SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C

C static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C code

  • All rules 420
  • Vulnerability14
  • Bug111
  • Security Hotspot19
  • Code Smell276

  • Quick Fix 27
Filtered: 39 rules found
confusing
    Impact
      Clean code attribute
        1. #include directives in a file should only be preceded by other preprocessor directives or comments

           Code Smell
        2. Loops should not have more than one "break" or "goto" statement

           Code Smell
        3. Switch labels should not be nested inside non-switch blocks

           Code Smell
        4. Appropriate char types should be used for character and integer values

           Code Smell
        5. The first element of an array should not be accessed implicitly

           Code Smell
        6. Multicharacter literals should not be used

           Code Smell
        7. GNU attributes should be used correctly

           Code Smell
        8. Functions which do not return should be declared as "noreturn"

           Code Smell
        9. Functions with "noreturn" attribute should not return

           Bug
        10. "else" statements should be clearly matched with an "if"

           Code Smell
        11. A conditionally executed single line should be denoted by indentation

           Code Smell
        12. Macros should not be redefined

           Code Smell
        13. "#include_next" should not be used

           Code Smell
        14. String literals should not be concatenated implicitly

           Code Smell
        15. Types and variables should be declared in separate statements

           Code Smell
        16. Format strings should be used correctly

           Code Smell
        17. Conditional operators should not be nested

           Code Smell
        18. Increment should not be used to set boolean variables to 'true'

           Code Smell
        19. Loops with at most one iteration should be refactored

           Bug
        20. Deprecated K&R syntax should not be used for function definition

           Code Smell
        21. Redundant pairs of parentheses should be removed

           Code Smell
        22. "/*" and "//" should not be used within comments

           Code Smell
        23. "Global variables" shall not be used

           Code Smell
        24. The built-in unary "+" operator should not be used

           Code Smell
        25. The argument to a "mixed-use macro parameter" shall not be subject to further expansion

           Code Smell
        26. Local variables shall not have static storage duration

           Code Smell
        27. A function with non-"void" return type shall return a value on all paths

           Bug
        28. The parameters in all "declarations" or overrides of a function shall either be unnamed or have identical names

           Code Smell
        29. The comma operator should not be used

           Code Smell
        30. Parentheses should be used to make the meaning of an expression appropriately explicit

           Code Smell
        31. The same type aliases shall be used in all "declarations" of the same "entity"

           Code Smell
        32. Block scope "declarations" shall not be "visually ambiguous"

           Code Smell
        33. All identifiers used in the controlling expression of "#if" or "#elif" preprocessing directives shall be defined prior to evaluation

           Bug
        34. Parentheses shall be used to ensure macro arguments are expanded appropriately

           Code Smell
        35. "#undef" should only be used for macros defined previously in the same file

           Code Smell
        36. "#include" directives should only be preceded by preprocessor directives or comments

           Code Smell
        37. A variable declared in an "inner scope" shall not hide a variable declared in an "outer scope"

           Code Smell
        38. The character sequence "/*" shall not be used within a C-style comment

           Code Smell
        39. Controlling expressions should not be invariant

           Bug

        Controlling expressions should not be invariant

        intentionality - logical
        reliability
        Bug
        • confusing
        • unused
        • symbolic-execution
        • misra-c++2023
        • misra-advisory

        Why is this an issue?

        More Info

        This rule is part of MISRA C++:2023.

        Usage of this content is governed by Sonar’s terms and conditions. Redistribution is prohibited.

        Rule 0.0.2 - Controlling expressions should not be invariant

        [IEC 61508-7] / C.5.9
        [DO-178C] / 6.4.4.3.c
        [ISO 26262-6] / 9.4.5

        Category: Advisory

        Analysis: Undecidable,System

        Amplification

        This rule applies to:

        • Controlling expressions of if, while, for, do ... while and switch statements; and
        • The first operand of the conditional operator (?:); and
        • The left hand operand of the logical AND (&&) and logical OR (||) operators.

        It does not apply to controlling expressions of constexpr if statements.

        A function’s compliance with this rule is determined independently of the context in which the function is called. For example, a Boolean parameter is treated as if it may have a value of true or false, even if all the calls expressed in the current program use a value of true.

        Rationale

        If a controlling expression has an invariant value, it is possible that there is a programming error. Any code in an infeasible path [1] may be removed by the compiler, which might have the effect of removing code that has been introduced for defensive purposes.

        This rule does not apply to constexpr if, as this is intended to be evaluated at compile time and requires a constant expression.

        Exception

        • A while statement with a constant expression evaluating to true is permitted as this is commonly used in real time systems.
        • Macros are permitted to expand to a do-while statement of the form do { ... } while ( false ), allowing a macro expansion to be used as a statement that includes a local scope.

        Example

        s8a = ( u16a < 0u ) ? 0 : 1;               // Non-compliant - u16a always >= 0
        
        if ( u16a <= 0xffffu ) { }                 // Non-compliant - always true
        if ( 2 > 3 ) { }                           // Non-compliant - always false
        if ( ( s8a < 10 ) && ( s8a > 20 ) ) { }    // Non-compliant - always false
        if ( ( s8a < 10 ) || ( s8a > 5  ) ) { }    // Non-compliant - always true
        if ( ( s8a < 10 ) &&
             ( s8a > 20 ) ||                       // Non-compliant - left operand of ||
             ( s8b == 5 ) ) { }                    //                 always false
        
        const uint8_t N = 4u;
        
        if ( N == 4u )                             // Non-compliant - compiler is permitted
        {                                          // to assume that N always has value 4
        }
        
        extern const volatile uint8_t M;
        
        if ( M == 4u )                             // Compliant - compiler assumes M may
        {                                          // change, even though the program
        }                                          // cannot modify its value
        
        while ( s8a > 10 )
        {
          if ( s8a > 5 ) { }                       // Non-compliant - s8a always > 5
        
          --s8a;
        }
        
        for ( s8a = 0; s8a < 130; ++s8a ) { }      // Non-compliant - always true
        
        while ( true ) { /* Do something */ }      // Compliant by exception #1
        
        do { } while ( false );                    // Compliant by exception #2
                                                   //   - if expanded from a macro
        
        uint16_t n;                                // Assume 10 <= n <= 100
        uint16_t sum;
        
        sum = 0;
        
        for ( uint16_t i = ( n - 6u ); i < n; ++i )
        {
          sum += i;
        }
        
        if ( ( sum % 2u ) == 0u )
        {
          // Non-compliant - the sum of six, consecutive, non-negative integers is always
          // an odd number, so the controlling expression will always be false.
        }
        
        template< typename T >
        void foo()
        {
          if constexpr ( std::is_integral< T >() ) // Rule does not apply
          {
            // Handle integral case
          }
          else
          {
            // Handle other case
          }
        }
        
        template void foo< int >();
        template void foo< float >();
        

        Glossary

        [1] Infeasible path

        Infeasible paths occur where there is a syntactic path to a code fragment, but the semantics ensure that the control flow path will not be executed. For example:

        if ( u32 < 0 )
        {
          // An unsigned value will never be negative,
          // so code in this block will never be executed.
        }
        

        Copyright The MISRA Consortium Limited © 2023

        How to fix it

        If a controlling expression can be computed statically, use if constexpr to suppress issues of this rule. For example, consider this feature flag:

        const int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if (10 < FeatureConst) { // Noncompliant: This condition is always true when evaluated
                return true;
            }
            return false;
        }
        

        Here is the corrected example:

        constexpr int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if constexpr (10 < FeatureConst) { // Compliant: if constexpr is an exception to the rule
                return true;
            }
            return false;
        }
        

        A typical case of statically computed condition happens when testing the value of a template argument. Our analyzer considers each template instantiation independently. If an instantiation happens to have a statically invariant controlling expression for the given combination of arguments, the analyzer reports a violation.

        This might lead to seemingly contradictory reports, as in the following example:

        template<int X>
        void template_with_compile_check() {
            // Noncompliant: This condition is always false when evaluated
            // Noncompliant: This condition is always true when evaluated
            if (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        

        These reports do not actually contradict each other because they refer to different instantiations of the template function, sharing the same code location.

        Again, if constexpr allows you to ensure that a condition is evaluated at compile-time, and is probably more appropriate when testing the value of template arguments. No issue would be created in that case.

        template<int X>
        void template_with_compile_check() {
            // Compliant: if constexpr is an exception to the rule
            if constexpr (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use