blob: 5094a0336232852125f2f11c1053a161eb466bb6 [file] [log] [blame]
Zhongxing Xu9e56d232009-10-31 10:02:37 +00001//== DivZeroChecker.cpp - Division by zero checker --------------*- C++ -*--==//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
Argyrios Kyrtzidisd2592a32010-12-22 18:53:44 +000010// This defines DivZeroChecker, a builtin check in ExprEngine that performs
Zhongxing Xu9e56d232009-10-31 10:02:37 +000011// checks for division by zeros.
12//
13//===----------------------------------------------------------------------===//
14
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000015#include "ClangSACheckers.h"
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000016#include "clang/StaticAnalyzer/Core/Checker.h"
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000017#include "clang/StaticAnalyzer/Core/CheckerManager.h"
18#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
Ted Kremenek9b663712011-02-10 01:03:03 +000019#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
Zhongxing Xu9e56d232009-10-31 10:02:37 +000020
21using namespace clang;
Ted Kremenek9ef65372010-12-23 07:20:52 +000022using namespace ento;
Zhongxing Xu9e56d232009-10-31 10:02:37 +000023
Ted Kremenek36df58a2009-11-06 20:47:51 +000024namespace {
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000025class DivZeroChecker : public Checker< check::PreStmt<BinaryOperator> > {
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000026 mutable OwningPtr<BuiltinBug> BT;
Anna Zaks02019f72012-01-20 20:28:31 +000027 void reportBug(const char *Msg,
Ted Kremenek8bef8232012-01-26 21:29:00 +000028 ProgramStateRef StateZero,
Anna Zaks02019f72012-01-20 20:28:31 +000029 CheckerContext &C) const ;
Ted Kremenek36df58a2009-11-06 20:47:51 +000030public:
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000031 void checkPreStmt(const BinaryOperator *B, CheckerContext &C) const;
Ted Kremenek36df58a2009-11-06 20:47:51 +000032};
33} // end anonymous namespace
34
Anna Zaks02019f72012-01-20 20:28:31 +000035void DivZeroChecker::reportBug(const char *Msg,
Ted Kremenek8bef8232012-01-26 21:29:00 +000036 ProgramStateRef StateZero,
Anna Zaks02019f72012-01-20 20:28:31 +000037 CheckerContext &C) const {
38 if (ExplodedNode *N = C.generateSink(StateZero)) {
39 if (!BT)
Anna Zaks3bfd6d72012-01-21 05:07:33 +000040 BT.reset(new BuiltinBug("Division by zero"));
Anna Zaks02019f72012-01-20 20:28:31 +000041
42 BugReport *R =
Anna Zaks3bfd6d72012-01-21 05:07:33 +000043 new BugReport(*BT, Msg, N);
Anna Zaks02019f72012-01-20 20:28:31 +000044
45 R->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(N,
Ted Kremenek76aadc32012-03-09 01:13:14 +000046 bugreporter::GetDenomExpr(N), R));
Anna Zaks02019f72012-01-20 20:28:31 +000047 C.EmitReport(R);
48 }
49}
50
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000051void DivZeroChecker::checkPreStmt(const BinaryOperator *B,
52 CheckerContext &C) const {
Zhongxing Xu9e56d232009-10-31 10:02:37 +000053 BinaryOperator::Opcode Op = B->getOpcode();
John McCall2de56d12010-08-25 11:45:40 +000054 if (Op != BO_Div &&
55 Op != BO_Rem &&
56 Op != BO_DivAssign &&
57 Op != BO_RemAssign)
Zhongxing Xu9e56d232009-10-31 10:02:37 +000058 return;
59
Anna Zaks783db502012-07-10 16:27:55 +000060 if (!B->getRHS()->getType()->isScalarType())
Zhongxing Xu9e56d232009-10-31 10:02:37 +000061 return;
62
Ted Kremenek5eca4822012-01-06 22:09:28 +000063 SVal Denom = C.getState()->getSVal(B->getRHS(), C.getLocationContext());
Zhongxing Xu9e56d232009-10-31 10:02:37 +000064 const DefinedSVal *DV = dyn_cast<DefinedSVal>(&Denom);
65
66 // Divide-by-undefined handled in the generic checking for uses of
67 // undefined values.
68 if (!DV)
69 return;
70
71 // Check for divide by zero.
72 ConstraintManager &CM = C.getConstraintManager();
Ted Kremenek8bef8232012-01-26 21:29:00 +000073 ProgramStateRef stateNotZero, stateZero;
Ted Kremenek28f47b92010-12-01 22:16:56 +000074 llvm::tie(stateNotZero, stateZero) = CM.assumeDual(C.getState(), *DV);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000075
Anna Zaks8d0ffc72011-11-08 19:56:35 +000076 if (!stateNotZero) {
77 assert(stateZero);
Anna Zaks02019f72012-01-20 20:28:31 +000078 reportBug("Division by zero", stateZero, C);
79 return;
80 }
Zhongxing Xu9e56d232009-10-31 10:02:37 +000081
Anna Zaks02019f72012-01-20 20:28:31 +000082 bool TaintedD = C.getState()->isTainted(*DV);
83 if ((stateNotZero && stateZero && TaintedD)) {
84 reportBug("Division by a tainted value, possibly zero", stateZero, C);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000085 return;
86 }
87
88 // If we get here, then the denom should not be zero. We abandon the implicit
89 // zero denom case for now.
Anna Zaks0bd6b112011-10-26 21:06:34 +000090 C.addTransition(stateNotZero);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000091}
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000092
93void ento::registerDivZeroChecker(CheckerManager &mgr) {
94 mgr.registerChecker<DivZeroChecker>();
95}