blob: 93daf94fbe3255b752081f18236625aa22ba047b [file] [log] [blame]
Zhongxing Xu9e56d232009-10-31 10:02:37 +00001//== DivZeroChecker.cpp - Division by zero checker --------------*- C++ -*--==//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
Argyrios Kyrtzidisd2592a32010-12-22 18:53:44 +000010// This defines DivZeroChecker, a builtin check in ExprEngine that performs
Zhongxing Xu9e56d232009-10-31 10:02:37 +000011// checks for division by zeros.
12//
13//===----------------------------------------------------------------------===//
14
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000015#include "ClangSACheckers.h"
Chandler Carruth55fc8732012-12-04 09:13:33 +000016#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000017#include "clang/StaticAnalyzer/Core/Checker.h"
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000018#include "clang/StaticAnalyzer/Core/CheckerManager.h"
19#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
Zhongxing Xu9e56d232009-10-31 10:02:37 +000020
21using namespace clang;
Ted Kremenek9ef65372010-12-23 07:20:52 +000022using namespace ento;
Zhongxing Xu9e56d232009-10-31 10:02:37 +000023
Ted Kremenek36df58a2009-11-06 20:47:51 +000024namespace {
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000025class DivZeroChecker : public Checker< check::PreStmt<BinaryOperator> > {
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000026 mutable OwningPtr<BuiltinBug> BT;
Anna Zaks02019f72012-01-20 20:28:31 +000027 void reportBug(const char *Msg,
Ted Kremenek8bef8232012-01-26 21:29:00 +000028 ProgramStateRef StateZero,
Anna Zaks02019f72012-01-20 20:28:31 +000029 CheckerContext &C) const ;
Ted Kremenek36df58a2009-11-06 20:47:51 +000030public:
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000031 void checkPreStmt(const BinaryOperator *B, CheckerContext &C) const;
Ted Kremenek36df58a2009-11-06 20:47:51 +000032};
33} // end anonymous namespace
34
Anna Zaks02019f72012-01-20 20:28:31 +000035void DivZeroChecker::reportBug(const char *Msg,
Ted Kremenek8bef8232012-01-26 21:29:00 +000036 ProgramStateRef StateZero,
Anna Zaks02019f72012-01-20 20:28:31 +000037 CheckerContext &C) const {
38 if (ExplodedNode *N = C.generateSink(StateZero)) {
39 if (!BT)
Anna Zaks3bfd6d72012-01-21 05:07:33 +000040 BT.reset(new BuiltinBug("Division by zero"));
Anna Zaks02019f72012-01-20 20:28:31 +000041
Jordan Rosea1f81bb2012-08-28 00:50:51 +000042 BugReport *R = new BugReport(*BT, Msg, N);
43 bugreporter::trackNullOrUndefValue(N, bugreporter::GetDenomExpr(N), *R);
Jordan Rose785950e2012-11-02 01:53:40 +000044 C.emitReport(R);
Anna Zaks02019f72012-01-20 20:28:31 +000045 }
46}
47
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000048void DivZeroChecker::checkPreStmt(const BinaryOperator *B,
49 CheckerContext &C) const {
Zhongxing Xu9e56d232009-10-31 10:02:37 +000050 BinaryOperator::Opcode Op = B->getOpcode();
John McCall2de56d12010-08-25 11:45:40 +000051 if (Op != BO_Div &&
52 Op != BO_Rem &&
53 Op != BO_DivAssign &&
54 Op != BO_RemAssign)
Zhongxing Xu9e56d232009-10-31 10:02:37 +000055 return;
56
Anna Zaks783db502012-07-10 16:27:55 +000057 if (!B->getRHS()->getType()->isScalarType())
Zhongxing Xu9e56d232009-10-31 10:02:37 +000058 return;
59
Ted Kremenek5eca4822012-01-06 22:09:28 +000060 SVal Denom = C.getState()->getSVal(B->getRHS(), C.getLocationContext());
David Blaikiedc84cd52013-02-20 22:23:23 +000061 Optional<DefinedSVal> DV = Denom.getAs<DefinedSVal>();
Zhongxing Xu9e56d232009-10-31 10:02:37 +000062
63 // Divide-by-undefined handled in the generic checking for uses of
64 // undefined values.
65 if (!DV)
66 return;
67
68 // Check for divide by zero.
69 ConstraintManager &CM = C.getConstraintManager();
Ted Kremenek8bef8232012-01-26 21:29:00 +000070 ProgramStateRef stateNotZero, stateZero;
Ted Kremenek28f47b92010-12-01 22:16:56 +000071 llvm::tie(stateNotZero, stateZero) = CM.assumeDual(C.getState(), *DV);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000072
Anna Zaks8d0ffc72011-11-08 19:56:35 +000073 if (!stateNotZero) {
74 assert(stateZero);
Anna Zaks02019f72012-01-20 20:28:31 +000075 reportBug("Division by zero", stateZero, C);
76 return;
77 }
Zhongxing Xu9e56d232009-10-31 10:02:37 +000078
Anna Zaks02019f72012-01-20 20:28:31 +000079 bool TaintedD = C.getState()->isTainted(*DV);
80 if ((stateNotZero && stateZero && TaintedD)) {
81 reportBug("Division by a tainted value, possibly zero", stateZero, C);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000082 return;
83 }
84
85 // If we get here, then the denom should not be zero. We abandon the implicit
86 // zero denom case for now.
Anna Zaks0bd6b112011-10-26 21:06:34 +000087 C.addTransition(stateNotZero);
Zhongxing Xu9e56d232009-10-31 10:02:37 +000088}
Argyrios Kyrtzidis919c9b92011-02-28 01:27:50 +000089
90void ento::registerDivZeroChecker(CheckerManager &mgr) {
91 mgr.registerChecker<DivZeroChecker>();
92}