SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C

C static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C code

  • All rules 420
  • Vulnerability14
  • Bug111
  • Security Hotspot19
  • Code Smell276

  • Quick Fix 27
Filtered: 30 rules found
misra-advisory
    Impact
      Clean code attribute
        1. Floating-point arithmetic should be used appropriately

           Bug
        2. The "goto" statement should not be used

           Code Smell
        3. The built-in unary "+" operator should not be used

           Code Smell
        4. Functions with "limited visibility" should be "used" at least once

           Code Smell
        5. All variables should be initialized

           Code Smell
        6. "Dynamic memory" should not be used

           Code Smell
        7. The "#pragma" directive and the "_Pragma" operator should not be used

           Code Smell
        8. The "#" and "##" preprocessor operators should not be used

           Code Smell
        9. Program-terminating functions should not be used

           Code Smell
        10. Bit-fields should not be declared

           Code Smell
        11. A "declaration" should not declare more than one variable or member variable

           Code Smell
        12. The target type of a pointer or "lvalue" reference parameter should be const-qualified appropriately

           Code Smell
        13. The result of an assignment operator should not be "used"

           Code Smell
        14. An unsigned arithmetic operation with constant operands should not wrap

           Bug
        15. The comma operator should not be used

           Code Smell
        16. The right-hand operand of a logical "&&" or "||" operator should not contain "persistent side effects"

           Bug
        17. The built-in unary "-" operator should not be applied to an expression of unsigned type

           Bug
        18. A cast should not convert a pointer type to an integral type

           Code Smell
        19. The "declaration" of an object should contain no more than two levels of pointer indirection

           Code Smell
        20. Parentheses should be used to make the meaning of an expression appropriately explicit

           Code Smell
        21. The names of the "standard signed integer types" and "standard unsigned integer types" should not be used

           Code Smell
        22. A function or object with external linkage should be "introduced" in a "header file"

           Code Smell
        23. "#undef" should only be used for macros defined previously in the same file

           Code Smell
        24. "#include" directives should only be preceded by preprocessor directives or comments

           Code Smell
        25. Sections of code should not be "commented out"

           Code Smell
        26. "Trigraph-like sequences" should not be used

           Code Smell
        27. A value should not be "unnecessarily written" to a local object

           Code Smell
        28. Types with "limited visibility" should be "used" at least once

           Code Smell
        29. Variables with "limited visibility" should be "used" at least once

           Code Smell
        30. Controlling expressions should not be invariant

           Bug

        Controlling expressions should not be invariant

        intentionality - logical
        reliability
        Bug
        • confusing
        • unused
        • symbolic-execution
        • misra-c++2023
        • misra-advisory

        Why is this an issue?

        More Info

        This rule is part of MISRA C++:2023.

        Usage of this content is governed by Sonar’s terms and conditions. Redistribution is prohibited.

        Rule 0.0.2 - Controlling expressions should not be invariant

        [IEC 61508-7] / C.5.9
        [DO-178C] / 6.4.4.3.c
        [ISO 26262-6] / 9.4.5

        Category: Advisory

        Analysis: Undecidable,System

        Amplification

        This rule applies to:

        • Controlling expressions of if, while, for, do ... while and switch statements; and
        • The first operand of the conditional operator (?:); and
        • The left hand operand of the logical AND (&&) and logical OR (||) operators.

        It does not apply to controlling expressions of constexpr if statements.

        A function’s compliance with this rule is determined independently of the context in which the function is called. For example, a Boolean parameter is treated as if it may have a value of true or false, even if all the calls expressed in the current program use a value of true.

        Rationale

        If a controlling expression has an invariant value, it is possible that there is a programming error. Any code in an infeasible path [1] may be removed by the compiler, which might have the effect of removing code that has been introduced for defensive purposes.

        This rule does not apply to constexpr if, as this is intended to be evaluated at compile time and requires a constant expression.

        Exception

        • A while statement with a constant expression evaluating to true is permitted as this is commonly used in real time systems.
        • Macros are permitted to expand to a do-while statement of the form do { ... } while ( false ), allowing a macro expansion to be used as a statement that includes a local scope.

        Example

        s8a = ( u16a < 0u ) ? 0 : 1;               // Non-compliant - u16a always >= 0
        
        if ( u16a <= 0xffffu ) { }                 // Non-compliant - always true
        if ( 2 > 3 ) { }                           // Non-compliant - always false
        if ( ( s8a < 10 ) && ( s8a > 20 ) ) { }    // Non-compliant - always false
        if ( ( s8a < 10 ) || ( s8a > 5  ) ) { }    // Non-compliant - always true
        if ( ( s8a < 10 ) &&
             ( s8a > 20 ) ||                       // Non-compliant - left operand of ||
             ( s8b == 5 ) ) { }                    //                 always false
        
        const uint8_t N = 4u;
        
        if ( N == 4u )                             // Non-compliant - compiler is permitted
        {                                          // to assume that N always has value 4
        }
        
        extern const volatile uint8_t M;
        
        if ( M == 4u )                             // Compliant - compiler assumes M may
        {                                          // change, even though the program
        }                                          // cannot modify its value
        
        while ( s8a > 10 )
        {
          if ( s8a > 5 ) { }                       // Non-compliant - s8a always > 5
        
          --s8a;
        }
        
        for ( s8a = 0; s8a < 130; ++s8a ) { }      // Non-compliant - always true
        
        while ( true ) { /* Do something */ }      // Compliant by exception #1
        
        do { } while ( false );                    // Compliant by exception #2
                                                   //   - if expanded from a macro
        
        uint16_t n;                                // Assume 10 <= n <= 100
        uint16_t sum;
        
        sum = 0;
        
        for ( uint16_t i = ( n - 6u ); i < n; ++i )
        {
          sum += i;
        }
        
        if ( ( sum % 2u ) == 0u )
        {
          // Non-compliant - the sum of six, consecutive, non-negative integers is always
          // an odd number, so the controlling expression will always be false.
        }
        
        template< typename T >
        void foo()
        {
          if constexpr ( std::is_integral< T >() ) // Rule does not apply
          {
            // Handle integral case
          }
          else
          {
            // Handle other case
          }
        }
        
        template void foo< int >();
        template void foo< float >();
        

        Glossary

        [1] Infeasible path

        Infeasible paths occur where there is a syntactic path to a code fragment, but the semantics ensure that the control flow path will not be executed. For example:

        if ( u32 < 0 )
        {
          // An unsigned value will never be negative,
          // so code in this block will never be executed.
        }
        

        Copyright The MISRA Consortium Limited © 2023

        How to fix it

        If a controlling expression can be computed statically, use if constexpr to suppress issues of this rule. For example, consider this feature flag:

        const int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if (10 < FeatureConst) { // Noncompliant: This condition is always true when evaluated
                return true;
            }
            return false;
        }
        

        Here is the corrected example:

        constexpr int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if constexpr (10 < FeatureConst) { // Compliant: if constexpr is an exception to the rule
                return true;
            }
            return false;
        }
        

        A typical case of statically computed condition happens when testing the value of a template argument. Our analyzer considers each template instantiation independently. If an instantiation happens to have a statically invariant controlling expression for the given combination of arguments, the analyzer reports a violation.

        This might lead to seemingly contradictory reports, as in the following example:

        template<int X>
        void template_with_compile_check() {
            // Noncompliant: This condition is always false when evaluated
            // Noncompliant: This condition is always true when evaluated
            if (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        

        These reports do not actually contradict each other because they refer to different instantiations of the template function, sharing the same code location.

        Again, if constexpr allows you to ensure that a condition is evaluated at compile-time, and is probably more appropriate when testing the value of template arguments. No issue would be created in that case.

        template<int X>
        void template_with_compile_check() {
            // Compliant: if constexpr is an exception to the rule
            if constexpr (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use