Compile code using the highest warning level available for your compiler and eliminate warnings by modifying the code.
According to the C Standard, subclause 188.8.131.52 [ISO/IEC 9899:2011],
A conforming implementation shall produce at least one diagnostic message (identified in an implementation-defined manner) if a preprocessing translation unit or translation unit contains a violation of any syntax rule or constraint, even if the behavior is also explicitly specified as undefined or implementation-defined. Diagnostic messages need not be produced in other circumstances.
If suitable source-code-checking tools are available, use them regularly.
Compilers can produce diagnostic messages for correct code, as is permitted by C. It is usually preferable to rewrite code to eliminate compiler warnings, but if the code is correct, it is sufficient to provide a comment explaining why the warning message does not apply. Some compilers provide ways to suppress warnings, such as suitably formatted comments or pragmas, which can be used sparingly when the programmer understands the implications of the warning but has good reason to use the flagged construct anyway.
Do not simply quiet warnings by adding type casts or other means. Instead, understand the reason for the warning and consider a better approach, such as using matching types and avoiding type casts whenever possible.
Noncompliant Code Example (Windows)
default warning specifier with
#pragma warning resets the behavior of a warning to its default value, which may not be the same as its previous behavior. Programmers commonly, but incorrectly, use the
default warning specifier to restore previous warning messages after a message is temporarily disabled.
Compliant Solution (Windows)
Instead of using the
default warning specifier, the current state of the warnings should be saved and then restored after the unnecessarily flagged code.
pragma warning(push) stores the current warning state for every warning. The
pragma warning(pop)pops the last warning state pushed onto the stack. Any changes made to the warning state between the push and pop are undone.
Eliminating violations of syntax rules and other constraints can eliminate serious software vulnerabilities that can lead to the execution of arbitrary code with the permissions of the vulnerable process.
Not All Warnings Are Enabled
Warnings Not Treated As Errors
|SonarQube C/C++ Plugin|
Warns when the
Requires documentation of
|SEI CERT C++ Coding Standard||VOID MSC00-CPP. Compile cleanly at high warning levels|
|MITRE CWE||CWE-563, Unused variable|
CWE-570, Expression is always false
CWE-571, Expression is always true
|[ISO/IEC 9899:2011]||Section 184.108.40.206, "Diagnostics"|
|[Seacord 2013]||Chapter 9, "Recommended Practices"|
|[Sutter 2005]||Item 1|