1d99bd55aSTed Kremenek //==- CheckSecuritySyntaxOnly.cpp - Basic security checks --------*- C++ -*-==// 2d99bd55aSTed Kremenek // 3*2946cd70SChandler Carruth // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4*2946cd70SChandler Carruth // See https://llvm.org/LICENSE.txt for license information. 5*2946cd70SChandler Carruth // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6d99bd55aSTed Kremenek // 7d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 8d99bd55aSTed Kremenek // 9d99bd55aSTed Kremenek // This file defines a set of flow-insensitive security checks. 10d99bd55aSTed Kremenek // 11d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 12d99bd55aSTed Kremenek 1376a21502SKristof Umann #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" 14c29bed39SAnna Zaks #include "clang/AST/StmtVisitor.h" 1550657f6bSGeorge Karpenkov #include "clang/Analysis/AnalysisDeclContext.h" 16c29bed39SAnna Zaks #include "clang/Basic/TargetInfo.h" 17f8cbac4bSTed Kremenek #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h" 183a02247dSChandler Carruth #include "clang/StaticAnalyzer/Core/Checker.h" 19c29bed39SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h" 204903802fSBenjamin Kramer #include "llvm/ADT/SmallString.h" 21fca2e961SLenny Maiorani #include "llvm/ADT/StringSwitch.h" 22c29bed39SAnna Zaks #include "llvm/Support/raw_ostream.h" 23d99bd55aSTed Kremenek 24d99bd55aSTed Kremenek using namespace clang; 25d99bd55aSTed Kremenek using namespace ento; 26d99bd55aSTed Kremenek 27d99bd55aSTed Kremenek static bool isArc4RandomAvailable(const ASTContext &Ctx) { 28e8bbc121SDouglas Gregor const llvm::Triple &T = Ctx.getTargetInfo().getTriple(); 29d99bd55aSTed Kremenek return T.getVendor() == llvm::Triple::Apple || 30e5bdc851SEd Schouten T.getOS() == llvm::Triple::CloudABI || 315a409d0eSMichal Gorny T.isOSFreeBSD() || 325a409d0eSMichal Gorny T.isOSNetBSD() || 335a409d0eSMichal Gorny T.isOSOpenBSD() || 345a409d0eSMichal Gorny T.isOSDragonFly(); 35d99bd55aSTed Kremenek } 36d99bd55aSTed Kremenek 37d99bd55aSTed Kremenek namespace { 38c54dc951STed Kremenek struct ChecksFilter { 398419cf30SArtem Dergachev DefaultBool check_bcmp; 408419cf30SArtem Dergachev DefaultBool check_bcopy; 418419cf30SArtem Dergachev DefaultBool check_bzero; 42c54dc951STed Kremenek DefaultBool check_gets; 43c54dc951STed Kremenek DefaultBool check_getpw; 44c54dc951STed Kremenek DefaultBool check_mktemp; 4589eaf8d5STed Kremenek DefaultBool check_mkstemp; 46c54dc951STed Kremenek DefaultBool check_strcpy; 47c54dc951STed Kremenek DefaultBool check_rand; 48c54dc951STed Kremenek DefaultBool check_vfork; 49c54dc951STed Kremenek DefaultBool check_FloatLoopCounter; 5089eaf8d5STed Kremenek DefaultBool check_UncheckedReturn; 514aca9b1cSAlexander Kornienko 528419cf30SArtem Dergachev CheckName checkName_bcmp; 538419cf30SArtem Dergachev CheckName checkName_bcopy; 548419cf30SArtem Dergachev CheckName checkName_bzero; 554aca9b1cSAlexander Kornienko CheckName checkName_gets; 564aca9b1cSAlexander Kornienko CheckName checkName_getpw; 574aca9b1cSAlexander Kornienko CheckName checkName_mktemp; 584aca9b1cSAlexander Kornienko CheckName checkName_mkstemp; 594aca9b1cSAlexander Kornienko CheckName checkName_strcpy; 604aca9b1cSAlexander Kornienko CheckName checkName_rand; 614aca9b1cSAlexander Kornienko CheckName checkName_vfork; 624aca9b1cSAlexander Kornienko CheckName checkName_FloatLoopCounter; 634aca9b1cSAlexander Kornienko CheckName checkName_UncheckedReturn; 64c54dc951STed Kremenek }; 65c54dc951STed Kremenek 66d99bd55aSTed Kremenek class WalkAST : public StmtVisitor<WalkAST> { 67d99bd55aSTed Kremenek BugReporter &BR; 6881ce1c8aSTed Kremenek AnalysisDeclContext* AC; 69d99bd55aSTed Kremenek enum { num_setids = 6 }; 70d99bd55aSTed Kremenek IdentifierInfo *II_setid[num_setids]; 71d99bd55aSTed Kremenek 72d99bd55aSTed Kremenek const bool CheckRand; 73c54dc951STed Kremenek const ChecksFilter &filter; 74d99bd55aSTed Kremenek 75d99bd55aSTed Kremenek public: 76c54dc951STed Kremenek WalkAST(BugReporter &br, AnalysisDeclContext* ac, 77c54dc951STed Kremenek const ChecksFilter &f) 78c29bed39SAnna Zaks : BR(br), AC(ac), II_setid(), 79c54dc951STed Kremenek CheckRand(isArc4RandomAvailable(BR.getContext())), 80c54dc951STed Kremenek filter(f) {} 81d99bd55aSTed Kremenek 82d99bd55aSTed Kremenek // Statement visitor methods. 83d99bd55aSTed Kremenek void VisitCallExpr(CallExpr *CE); 84d99bd55aSTed Kremenek void VisitForStmt(ForStmt *S); 85d99bd55aSTed Kremenek void VisitCompoundStmt (CompoundStmt *S); 86d99bd55aSTed Kremenek void VisitStmt(Stmt *S) { VisitChildren(S); } 87d99bd55aSTed Kremenek 88d99bd55aSTed Kremenek void VisitChildren(Stmt *S); 89d99bd55aSTed Kremenek 90d99bd55aSTed Kremenek // Helpers. 91de909e49SLenny Maiorani bool checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD); 92d99bd55aSTed Kremenek 932a3ca840SPierre Gousseau typedef void (WalkAST::*FnCheck)(const CallExpr *, const FunctionDecl *); 94fca2e961SLenny Maiorani 95d99bd55aSTed Kremenek // Checker-specific methods. 96de909e49SLenny Maiorani void checkLoopConditionForFloat(const ForStmt *FS); 978419cf30SArtem Dergachev void checkCall_bcmp(const CallExpr *CE, const FunctionDecl *FD); 988419cf30SArtem Dergachev void checkCall_bcopy(const CallExpr *CE, const FunctionDecl *FD); 998419cf30SArtem Dergachev void checkCall_bzero(const CallExpr *CE, const FunctionDecl *FD); 100de909e49SLenny Maiorani void checkCall_gets(const CallExpr *CE, const FunctionDecl *FD); 101de909e49SLenny Maiorani void checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD); 102de909e49SLenny Maiorani void checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD); 10389eaf8d5STed Kremenek void checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD); 104de909e49SLenny Maiorani void checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD); 105de909e49SLenny Maiorani void checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD); 106de909e49SLenny Maiorani void checkCall_rand(const CallExpr *CE, const FunctionDecl *FD); 107de909e49SLenny Maiorani void checkCall_random(const CallExpr *CE, const FunctionDecl *FD); 108fedf5dfcSAnna Zaks void checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD); 109de909e49SLenny Maiorani void checkUncheckedReturnValue(CallExpr *CE); 110d99bd55aSTed Kremenek }; 111d99bd55aSTed Kremenek } // end anonymous namespace 112d99bd55aSTed Kremenek 113d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 114d99bd55aSTed Kremenek // AST walking. 115d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 116d99bd55aSTed Kremenek 117d99bd55aSTed Kremenek void WalkAST::VisitChildren(Stmt *S) { 118973431b2SBenjamin Kramer for (Stmt *Child : S->children()) 119973431b2SBenjamin Kramer if (Child) 120973431b2SBenjamin Kramer Visit(Child); 121d99bd55aSTed Kremenek } 122d99bd55aSTed Kremenek 123d99bd55aSTed Kremenek void WalkAST::VisitCallExpr(CallExpr *CE) { 124fca2e961SLenny Maiorani // Get the callee. 125fca2e961SLenny Maiorani const FunctionDecl *FD = CE->getDirectCallee(); 126fca2e961SLenny Maiorani 127fca2e961SLenny Maiorani if (!FD) 128fca2e961SLenny Maiorani return; 129fca2e961SLenny Maiorani 130fca2e961SLenny Maiorani // Get the name of the callee. If it's a builtin, strip off the prefix. 131fca2e961SLenny Maiorani IdentifierInfo *II = FD->getIdentifier(); 132fca2e961SLenny Maiorani if (!II) // if no identifier, not a simple C function 133fca2e961SLenny Maiorani return; 1340e62c1ccSChris Lattner StringRef Name = II->getName(); 135fca2e961SLenny Maiorani if (Name.startswith("__builtin_")) 136fca2e961SLenny Maiorani Name = Name.substr(10); 137fca2e961SLenny Maiorani 138fca2e961SLenny Maiorani // Set the evaluation function by switching on the callee name. 139fca2e961SLenny Maiorani FnCheck evalFunction = llvm::StringSwitch<FnCheck>(Name) 1408419cf30SArtem Dergachev .Case("bcmp", &WalkAST::checkCall_bcmp) 1418419cf30SArtem Dergachev .Case("bcopy", &WalkAST::checkCall_bcopy) 1428419cf30SArtem Dergachev .Case("bzero", &WalkAST::checkCall_bzero) 143de909e49SLenny Maiorani .Case("gets", &WalkAST::checkCall_gets) 144de909e49SLenny Maiorani .Case("getpw", &WalkAST::checkCall_getpw) 145de909e49SLenny Maiorani .Case("mktemp", &WalkAST::checkCall_mktemp) 14689eaf8d5STed Kremenek .Case("mkstemp", &WalkAST::checkCall_mkstemp) 14789eaf8d5STed Kremenek .Case("mkdtemp", &WalkAST::checkCall_mkstemp) 14889eaf8d5STed Kremenek .Case("mkstemps", &WalkAST::checkCall_mkstemp) 149de909e49SLenny Maiorani .Cases("strcpy", "__strcpy_chk", &WalkAST::checkCall_strcpy) 150de909e49SLenny Maiorani .Cases("strcat", "__strcat_chk", &WalkAST::checkCall_strcat) 151de909e49SLenny Maiorani .Case("drand48", &WalkAST::checkCall_rand) 152de909e49SLenny Maiorani .Case("erand48", &WalkAST::checkCall_rand) 153de909e49SLenny Maiorani .Case("jrand48", &WalkAST::checkCall_rand) 154de909e49SLenny Maiorani .Case("lrand48", &WalkAST::checkCall_rand) 155de909e49SLenny Maiorani .Case("mrand48", &WalkAST::checkCall_rand) 156de909e49SLenny Maiorani .Case("nrand48", &WalkAST::checkCall_rand) 157de909e49SLenny Maiorani .Case("lcong48", &WalkAST::checkCall_rand) 158de909e49SLenny Maiorani .Case("rand", &WalkAST::checkCall_rand) 159de909e49SLenny Maiorani .Case("rand_r", &WalkAST::checkCall_rand) 160de909e49SLenny Maiorani .Case("random", &WalkAST::checkCall_random) 161fedf5dfcSAnna Zaks .Case("vfork", &WalkAST::checkCall_vfork) 1620dbb783cSCraig Topper .Default(nullptr); 163fca2e961SLenny Maiorani 164fca2e961SLenny Maiorani // If the callee isn't defined, it is not of security concern. 165fca2e961SLenny Maiorani // Check and evaluate the call. 166fca2e961SLenny Maiorani if (evalFunction) 167fca2e961SLenny Maiorani (this->*evalFunction)(CE, FD); 168d99bd55aSTed Kremenek 169d99bd55aSTed Kremenek // Recurse and check children. 170d99bd55aSTed Kremenek VisitChildren(CE); 171d99bd55aSTed Kremenek } 172d99bd55aSTed Kremenek 173d99bd55aSTed Kremenek void WalkAST::VisitCompoundStmt(CompoundStmt *S) { 174973431b2SBenjamin Kramer for (Stmt *Child : S->children()) 175973431b2SBenjamin Kramer if (Child) { 176973431b2SBenjamin Kramer if (CallExpr *CE = dyn_cast<CallExpr>(Child)) 177de909e49SLenny Maiorani checkUncheckedReturnValue(CE); 178973431b2SBenjamin Kramer Visit(Child); 179d99bd55aSTed Kremenek } 180d99bd55aSTed Kremenek } 181d99bd55aSTed Kremenek 182d99bd55aSTed Kremenek void WalkAST::VisitForStmt(ForStmt *FS) { 183de909e49SLenny Maiorani checkLoopConditionForFloat(FS); 184d99bd55aSTed Kremenek 185d99bd55aSTed Kremenek // Recurse and check children. 186d99bd55aSTed Kremenek VisitChildren(FS); 187d99bd55aSTed Kremenek } 188d99bd55aSTed Kremenek 189d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 190b23ccecbSRaphael Isemann // Check: floating point variable used as loop counter. 191d99bd55aSTed Kremenek // Originally: <rdar://problem/6336718> 192d99bd55aSTed Kremenek // Implements: CERT security coding advisory FLP-30. 193d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 194d99bd55aSTed Kremenek 195d99bd55aSTed Kremenek static const DeclRefExpr* 196de909e49SLenny Maiorani getIncrementedVar(const Expr *expr, const VarDecl *x, const VarDecl *y) { 197d99bd55aSTed Kremenek expr = expr->IgnoreParenCasts(); 198d99bd55aSTed Kremenek 199d99bd55aSTed Kremenek if (const BinaryOperator *B = dyn_cast<BinaryOperator>(expr)) { 200d99bd55aSTed Kremenek if (!(B->isAssignmentOp() || B->isCompoundAssignmentOp() || 201d99bd55aSTed Kremenek B->getOpcode() == BO_Comma)) 2020dbb783cSCraig Topper return nullptr; 203d99bd55aSTed Kremenek 204de909e49SLenny Maiorani if (const DeclRefExpr *lhs = getIncrementedVar(B->getLHS(), x, y)) 205d99bd55aSTed Kremenek return lhs; 206d99bd55aSTed Kremenek 207de909e49SLenny Maiorani if (const DeclRefExpr *rhs = getIncrementedVar(B->getRHS(), x, y)) 208d99bd55aSTed Kremenek return rhs; 209d99bd55aSTed Kremenek 2100dbb783cSCraig Topper return nullptr; 211d99bd55aSTed Kremenek } 212d99bd55aSTed Kremenek 213d99bd55aSTed Kremenek if (const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(expr)) { 214d99bd55aSTed Kremenek const NamedDecl *ND = DR->getDecl(); 2150dbb783cSCraig Topper return ND == x || ND == y ? DR : nullptr; 216d99bd55aSTed Kremenek } 217d99bd55aSTed Kremenek 218d99bd55aSTed Kremenek if (const UnaryOperator *U = dyn_cast<UnaryOperator>(expr)) 219d99bd55aSTed Kremenek return U->isIncrementDecrementOp() 2200dbb783cSCraig Topper ? getIncrementedVar(U->getSubExpr(), x, y) : nullptr; 221d99bd55aSTed Kremenek 2220dbb783cSCraig Topper return nullptr; 223d99bd55aSTed Kremenek } 224d99bd55aSTed Kremenek 225d99bd55aSTed Kremenek /// CheckLoopConditionForFloat - This check looks for 'for' statements that 226d99bd55aSTed Kremenek /// use a floating point variable as a loop counter. 227d99bd55aSTed Kremenek /// CERT: FLP30-C, FLP30-CPP. 228d99bd55aSTed Kremenek /// 229de909e49SLenny Maiorani void WalkAST::checkLoopConditionForFloat(const ForStmt *FS) { 230c54dc951STed Kremenek if (!filter.check_FloatLoopCounter) 231c54dc951STed Kremenek return; 232c54dc951STed Kremenek 233d99bd55aSTed Kremenek // Does the loop have a condition? 234d99bd55aSTed Kremenek const Expr *condition = FS->getCond(); 235d99bd55aSTed Kremenek 236d99bd55aSTed Kremenek if (!condition) 237d99bd55aSTed Kremenek return; 238d99bd55aSTed Kremenek 239d99bd55aSTed Kremenek // Does the loop have an increment? 240d99bd55aSTed Kremenek const Expr *increment = FS->getInc(); 241d99bd55aSTed Kremenek 242d99bd55aSTed Kremenek if (!increment) 243d99bd55aSTed Kremenek return; 244d99bd55aSTed Kremenek 245d99bd55aSTed Kremenek // Strip away '()' and casts. 246d99bd55aSTed Kremenek condition = condition->IgnoreParenCasts(); 247d99bd55aSTed Kremenek increment = increment->IgnoreParenCasts(); 248d99bd55aSTed Kremenek 249d99bd55aSTed Kremenek // Is the loop condition a comparison? 250d99bd55aSTed Kremenek const BinaryOperator *B = dyn_cast<BinaryOperator>(condition); 251d99bd55aSTed Kremenek 252d99bd55aSTed Kremenek if (!B) 253d99bd55aSTed Kremenek return; 254d99bd55aSTed Kremenek 255d99bd55aSTed Kremenek // Is this a comparison? 256d99bd55aSTed Kremenek if (!(B->isRelationalOp() || B->isEqualityOp())) 257d99bd55aSTed Kremenek return; 258d99bd55aSTed Kremenek 259d99bd55aSTed Kremenek // Are we comparing variables? 260d99bd55aSTed Kremenek const DeclRefExpr *drLHS = 261d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getLHS()->IgnoreParenLValueCasts()); 262d99bd55aSTed Kremenek const DeclRefExpr *drRHS = 263d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getRHS()->IgnoreParenLValueCasts()); 264d99bd55aSTed Kremenek 265d99bd55aSTed Kremenek // Does at least one of the variables have a floating point type? 2660dbb783cSCraig Topper drLHS = drLHS && drLHS->getType()->isRealFloatingType() ? drLHS : nullptr; 2670dbb783cSCraig Topper drRHS = drRHS && drRHS->getType()->isRealFloatingType() ? drRHS : nullptr; 268d99bd55aSTed Kremenek 269d99bd55aSTed Kremenek if (!drLHS && !drRHS) 270d99bd55aSTed Kremenek return; 271d99bd55aSTed Kremenek 2720dbb783cSCraig Topper const VarDecl *vdLHS = drLHS ? dyn_cast<VarDecl>(drLHS->getDecl()) : nullptr; 2730dbb783cSCraig Topper const VarDecl *vdRHS = drRHS ? dyn_cast<VarDecl>(drRHS->getDecl()) : nullptr; 274d99bd55aSTed Kremenek 275d99bd55aSTed Kremenek if (!vdLHS && !vdRHS) 276d99bd55aSTed Kremenek return; 277d99bd55aSTed Kremenek 278d99bd55aSTed Kremenek // Does either variable appear in increment? 279de909e49SLenny Maiorani const DeclRefExpr *drInc = getIncrementedVar(increment, vdLHS, vdRHS); 280d99bd55aSTed Kremenek 281d99bd55aSTed Kremenek if (!drInc) 282d99bd55aSTed Kremenek return; 283d99bd55aSTed Kremenek 284d99bd55aSTed Kremenek // Emit the error. First figure out which DeclRefExpr in the condition 285d99bd55aSTed Kremenek // referenced the compared variable. 28626a3661aSTed Kremenek assert(drInc->getDecl()); 287d99bd55aSTed Kremenek const DeclRefExpr *drCond = vdLHS == drInc->getDecl() ? drLHS : drRHS; 288d99bd55aSTed Kremenek 2890e62c1ccSChris Lattner SmallVector<SourceRange, 2> ranges; 2902c1dd271SDylan Noblesmith SmallString<256> sbuf; 291d99bd55aSTed Kremenek llvm::raw_svector_ostream os(sbuf); 292d99bd55aSTed Kremenek 293d99bd55aSTed Kremenek os << "Variable '" << drCond->getDecl()->getName() 294d99bd55aSTed Kremenek << "' with floating point type '" << drCond->getType().getAsString() 295d99bd55aSTed Kremenek << "' should not be used as a loop counter"; 296d99bd55aSTed Kremenek 297d99bd55aSTed Kremenek ranges.push_back(drCond->getSourceRange()); 298d99bd55aSTed Kremenek ranges.push_back(drInc->getSourceRange()); 299d99bd55aSTed Kremenek 300d99bd55aSTed Kremenek const char *bugType = "Floating point variable used as loop counter"; 301c29bed39SAnna Zaks 302c29bed39SAnna Zaks PathDiagnosticLocation FSLoc = 303c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 3044aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_FloatLoopCounter, 3055a10f08bSTed Kremenek bugType, "Security", os.str(), 30642b4248fSJordan Rose FSLoc, ranges); 307d99bd55aSTed Kremenek } 308d99bd55aSTed Kremenek 309d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 3108419cf30SArtem Dergachev // Check: Any use of bcmp. 3118419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3128419cf30SArtem Dergachev // bcmp was deprecated in POSIX.1-2008 3138419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3148419cf30SArtem Dergachev 3158419cf30SArtem Dergachev void WalkAST::checkCall_bcmp(const CallExpr *CE, const FunctionDecl *FD) { 3168419cf30SArtem Dergachev if (!filter.check_bcmp) 3178419cf30SArtem Dergachev return; 3188419cf30SArtem Dergachev 3198419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 3208419cf30SArtem Dergachev if (!FPT) 3218419cf30SArtem Dergachev return; 3228419cf30SArtem Dergachev 3238419cf30SArtem Dergachev // Verify that the function takes three arguments. 3248419cf30SArtem Dergachev if (FPT->getNumParams() != 3) 3258419cf30SArtem Dergachev return; 3268419cf30SArtem Dergachev 3278419cf30SArtem Dergachev for (int i = 0; i < 2; i++) { 3288419cf30SArtem Dergachev // Verify the first and second argument type is void*. 3298419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 3308419cf30SArtem Dergachev if (!PT) 3318419cf30SArtem Dergachev return; 3328419cf30SArtem Dergachev 3338419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 3348419cf30SArtem Dergachev return; 3358419cf30SArtem Dergachev } 3368419cf30SArtem Dergachev 3378419cf30SArtem Dergachev // Verify the third argument type is integer. 3388419cf30SArtem Dergachev if (!FPT->getParamType(2)->isIntegralOrUnscopedEnumerationType()) 3398419cf30SArtem Dergachev return; 3408419cf30SArtem Dergachev 3418419cf30SArtem Dergachev // Issue a warning. 3428419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 3438419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3448419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcmp, 3458419cf30SArtem Dergachev "Use of deprecated function in call to 'bcmp()'", 3468419cf30SArtem Dergachev "Security", 3478419cf30SArtem Dergachev "The bcmp() function is obsoleted by memcmp().", 3488419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 3498419cf30SArtem Dergachev } 3508419cf30SArtem Dergachev 3518419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3528419cf30SArtem Dergachev // Check: Any use of bcopy. 3538419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3548419cf30SArtem Dergachev // bcopy was deprecated in POSIX.1-2008 3558419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3568419cf30SArtem Dergachev 3578419cf30SArtem Dergachev void WalkAST::checkCall_bcopy(const CallExpr *CE, const FunctionDecl *FD) { 3588419cf30SArtem Dergachev if (!filter.check_bcopy) 3598419cf30SArtem Dergachev return; 3608419cf30SArtem Dergachev 3618419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 3628419cf30SArtem Dergachev if (!FPT) 3638419cf30SArtem Dergachev return; 3648419cf30SArtem Dergachev 3658419cf30SArtem Dergachev // Verify that the function takes three arguments. 3668419cf30SArtem Dergachev if (FPT->getNumParams() != 3) 3678419cf30SArtem Dergachev return; 3688419cf30SArtem Dergachev 3698419cf30SArtem Dergachev for (int i = 0; i < 2; i++) { 3708419cf30SArtem Dergachev // Verify the first and second argument type is void*. 3718419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 3728419cf30SArtem Dergachev if (!PT) 3738419cf30SArtem Dergachev return; 3748419cf30SArtem Dergachev 3758419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 3768419cf30SArtem Dergachev return; 3778419cf30SArtem Dergachev } 3788419cf30SArtem Dergachev 3798419cf30SArtem Dergachev // Verify the third argument type is integer. 3808419cf30SArtem Dergachev if (!FPT->getParamType(2)->isIntegralOrUnscopedEnumerationType()) 3818419cf30SArtem Dergachev return; 3828419cf30SArtem Dergachev 3838419cf30SArtem Dergachev // Issue a warning. 3848419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 3858419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3868419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcopy, 3878419cf30SArtem Dergachev "Use of deprecated function in call to 'bcopy()'", 3888419cf30SArtem Dergachev "Security", 3898419cf30SArtem Dergachev "The bcopy() function is obsoleted by memcpy() " 3908419cf30SArtem Dergachev "or memmove().", 3918419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 3928419cf30SArtem Dergachev } 3938419cf30SArtem Dergachev 3948419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3958419cf30SArtem Dergachev // Check: Any use of bzero. 3968419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3978419cf30SArtem Dergachev // bzero was deprecated in POSIX.1-2008 3988419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3998419cf30SArtem Dergachev 4008419cf30SArtem Dergachev void WalkAST::checkCall_bzero(const CallExpr *CE, const FunctionDecl *FD) { 4018419cf30SArtem Dergachev if (!filter.check_bzero) 4028419cf30SArtem Dergachev return; 4038419cf30SArtem Dergachev 4048419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 4058419cf30SArtem Dergachev if (!FPT) 4068419cf30SArtem Dergachev return; 4078419cf30SArtem Dergachev 4088419cf30SArtem Dergachev // Verify that the function takes two arguments. 4098419cf30SArtem Dergachev if (FPT->getNumParams() != 2) 4108419cf30SArtem Dergachev return; 4118419cf30SArtem Dergachev 4128419cf30SArtem Dergachev // Verify the first argument type is void*. 4138419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 4148419cf30SArtem Dergachev if (!PT) 4158419cf30SArtem Dergachev return; 4168419cf30SArtem Dergachev 4178419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 4188419cf30SArtem Dergachev return; 4198419cf30SArtem Dergachev 4208419cf30SArtem Dergachev // Verify the second argument type is integer. 4218419cf30SArtem Dergachev if (!FPT->getParamType(1)->isIntegralOrUnscopedEnumerationType()) 4228419cf30SArtem Dergachev return; 4238419cf30SArtem Dergachev 4248419cf30SArtem Dergachev // Issue a warning. 4258419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 4268419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4278419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bzero, 4288419cf30SArtem Dergachev "Use of deprecated function in call to 'bzero()'", 4298419cf30SArtem Dergachev "Security", 4308419cf30SArtem Dergachev "The bzero() function is obsoleted by memset().", 4318419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 4328419cf30SArtem Dergachev } 4338419cf30SArtem Dergachev 4348419cf30SArtem Dergachev 4358419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 436d99bd55aSTed Kremenek // Check: Any use of 'gets' is insecure. 437d99bd55aSTed Kremenek // Originally: <rdar://problem/6335715> 438d99bd55aSTed Kremenek // Implements (part of): 300-BSI (buildsecurityin.us-cert.gov) 439d99bd55aSTed Kremenek // CWE-242: Use of Inherently Dangerous Function 440d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 441d99bd55aSTed Kremenek 442de909e49SLenny Maiorani void WalkAST::checkCall_gets(const CallExpr *CE, const FunctionDecl *FD) { 443c54dc951STed Kremenek if (!filter.check_gets) 444c54dc951STed Kremenek return; 445c54dc951STed Kremenek 44657d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 447d99bd55aSTed Kremenek if (!FPT) 448d99bd55aSTed Kremenek return; 449d99bd55aSTed Kremenek 450d99bd55aSTed Kremenek // Verify that the function takes a single argument. 4519cacbabdSAlp Toker if (FPT->getNumParams() != 1) 452d99bd55aSTed Kremenek return; 453d99bd55aSTed Kremenek 454d99bd55aSTed Kremenek // Is the argument a 'char*'? 4559cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 456d99bd55aSTed Kremenek if (!PT) 457d99bd55aSTed Kremenek return; 458d99bd55aSTed Kremenek 459d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 460d99bd55aSTed Kremenek return; 461d99bd55aSTed Kremenek 462d99bd55aSTed Kremenek // Issue a warning. 463c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 464c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4654aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_gets, 4665a10f08bSTed Kremenek "Potential buffer overflow in call to 'gets'", 467d99bd55aSTed Kremenek "Security", 468d99bd55aSTed Kremenek "Call to function 'gets' is extremely insecure as it can " 469d99bd55aSTed Kremenek "always result in a buffer overflow", 47042b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 471d99bd55aSTed Kremenek } 472d99bd55aSTed Kremenek 473d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 474d99bd55aSTed Kremenek // Check: Any use of 'getpwd' is insecure. 475d99bd55aSTed Kremenek // CWE-477: Use of Obsolete Functions 476d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 477d99bd55aSTed Kremenek 478de909e49SLenny Maiorani void WalkAST::checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD) { 479c54dc951STed Kremenek if (!filter.check_getpw) 480c54dc951STed Kremenek return; 481c54dc951STed Kremenek 48257d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 483d99bd55aSTed Kremenek if (!FPT) 484d99bd55aSTed Kremenek return; 485d99bd55aSTed Kremenek 486d99bd55aSTed Kremenek // Verify that the function takes two arguments. 4879cacbabdSAlp Toker if (FPT->getNumParams() != 2) 488d99bd55aSTed Kremenek return; 489d99bd55aSTed Kremenek 490d99bd55aSTed Kremenek // Verify the first argument type is integer. 4919cacbabdSAlp Toker if (!FPT->getParamType(0)->isIntegralOrUnscopedEnumerationType()) 492d99bd55aSTed Kremenek return; 493d99bd55aSTed Kremenek 494d99bd55aSTed Kremenek // Verify the second argument type is char*. 4959cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(1)->getAs<PointerType>(); 496d99bd55aSTed Kremenek if (!PT) 497d99bd55aSTed Kremenek return; 498d99bd55aSTed Kremenek 499d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 500d99bd55aSTed Kremenek return; 501d99bd55aSTed Kremenek 502d99bd55aSTed Kremenek // Issue a warning. 503c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 504c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5054aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_getpw, 5065a10f08bSTed Kremenek "Potential buffer overflow in call to 'getpw'", 507d99bd55aSTed Kremenek "Security", 508d99bd55aSTed Kremenek "The getpw() function is dangerous as it may overflow the " 509d99bd55aSTed Kremenek "provided buffer. It is obsoleted by getpwuid().", 51042b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 511d99bd55aSTed Kremenek } 512d99bd55aSTed Kremenek 513d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 514d99bd55aSTed Kremenek // Check: Any use of 'mktemp' is insecure. It is obsoleted by mkstemp(). 515d99bd55aSTed Kremenek // CWE-377: Insecure Temporary File 516d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 517d99bd55aSTed Kremenek 518de909e49SLenny Maiorani void WalkAST::checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD) { 519afddb9c8STed Kremenek if (!filter.check_mktemp) { 520afddb9c8STed Kremenek // Fall back to the security check of looking for enough 'X's in the 521afddb9c8STed Kremenek // format string, since that is a less severe warning. 522afddb9c8STed Kremenek checkCall_mkstemp(CE, FD); 523afddb9c8STed Kremenek return; 524afddb9c8STed Kremenek } 525afddb9c8STed Kremenek 52657d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 527d99bd55aSTed Kremenek if(!FPT) 528d99bd55aSTed Kremenek return; 529d99bd55aSTed Kremenek 53070568c2bSLenny Maiorani // Verify that the function takes a single argument. 5319cacbabdSAlp Toker if (FPT->getNumParams() != 1) 532d99bd55aSTed Kremenek return; 533d99bd55aSTed Kremenek 534d99bd55aSTed Kremenek // Verify that the argument is Pointer Type. 5359cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 536d99bd55aSTed Kremenek if (!PT) 537d99bd55aSTed Kremenek return; 538d99bd55aSTed Kremenek 539d99bd55aSTed Kremenek // Verify that the argument is a 'char*'. 540d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 541d99bd55aSTed Kremenek return; 542d99bd55aSTed Kremenek 543c3f36af8SAlp Toker // Issue a warning. 544c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 545c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5464aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mktemp, 5475a10f08bSTed Kremenek "Potential insecure temporary file in call 'mktemp'", 548d99bd55aSTed Kremenek "Security", 549d99bd55aSTed Kremenek "Call to function 'mktemp' is insecure as it always " 5505a10f08bSTed Kremenek "creates or uses insecure temporary file. Use 'mkstemp' " 5515a10f08bSTed Kremenek "instead", 55242b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 553d99bd55aSTed Kremenek } 554d99bd55aSTed Kremenek 55589eaf8d5STed Kremenek 55689eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 55789eaf8d5STed Kremenek // Check: Use of 'mkstemp', 'mktemp', 'mkdtemp' should contain at least 6 X's. 55889eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 55989eaf8d5STed Kremenek 56089eaf8d5STed Kremenek void WalkAST::checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD) { 56189eaf8d5STed Kremenek if (!filter.check_mkstemp) 56289eaf8d5STed Kremenek return; 56389eaf8d5STed Kremenek 56489eaf8d5STed Kremenek StringRef Name = FD->getIdentifier()->getName(); 56589eaf8d5STed Kremenek std::pair<signed, signed> ArgSuffix = 56689eaf8d5STed Kremenek llvm::StringSwitch<std::pair<signed, signed> >(Name) 56789eaf8d5STed Kremenek .Case("mktemp", std::make_pair(0,-1)) 56889eaf8d5STed Kremenek .Case("mkstemp", std::make_pair(0,-1)) 56989eaf8d5STed Kremenek .Case("mkdtemp", std::make_pair(0,-1)) 57089eaf8d5STed Kremenek .Case("mkstemps", std::make_pair(0,1)) 57189eaf8d5STed Kremenek .Default(std::make_pair(-1, -1)); 57289eaf8d5STed Kremenek 57389eaf8d5STed Kremenek assert(ArgSuffix.first >= 0 && "Unsupported function"); 57489eaf8d5STed Kremenek 57589eaf8d5STed Kremenek // Check if the number of arguments is consistent with out expectations. 57689eaf8d5STed Kremenek unsigned numArgs = CE->getNumArgs(); 57789eaf8d5STed Kremenek if ((signed) numArgs <= ArgSuffix.first) 57889eaf8d5STed Kremenek return; 57989eaf8d5STed Kremenek 58089eaf8d5STed Kremenek const StringLiteral *strArg = 58189eaf8d5STed Kremenek dyn_cast<StringLiteral>(CE->getArg((unsigned)ArgSuffix.first) 58289eaf8d5STed Kremenek ->IgnoreParenImpCasts()); 58389eaf8d5STed Kremenek 58489eaf8d5STed Kremenek // Currently we only handle string literals. It is possible to do better, 58589eaf8d5STed Kremenek // either by looking at references to const variables, or by doing real 58689eaf8d5STed Kremenek // flow analysis. 58789eaf8d5STed Kremenek if (!strArg || strArg->getCharByteWidth() != 1) 58889eaf8d5STed Kremenek return; 58989eaf8d5STed Kremenek 59089eaf8d5STed Kremenek // Count the number of X's, taking into account a possible cutoff suffix. 59189eaf8d5STed Kremenek StringRef str = strArg->getString(); 59289eaf8d5STed Kremenek unsigned numX = 0; 59389eaf8d5STed Kremenek unsigned n = str.size(); 59489eaf8d5STed Kremenek 59589eaf8d5STed Kremenek // Take into account the suffix. 59689eaf8d5STed Kremenek unsigned suffix = 0; 59789eaf8d5STed Kremenek if (ArgSuffix.second >= 0) { 59889eaf8d5STed Kremenek const Expr *suffixEx = CE->getArg((unsigned)ArgSuffix.second); 599407659abSFangrui Song Expr::EvalResult EVResult; 600407659abSFangrui Song if (!suffixEx->EvaluateAsInt(EVResult, BR.getContext())) 60189eaf8d5STed Kremenek return; 602407659abSFangrui Song llvm::APSInt Result = EVResult.Val.getInt(); 60389eaf8d5STed Kremenek // FIXME: Issue a warning. 60489eaf8d5STed Kremenek if (Result.isNegative()) 60589eaf8d5STed Kremenek return; 60689eaf8d5STed Kremenek suffix = (unsigned) Result.getZExtValue(); 60789eaf8d5STed Kremenek n = (n > suffix) ? n - suffix : 0; 60889eaf8d5STed Kremenek } 60989eaf8d5STed Kremenek 61089eaf8d5STed Kremenek for (unsigned i = 0; i < n; ++i) 61189eaf8d5STed Kremenek if (str[i] == 'X') ++numX; 61289eaf8d5STed Kremenek 61389eaf8d5STed Kremenek if (numX >= 6) 61489eaf8d5STed Kremenek return; 61589eaf8d5STed Kremenek 61689eaf8d5STed Kremenek // Issue a warning. 61789eaf8d5STed Kremenek PathDiagnosticLocation CELoc = 61889eaf8d5STed Kremenek PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6192c1dd271SDylan Noblesmith SmallString<512> buf; 62089eaf8d5STed Kremenek llvm::raw_svector_ostream out(buf); 62189eaf8d5STed Kremenek out << "Call to '" << Name << "' should have at least 6 'X's in the" 62289eaf8d5STed Kremenek " format string to be secure (" << numX << " 'X'"; 62389eaf8d5STed Kremenek if (numX != 1) 62489eaf8d5STed Kremenek out << 's'; 62589eaf8d5STed Kremenek out << " seen"; 62689eaf8d5STed Kremenek if (suffix) { 62789eaf8d5STed Kremenek out << ", " << suffix << " character"; 62889eaf8d5STed Kremenek if (suffix > 1) 62989eaf8d5STed Kremenek out << 's'; 63089eaf8d5STed Kremenek out << " used as a suffix"; 63189eaf8d5STed Kremenek } 63289eaf8d5STed Kremenek out << ')'; 6334aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mkstemp, 6345a10f08bSTed Kremenek "Insecure temporary file creation", "Security", 63542b4248fSJordan Rose out.str(), CELoc, strArg->getSourceRange()); 63689eaf8d5STed Kremenek } 63789eaf8d5STed Kremenek 638d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 6396ffe738fSLenny Maiorani // Check: Any use of 'strcpy' is insecure. 6406ffe738fSLenny Maiorani // 6416ffe738fSLenny Maiorani // CWE-119: Improper Restriction of Operations within 6426ffe738fSLenny Maiorani // the Bounds of a Memory Buffer 6436ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 644de909e49SLenny Maiorani void WalkAST::checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD) { 645c54dc951STed Kremenek if (!filter.check_strcpy) 646c54dc951STed Kremenek return; 647c54dc951STed Kremenek 648de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 6496ffe738fSLenny Maiorani return; 6506ffe738fSLenny Maiorani 6511ebd1c4fSArtem Dergachev const auto *Target = CE->getArg(0)->IgnoreImpCasts(), 6521ebd1c4fSArtem Dergachev *Source = CE->getArg(1)->IgnoreImpCasts(); 653e2a8eec4SGeorge Karpenkov 654e2a8eec4SGeorge Karpenkov if (const auto *Array = dyn_cast<ConstantArrayType>(Target->getType())) { 6551ebd1c4fSArtem Dergachev uint64_t ArraySize = BR.getContext().getTypeSize(Array) / 8; 6561ebd1c4fSArtem Dergachev if (const auto *String = dyn_cast<StringLiteral>(Source)) { 6571ebd1c4fSArtem Dergachev if (ArraySize >= String->getLength() + 1) 6581ebd1c4fSArtem Dergachev return; 6591ebd1c4fSArtem Dergachev } 6601ebd1c4fSArtem Dergachev } 6611ebd1c4fSArtem Dergachev 662de909e49SLenny Maiorani // Issue a warning. 663c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 664c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6654aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 6665a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 6676ffe738fSLenny Maiorani "call 'strcpy'", 6686ffe738fSLenny Maiorani "Security", 6696ffe738fSLenny Maiorani "Call to function 'strcpy' is insecure as it does not " 6706ffe738fSLenny Maiorani "provide bounding of the memory buffer. Replace " 6716ffe738fSLenny Maiorani "unbounded copy functions with analogous functions that " 672ee5e8ae8SAnna Zaks "support length arguments such as 'strlcpy'. CWE-119.", 67342b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 6746ffe738fSLenny Maiorani } 6756ffe738fSLenny Maiorani 6766ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 677de909e49SLenny Maiorani // Check: Any use of 'strcat' is insecure. 678de909e49SLenny Maiorani // 679de909e49SLenny Maiorani // CWE-119: Improper Restriction of Operations within 680de909e49SLenny Maiorani // the Bounds of a Memory Buffer 681de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 682de909e49SLenny Maiorani void WalkAST::checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD) { 683c54dc951STed Kremenek if (!filter.check_strcpy) 684c54dc951STed Kremenek return; 685c54dc951STed Kremenek 686de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 687de909e49SLenny Maiorani return; 688de909e49SLenny Maiorani 689de909e49SLenny Maiorani // Issue a warning. 690c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 691c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6924aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 6935a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 694de909e49SLenny Maiorani "call 'strcat'", 695de909e49SLenny Maiorani "Security", 696de909e49SLenny Maiorani "Call to function 'strcat' is insecure as it does not " 697de909e49SLenny Maiorani "provide bounding of the memory buffer. Replace " 698de909e49SLenny Maiorani "unbounded copy functions with analogous functions that " 699ee5e8ae8SAnna Zaks "support length arguments such as 'strlcat'. CWE-119.", 70042b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 701de909e49SLenny Maiorani } 702de909e49SLenny Maiorani 703de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 704de909e49SLenny Maiorani // Common check for str* functions with no bounds parameters. 705de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 706de909e49SLenny Maiorani bool WalkAST::checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD) { 70757d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 708de909e49SLenny Maiorani if (!FPT) 709de909e49SLenny Maiorani return false; 710de909e49SLenny Maiorani 711de909e49SLenny Maiorani // Verify the function takes two arguments, three in the _chk version. 7129cacbabdSAlp Toker int numArgs = FPT->getNumParams(); 713de909e49SLenny Maiorani if (numArgs != 2 && numArgs != 3) 714de909e49SLenny Maiorani return false; 715de909e49SLenny Maiorani 716de909e49SLenny Maiorani // Verify the type for both arguments. 717de909e49SLenny Maiorani for (int i = 0; i < 2; i++) { 718de909e49SLenny Maiorani // Verify that the arguments are pointers. 7199cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 720de909e49SLenny Maiorani if (!PT) 721de909e49SLenny Maiorani return false; 722de909e49SLenny Maiorani 723de909e49SLenny Maiorani // Verify that the argument is a 'char*'. 724de909e49SLenny Maiorani if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 725de909e49SLenny Maiorani return false; 726de909e49SLenny Maiorani } 727de909e49SLenny Maiorani 728de909e49SLenny Maiorani return true; 729de909e49SLenny Maiorani } 730de909e49SLenny Maiorani 731de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 732d99bd55aSTed Kremenek // Check: Linear congruent random number generators should not be used 733d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 734d99bd55aSTed Kremenek // CWE-338: Use of cryptographically weak prng 735d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 736d99bd55aSTed Kremenek 737de909e49SLenny Maiorani void WalkAST::checkCall_rand(const CallExpr *CE, const FunctionDecl *FD) { 738c54dc951STed Kremenek if (!filter.check_rand || !CheckRand) 739d99bd55aSTed Kremenek return; 740d99bd55aSTed Kremenek 74157d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 742d99bd55aSTed Kremenek if (!FTP) 743d99bd55aSTed Kremenek return; 744d99bd55aSTed Kremenek 7459cacbabdSAlp Toker if (FTP->getNumParams() == 1) { 746d99bd55aSTed Kremenek // Is the argument an 'unsigned short *'? 747d99bd55aSTed Kremenek // (Actually any integer type is allowed.) 7489cacbabdSAlp Toker const PointerType *PT = FTP->getParamType(0)->getAs<PointerType>(); 749d99bd55aSTed Kremenek if (!PT) 750d99bd55aSTed Kremenek return; 751d99bd55aSTed Kremenek 75261e221f6SJordan Rose if (! PT->getPointeeType()->isIntegralOrUnscopedEnumerationType()) 753d99bd55aSTed Kremenek return; 7549cacbabdSAlp Toker } else if (FTP->getNumParams() != 0) 755d99bd55aSTed Kremenek return; 756d99bd55aSTed Kremenek 757d99bd55aSTed Kremenek // Issue a warning. 7582c1dd271SDylan Noblesmith SmallString<256> buf1; 759d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 760b89514a9SBenjamin Kramer os1 << '\'' << *FD << "' is a poor random number generator"; 761d99bd55aSTed Kremenek 7622c1dd271SDylan Noblesmith SmallString<256> buf2; 763d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 764b89514a9SBenjamin Kramer os2 << "Function '" << *FD 765d99bd55aSTed Kremenek << "' is obsolete because it implements a poor random number generator." 766d99bd55aSTed Kremenek << " Use 'arc4random' instead"; 767d99bd55aSTed Kremenek 768c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 769c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 7704aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, os1.str(), 7714aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 7724aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 773d99bd55aSTed Kremenek } 774d99bd55aSTed Kremenek 775d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 776d99bd55aSTed Kremenek // Check: 'random' should not be used 777d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 778d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 779d99bd55aSTed Kremenek 780de909e49SLenny Maiorani void WalkAST::checkCall_random(const CallExpr *CE, const FunctionDecl *FD) { 78189eaf8d5STed Kremenek if (!CheckRand || !filter.check_rand) 782d99bd55aSTed Kremenek return; 783d99bd55aSTed Kremenek 78457d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 785d99bd55aSTed Kremenek if (!FTP) 786d99bd55aSTed Kremenek return; 787d99bd55aSTed Kremenek 788d99bd55aSTed Kremenek // Verify that the function takes no argument. 7899cacbabdSAlp Toker if (FTP->getNumParams() != 0) 790d99bd55aSTed Kremenek return; 791d99bd55aSTed Kremenek 792d99bd55aSTed Kremenek // Issue a warning. 793c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 794c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 7954aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, 7965a10f08bSTed Kremenek "'random' is not a secure random number generator", 797d99bd55aSTed Kremenek "Security", 798d99bd55aSTed Kremenek "The 'random' function produces a sequence of values that " 799d99bd55aSTed Kremenek "an adversary may be able to predict. Use 'arc4random' " 80042b4248fSJordan Rose "instead", CELoc, CE->getCallee()->getSourceRange()); 801d99bd55aSTed Kremenek } 802d99bd55aSTed Kremenek 803d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 804fedf5dfcSAnna Zaks // Check: 'vfork' should not be used. 805fedf5dfcSAnna Zaks // POS33-C: Do not use vfork(). 806fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 807fedf5dfcSAnna Zaks 808fedf5dfcSAnna Zaks void WalkAST::checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD) { 809c54dc951STed Kremenek if (!filter.check_vfork) 810c54dc951STed Kremenek return; 811c54dc951STed Kremenek 812fedf5dfcSAnna Zaks // All calls to vfork() are insecure, issue a warning. 813fedf5dfcSAnna Zaks PathDiagnosticLocation CELoc = 814fedf5dfcSAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 8154aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_vfork, 8165a10f08bSTed Kremenek "Potential insecure implementation-specific behavior in " 817fedf5dfcSAnna Zaks "call 'vfork'", 818fedf5dfcSAnna Zaks "Security", 819fedf5dfcSAnna Zaks "Call to function 'vfork' is insecure as it can lead to " 820fedf5dfcSAnna Zaks "denial of service situations in the parent process. " 821fedf5dfcSAnna Zaks "Replace calls to vfork with calls to the safer " 822fedf5dfcSAnna Zaks "'posix_spawn' function", 82342b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 824fedf5dfcSAnna Zaks } 825fedf5dfcSAnna Zaks 826fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 827d99bd55aSTed Kremenek // Check: Should check whether privileges are dropped successfully. 828d99bd55aSTed Kremenek // Originally: <rdar://problem/6337132> 829d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 830d99bd55aSTed Kremenek 831de909e49SLenny Maiorani void WalkAST::checkUncheckedReturnValue(CallExpr *CE) { 83289eaf8d5STed Kremenek if (!filter.check_UncheckedReturn) 83389eaf8d5STed Kremenek return; 83489eaf8d5STed Kremenek 835d99bd55aSTed Kremenek const FunctionDecl *FD = CE->getDirectCallee(); 836d99bd55aSTed Kremenek if (!FD) 837d99bd55aSTed Kremenek return; 838d99bd55aSTed Kremenek 8390dbb783cSCraig Topper if (II_setid[0] == nullptr) { 840d99bd55aSTed Kremenek static const char * const identifiers[num_setids] = { 841d99bd55aSTed Kremenek "setuid", "setgid", "seteuid", "setegid", 842d99bd55aSTed Kremenek "setreuid", "setregid" 843d99bd55aSTed Kremenek }; 844d99bd55aSTed Kremenek 845d99bd55aSTed Kremenek for (size_t i = 0; i < num_setids; i++) 846d99bd55aSTed Kremenek II_setid[i] = &BR.getContext().Idents.get(identifiers[i]); 847d99bd55aSTed Kremenek } 848d99bd55aSTed Kremenek 849d99bd55aSTed Kremenek const IdentifierInfo *id = FD->getIdentifier(); 850d99bd55aSTed Kremenek size_t identifierid; 851d99bd55aSTed Kremenek 852d99bd55aSTed Kremenek for (identifierid = 0; identifierid < num_setids; identifierid++) 853d99bd55aSTed Kremenek if (id == II_setid[identifierid]) 854d99bd55aSTed Kremenek break; 855d99bd55aSTed Kremenek 856d99bd55aSTed Kremenek if (identifierid >= num_setids) 857d99bd55aSTed Kremenek return; 858d99bd55aSTed Kremenek 85957d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 860d99bd55aSTed Kremenek if (!FTP) 861d99bd55aSTed Kremenek return; 862d99bd55aSTed Kremenek 863d99bd55aSTed Kremenek // Verify that the function takes one or two arguments (depending on 864d99bd55aSTed Kremenek // the function). 8659cacbabdSAlp Toker if (FTP->getNumParams() != (identifierid < 4 ? 1 : 2)) 866d99bd55aSTed Kremenek return; 867d99bd55aSTed Kremenek 868d99bd55aSTed Kremenek // The arguments must be integers. 8699cacbabdSAlp Toker for (unsigned i = 0; i < FTP->getNumParams(); i++) 8709cacbabdSAlp Toker if (!FTP->getParamType(i)->isIntegralOrUnscopedEnumerationType()) 871d99bd55aSTed Kremenek return; 872d99bd55aSTed Kremenek 873d99bd55aSTed Kremenek // Issue a warning. 8742c1dd271SDylan Noblesmith SmallString<256> buf1; 875d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 876b89514a9SBenjamin Kramer os1 << "Return value is not checked in call to '" << *FD << '\''; 877d99bd55aSTed Kremenek 8782c1dd271SDylan Noblesmith SmallString<256> buf2; 879d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 880b89514a9SBenjamin Kramer os2 << "The return value from the call to '" << *FD 881b89514a9SBenjamin Kramer << "' is not checked. If an error occurs in '" << *FD 882d99bd55aSTed Kremenek << "', the following code may execute with unexpected privileges"; 883d99bd55aSTed Kremenek 884c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 885c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 8864aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_UncheckedReturn, os1.str(), 8874aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 8884aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 889d99bd55aSTed Kremenek } 890d99bd55aSTed Kremenek 891d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 892af45aca6SArgyrios Kyrtzidis // SecuritySyntaxChecker 893d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 894d99bd55aSTed Kremenek 895af45aca6SArgyrios Kyrtzidis namespace { 8966a5674ffSArgyrios Kyrtzidis class SecuritySyntaxChecker : public Checker<check::ASTCodeBody> { 897af45aca6SArgyrios Kyrtzidis public: 898c54dc951STed Kremenek ChecksFilter filter; 899c54dc951STed Kremenek 900af45aca6SArgyrios Kyrtzidis void checkASTCodeBody(const Decl *D, AnalysisManager& mgr, 901af45aca6SArgyrios Kyrtzidis BugReporter &BR) const { 902c54dc951STed Kremenek WalkAST walker(BR, mgr.getAnalysisDeclContext(D), filter); 903d99bd55aSTed Kremenek walker.Visit(D->getBody()); 904d99bd55aSTed Kremenek } 905af45aca6SArgyrios Kyrtzidis }; 906ab9db510SAlexander Kornienko } 907af45aca6SArgyrios Kyrtzidis 908c54dc951STed Kremenek #define REGISTER_CHECKER(name) \ 909c54dc951STed Kremenek void ento::register##name(CheckerManager &mgr) { \ 9104aca9b1cSAlexander Kornienko SecuritySyntaxChecker *checker = \ 9114aca9b1cSAlexander Kornienko mgr.registerChecker<SecuritySyntaxChecker>(); \ 9124aca9b1cSAlexander Kornienko checker->filter.check_##name = true; \ 9134aca9b1cSAlexander Kornienko checker->filter.checkName_##name = mgr.getCurrentCheckName(); \ 914af45aca6SArgyrios Kyrtzidis } 915c54dc951STed Kremenek 9168419cf30SArtem Dergachev REGISTER_CHECKER(bcmp) 9178419cf30SArtem Dergachev REGISTER_CHECKER(bcopy) 9188419cf30SArtem Dergachev REGISTER_CHECKER(bzero) 919c54dc951STed Kremenek REGISTER_CHECKER(gets) 920c54dc951STed Kremenek REGISTER_CHECKER(getpw) 92189eaf8d5STed Kremenek REGISTER_CHECKER(mkstemp) 922c54dc951STed Kremenek REGISTER_CHECKER(mktemp) 923c54dc951STed Kremenek REGISTER_CHECKER(strcpy) 924c54dc951STed Kremenek REGISTER_CHECKER(rand) 925c54dc951STed Kremenek REGISTER_CHECKER(vfork) 926c54dc951STed Kremenek REGISTER_CHECKER(FloatLoopCounter) 92789eaf8d5STed Kremenek REGISTER_CHECKER(UncheckedReturn) 92889eaf8d5STed Kremenek 929c54dc951STed Kremenek 930