SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C++

C++ static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C++ code

  • All rules 798
  • Vulnerability14
  • Bug173
  • Security Hotspot19
  • Code Smell592

  • Quick Fix 99
Filtered: 50 rules found
misra-advisory
    Impact
      Clean code attribute
        1. Floating-point arithmetic should be used appropriately

           Bug
        2. The "goto" statement should not be used

           Code Smell
        3. "Legacy for statements" should be "simple"

           Code Smell
        4. The built-in unary "+" operator should not be used

           Code Smell
        5. "User-provided" copy and move member functions of a class should have appropriate signatures

           Code Smell
        6. "Symmetrical operators" should only be implemented as non-member functions

           Code Smell
        7. Member functions returning references to their object should be "ref-qualified" appropriately

           Code Smell
        8. "std::vector" should not be specialized with "bool"

           Code Smell
        9. Variables of array type should not be declared

           Code Smell
        10. "Unscoped enumerations" should not be declared

           Code Smell
        11. Functions with "limited visibility" should be "used" at least once

           Code Smell
        12. All variables should be initialized

           Code Smell
        13. The raw pointer constructors of "std::shared_ptr" and "std::unique_ptr" should not be used

           Code Smell
        14. All direct, non-static data members of a class should be initialized before the class object is "accessible"

           Code Smell
        15. Variables should be captured explicitly in a non-"transient lambda"

           Code Smell
        16. Deprecated features should not be used

           Code Smell
        17. "Dynamic memory" should not be used

           Code Smell
        18. The "#pragma" directive and the "_Pragma" operator should not be used

           Code Smell
        19. The "#" and "##" preprocessor operators should not be used

           Code Smell
        20. Program-terminating functions should not be used

           Code Smell
        21. A "noexcept" function should not attempt to propagate an exception to the calling function

           Bug
        22. There should be at least one exception handler to catch all otherwise unhandled exceptions

           Bug
        23. All constructors of a class should explicitly initialize all of its virtual base classes and immediate base classes

           Code Smell
        24. Non-static data members should be either all "private" or all "public"

           Code Smell
        25. Classes should not be inherited virtually

           Code Smell
        26. Bit-fields should not be declared

           Code Smell
        27. A "declaration" should not declare more than one variable or member variable

           Code Smell
        28. There should be no unnamed namespaces in "header files"

           Code Smell
        29. The only "declarations" in the global namespace should be "main", namespace declarations and "extern "C"" declarations

           Code Smell
        30. The target type of a pointer or "lvalue" reference parameter should be const-qualified appropriately

           Code Smell
        31. The result of an assignment operator should not be "used"

           Code Smell
        32. An unsigned arithmetic operation with constant operands should not wrap

           Bug
        33. The comma operator should not be used

           Code Smell
        34. The right-hand operand of a logical "&&" or "||" operator should not contain "persistent side effects"

           Bug
        35. The built-in unary "-" operator should not be applied to an expression of unsigned type

           Bug
        36. A cast should not convert a pointer type to an integral type

           Code Smell
        37. The "declaration" of an object should contain no more than two levels of pointer indirection

           Code Smell
        38. Parentheses should be used to make the meaning of an expression appropriately explicit

           Code Smell
        39. The names of the "standard signed integer types" and "standard unsigned integer types" should not be used

           Code Smell
        40. Internal linkage should be specified appropriately

           Code Smell
        41. A function or object with external linkage should be "introduced" in a "header file"

           Code Smell
        42. When an array with external linkage is declared, its size should be explicitly specified

           Code Smell
        43. "#undef" should only be used for macros defined previously in the same file

           Code Smell
        44. "#include" directives should only be preceded by preprocessor directives or comments

           Code Smell
        45. Sections of code should not be "commented out"

           Code Smell
        46. "Trigraph-like sequences" should not be used

           Code Smell
        47. A value should not be "unnecessarily written" to a local object

           Code Smell
        48. Types with "limited visibility" should be "used" at least once

           Code Smell
        49. Variables with "limited visibility" should be "used" at least once

           Code Smell
        50. Controlling expressions should not be invariant

           Bug

        Controlling expressions should not be invariant

        intentionality - logical
        reliability
        Bug
        • confusing
        • unused
        • symbolic-execution
        • misra-c++2023
        • misra-advisory

        Why is this an issue?

        More Info

        This rule is part of MISRA C++:2023.

        Usage of this content is governed by Sonar’s terms and conditions. Redistribution is prohibited.

        Rule 0.0.2 - Controlling expressions should not be invariant

        [IEC 61508-7] / C.5.9
        [DO-178C] / 6.4.4.3.c
        [ISO 26262-6] / 9.4.5

        Category: Advisory

        Analysis: Undecidable,System

        Amplification

        This rule applies to:

        • Controlling expressions of if, while, for, do ... while and switch statements; and
        • The first operand of the conditional operator (?:); and
        • The left hand operand of the logical AND (&&) and logical OR (||) operators.

        It does not apply to controlling expressions of constexpr if statements.

        A function’s compliance with this rule is determined independently of the context in which the function is called. For example, a Boolean parameter is treated as if it may have a value of true or false, even if all the calls expressed in the current program use a value of true.

        Rationale

        If a controlling expression has an invariant value, it is possible that there is a programming error. Any code in an infeasible path [1] may be removed by the compiler, which might have the effect of removing code that has been introduced for defensive purposes.

        This rule does not apply to constexpr if, as this is intended to be evaluated at compile time and requires a constant expression.

        Exception

        • A while statement with a constant expression evaluating to true is permitted as this is commonly used in real time systems.
        • Macros are permitted to expand to a do-while statement of the form do { ... } while ( false ), allowing a macro expansion to be used as a statement that includes a local scope.

        Example

        s8a = ( u16a < 0u ) ? 0 : 1;               // Non-compliant - u16a always >= 0
        
        if ( u16a <= 0xffffu ) { }                 // Non-compliant - always true
        if ( 2 > 3 ) { }                           // Non-compliant - always false
        if ( ( s8a < 10 ) && ( s8a > 20 ) ) { }    // Non-compliant - always false
        if ( ( s8a < 10 ) || ( s8a > 5  ) ) { }    // Non-compliant - always true
        if ( ( s8a < 10 ) &&
             ( s8a > 20 ) ||                       // Non-compliant - left operand of ||
             ( s8b == 5 ) ) { }                    //                 always false
        
        const uint8_t N = 4u;
        
        if ( N == 4u )                             // Non-compliant - compiler is permitted
        {                                          // to assume that N always has value 4
        }
        
        extern const volatile uint8_t M;
        
        if ( M == 4u )                             // Compliant - compiler assumes M may
        {                                          // change, even though the program
        }                                          // cannot modify its value
        
        while ( s8a > 10 )
        {
          if ( s8a > 5 ) { }                       // Non-compliant - s8a always > 5
        
          --s8a;
        }
        
        for ( s8a = 0; s8a < 130; ++s8a ) { }      // Non-compliant - always true
        
        while ( true ) { /* Do something */ }      // Compliant by exception #1
        
        do { } while ( false );                    // Compliant by exception #2
                                                   //   - if expanded from a macro
        
        uint16_t n;                                // Assume 10 <= n <= 100
        uint16_t sum;
        
        sum = 0;
        
        for ( uint16_t i = ( n - 6u ); i < n; ++i )
        {
          sum += i;
        }
        
        if ( ( sum % 2u ) == 0u )
        {
          // Non-compliant - the sum of six, consecutive, non-negative integers is always
          // an odd number, so the controlling expression will always be false.
        }
        
        template< typename T >
        void foo()
        {
          if constexpr ( std::is_integral< T >() ) // Rule does not apply
          {
            // Handle integral case
          }
          else
          {
            // Handle other case
          }
        }
        
        template void foo< int >();
        template void foo< float >();
        

        Glossary

        [1] Infeasible path

        Infeasible paths occur where there is a syntactic path to a code fragment, but the semantics ensure that the control flow path will not be executed. For example:

        if ( u32 < 0 )
        {
          // An unsigned value will never be negative,
          // so code in this block will never be executed.
        }
        

        Copyright The MISRA Consortium Limited © 2023

        How to fix it

        If a controlling expression can be computed statically, use if constexpr to suppress issues of this rule. For example, consider this feature flag:

        const int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if (10 < FeatureConst) { // Noncompliant: This condition is always true when evaluated
                return true;
            }
            return false;
        }
        

        Here is the corrected example:

        constexpr int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if constexpr (10 < FeatureConst) { // Compliant: if constexpr is an exception to the rule
                return true;
            }
            return false;
        }
        

        A typical case of statically computed condition happens when testing the value of a template argument. Our analyzer considers each template instantiation independently. If an instantiation happens to have a statically invariant controlling expression for the given combination of arguments, the analyzer reports a violation.

        This might lead to seemingly contradictory reports, as in the following example:

        template<int X>
        void template_with_compile_check() {
            // Noncompliant: This condition is always false when evaluated
            // Noncompliant: This condition is always true when evaluated
            if (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        

        These reports do not actually contradict each other because they refer to different instantiations of the template function, sharing the same code location.

        Again, if constexpr allows you to ensure that a condition is evaluated at compile-time, and is probably more appropriate when testing the value of template arguments. No issue would be created in that case.

        template<int X>
        void template_with_compile_check() {
            // Compliant: if constexpr is an exception to the rule
            if constexpr (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use