xref: /llvm-project/clang/lib/StaticAnalyzer/Checkers/DivZeroChecker.cpp (revision 09b8dbfa80d62e64efb09bd166324270c96badf9)
1 //== DivZeroChecker.cpp - Division by zero checker --------------*- C++ -*--==//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This defines DivZeroChecker, a builtin check in ExprEngine that performs
10 // checks for division by zeros.
11 //
12 //===----------------------------------------------------------------------===//
13 
14 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
15 #include "clang/StaticAnalyzer/Checkers/Taint.h"
16 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
17 #include "clang/StaticAnalyzer/Core/BugReporter/CommonBugCategories.h"
18 #include "clang/StaticAnalyzer/Core/Checker.h"
19 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
20 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
21 #include <optional>
22 
23 using namespace clang;
24 using namespace ento;
25 using namespace taint;
26 
27 namespace {
28 class DivZeroChecker : public Checker<check::PreStmt<BinaryOperator>> {
29   void reportBug(StringRef Msg, ProgramStateRef StateZero,
30                  CheckerContext &C) const;
31   void reportTaintBug(StringRef Msg, ProgramStateRef StateZero,
32                       CheckerContext &C,
33                       llvm::ArrayRef<SymbolRef> TaintedSyms) const;
34 
35 public:
36   /// This checker class implements several user facing checkers
37   enum CheckKind { CK_DivideZero, CK_TaintedDivChecker, CK_NumCheckKinds };
38   bool ChecksEnabled[CK_NumCheckKinds] = {false};
39   CheckerNameRef CheckNames[CK_NumCheckKinds];
40   mutable std::unique_ptr<BugType> BugTypes[CK_NumCheckKinds];
41 
42   void checkPreStmt(const BinaryOperator *B, CheckerContext &C) const;
43 };
44 } // end anonymous namespace
45 
46 static const Expr *getDenomExpr(const ExplodedNode *N) {
47   const Stmt *S = N->getLocationAs<PreStmt>()->getStmt();
48   if (const auto *BE = dyn_cast<BinaryOperator>(S))
49     return BE->getRHS();
50   return nullptr;
51 }
52 
53 void DivZeroChecker::reportBug(StringRef Msg, ProgramStateRef StateZero,
54                                CheckerContext &C) const {
55   if (!ChecksEnabled[CK_DivideZero])
56     return;
57   if (!BugTypes[CK_DivideZero])
58     BugTypes[CK_DivideZero].reset(
59         new BugType(CheckNames[CK_DivideZero], "Division by zero"));
60   if (ExplodedNode *N = C.generateErrorNode(StateZero)) {
61     auto R = std::make_unique<PathSensitiveBugReport>(*BugTypes[CK_DivideZero],
62                                                       Msg, N);
63     bugreporter::trackExpressionValue(N, getDenomExpr(N), *R);
64     C.emitReport(std::move(R));
65   }
66 }
67 
68 void DivZeroChecker::reportTaintBug(
69     StringRef Msg, ProgramStateRef StateZero, CheckerContext &C,
70     llvm::ArrayRef<SymbolRef> TaintedSyms) const {
71   if (!ChecksEnabled[CK_TaintedDivChecker])
72     return;
73   if (!BugTypes[CK_TaintedDivChecker])
74     BugTypes[CK_TaintedDivChecker].reset(
75         new BugType(CheckNames[CK_TaintedDivChecker], "Division by zero",
76                     categories::TaintedData));
77   if (ExplodedNode *N = C.generateNonFatalErrorNode(StateZero)) {
78     auto R = std::make_unique<PathSensitiveBugReport>(
79         *BugTypes[CK_TaintedDivChecker], Msg, N);
80     bugreporter::trackExpressionValue(N, getDenomExpr(N), *R);
81     for (auto Sym : TaintedSyms)
82       R->markInteresting(Sym);
83     C.emitReport(std::move(R));
84   }
85 }
86 
87 void DivZeroChecker::checkPreStmt(const BinaryOperator *B,
88                                   CheckerContext &C) const {
89   BinaryOperator::Opcode Op = B->getOpcode();
90   if (Op != BO_Div &&
91       Op != BO_Rem &&
92       Op != BO_DivAssign &&
93       Op != BO_RemAssign)
94     return;
95 
96   if (!B->getRHS()->getType()->isScalarType())
97     return;
98 
99   SVal Denom = C.getSVal(B->getRHS());
100   std::optional<DefinedSVal> DV = Denom.getAs<DefinedSVal>();
101 
102   // Divide-by-undefined handled in the generic checking for uses of
103   // undefined values.
104   if (!DV)
105     return;
106 
107   // Check for divide by zero.
108   ConstraintManager &CM = C.getConstraintManager();
109   ProgramStateRef stateNotZero, stateZero;
110   std::tie(stateNotZero, stateZero) = CM.assumeDual(C.getState(), *DV);
111 
112   if (!stateNotZero) {
113     assert(stateZero);
114     reportBug("Division by zero", stateZero, C);
115     return;
116   }
117 
118   if ((stateNotZero && stateZero)) {
119     std::vector<SymbolRef> taintedSyms = getTaintedSymbols(C.getState(), *DV);
120     if (!taintedSyms.empty()) {
121       reportTaintBug("Division by a tainted value, possibly zero", stateNotZero,
122                      C, taintedSyms);
123       return;
124     }
125   }
126 
127   // If we get here, then the denom should not be zero. We abandon the implicit
128   // zero denom case for now.
129   C.addTransition(stateNotZero);
130 }
131 
132 void ento::registerDivZeroChecker(CheckerManager &mgr) {
133   DivZeroChecker *checker = mgr.registerChecker<DivZeroChecker>();
134   checker->ChecksEnabled[DivZeroChecker::CK_DivideZero] = true;
135   checker->CheckNames[DivZeroChecker::CK_DivideZero] =
136       mgr.getCurrentCheckerName();
137 }
138 
139 bool ento::shouldRegisterDivZeroChecker(const CheckerManager &mgr) {
140   return true;
141 }
142 
143 void ento::registerTaintedDivChecker(CheckerManager &mgr) {
144   DivZeroChecker *checker;
145   if (!mgr.isRegisteredChecker<DivZeroChecker>())
146     checker = mgr.registerChecker<DivZeroChecker>();
147   else
148     checker = mgr.getChecker<DivZeroChecker>();
149   checker->ChecksEnabled[DivZeroChecker::CK_TaintedDivChecker] = true;
150   checker->CheckNames[DivZeroChecker::CK_TaintedDivChecker] =
151       mgr.getCurrentCheckerName();
152 }
153 
154 bool ento::shouldRegisterTaintedDivChecker(const CheckerManager &mgr) {
155   return true;
156 }
157