Start here

Home
About Klocwork
What's new
Fixed issues
Release notes
Installation

Reference

C/C++ checkers
Java checkers
C# checkers
MISRA C 2004 checkers
MISRA C++ 2008 checkers
MISRA C 2012 checkers
MISRA C 2012 checkers with Amendment 1
Commands
Metrics
Troubleshooting
Reference

Product components

C/C++ Integration build analysis
Java Integration build analysis
Desktop analysis
Refactoring
Klocwork Static Code Analysis
Klocwork Code Review
Structure101
Tuning
Custom checkers

Coding environments

Visual Studio
Eclipse for C/C++
Eclipse for Java
IntelliJ IDEA
Other

Administration

Project configuration
Build configuration
Administration
Analysis performance
Server performance
Security/permissions
Licensing
Klocwork Static Code Analysis Web API
Klocwork Code Review Web API

Community

View help online
Visit RogueWave.com
Klocwork Support
Rogue Wave Videos

Legal

Legal information

DBZ.ITERATOR

Loop iterator might be used in a division by zero

An attempt to do a division or modulo operation using zero as the divisor causes a runtime error. Division by zero defects often occur due to ineffective error handling or race conditions, and typically cause abnormal program termination. Before a value is used as the divisor of a division or modulo operation in C/C++ code, it must be checked to confirm that it is not equal to zero.

The DBZ checkers look for instances in which a zero constant value is used as the divisor of a division or modulo operation.

The DBZ.ITERATOR checker flags situations in which a loop iterator that has been assigned a zero constant value in the execution of the loop might subsequently be used explicitly or passed to a function that might use it as a divisor of a division or modulo operation without checking it for the zero value.

Vulnerability and risk

Integer division by zero usually result in the failure of the process or an exception. It can also result in success of the operation, but gives an erroneous answer. Floating-point division by zero is more subtle. It depends on the implementation of the compiler. If the compiler is following the IEEE floating-point standard (IEEE 754), then the result of the floating-point division by zero has a well-defined result. However, the C and C++ standards do not enforce compliance to IEEE 754. Thus, floating-point division by zero has an undefined behavior in C and C++ and might result in the failure of the process or an exception.

Division by zero issues typically occur due to ineffective exception handling. To avoid this vulnerability, check for a zero value before using it as the divisor of a division or modulo operation.

Vulnerable code example

1  int count_sum_of_custom_arithmetic_series()
2  {    
3      int sum = 0;
4      for (int i = -10; i < 10; ++i) {
5          sum += 3628800 / i;
6      }    
7      return sum;
8  }

Klocwork produces an issue report at line 5 indicating that the loop iterator 'i' is assigned a zero constant value during the loop iteration and this value is used as the divisor of the division operation. A division by zero can produce unexpected and unintended results.

Fixed code example

1  int count_sum_of_custom_arithmetic_series()
2  {    
3      int sum = 0;
4      for (int i = -10; i < 10; ++i) {
5          if (i != 0) {
6              sum += 3628800 / i;
7          }
8      }
9      return sum;
10  }   

The problem from the previous snippet is fixed: the input variable ‘size’ is checked for the exceptional case of the zero constant value in line 5 and prevents the value 0 to be used in the division in line 6.

External guidance

Extension

This checker can be extended through the Klocwork knowledge base. See Tuning C/C++ analysis for more information.

Limitations

This checker only deals with integral types, not floating-point types. This means that defects involving floating-point types will not be detected by this checker. For example:
1  double count_sum_of_custom_arithmetic_series()
2  {
3      double sum = 0;
4      for (double i = -10.0; i < 10.0; ++i) {
5          sum += 3628800 / i;   // Divide by zero will not be detected here since it is a floating-point type.
6      }
7      return sum;
8  }
This checker does not deal with abstract symbolic expressions evaluating to zero. This means that defects involving this kind of reasoning may not be detected by this checker. For example:
1  int count_sum_of_custom_arithmetic_series()
2  {
3      int sum = 0;
4      for (int i = -10; i < 10; ++i) {
5          sum += 3628800 / (i - i);   // Divide by zero will happen here since i - i = 0. Not detected by this checker.
6      }
7      return sum;
8  }
This checker only deals with loop iterators having a step (or increment) of +1 or -1. This means that defects involving loop iterators having a step different than +1 or -1 will not be detected by this checker. For example:
1  intcount_sum_of_custom_arithmetic_series_with_step_of_two()
2  {
3      int sum = 0;
4      for (int i = -10; i < 10; i += 2) {
5          sum += 3628800 / i;            // Divide by zero will not be detected here since it the step of i is +2.
6      }
7      return sum;
8  }