1d99bd55aSTed Kremenek //==- CheckSecuritySyntaxOnly.cpp - Basic security checks --------*- C++ -*-==//
2d99bd55aSTed Kremenek //
3d99bd55aSTed Kremenek //                     The LLVM Compiler Infrastructure
4d99bd55aSTed Kremenek //
5d99bd55aSTed Kremenek // This file is distributed under the University of Illinois Open Source
6d99bd55aSTed Kremenek // License. See LICENSE.TXT for details.
7d99bd55aSTed Kremenek //
8d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
9d99bd55aSTed Kremenek //
10d99bd55aSTed Kremenek //  This file defines a set of flow-insensitive security checks.
11d99bd55aSTed Kremenek //
12d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
13d99bd55aSTed Kremenek 
14af45aca6SArgyrios Kyrtzidis #include "ClangSACheckers.h"
15c29bed39SAnna Zaks #include "clang/Analysis/AnalysisContext.h"
16c29bed39SAnna Zaks #include "clang/AST/StmtVisitor.h"
17c29bed39SAnna Zaks #include "clang/Basic/TargetInfo.h"
186a5674ffSArgyrios Kyrtzidis #include "clang/StaticAnalyzer/Core/Checker.h"
19f8cbac4bSTed Kremenek #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
20c29bed39SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
21fca2e961SLenny Maiorani #include "llvm/ADT/StringSwitch.h"
22c29bed39SAnna Zaks #include "llvm/Support/raw_ostream.h"
23d99bd55aSTed Kremenek 
24d99bd55aSTed Kremenek using namespace clang;
25d99bd55aSTed Kremenek using namespace ento;
26d99bd55aSTed Kremenek 
27d99bd55aSTed Kremenek static bool isArc4RandomAvailable(const ASTContext &Ctx) {
28e8bbc121SDouglas Gregor   const llvm::Triple &T = Ctx.getTargetInfo().getTriple();
29d99bd55aSTed Kremenek   return T.getVendor() == llvm::Triple::Apple ||
3045e84b00SDouglas Gregor          T.getOS() == llvm::Triple::FreeBSD ||
3145e84b00SDouglas Gregor          T.getOS() == llvm::Triple::NetBSD ||
3245e84b00SDouglas Gregor          T.getOS() == llvm::Triple::OpenBSD ||
3345e84b00SDouglas Gregor          T.getOS() == llvm::Triple::DragonFly;
34d99bd55aSTed Kremenek }
35d99bd55aSTed Kremenek 
36d99bd55aSTed Kremenek namespace {
37*c54dc951STed Kremenek struct DefaultBool {
38*c54dc951STed Kremenek   bool val;
39*c54dc951STed Kremenek   DefaultBool() : val(false) {}
40*c54dc951STed Kremenek   operator bool() const { return val; }
41*c54dc951STed Kremenek   DefaultBool &operator=(bool b) { val = b; return *this; }
42*c54dc951STed Kremenek };
43*c54dc951STed Kremenek 
44*c54dc951STed Kremenek struct ChecksFilter {
45*c54dc951STed Kremenek   DefaultBool check_gets;
46*c54dc951STed Kremenek   DefaultBool check_getpw;
47*c54dc951STed Kremenek   DefaultBool check_mktemp;
48*c54dc951STed Kremenek   DefaultBool check_strcpy;
49*c54dc951STed Kremenek   DefaultBool check_rand;
50*c54dc951STed Kremenek   DefaultBool check_vfork;
51*c54dc951STed Kremenek   DefaultBool check_FloatLoopCounter;
52*c54dc951STed Kremenek };
53*c54dc951STed Kremenek 
54d99bd55aSTed Kremenek class WalkAST : public StmtVisitor<WalkAST> {
55d99bd55aSTed Kremenek   BugReporter &BR;
5681ce1c8aSTed Kremenek   AnalysisDeclContext* AC;
57d99bd55aSTed Kremenek   enum { num_setids = 6 };
58d99bd55aSTed Kremenek   IdentifierInfo *II_setid[num_setids];
59d99bd55aSTed Kremenek 
60d99bd55aSTed Kremenek   const bool CheckRand;
61*c54dc951STed Kremenek   const ChecksFilter &filter;
62d99bd55aSTed Kremenek 
63d99bd55aSTed Kremenek public:
64*c54dc951STed Kremenek   WalkAST(BugReporter &br, AnalysisDeclContext* ac,
65*c54dc951STed Kremenek           const ChecksFilter &f)
66c29bed39SAnna Zaks   : BR(br), AC(ac), II_setid(),
67*c54dc951STed Kremenek     CheckRand(isArc4RandomAvailable(BR.getContext())),
68*c54dc951STed Kremenek     filter(f) {}
69d99bd55aSTed Kremenek 
70d99bd55aSTed Kremenek   // Statement visitor methods.
71d99bd55aSTed Kremenek   void VisitCallExpr(CallExpr *CE);
72d99bd55aSTed Kremenek   void VisitForStmt(ForStmt *S);
73d99bd55aSTed Kremenek   void VisitCompoundStmt (CompoundStmt *S);
74d99bd55aSTed Kremenek   void VisitStmt(Stmt *S) { VisitChildren(S); }
75d99bd55aSTed Kremenek 
76d99bd55aSTed Kremenek   void VisitChildren(Stmt *S);
77d99bd55aSTed Kremenek 
78d99bd55aSTed Kremenek   // Helpers.
79de909e49SLenny Maiorani   bool checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD);
80d99bd55aSTed Kremenek 
81fca2e961SLenny Maiorani   typedef void (WalkAST::*FnCheck)(const CallExpr *,
82fca2e961SLenny Maiorani 				   const FunctionDecl *);
83fca2e961SLenny Maiorani 
84d99bd55aSTed Kremenek   // Checker-specific methods.
85de909e49SLenny Maiorani   void checkLoopConditionForFloat(const ForStmt *FS);
86de909e49SLenny Maiorani   void checkCall_gets(const CallExpr *CE, const FunctionDecl *FD);
87de909e49SLenny Maiorani   void checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD);
88de909e49SLenny Maiorani   void checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD);
89de909e49SLenny Maiorani   void checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD);
90de909e49SLenny Maiorani   void checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD);
91de909e49SLenny Maiorani   void checkCall_rand(const CallExpr *CE, const FunctionDecl *FD);
92de909e49SLenny Maiorani   void checkCall_random(const CallExpr *CE, const FunctionDecl *FD);
93fedf5dfcSAnna Zaks   void checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD);
94de909e49SLenny Maiorani   void checkUncheckedReturnValue(CallExpr *CE);
95d99bd55aSTed Kremenek };
96d99bd55aSTed Kremenek } // end anonymous namespace
97d99bd55aSTed Kremenek 
98d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
99d99bd55aSTed Kremenek // AST walking.
100d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
101d99bd55aSTed Kremenek 
102d99bd55aSTed Kremenek void WalkAST::VisitChildren(Stmt *S) {
103d99bd55aSTed Kremenek   for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I)
104d99bd55aSTed Kremenek     if (Stmt *child = *I)
105d99bd55aSTed Kremenek       Visit(child);
106d99bd55aSTed Kremenek }
107d99bd55aSTed Kremenek 
108d99bd55aSTed Kremenek void WalkAST::VisitCallExpr(CallExpr *CE) {
109fca2e961SLenny Maiorani   // Get the callee.
110fca2e961SLenny Maiorani   const FunctionDecl *FD = CE->getDirectCallee();
111fca2e961SLenny Maiorani 
112fca2e961SLenny Maiorani   if (!FD)
113fca2e961SLenny Maiorani     return;
114fca2e961SLenny Maiorani 
115fca2e961SLenny Maiorani   // Get the name of the callee. If it's a builtin, strip off the prefix.
116fca2e961SLenny Maiorani   IdentifierInfo *II = FD->getIdentifier();
117fca2e961SLenny Maiorani   if (!II)   // if no identifier, not a simple C function
118fca2e961SLenny Maiorani     return;
1190e62c1ccSChris Lattner   StringRef Name = II->getName();
120fca2e961SLenny Maiorani   if (Name.startswith("__builtin_"))
121fca2e961SLenny Maiorani     Name = Name.substr(10);
122fca2e961SLenny Maiorani 
123fca2e961SLenny Maiorani   // Set the evaluation function by switching on the callee name.
124fca2e961SLenny Maiorani   FnCheck evalFunction = llvm::StringSwitch<FnCheck>(Name)
125de909e49SLenny Maiorani     .Case("gets", &WalkAST::checkCall_gets)
126de909e49SLenny Maiorani     .Case("getpw", &WalkAST::checkCall_getpw)
127de909e49SLenny Maiorani     .Case("mktemp", &WalkAST::checkCall_mktemp)
128de909e49SLenny Maiorani     .Cases("strcpy", "__strcpy_chk", &WalkAST::checkCall_strcpy)
129de909e49SLenny Maiorani     .Cases("strcat", "__strcat_chk", &WalkAST::checkCall_strcat)
130de909e49SLenny Maiorani     .Case("drand48", &WalkAST::checkCall_rand)
131de909e49SLenny Maiorani     .Case("erand48", &WalkAST::checkCall_rand)
132de909e49SLenny Maiorani     .Case("jrand48", &WalkAST::checkCall_rand)
133de909e49SLenny Maiorani     .Case("lrand48", &WalkAST::checkCall_rand)
134de909e49SLenny Maiorani     .Case("mrand48", &WalkAST::checkCall_rand)
135de909e49SLenny Maiorani     .Case("nrand48", &WalkAST::checkCall_rand)
136de909e49SLenny Maiorani     .Case("lcong48", &WalkAST::checkCall_rand)
137de909e49SLenny Maiorani     .Case("rand", &WalkAST::checkCall_rand)
138de909e49SLenny Maiorani     .Case("rand_r", &WalkAST::checkCall_rand)
139de909e49SLenny Maiorani     .Case("random", &WalkAST::checkCall_random)
140fedf5dfcSAnna Zaks     .Case("vfork", &WalkAST::checkCall_vfork)
141fca2e961SLenny Maiorani     .Default(NULL);
142fca2e961SLenny Maiorani 
143fca2e961SLenny Maiorani   // If the callee isn't defined, it is not of security concern.
144fca2e961SLenny Maiorani   // Check and evaluate the call.
145fca2e961SLenny Maiorani   if (evalFunction)
146fca2e961SLenny Maiorani     (this->*evalFunction)(CE, FD);
147d99bd55aSTed Kremenek 
148d99bd55aSTed Kremenek   // Recurse and check children.
149d99bd55aSTed Kremenek   VisitChildren(CE);
150d99bd55aSTed Kremenek }
151d99bd55aSTed Kremenek 
152d99bd55aSTed Kremenek void WalkAST::VisitCompoundStmt(CompoundStmt *S) {
153d99bd55aSTed Kremenek   for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I)
154d99bd55aSTed Kremenek     if (Stmt *child = *I) {
155d99bd55aSTed Kremenek       if (CallExpr *CE = dyn_cast<CallExpr>(child))
156de909e49SLenny Maiorani         checkUncheckedReturnValue(CE);
157d99bd55aSTed Kremenek       Visit(child);
158d99bd55aSTed Kremenek     }
159d99bd55aSTed Kremenek }
160d99bd55aSTed Kremenek 
161d99bd55aSTed Kremenek void WalkAST::VisitForStmt(ForStmt *FS) {
162de909e49SLenny Maiorani   checkLoopConditionForFloat(FS);
163d99bd55aSTed Kremenek 
164d99bd55aSTed Kremenek   // Recurse and check children.
165d99bd55aSTed Kremenek   VisitChildren(FS);
166d99bd55aSTed Kremenek }
167d99bd55aSTed Kremenek 
168d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
169d99bd55aSTed Kremenek // Check: floating poing variable used as loop counter.
170d99bd55aSTed Kremenek // Originally: <rdar://problem/6336718>
171d99bd55aSTed Kremenek // Implements: CERT security coding advisory FLP-30.
172d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
173d99bd55aSTed Kremenek 
174d99bd55aSTed Kremenek static const DeclRefExpr*
175de909e49SLenny Maiorani getIncrementedVar(const Expr *expr, const VarDecl *x, const VarDecl *y) {
176d99bd55aSTed Kremenek   expr = expr->IgnoreParenCasts();
177d99bd55aSTed Kremenek 
178d99bd55aSTed Kremenek   if (const BinaryOperator *B = dyn_cast<BinaryOperator>(expr)) {
179d99bd55aSTed Kremenek     if (!(B->isAssignmentOp() || B->isCompoundAssignmentOp() ||
180d99bd55aSTed Kremenek           B->getOpcode() == BO_Comma))
181d99bd55aSTed Kremenek       return NULL;
182d99bd55aSTed Kremenek 
183de909e49SLenny Maiorani     if (const DeclRefExpr *lhs = getIncrementedVar(B->getLHS(), x, y))
184d99bd55aSTed Kremenek       return lhs;
185d99bd55aSTed Kremenek 
186de909e49SLenny Maiorani     if (const DeclRefExpr *rhs = getIncrementedVar(B->getRHS(), x, y))
187d99bd55aSTed Kremenek       return rhs;
188d99bd55aSTed Kremenek 
189d99bd55aSTed Kremenek     return NULL;
190d99bd55aSTed Kremenek   }
191d99bd55aSTed Kremenek 
192d99bd55aSTed Kremenek   if (const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(expr)) {
193d99bd55aSTed Kremenek     const NamedDecl *ND = DR->getDecl();
194d99bd55aSTed Kremenek     return ND == x || ND == y ? DR : NULL;
195d99bd55aSTed Kremenek   }
196d99bd55aSTed Kremenek 
197d99bd55aSTed Kremenek   if (const UnaryOperator *U = dyn_cast<UnaryOperator>(expr))
198d99bd55aSTed Kremenek     return U->isIncrementDecrementOp()
199de909e49SLenny Maiorani       ? getIncrementedVar(U->getSubExpr(), x, y) : NULL;
200d99bd55aSTed Kremenek 
201d99bd55aSTed Kremenek   return NULL;
202d99bd55aSTed Kremenek }
203d99bd55aSTed Kremenek 
204d99bd55aSTed Kremenek /// CheckLoopConditionForFloat - This check looks for 'for' statements that
205d99bd55aSTed Kremenek ///  use a floating point variable as a loop counter.
206d99bd55aSTed Kremenek ///  CERT: FLP30-C, FLP30-CPP.
207d99bd55aSTed Kremenek ///
208de909e49SLenny Maiorani void WalkAST::checkLoopConditionForFloat(const ForStmt *FS) {
209*c54dc951STed Kremenek   if (!filter.check_FloatLoopCounter)
210*c54dc951STed Kremenek     return;
211*c54dc951STed Kremenek 
212d99bd55aSTed Kremenek   // Does the loop have a condition?
213d99bd55aSTed Kremenek   const Expr *condition = FS->getCond();
214d99bd55aSTed Kremenek 
215d99bd55aSTed Kremenek   if (!condition)
216d99bd55aSTed Kremenek     return;
217d99bd55aSTed Kremenek 
218d99bd55aSTed Kremenek   // Does the loop have an increment?
219d99bd55aSTed Kremenek   const Expr *increment = FS->getInc();
220d99bd55aSTed Kremenek 
221d99bd55aSTed Kremenek   if (!increment)
222d99bd55aSTed Kremenek     return;
223d99bd55aSTed Kremenek 
224d99bd55aSTed Kremenek   // Strip away '()' and casts.
225d99bd55aSTed Kremenek   condition = condition->IgnoreParenCasts();
226d99bd55aSTed Kremenek   increment = increment->IgnoreParenCasts();
227d99bd55aSTed Kremenek 
228d99bd55aSTed Kremenek   // Is the loop condition a comparison?
229d99bd55aSTed Kremenek   const BinaryOperator *B = dyn_cast<BinaryOperator>(condition);
230d99bd55aSTed Kremenek 
231d99bd55aSTed Kremenek   if (!B)
232d99bd55aSTed Kremenek     return;
233d99bd55aSTed Kremenek 
234d99bd55aSTed Kremenek   // Is this a comparison?
235d99bd55aSTed Kremenek   if (!(B->isRelationalOp() || B->isEqualityOp()))
236d99bd55aSTed Kremenek     return;
237d99bd55aSTed Kremenek 
238d99bd55aSTed Kremenek   // Are we comparing variables?
239d99bd55aSTed Kremenek   const DeclRefExpr *drLHS =
240d99bd55aSTed Kremenek     dyn_cast<DeclRefExpr>(B->getLHS()->IgnoreParenLValueCasts());
241d99bd55aSTed Kremenek   const DeclRefExpr *drRHS =
242d99bd55aSTed Kremenek     dyn_cast<DeclRefExpr>(B->getRHS()->IgnoreParenLValueCasts());
243d99bd55aSTed Kremenek 
244d99bd55aSTed Kremenek   // Does at least one of the variables have a floating point type?
245d99bd55aSTed Kremenek   drLHS = drLHS && drLHS->getType()->isRealFloatingType() ? drLHS : NULL;
246d99bd55aSTed Kremenek   drRHS = drRHS && drRHS->getType()->isRealFloatingType() ? drRHS : NULL;
247d99bd55aSTed Kremenek 
248d99bd55aSTed Kremenek   if (!drLHS && !drRHS)
249d99bd55aSTed Kremenek     return;
250d99bd55aSTed Kremenek 
251d99bd55aSTed Kremenek   const VarDecl *vdLHS = drLHS ? dyn_cast<VarDecl>(drLHS->getDecl()) : NULL;
252d99bd55aSTed Kremenek   const VarDecl *vdRHS = drRHS ? dyn_cast<VarDecl>(drRHS->getDecl()) : NULL;
253d99bd55aSTed Kremenek 
254d99bd55aSTed Kremenek   if (!vdLHS && !vdRHS)
255d99bd55aSTed Kremenek     return;
256d99bd55aSTed Kremenek 
257d99bd55aSTed Kremenek   // Does either variable appear in increment?
258de909e49SLenny Maiorani   const DeclRefExpr *drInc = getIncrementedVar(increment, vdLHS, vdRHS);
259d99bd55aSTed Kremenek 
260d99bd55aSTed Kremenek   if (!drInc)
261d99bd55aSTed Kremenek     return;
262d99bd55aSTed Kremenek 
263d99bd55aSTed Kremenek   // Emit the error.  First figure out which DeclRefExpr in the condition
264d99bd55aSTed Kremenek   // referenced the compared variable.
265d99bd55aSTed Kremenek   const DeclRefExpr *drCond = vdLHS == drInc->getDecl() ? drLHS : drRHS;
266d99bd55aSTed Kremenek 
2670e62c1ccSChris Lattner   SmallVector<SourceRange, 2> ranges;
268d99bd55aSTed Kremenek   llvm::SmallString<256> sbuf;
269d99bd55aSTed Kremenek   llvm::raw_svector_ostream os(sbuf);
270d99bd55aSTed Kremenek 
271d99bd55aSTed Kremenek   os << "Variable '" << drCond->getDecl()->getName()
272d99bd55aSTed Kremenek      << "' with floating point type '" << drCond->getType().getAsString()
273d99bd55aSTed Kremenek      << "' should not be used as a loop counter";
274d99bd55aSTed Kremenek 
275d99bd55aSTed Kremenek   ranges.push_back(drCond->getSourceRange());
276d99bd55aSTed Kremenek   ranges.push_back(drInc->getSourceRange());
277d99bd55aSTed Kremenek 
278d99bd55aSTed Kremenek   const char *bugType = "Floating point variable used as loop counter";
279c29bed39SAnna Zaks 
280c29bed39SAnna Zaks   PathDiagnosticLocation FSLoc =
281c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC);
282d99bd55aSTed Kremenek   BR.EmitBasicReport(bugType, "Security", os.str(),
283c29bed39SAnna Zaks                      FSLoc, ranges.data(), ranges.size());
284d99bd55aSTed Kremenek }
285d99bd55aSTed Kremenek 
286d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
287d99bd55aSTed Kremenek // Check: Any use of 'gets' is insecure.
288d99bd55aSTed Kremenek // Originally: <rdar://problem/6335715>
289d99bd55aSTed Kremenek // Implements (part of): 300-BSI (buildsecurityin.us-cert.gov)
290d99bd55aSTed Kremenek // CWE-242: Use of Inherently Dangerous Function
291d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
292d99bd55aSTed Kremenek 
293de909e49SLenny Maiorani void WalkAST::checkCall_gets(const CallExpr *CE, const FunctionDecl *FD) {
294*c54dc951STed Kremenek   if (!filter.check_gets)
295*c54dc951STed Kremenek     return;
296*c54dc951STed Kremenek 
297d99bd55aSTed Kremenek   const FunctionProtoType *FPT
298d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
299d99bd55aSTed Kremenek   if (!FPT)
300d99bd55aSTed Kremenek     return;
301d99bd55aSTed Kremenek 
302d99bd55aSTed Kremenek   // Verify that the function takes a single argument.
303d99bd55aSTed Kremenek   if (FPT->getNumArgs() != 1)
304d99bd55aSTed Kremenek     return;
305d99bd55aSTed Kremenek 
306d99bd55aSTed Kremenek   // Is the argument a 'char*'?
307d99bd55aSTed Kremenek   const PointerType *PT = dyn_cast<PointerType>(FPT->getArgType(0));
308d99bd55aSTed Kremenek   if (!PT)
309d99bd55aSTed Kremenek     return;
310d99bd55aSTed Kremenek 
311d99bd55aSTed Kremenek   if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy)
312d99bd55aSTed Kremenek     return;
313d99bd55aSTed Kremenek 
314d99bd55aSTed Kremenek   // Issue a warning.
315d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
316c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
317c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
318d99bd55aSTed Kremenek   BR.EmitBasicReport("Potential buffer overflow in call to 'gets'",
319d99bd55aSTed Kremenek                      "Security",
320d99bd55aSTed Kremenek                      "Call to function 'gets' is extremely insecure as it can "
321d99bd55aSTed Kremenek                      "always result in a buffer overflow",
322c29bed39SAnna Zaks                      CELoc, &R, 1);
323d99bd55aSTed Kremenek }
324d99bd55aSTed Kremenek 
325d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
326d99bd55aSTed Kremenek // Check: Any use of 'getpwd' is insecure.
327d99bd55aSTed Kremenek // CWE-477: Use of Obsolete Functions
328d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
329d99bd55aSTed Kremenek 
330de909e49SLenny Maiorani void WalkAST::checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD) {
331*c54dc951STed Kremenek   if (!filter.check_getpw)
332*c54dc951STed Kremenek     return;
333*c54dc951STed Kremenek 
334d99bd55aSTed Kremenek   const FunctionProtoType *FPT
335d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
336d99bd55aSTed Kremenek   if (!FPT)
337d99bd55aSTed Kremenek     return;
338d99bd55aSTed Kremenek 
339d99bd55aSTed Kremenek   // Verify that the function takes two arguments.
340d99bd55aSTed Kremenek   if (FPT->getNumArgs() != 2)
341d99bd55aSTed Kremenek     return;
342d99bd55aSTed Kremenek 
343d99bd55aSTed Kremenek   // Verify the first argument type is integer.
344d99bd55aSTed Kremenek   if (!FPT->getArgType(0)->isIntegerType())
345d99bd55aSTed Kremenek     return;
346d99bd55aSTed Kremenek 
347d99bd55aSTed Kremenek   // Verify the second argument type is char*.
348d99bd55aSTed Kremenek   const PointerType *PT = dyn_cast<PointerType>(FPT->getArgType(1));
349d99bd55aSTed Kremenek   if (!PT)
350d99bd55aSTed Kremenek     return;
351d99bd55aSTed Kremenek 
352d99bd55aSTed Kremenek   if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy)
353d99bd55aSTed Kremenek     return;
354d99bd55aSTed Kremenek 
355d99bd55aSTed Kremenek   // Issue a warning.
356d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
357c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
358c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
359d99bd55aSTed Kremenek   BR.EmitBasicReport("Potential buffer overflow in call to 'getpw'",
360d99bd55aSTed Kremenek                      "Security",
361d99bd55aSTed Kremenek                      "The getpw() function is dangerous as it may overflow the "
362d99bd55aSTed Kremenek                      "provided buffer. It is obsoleted by getpwuid().",
363c29bed39SAnna Zaks                      CELoc, &R, 1);
364d99bd55aSTed Kremenek }
365d99bd55aSTed Kremenek 
366d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
367d99bd55aSTed Kremenek // Check: Any use of 'mktemp' is insecure.It is obsoleted by mkstemp().
368d99bd55aSTed Kremenek // CWE-377: Insecure Temporary File
369d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
370d99bd55aSTed Kremenek 
371de909e49SLenny Maiorani void WalkAST::checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD) {
372*c54dc951STed Kremenek   if (!filter.check_mktemp)
373*c54dc951STed Kremenek     return;
374*c54dc951STed Kremenek 
375d99bd55aSTed Kremenek   const FunctionProtoType *FPT
376d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
377d99bd55aSTed Kremenek   if(!FPT)
378d99bd55aSTed Kremenek     return;
379d99bd55aSTed Kremenek 
38070568c2bSLenny Maiorani   // Verify that the function takes a single argument.
381d99bd55aSTed Kremenek   if (FPT->getNumArgs() != 1)
382d99bd55aSTed Kremenek     return;
383d99bd55aSTed Kremenek 
384d99bd55aSTed Kremenek   // Verify that the argument is Pointer Type.
385d99bd55aSTed Kremenek   const PointerType *PT = dyn_cast<PointerType>(FPT->getArgType(0));
386d99bd55aSTed Kremenek   if (!PT)
387d99bd55aSTed Kremenek     return;
388d99bd55aSTed Kremenek 
389d99bd55aSTed Kremenek   // Verify that the argument is a 'char*'.
390d99bd55aSTed Kremenek   if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy)
391d99bd55aSTed Kremenek     return;
392d99bd55aSTed Kremenek 
393d99bd55aSTed Kremenek   // Issue a waring.
394d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
395c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
396c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
397d99bd55aSTed Kremenek   BR.EmitBasicReport("Potential insecure temporary file in call 'mktemp'",
398d99bd55aSTed Kremenek                      "Security",
399d99bd55aSTed Kremenek                      "Call to function 'mktemp' is insecure as it always "
400d99bd55aSTed Kremenek                      "creates or uses insecure temporary file.  Use 'mkstemp' instead",
401c29bed39SAnna Zaks                      CELoc, &R, 1);
402d99bd55aSTed Kremenek }
403d99bd55aSTed Kremenek 
404d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
4056ffe738fSLenny Maiorani // Check: Any use of 'strcpy' is insecure.
4066ffe738fSLenny Maiorani //
4076ffe738fSLenny Maiorani // CWE-119: Improper Restriction of Operations within
4086ffe738fSLenny Maiorani // the Bounds of a Memory Buffer
4096ffe738fSLenny Maiorani //===----------------------------------------------------------------------===//
410de909e49SLenny Maiorani void WalkAST::checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD) {
411*c54dc951STed Kremenek   if (!filter.check_strcpy)
412*c54dc951STed Kremenek     return;
413*c54dc951STed Kremenek 
414de909e49SLenny Maiorani   if (!checkCall_strCommon(CE, FD))
4156ffe738fSLenny Maiorani     return;
4166ffe738fSLenny Maiorani 
417de909e49SLenny Maiorani   // Issue a warning.
4186ffe738fSLenny Maiorani   SourceRange R = CE->getCallee()->getSourceRange();
419c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
420c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
4216ffe738fSLenny Maiorani   BR.EmitBasicReport("Potential insecure memory buffer bounds restriction in "
4226ffe738fSLenny Maiorani                      "call 'strcpy'",
4236ffe738fSLenny Maiorani                      "Security",
4246ffe738fSLenny Maiorani                      "Call to function 'strcpy' is insecure as it does not "
4256ffe738fSLenny Maiorani 		     "provide bounding of the memory buffer. Replace "
4266ffe738fSLenny Maiorani 		     "unbounded copy functions with analogous functions that "
4276ffe738fSLenny Maiorani 		     "support length arguments such as 'strncpy'. CWE-119.",
428c29bed39SAnna Zaks                      CELoc, &R, 1);
4296ffe738fSLenny Maiorani }
4306ffe738fSLenny Maiorani 
4316ffe738fSLenny Maiorani //===----------------------------------------------------------------------===//
432de909e49SLenny Maiorani // Check: Any use of 'strcat' is insecure.
433de909e49SLenny Maiorani //
434de909e49SLenny Maiorani // CWE-119: Improper Restriction of Operations within
435de909e49SLenny Maiorani // the Bounds of a Memory Buffer
436de909e49SLenny Maiorani //===----------------------------------------------------------------------===//
437de909e49SLenny Maiorani void WalkAST::checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD) {
438*c54dc951STed Kremenek   if (!filter.check_strcpy)
439*c54dc951STed Kremenek     return;
440*c54dc951STed Kremenek 
441de909e49SLenny Maiorani   if (!checkCall_strCommon(CE, FD))
442de909e49SLenny Maiorani     return;
443de909e49SLenny Maiorani 
444de909e49SLenny Maiorani   // Issue a warning.
445de909e49SLenny Maiorani   SourceRange R = CE->getCallee()->getSourceRange();
446c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
447c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
448de909e49SLenny Maiorani   BR.EmitBasicReport("Potential insecure memory buffer bounds restriction in "
449de909e49SLenny Maiorani 		     "call 'strcat'",
450de909e49SLenny Maiorani 		     "Security",
451de909e49SLenny Maiorani 		     "Call to function 'strcat' is insecure as it does not "
452de909e49SLenny Maiorani 		     "provide bounding of the memory buffer. Replace "
453de909e49SLenny Maiorani 		     "unbounded copy functions with analogous functions that "
454de909e49SLenny Maiorani 		     "support length arguments such as 'strncat'. CWE-119.",
455c29bed39SAnna Zaks                      CELoc, &R, 1);
456de909e49SLenny Maiorani }
457de909e49SLenny Maiorani 
458de909e49SLenny Maiorani //===----------------------------------------------------------------------===//
459de909e49SLenny Maiorani // Common check for str* functions with no bounds parameters.
460de909e49SLenny Maiorani //===----------------------------------------------------------------------===//
461de909e49SLenny Maiorani bool WalkAST::checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD) {
462de909e49SLenny Maiorani   const FunctionProtoType *FPT
463de909e49SLenny Maiorani     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
464de909e49SLenny Maiorani   if (!FPT)
465de909e49SLenny Maiorani     return false;
466de909e49SLenny Maiorani 
467de909e49SLenny Maiorani   // Verify the function takes two arguments, three in the _chk version.
468de909e49SLenny Maiorani   int numArgs = FPT->getNumArgs();
469de909e49SLenny Maiorani   if (numArgs != 2 && numArgs != 3)
470de909e49SLenny Maiorani     return false;
471de909e49SLenny Maiorani 
472de909e49SLenny Maiorani   // Verify the type for both arguments.
473de909e49SLenny Maiorani   for (int i = 0; i < 2; i++) {
474de909e49SLenny Maiorani     // Verify that the arguments are pointers.
475de909e49SLenny Maiorani     const PointerType *PT = dyn_cast<PointerType>(FPT->getArgType(i));
476de909e49SLenny Maiorani     if (!PT)
477de909e49SLenny Maiorani       return false;
478de909e49SLenny Maiorani 
479de909e49SLenny Maiorani     // Verify that the argument is a 'char*'.
480de909e49SLenny Maiorani     if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy)
481de909e49SLenny Maiorani       return false;
482de909e49SLenny Maiorani   }
483de909e49SLenny Maiorani 
484de909e49SLenny Maiorani   return true;
485de909e49SLenny Maiorani }
486de909e49SLenny Maiorani 
487de909e49SLenny Maiorani //===----------------------------------------------------------------------===//
488d99bd55aSTed Kremenek // Check: Linear congruent random number generators should not be used
489d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000>
490d99bd55aSTed Kremenek // CWE-338: Use of cryptographically weak prng
491d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
492d99bd55aSTed Kremenek 
493de909e49SLenny Maiorani void WalkAST::checkCall_rand(const CallExpr *CE, const FunctionDecl *FD) {
494*c54dc951STed Kremenek   if (!filter.check_rand || !CheckRand)
495d99bd55aSTed Kremenek     return;
496d99bd55aSTed Kremenek 
497d99bd55aSTed Kremenek   const FunctionProtoType *FTP
498d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
499d99bd55aSTed Kremenek   if (!FTP)
500d99bd55aSTed Kremenek     return;
501d99bd55aSTed Kremenek 
502d99bd55aSTed Kremenek   if (FTP->getNumArgs() == 1) {
503d99bd55aSTed Kremenek     // Is the argument an 'unsigned short *'?
504d99bd55aSTed Kremenek     // (Actually any integer type is allowed.)
505d99bd55aSTed Kremenek     const PointerType *PT = dyn_cast<PointerType>(FTP->getArgType(0));
506d99bd55aSTed Kremenek     if (!PT)
507d99bd55aSTed Kremenek       return;
508d99bd55aSTed Kremenek 
509d99bd55aSTed Kremenek     if (! PT->getPointeeType()->isIntegerType())
510d99bd55aSTed Kremenek       return;
511d99bd55aSTed Kremenek   }
512d99bd55aSTed Kremenek   else if (FTP->getNumArgs() != 0)
513d99bd55aSTed Kremenek     return;
514d99bd55aSTed Kremenek 
515d99bd55aSTed Kremenek   // Issue a warning.
516d99bd55aSTed Kremenek   llvm::SmallString<256> buf1;
517d99bd55aSTed Kremenek   llvm::raw_svector_ostream os1(buf1);
518b89514a9SBenjamin Kramer   os1 << '\'' << *FD << "' is a poor random number generator";
519d99bd55aSTed Kremenek 
520d99bd55aSTed Kremenek   llvm::SmallString<256> buf2;
521d99bd55aSTed Kremenek   llvm::raw_svector_ostream os2(buf2);
522b89514a9SBenjamin Kramer   os2 << "Function '" << *FD
523d99bd55aSTed Kremenek       << "' is obsolete because it implements a poor random number generator."
524d99bd55aSTed Kremenek       << "  Use 'arc4random' instead";
525d99bd55aSTed Kremenek 
526d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
527c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
528c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
529c29bed39SAnna Zaks   BR.EmitBasicReport(os1.str(), "Security", os2.str(), CELoc, &R, 1);
530d99bd55aSTed Kremenek }
531d99bd55aSTed Kremenek 
532d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
533d99bd55aSTed Kremenek // Check: 'random' should not be used
534d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000>
535d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
536d99bd55aSTed Kremenek 
537de909e49SLenny Maiorani void WalkAST::checkCall_random(const CallExpr *CE, const FunctionDecl *FD) {
538fca2e961SLenny Maiorani   if (!CheckRand)
539d99bd55aSTed Kremenek     return;
540d99bd55aSTed Kremenek 
541d99bd55aSTed Kremenek   const FunctionProtoType *FTP
542d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
543d99bd55aSTed Kremenek   if (!FTP)
544d99bd55aSTed Kremenek     return;
545d99bd55aSTed Kremenek 
546d99bd55aSTed Kremenek   // Verify that the function takes no argument.
547d99bd55aSTed Kremenek   if (FTP->getNumArgs() != 0)
548d99bd55aSTed Kremenek     return;
549d99bd55aSTed Kremenek 
550d99bd55aSTed Kremenek   // Issue a warning.
551d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
552c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
553c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
554d99bd55aSTed Kremenek   BR.EmitBasicReport("'random' is not a secure random number generator",
555d99bd55aSTed Kremenek                      "Security",
556d99bd55aSTed Kremenek                      "The 'random' function produces a sequence of values that "
557d99bd55aSTed Kremenek                      "an adversary may be able to predict.  Use 'arc4random' "
558c29bed39SAnna Zaks                      "instead", CELoc, &R, 1);
559d99bd55aSTed Kremenek }
560d99bd55aSTed Kremenek 
561d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
562fedf5dfcSAnna Zaks // Check: 'vfork' should not be used.
563fedf5dfcSAnna Zaks // POS33-C: Do not use vfork().
564fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===//
565fedf5dfcSAnna Zaks 
566fedf5dfcSAnna Zaks void WalkAST::checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD) {
567*c54dc951STed Kremenek   if (!filter.check_vfork)
568*c54dc951STed Kremenek     return;
569*c54dc951STed Kremenek 
570fedf5dfcSAnna Zaks   // All calls to vfork() are insecure, issue a warning.
571fedf5dfcSAnna Zaks   SourceRange R = CE->getCallee()->getSourceRange();
572fedf5dfcSAnna Zaks   PathDiagnosticLocation CELoc =
573fedf5dfcSAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
574fedf5dfcSAnna Zaks   BR.EmitBasicReport("Potential insecure implementation-specific behavior in "
575fedf5dfcSAnna Zaks                      "call 'vfork'",
576fedf5dfcSAnna Zaks                      "Security",
577fedf5dfcSAnna Zaks                      "Call to function 'vfork' is insecure as it can lead to "
578fedf5dfcSAnna Zaks                      "denial of service situations in the parent process. "
579fedf5dfcSAnna Zaks                      "Replace calls to vfork with calls to the safer "
580fedf5dfcSAnna Zaks                      "'posix_spawn' function",
581fedf5dfcSAnna Zaks                      CELoc, &R, 1);
582fedf5dfcSAnna Zaks }
583fedf5dfcSAnna Zaks 
584fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===//
585d99bd55aSTed Kremenek // Check: Should check whether privileges are dropped successfully.
586d99bd55aSTed Kremenek // Originally: <rdar://problem/6337132>
587d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
588d99bd55aSTed Kremenek 
589de909e49SLenny Maiorani void WalkAST::checkUncheckedReturnValue(CallExpr *CE) {
590d99bd55aSTed Kremenek   const FunctionDecl *FD = CE->getDirectCallee();
591d99bd55aSTed Kremenek   if (!FD)
592d99bd55aSTed Kremenek     return;
593d99bd55aSTed Kremenek 
594d99bd55aSTed Kremenek   if (II_setid[0] == NULL) {
595d99bd55aSTed Kremenek     static const char * const identifiers[num_setids] = {
596d99bd55aSTed Kremenek       "setuid", "setgid", "seteuid", "setegid",
597d99bd55aSTed Kremenek       "setreuid", "setregid"
598d99bd55aSTed Kremenek     };
599d99bd55aSTed Kremenek 
600d99bd55aSTed Kremenek     for (size_t i = 0; i < num_setids; i++)
601d99bd55aSTed Kremenek       II_setid[i] = &BR.getContext().Idents.get(identifiers[i]);
602d99bd55aSTed Kremenek   }
603d99bd55aSTed Kremenek 
604d99bd55aSTed Kremenek   const IdentifierInfo *id = FD->getIdentifier();
605d99bd55aSTed Kremenek   size_t identifierid;
606d99bd55aSTed Kremenek 
607d99bd55aSTed Kremenek   for (identifierid = 0; identifierid < num_setids; identifierid++)
608d99bd55aSTed Kremenek     if (id == II_setid[identifierid])
609d99bd55aSTed Kremenek       break;
610d99bd55aSTed Kremenek 
611d99bd55aSTed Kremenek   if (identifierid >= num_setids)
612d99bd55aSTed Kremenek     return;
613d99bd55aSTed Kremenek 
614d99bd55aSTed Kremenek   const FunctionProtoType *FTP
615d99bd55aSTed Kremenek     = dyn_cast<FunctionProtoType>(FD->getType().IgnoreParens());
616d99bd55aSTed Kremenek   if (!FTP)
617d99bd55aSTed Kremenek     return;
618d99bd55aSTed Kremenek 
619d99bd55aSTed Kremenek   // Verify that the function takes one or two arguments (depending on
620d99bd55aSTed Kremenek   //   the function).
621d99bd55aSTed Kremenek   if (FTP->getNumArgs() != (identifierid < 4 ? 1 : 2))
622d99bd55aSTed Kremenek     return;
623d99bd55aSTed Kremenek 
624d99bd55aSTed Kremenek   // The arguments must be integers.
625d99bd55aSTed Kremenek   for (unsigned i = 0; i < FTP->getNumArgs(); i++)
626d99bd55aSTed Kremenek     if (! FTP->getArgType(i)->isIntegerType())
627d99bd55aSTed Kremenek       return;
628d99bd55aSTed Kremenek 
629d99bd55aSTed Kremenek   // Issue a warning.
630d99bd55aSTed Kremenek   llvm::SmallString<256> buf1;
631d99bd55aSTed Kremenek   llvm::raw_svector_ostream os1(buf1);
632b89514a9SBenjamin Kramer   os1 << "Return value is not checked in call to '" << *FD << '\'';
633d99bd55aSTed Kremenek 
634d99bd55aSTed Kremenek   llvm::SmallString<256> buf2;
635d99bd55aSTed Kremenek   llvm::raw_svector_ostream os2(buf2);
636b89514a9SBenjamin Kramer   os2 << "The return value from the call to '" << *FD
637b89514a9SBenjamin Kramer       << "' is not checked.  If an error occurs in '" << *FD
638d99bd55aSTed Kremenek       << "', the following code may execute with unexpected privileges";
639d99bd55aSTed Kremenek 
640d99bd55aSTed Kremenek   SourceRange R = CE->getCallee()->getSourceRange();
641c29bed39SAnna Zaks   PathDiagnosticLocation CELoc =
642c29bed39SAnna Zaks     PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
643c29bed39SAnna Zaks   BR.EmitBasicReport(os1.str(), "Security", os2.str(), CELoc, &R, 1);
644d99bd55aSTed Kremenek }
645d99bd55aSTed Kremenek 
646d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
647af45aca6SArgyrios Kyrtzidis // SecuritySyntaxChecker
648d99bd55aSTed Kremenek //===----------------------------------------------------------------------===//
649d99bd55aSTed Kremenek 
650af45aca6SArgyrios Kyrtzidis namespace {
6516a5674ffSArgyrios Kyrtzidis class SecuritySyntaxChecker : public Checker<check::ASTCodeBody> {
652af45aca6SArgyrios Kyrtzidis public:
653*c54dc951STed Kremenek   ChecksFilter filter;
654*c54dc951STed Kremenek 
655af45aca6SArgyrios Kyrtzidis   void checkASTCodeBody(const Decl *D, AnalysisManager& mgr,
656af45aca6SArgyrios Kyrtzidis                         BugReporter &BR) const {
657*c54dc951STed Kremenek     WalkAST walker(BR, mgr.getAnalysisDeclContext(D), filter);
658d99bd55aSTed Kremenek     walker.Visit(D->getBody());
659d99bd55aSTed Kremenek   }
660af45aca6SArgyrios Kyrtzidis };
661af45aca6SArgyrios Kyrtzidis }
662af45aca6SArgyrios Kyrtzidis 
663*c54dc951STed Kremenek #define REGISTER_CHECKER(name) \
664*c54dc951STed Kremenek void ento::register##name(CheckerManager &mgr) {\
665*c54dc951STed Kremenek   mgr.registerChecker<SecuritySyntaxChecker>()->filter.check_##name = true;\
666af45aca6SArgyrios Kyrtzidis }
667*c54dc951STed Kremenek 
668*c54dc951STed Kremenek REGISTER_CHECKER(gets)
669*c54dc951STed Kremenek REGISTER_CHECKER(getpw)
670*c54dc951STed Kremenek REGISTER_CHECKER(mktemp)
671*c54dc951STed Kremenek REGISTER_CHECKER(strcpy)
672*c54dc951STed Kremenek REGISTER_CHECKER(rand)
673*c54dc951STed Kremenek REGISTER_CHECKER(vfork)
674*c54dc951STed Kremenek REGISTER_CHECKER(FloatLoopCounter)
675*c54dc951STed Kremenek 
676