added fourteen new security guidelines.

Amendment 2

In February 2020, MISRA published (as a free download) MISRA C:2012 - Amendment 2: Updates for ISO/IEC 9899:2011/18 Core functionality[17] which adds mapping for the undefined, unspecified and implementation defined behaviours within C11/C18.

Supporting documents

MISRA have published the following addenda to support MISRA C:2012:

  • MISRA C:2012 - Addendum 1: Rule Mappings,[18] which contains bi-directional rule mappings between MISRA C:2004 and the new version. It is intended to assist users in migration.
  • MISRA C:2012 - Addendum 2: Coverage of MISRA C:2012 against ISO/IEC TS 17961:2013 "C Secure"[19]
  • MISRA C:2012 - Addendum 3: Coverage of MISRA C:2012 against CERT C[20]

MISRA C:2023

In May 2023 MISRA published MISRA C:2023 (MISRA C Third edition, Second revision) which incorporates Amendments 2 – 4 (AMD2, AMD3, AMD4) and Technical Corrigendum 2 (TC2) and incorporates support for C11 and C18 language features. [21]

Example suite

An exemplar suite (for MISRA-C:2004 and MISRA C:2012) is available from the MISRA GitLab[22] repository (login required). This allows tool-users to evaluate and compare the checking support provided by the various MISRA tools; additionally, it gives tool-implementers some guidance as to the intent of the MISRA Guidelines.

Tools

While there exist many software tools that claim to check code for "MISRA conformance", there is no MISRA certification process.[23]

Most of the guidelines can be checked using tools that perform static code analysis. The remaining guidelines require the use of dynamic code analysis.

Tools that check code for MISRA conformance include:

  • Astrée by AbsInt
  • Axivion Bauhaus Suite by Axivion GmbH. MISRA C:2004, C:2012, C:2012 Amendment 1, C++:2008, Compliance:2016.
  • CodeSonar by GrammaTech
  • Coverity by Synopsys - Static Analysis
  • Cppcheck - Open source Static Analysis tool for C/C++
  • ECLAIR by BUGSENG srl. MISRA C:2004, C:2012, C:2012 Amendment 1, C++:2008.
  • Helix QAC by Perforce Software. MISRA C:1998, C:2004, C:2012, C++:2008.[24]
  • Klocwork by Rogue Wave Software (now owned by Perforce Software[25]). MISRA C:2012, C:2012 Amendment 1, C++:2008.[26]
  • LDRA Testbed by Liverpool Data Research Associates
  • Parasoft C/C++test by Parasoft. MISRA C 1998, MISRA C 2004, MISRA C 2012 AMD1, AMD2 and AMD3, MISRA C++ 2008, Draft version of MISRA C++ 202x.[27]
  • PC-Lint by Gimpel Software (now owned by Vector Informatik GmbH). MISRA C:1998, C:2004, C:2012, C++:2008.[28]
  • Polyspace by MathWorks
  • PVS-Studio by Program Verification Systems
  • SonarQube by SonarSource (Open Source with some commercial plug-in components)
  • SQuORE by Squoring Technologies
  • Understand by SciTools

C/C++ compilers that support MISRA conformance include:

Criticism

Some research results question the effectiveness of MISRA C 2004.

In a paper that compares earlier work on MISRA C:1998 with MISRA C:2004, Les Hatton comes to the conclusion that:[30]

In view of the apparent widening influence of the MISRA C standard, this paper attempts to assess whether important deficiencies in the original standard have been addressed satisfactorily. Unfortunately, they have not and the important real to false positive ratio is not much better in MISRA C 2004 than it was in MISRA C 1998 and it is unacceptably low in both.

He goes on to state:[30]

In its present form, the only people to benefit from the MISRA C 2004 update would appear to be tool vendors and it is to be hoped that steps will be taken both to simplify the wording and to reduce the false positive ratio in future revisions by taking a little more notice of published experimental data and being less tempted to invent rules on the basis that they seem a good idea.

A study at the TU Delft, by Cathal Boogerd and Leon Moonen, empirically assesses the value of MISRA C:2004. It comes to similar results:[31]

From the data obtained, we can make the following key observations. First, there are 9 out of 72 rules for which violations were observed that perform significantly better (α = 0.05) than a random predictor at locating fault-related lines. The true positive rates for these rules range from 24-100%. Second, we observed a negative correlation between MISRA rule violations and observed faults. In addition, 29 out of 72 rules had a zero true positive rate. Taken together with Adams' observation that all modifications have a non-zero probability of introducing a fault, this makes it possible that adherence to the MISRA standard as a whole would have made the software less reliable.

See also

References

  1. "MISRA clarifies safe and secure uses of the C language". www.misra.org.uk. https://www.misra.org.uk/LinkClick.aspx?fileticket=JMG_JlEytqY%3D&tabid=59. 
  2. In spring 1997 software engineers at the Austin Rover Group (ARG) sent a draft C coding standard to Programming Research Ltd (PRL) for review. The review was performed by PRL's then senior consultant, David Blyth, who proposed replacing the draft with an appreciably stronger set of coding rules. Those rules, with minor changes, formed the basis of the first edition of MISRA C.
  3. "Joint Strike Fighter Air Vehicle C++ Coding Standards". http://www.stroustrup.com/JSF-AV-rules.pdf. 
  4. "JPL Institutional Coding Standard for the C Programming Language". https://andrewbanks.com/wp-content/uploads/2019/07/JPL_Coding_Standard_C.pdf. 
  5. "ISO 26262-6:2011 Road vehicles -- Functional safety -- Part 6: Product development at the software level". ISO. https://www.iso.org/standard/51362.html. 
  6. "ISO 26262-6:2018 Road vehicles -- Functional safety -- Part 6: Product development at the software level". ISO. https://www.iso.org/standard/68388.html. 
  7. "AUTOSAR 4.2 General Software Specification". https://www.autosar.org/fileadmin/user_upload/standards/classic/4-2/AUTOSAR_SWS_BSWGeneral.pdf. 
  8. "AUTOSAR 4.3 General Specification of Basic Software Modules". AutoSAR. 2016-11-30. https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_SWS_BSWGeneral.pdf. 
  9. MISRA publications
  10. 10.0 10.1 "Fact Sheet: MISRA C:2012 (PDF)". programmingresearch.com. http://www.programmingresearch.com/content/misc/PRQA-MISRAC2012-FactSheet.pdf. 
  11. "MISRA Compliance:2016 (PDF)". MISRA. http://misra.org.uk/LinkClick.aspx?fileticket=w_Syhpkf7xA%3d&tabid=57. 
  12. "MISRA Compliance:2020 (PDF)". MISRA. https://www.misra.org.uk/app/uploads/2021/06/MISRA-Compliance-2020.pdf. 
  13. "Achieving MISRA C:2012 Compliance". Parasoft. http://alm.parasoft.com/achieving-misra-c-2012-compliance-with-a-development-testing-platform. 
  14. "A brief history of MISRA C". MISRA. 2013-03-18. http://www.misra-c.com/Activities/MISRAC/tabid/160/Default.aspx. 
  15. "MISRA C:2012 release date announced". MISRA. 26 February 2013. http://www.misra.org.uk/LinkClick.aspx?fileticket=SAG1iH3YwNE%3d&tabid=59. 
  16. "MISRA C:2012 - Amendment 1 (PDF)". MISRA. April 2016. https://misra.org.uk/LinkClick.aspx?fileticket=V2wsZxtVGkE%3d&tabid=57. 
  17. "MISRA C:2012 - Amendment 2 (PDF)". MISRA. February 2020. https://misra.org.uk/LinkClick.aspx?fileticket=42UepuUAjQ4%3d&tabid=57. 
  18. "MISRA C:2012 - Addendum 1: Rule Mapping (PDF)". https://www.misra.org.uk/forum/download/file.php?id=629. 
  19. "MISRA C:2012 - Addendum 2: Coverage of MISRA C:2012 against ISO/IEC TS 17961:2013 "C Secure" (PDF)". https://www.misra.org.uk/LinkClick.aspx?fileticket=Ne5llHFRTtY%3d&tabid=57. 
  20. "MISRA C:2012 - Addendum 3: Coverage of MISRA C:2012 against CERT C (PDF)". https://www.misra.org.uk/LinkClick.aspx?fileticket=PLS6_EzbAl0%3d&tabid=57. 
  21. "MISRA". https://misra.org.uk/misra-c2023-released/. 
  22. MISRA GitLab repository
  23. "MISRA C FAQ list." MISRA Consortium
  24. "Helix QAC for C and C++ | Perforce". https://www.perforce.com/products/helix-qac. 
  25. "Clearlake Capital-Backed Perforce Software to Acquire Rogue Wave Software | Perforce". https://www.roguewave.com/company/news/2019/perforce-software-acquires-rogue-wave-software. 
  26. "Klocwork for C, C++, C#, Java, and JavaScript | Perforce". https://www.perforce.com/products/klocwork. 
  27. "C/C++ Built-in Test Configurations". Parasoft. 17 October 2022. https://docs.parasoft.com/display/CPPTESTPROEC20222/Built-in+Test+Configurations. 
  28. MISRA conformance checking, PC-lint/FlexeLint, Gimpel Software.
  29. Languages and Standards; iar.com
  30. 30.0 30.1 Language subsetting in an industrial context: a comparison of MISRA C 1998 and MISRA C; Les Hatton; University of Kingston; 2004.
  31. Assessing the Value of Coding Standards: An Empirical Study; C.J. Boogerd and L. Moonen; Delft University of Technology; 2008.

External links