MISRA-C launches 2025 guidelines for safer C
Cette publication existe aussi en Français
MISRA-C has launched its latest guidelines for safer C code and preparing for the next generation of the C language
MISRA C:2025, released this week by the MISRA C Working Group, enables developers to immediately take advantage of the updated guidelines, policy changes and enhancements by facilitating and streamlining compliance through the automated static code analysis and reporting.
MISRA C:2025 updates the major revision in 2023 lays the foundation for supporting the next revision to the C standard.
“The guidelines are preparing for the next version of the C language,” said Jim McElroy, XX for LDRA. ”The MISRA guidelines address the needs of memory safety as well as functional safety so proper use of MISRA are perfectly safe and we supported this from day one so we will immediately support 2025 in the tool suite.”
“MISRA C is preparing to go forwards,” said Jill Britton director of compliance at software tool supplier Perforce.
“Some of the sections have been reorganised and the guidelines for autogenerated code has been removed into a separate document – code generated by machine that is never read or modified by a human – for example the rules of l’s and 1s, 0 and Os, are not applicable, this has been in progress for ages and has been pulled out as a separate document.”
“Autogenerated code has been around for a long time. We can still analyse autogenerated code, we can do it to MISRA, to autogenerated version of MISRA, but people are more concerned about AI generation and what to do about that and how it will evolve,” she said.
MISRA C provides guidelines for developing code using the C programming language where safety, security and code quality are essential. Over the years, the guidelines have promoted safety, security, and reliability for a wide range of complex systems, including software-intensive embedded systems in the aerospace, defence, industrial, energy, medical and automotive sectors.
“Potential software vulnerabilities, including memory safety issues, are of significant concern to OEMs regardless of the system they’re developing,” said Andrew Banks, technical specialist at SLDRA, now part of Tasking, and MISRA C Working Group chair. “Many of these vulnerabilities, however, are not inherent flaws in the C language but rather result from developers taking shortcuts that bypass reliable coding practices. By complying with MISRA C:2025, developers can avoid many potential pitfalls such as memory safety-based vulnerabilities with the added benefit of improving code clarity, facilitating effective testing, and simplifying long-term maintainability.”
The previous update in 2023 introduced specific rules and directives for multithreading and atomic types, as well as consolidating previous versions of the guidelines into a single, comprehensive edition.
Support for MISRA C:2025 is available now.
https://ldra.com/misra/; www.perforce.com
If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :
eeNews on Google News
