Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In this example, a volatile object is accessed through a non-volatile-qualified reference, resulting in undefined behavior.:

Code Block
bgColor#FFcccc
langc
static volatile int **ipp;
static int *ip;
static volatile int i = 0;

printf("i = %d.\n", i);

ipp = &ip; /* produces warnings in modern compilers */
ipp = (int**) &ip; /* constraint violation, also produces warnings */
*ipp = &i; /* valid */
if (*ip != 0) { /* valid */
  /* ... */
}

...

In this compliant solution, ip is declared volatile.:

Code Block
bgColor#ccccff
langc
static volatile int **ipp;
static volatile int *ip;
static volatile int i = 0;

printf("i = %d.\n", i);

ipp = &ip;
*ipp = &i;
if (*ip != 0) {
  /* ... */
}

...

Tool

Version

Checker

Description

Compass/ROSE

 

 

 

GCC

Include Page
GCC_V
GCC_V

 

Can detect violations of this rule when the -Wcast-qual flag is used.

LDRA tool suite

Include Page
LDRA_V
LDRA_V

344 S

Fully implemented.

PRQA QA-C
Include Page
PRQA_V
PRQA_V
0312Fully implemented.

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

...

Bibliography

[ISO/IEC 9899:2011]Section 6.7.3, "Type Qualifiers"

...