SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C++

C++ static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C++ code

  • All rules 798
  • Vulnerability14
  • Bug173
  • Security Hotspot19
  • Code Smell592

  • Quick Fix 99
Filtered: 35 rules found
unused
    Impact
      Clean code attribute
        1. Non-empty statements should change control flow or have at least one side-effect

           Bug
        2. Unused type declarations should be removed

           Code Smell
        3. Calls to "std::format" with a locale should use the "L" flag

           Code Smell
        4. "std::format" should not have unused arguments

           Code Smell
        5. "std::format" should not be missing indexes

           Bug
        6. Width, alignment, and padding format options should be used consistently

           Code Smell
        7. Functions that are not used in a project should be removed

           Code Smell
        8. "extern" shouldn't be used on member definitions

           Bug
        9. Reference types should not be qualified with "const" or "volatile"

           Code Smell
        10. Namespaces should not be empty

           Code Smell
        11. Forward declarations should not be redundant

           Code Smell
        12. Declarations should not be empty

           Code Smell
        13. "catch" clauses should do more than rethrow

           Code Smell
        14. Conditionally executed code should be reachable

           Bug
        15. Values should not be uselessly incremented

           Bug
        16. Related "if/else if" statements should not have the same condition

           Bug
        17. Unused assignments should be removed

           Code Smell
        18. All code should be reachable

           Bug
        19. Unused local variables should be removed

           Code Smell
        20. Sections of code should not be commented out

           Code Smell
        21. Unused function parameters should be removed

           Code Smell
        22. Unused functions and methods should be removed

           Code Smell
        23. Empty statements should be removed

           Code Smell
        24. Unused "private" fields should be removed

           Code Smell
        25. Unused labels should be removed

           Code Smell
        26. Condition-specific "catch" handlers should not be used after the ellipsis (catch-all) handler

           Bug
        27. Functions with "limited visibility" should be "used" at least once

           Code Smell
        28. Sections of code should not be "commented out"

           Code Smell
        29. A named function parameter shall be "used" at least once

           Code Smell
        30. The value returned by a function shall be "used"

           Code Smell
        31. A value should not be "unnecessarily written" to a local object

           Code Smell
        32. Types with "limited visibility" should be "used" at least once

           Code Smell
        33. Variables with "limited visibility" should be "used" at least once

           Code Smell
        34. Controlling expressions should not be invariant

           Bug
        35. A function shall not contain "unreachable" statements

           Bug

        Controlling expressions should not be invariant

        intentionality - logical
        reliability
        Bug
        • confusing
        • unused
        • symbolic-execution
        • misra-c++2023
        • misra-advisory

        Why is this an issue?

        More Info

        This rule is part of MISRA C++:2023.

        Usage of this content is governed by Sonar’s terms and conditions. Redistribution is prohibited.

        Rule 0.0.2 - Controlling expressions should not be invariant

        [IEC 61508-7] / C.5.9
        [DO-178C] / 6.4.4.3.c
        [ISO 26262-6] / 9.4.5

        Category: Advisory

        Analysis: Undecidable,System

        Amplification

        This rule applies to:

        • Controlling expressions of if, while, for, do ... while and switch statements; and
        • The first operand of the conditional operator (?:); and
        • The left hand operand of the logical AND (&&) and logical OR (||) operators.

        It does not apply to controlling expressions of constexpr if statements.

        A function’s compliance with this rule is determined independently of the context in which the function is called. For example, a Boolean parameter is treated as if it may have a value of true or false, even if all the calls expressed in the current program use a value of true.

        Rationale

        If a controlling expression has an invariant value, it is possible that there is a programming error. Any code in an infeasible path [1] may be removed by the compiler, which might have the effect of removing code that has been introduced for defensive purposes.

        This rule does not apply to constexpr if, as this is intended to be evaluated at compile time and requires a constant expression.

        Exception

        • A while statement with a constant expression evaluating to true is permitted as this is commonly used in real time systems.
        • Macros are permitted to expand to a do-while statement of the form do { ... } while ( false ), allowing a macro expansion to be used as a statement that includes a local scope.

        Example

        s8a = ( u16a < 0u ) ? 0 : 1;               // Non-compliant - u16a always >= 0
        
        if ( u16a <= 0xffffu ) { }                 // Non-compliant - always true
        if ( 2 > 3 ) { }                           // Non-compliant - always false
        if ( ( s8a < 10 ) && ( s8a > 20 ) ) { }    // Non-compliant - always false
        if ( ( s8a < 10 ) || ( s8a > 5  ) ) { }    // Non-compliant - always true
        if ( ( s8a < 10 ) &&
             ( s8a > 20 ) ||                       // Non-compliant - left operand of ||
             ( s8b == 5 ) ) { }                    //                 always false
        
        const uint8_t N = 4u;
        
        if ( N == 4u )                             // Non-compliant - compiler is permitted
        {                                          // to assume that N always has value 4
        }
        
        extern const volatile uint8_t M;
        
        if ( M == 4u )                             // Compliant - compiler assumes M may
        {                                          // change, even though the program
        }                                          // cannot modify its value
        
        while ( s8a > 10 )
        {
          if ( s8a > 5 ) { }                       // Non-compliant - s8a always > 5
        
          --s8a;
        }
        
        for ( s8a = 0; s8a < 130; ++s8a ) { }      // Non-compliant - always true
        
        while ( true ) { /* Do something */ }      // Compliant by exception #1
        
        do { } while ( false );                    // Compliant by exception #2
                                                   //   - if expanded from a macro
        
        uint16_t n;                                // Assume 10 <= n <= 100
        uint16_t sum;
        
        sum = 0;
        
        for ( uint16_t i = ( n - 6u ); i < n; ++i )
        {
          sum += i;
        }
        
        if ( ( sum % 2u ) == 0u )
        {
          // Non-compliant - the sum of six, consecutive, non-negative integers is always
          // an odd number, so the controlling expression will always be false.
        }
        
        template< typename T >
        void foo()
        {
          if constexpr ( std::is_integral< T >() ) // Rule does not apply
          {
            // Handle integral case
          }
          else
          {
            // Handle other case
          }
        }
        
        template void foo< int >();
        template void foo< float >();
        

        Glossary

        [1] Infeasible path

        Infeasible paths occur where there is a syntactic path to a code fragment, but the semantics ensure that the control flow path will not be executed. For example:

        if ( u32 < 0 )
        {
          // An unsigned value will never be negative,
          // so code in this block will never be executed.
        }
        

        Copyright The MISRA Consortium Limited © 2023

        How to fix it

        If a controlling expression can be computed statically, use if constexpr to suppress issues of this rule. For example, consider this feature flag:

        const int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if (10 < FeatureConst) { // Noncompliant: This condition is always true when evaluated
                return true;
            }
            return false;
        }
        

        Here is the corrected example:

        constexpr int FeatureConst = 18; // Determined from the compilation paramters
        
        inline bool const_feature_is_big() {
            if constexpr (10 < FeatureConst) { // Compliant: if constexpr is an exception to the rule
                return true;
            }
            return false;
        }
        

        A typical case of statically computed condition happens when testing the value of a template argument. Our analyzer considers each template instantiation independently. If an instantiation happens to have a statically invariant controlling expression for the given combination of arguments, the analyzer reports a violation.

        This might lead to seemingly contradictory reports, as in the following example:

        template<int X>
        void template_with_compile_check() {
            // Noncompliant: This condition is always false when evaluated
            // Noncompliant: This condition is always true when evaluated
            if (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        

        These reports do not actually contradict each other because they refer to different instantiations of the template function, sharing the same code location.

        Again, if constexpr allows you to ensure that a condition is evaluated at compile-time, and is probably more appropriate when testing the value of template arguments. No issue would be created in that case.

        template<int X>
        void template_with_compile_check() {
            // Compliant: if constexpr is an exception to the rule
            if constexpr (X == 18) {
            }
        }
        
        void instantiate() {
            template_with_compile_check<18>();
            template_with_compile_check<19>();
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI

        © 2025 SonarSource Sàrl. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use