SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C

C static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C code

  • All rules 420
  • Vulnerability14
  • Bug111
  • Security Hotspot19
  • Code Smell276

  • Quick Fix 27
Filtered: 69 rules found
misra-required
    Impact
      Clean code attribute
        1. A function call shall not violate the function's preconditions

           Bug
        2. An "integer-literal" of type "long long" shall not use a single "L" or "l" in any suffix

           Code Smell
        3. The literal value zero shall be the only value assigned to "errno"

           Code Smell
        4. There shall be no occurrence of "undefined" or "critical unspecified behaviour"

           Bug
        5. User-defined identifiers shall have an appropriate form

           Code Smell
        6. "Global variables" shall not be used

           Code Smell
        7. The "volatile" qualifier shall be used appropriately

           Bug
        8. "Integral promotion" and the "usual arithmetic conversions" shall not change the signedness or the "type category" of an operand

           Code Smell
        9. The operands of "bitwise operators" and "shift operators" shall be appropriate

           Bug
        10. The argument to a "mixed-use macro parameter" shall not be subject to further expansion

           Code Smell
        11. An "object pointer type" shall not be cast to an integral type other than "std::uintptr_t" or "std::intptr_t"

           Code Smell
        12. The library function "system" from "<cstdlib>" shall not be used

           Vulnerability
        13. Reads and writes on the same file stream shall be separated by a positioning operation

           Bug
        14. Line-splicing shall not be used in "//" comments

           Bug
        15. Octal escape sequences, hexadecimal escape sequences and universal character names shall be terminated

           Code Smell
        16. Dynamic memory shall be managed automatically

           Code Smell
        17. Local variables shall not have static storage duration

           Code Smell
        18. The facilities provided by the standard "header file" "<csignal>" shall not be used

           Code Smell
        19. The macro "offsetof" shall not be used

           Code Smell
        20. The standard "header file" "<csetjmp>" shall not be used

           Code Smell
        21. A macro parameter immediately following a "#" operator shall not be immediately followed by a "##" operator

           Code Smell
        22. The "#include" directive shall be followed by either a "<filename>" or ""filename"" sequence

           Bug
        23. The "'" or """ or "\" characters and the "/*" or "//" character sequences shall not occur in a "header file" name

           Bug
        24. Precautions shall be taken in order to prevent the contents of a "header file" being included more than once

           Code Smell
        25. All "#else", "#elif" and "#endif" preprocessor directives shall reside in the same file as the "#if", "#ifdef" or "#ifndef" directive to which they are related

           Code Smell
        26. The "defined" preprocessor operator shall be used appropriately

           Bug
        27. A named bit-field with "signed integer type" shall not have a length of one bit

           Bug
        28. A bit-field shall have an appropriate type

           Code Smell
        29. Within an enumerator list, the value of an implicitly-specified "enumeration constant" shall be unique

           Code Smell
        30. A conversion from function type to pointer-to-function type shall only occur in appropriate contexts

           Code Smell
        31. A function with non-"void" return type shall return a value on all paths

           Bug
        32. The parameters in all "declarations" or overrides of a function shall either be unnamed or have identical names

           Code Smell
        33. The features of "<cstdarg>" shall not be used

           Code Smell
        34. Functions shall not call themselves, either directly or indirectly

           Code Smell
        35. An assignment operator shall not assign the address of an object with automatic storage duration to an object with a greater lifetime

           Code Smell
        36. The "asm" declaration shall not be used

           Code Smell
        37. The "goto" statement shall jump to a label declared later in the function body

           Code Smell
        38. A "goto" statement shall reference a label in a surrounding block

           Code Smell
        39. The structure of a "switch" statement shall be appropriate

           Code Smell
        40. All "if ... else if" constructs shall be terminated with an "else" statement

           Code Smell
        41. The body of an "iteration-statement" or a "selection-statement" shall be a "compound-statement"

           Code Smell
        42. An object with integral, enumerated, or pointer to "void" type shall not be cast to a pointer type

           Code Smell
        43. Casts shall not be performed between a pointer to function and any other type

           Bug
        44. A cast shall not remove any "const" or "volatile" qualification from the type accessed via a pointer or by reference

           Code Smell
        45. The built-in relational operators ">", ">=", "<" and "<=" shall not be applied to objects of pointer type, except where they point to elements of the same array

           Bug
        46. Subtraction between pointers shall only be applied to pointers that address elements of the same array

           Bug
        47. Pointer arithmetic shall not form an invalid pointer

           Bug
        48. Operations on a memory location shall be sequenced appropriately

           Bug
        49. The same type aliases shall be used in all "declarations" of the same "entity"

           Code Smell
        50. The source code used to implement an "entity" shall appear only once

           Bug
        51. The "one-definition rule" shall not be violated

           Bug
        52. All "declarations" of a variable or function shall have the same type

           Bug
        53. Block scope "declarations" shall not be "visually ambiguous"

           Code Smell
        54. A "header file" shall not contain definitions of functions or objects that are non-inline and have external linkage

           Code Smell
        55. A line whose first token is "#" shall be a valid preprocessing directive

           Bug
        56. All identifiers used in the controlling expression of "#if" or "#elif" preprocessing directives shall be defined prior to evaluation

           Bug
        57. Parentheses shall be used to ensure macro arguments are expanded appropriately

           Code Smell
        58. Tokens that look like a preprocessing directive shall not occur within a macro argument

           Bug
        59. Function-like macros shall not be defined

           Code Smell
        60. String literals with different encoding prefixes shall not be concatenated

           Bug
        61. The lowercase form of "L" shall not be used as the first character in a literal suffix

           Code Smell
        62. Unsigned "integer literals" shall be appropriately suffixed

           Code Smell
        63. Octal constants shall not be used

           Code Smell
        64. Within character literals and non raw-string literals, "\" shall only be used to form a defined escape sequence or universal character name

           Bug
        65. A variable declared in an "inner scope" shall not hide a variable declared in an "outer scope"

           Code Smell
        66. The character sequence "/*" shall not be used within a C-style comment

           Code Smell
        67. A named function parameter shall be "used" at least once

           Code Smell
        68. The value returned by a function shall be "used"

           Code Smell
        69. A function shall not contain "unreachable" statements

           Bug

        Pointer arithmetic shall not form an invalid pointer

        intentionality - logical
        reliability
        Bug
        • unpredictable
        • symbolic-execution
        • misra-c++2023
        • misra-required

        Why is this an issue?

        More Info

        This rule is part of MISRA C++:2023.

        Usage of this content is governed by Sonar’s terms and conditions. Redistribution is prohibited.

        Rule 8.7.1 - Pointer arithmetic shall not form an invalid pointer

        [expr.add] Undefined 4

        Category: Required

        Analysis: Undecidable,System

        Amplification

        This rule applies to all forms of pointer arithmetic, including array indexing:

        integer_expression + pointer_expression
        pointer_expression + integer_expression
        pointer_expression - integer_expression
        pointer_expression += integer_expression
        pointer_expression -= integer_expression
        ++pointer_expression
        --pointer_expression
        pointer_expression++
        pointer_expression--
        pointer_expression [ integer_expression ]
        integer_expression [ pointer_expression ]
        

        A pointer resulting from pointer arithmetic is invalid if it does not point to:

        • An element of the same array as the original pointer; or
        • One past the end of the same array as the original pointer.

        This rule also applies to pointer arithmetic that occurs within the C++ Standard Library functions. In addition, it is assumed that the implementation of the functions listed below perform pointer arithmetic on their pointer parameters:

        memchr, memcmp, memcpy, memmove, memset, strncat, strncmp, strncpy, strxfrm

        Note: a pointer to an object that is not an array is treated as if it were a pointer to the first element of an array with a single element.

        Rationale

        Undefined behaviour occurs if the result obtained from one of the above expressions is not a pointer to an element of the array pointed to by pointer_expression, or a pointer to one beyond the end of that array.

        Note: dereferencing an invalid pointer, including a pointer to one past the end of an array, results in undefined behaviour — this is targeted by M23_393: MISRA C++ 2023 Rule 4.1.3.

        Example

        int32_t * f1( int32_t * const a1, int32_t a2[ 10 ], int32_t ( &a3 )[ 10 ] )
        {
          a1[ 3 ] = 0;                  // Compliant only if the array pointed
                                        // to by 'a1' has at least 4 elements
        
          *( a2 + 9 ) = 0;              // Compliant only if the array pointed
                                        // to by 'a2' has at least 10 elements
        
          return a3 + 9;                // Compliant
        }
        
        void f2()
        {
          int32_t a1[ 10 ] = { };
        
          int32_t * p1 = &a1[  0 ];     // Compliant
          int32_t * p2 = a1 + 10;       // Compliant - points to one beyond and
          int32_t    i = *p2;           //             dereferencing is undefined behaviour
          int32_t * p3 = a1 + 11;       // Non-compliant - points to two beyond, resulting
                                        //                 in undefined behaviour
        
          p1++;                         // Compliant
          a1[ -1 ] = 0;                 // Non-compliant - exceeding array bounds results
                                        //                 in undefined behaviour
          i = *( &i + 0 );              // Compliant     - 'i' is treated as an array
                                        //                 of size 1
        
          // This declaration has 6 arrays:
          //   1 array of 5 elements of type array of int32_t
          //   5 arrays of 2 elements of type int32_t
          int32_t a2[ 5 ][ 2 ] = { };
        
          a2[ 3 ][ 1 ] = 0;             // Compliant
          i = *( *( a2 + 3 ) + 1 );     // Compliant
          i = a2[ 2 ][ 3 ];             // Non-compliant - exceeding array bounds results
                                        //                 in undefined behaviour
        
          int32_t * p4 = a2[ 1 ];       // Compliant
        
          i = p4[ 1 ];                  // Compliant - p4 addresses an array of size 2
        }
        

        The following example illustrates pointer arithmetic applied to members of a structure. Because each member is an object in its own right, this rule prevents the use of pointer arithmetic to move from one member to the next.

        struct
        {
          uint16_t x;
          uint16_t y;
          uint16_t a[ 10 ];
        } s;
        
        void f3()
        {
          uint16_t * p { &s.x };
        
          ++p;                          // Compliant - p points one past the end of s.x,
                                        //   but this cannot be assumed to point to s.y
          *p = 0;                       //   and dereferencing is undefined behaviour
        
          ++p;                          // Non-compliant - more than one past the end
        
        
          p = &s.a[ 0 ];                // Compliant     - p points into s.a
          p = p + 8;                    // Compliant     - p still points into s.a
          p = p + 3;                    // Non-compliant - more than one past the end
        }
        

        The following example shows that the implicit pointer arithmetic within library functions can lead to accesses beyond the end of an array:

        uint8_t buf1[ 5 ] = { 1, 2, 3, 4, 5 };
        uint8_t buf2[ 7 ] = { 1, 2, 3, 4, 5, 6, 7 };
        
        void f4()
        {
          if ( std::memcmp( buf1, buf2, 5 ) == 0 ) {}    // Compliant
          if ( std::memcmp( buf1, buf2, 7 ) == 0 ) {}    // Non-compliant
        
          auto p1 = std::next( buf1, 3 );                // Compliant
          auto p2 = std::next( buf1, 7 );                // Non-compliant
        }
        

        Copyright The MISRA Consortium Limited © 2023

          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use