1d99bd55aSTed Kremenek //==- CheckSecuritySyntaxOnly.cpp - Basic security checks --------*- C++ -*-==// 2d99bd55aSTed Kremenek // 3d99bd55aSTed Kremenek // The LLVM Compiler Infrastructure 4d99bd55aSTed Kremenek // 5d99bd55aSTed Kremenek // This file is distributed under the University of Illinois Open Source 6d99bd55aSTed Kremenek // License. See LICENSE.TXT for details. 7d99bd55aSTed Kremenek // 8d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 9d99bd55aSTed Kremenek // 10d99bd55aSTed Kremenek // This file defines a set of flow-insensitive security checks. 11d99bd55aSTed Kremenek // 12d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 13d99bd55aSTed Kremenek 1476a21502SKristof Umann #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" 15c29bed39SAnna Zaks #include "clang/AST/StmtVisitor.h" 1650657f6bSGeorge Karpenkov #include "clang/Analysis/AnalysisDeclContext.h" 17c29bed39SAnna Zaks #include "clang/Basic/TargetInfo.h" 18f8cbac4bSTed Kremenek #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h" 193a02247dSChandler Carruth #include "clang/StaticAnalyzer/Core/Checker.h" 20c29bed39SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h" 214903802fSBenjamin Kramer #include "llvm/ADT/SmallString.h" 22fca2e961SLenny Maiorani #include "llvm/ADT/StringSwitch.h" 23c29bed39SAnna Zaks #include "llvm/Support/raw_ostream.h" 24d99bd55aSTed Kremenek 25d99bd55aSTed Kremenek using namespace clang; 26d99bd55aSTed Kremenek using namespace ento; 27d99bd55aSTed Kremenek 28d99bd55aSTed Kremenek static bool isArc4RandomAvailable(const ASTContext &Ctx) { 29e8bbc121SDouglas Gregor const llvm::Triple &T = Ctx.getTargetInfo().getTriple(); 30d99bd55aSTed Kremenek return T.getVendor() == llvm::Triple::Apple || 31e5bdc851SEd Schouten T.getOS() == llvm::Triple::CloudABI || 325a409d0eSMichal Gorny T.isOSFreeBSD() || 335a409d0eSMichal Gorny T.isOSNetBSD() || 345a409d0eSMichal Gorny T.isOSOpenBSD() || 355a409d0eSMichal Gorny T.isOSDragonFly(); 36d99bd55aSTed Kremenek } 37d99bd55aSTed Kremenek 38d99bd55aSTed Kremenek namespace { 39c54dc951STed Kremenek struct ChecksFilter { 408419cf30SArtem Dergachev DefaultBool check_bcmp; 418419cf30SArtem Dergachev DefaultBool check_bcopy; 428419cf30SArtem Dergachev DefaultBool check_bzero; 43c54dc951STed Kremenek DefaultBool check_gets; 44c54dc951STed Kremenek DefaultBool check_getpw; 45c54dc951STed Kremenek DefaultBool check_mktemp; 4689eaf8d5STed Kremenek DefaultBool check_mkstemp; 47c54dc951STed Kremenek DefaultBool check_strcpy; 48c54dc951STed Kremenek DefaultBool check_rand; 49c54dc951STed Kremenek DefaultBool check_vfork; 50c54dc951STed Kremenek DefaultBool check_FloatLoopCounter; 5189eaf8d5STed Kremenek DefaultBool check_UncheckedReturn; 524aca9b1cSAlexander Kornienko 538419cf30SArtem Dergachev CheckName checkName_bcmp; 548419cf30SArtem Dergachev CheckName checkName_bcopy; 558419cf30SArtem Dergachev CheckName checkName_bzero; 564aca9b1cSAlexander Kornienko CheckName checkName_gets; 574aca9b1cSAlexander Kornienko CheckName checkName_getpw; 584aca9b1cSAlexander Kornienko CheckName checkName_mktemp; 594aca9b1cSAlexander Kornienko CheckName checkName_mkstemp; 604aca9b1cSAlexander Kornienko CheckName checkName_strcpy; 614aca9b1cSAlexander Kornienko CheckName checkName_rand; 624aca9b1cSAlexander Kornienko CheckName checkName_vfork; 634aca9b1cSAlexander Kornienko CheckName checkName_FloatLoopCounter; 644aca9b1cSAlexander Kornienko CheckName checkName_UncheckedReturn; 65c54dc951STed Kremenek }; 66c54dc951STed Kremenek 67d99bd55aSTed Kremenek class WalkAST : public StmtVisitor<WalkAST> { 68d99bd55aSTed Kremenek BugReporter &BR; 6981ce1c8aSTed Kremenek AnalysisDeclContext* AC; 70d99bd55aSTed Kremenek enum { num_setids = 6 }; 71d99bd55aSTed Kremenek IdentifierInfo *II_setid[num_setids]; 72d99bd55aSTed Kremenek 73d99bd55aSTed Kremenek const bool CheckRand; 74c54dc951STed Kremenek const ChecksFilter &filter; 75d99bd55aSTed Kremenek 76d99bd55aSTed Kremenek public: 77c54dc951STed Kremenek WalkAST(BugReporter &br, AnalysisDeclContext* ac, 78c54dc951STed Kremenek const ChecksFilter &f) 79c29bed39SAnna Zaks : BR(br), AC(ac), II_setid(), 80c54dc951STed Kremenek CheckRand(isArc4RandomAvailable(BR.getContext())), 81c54dc951STed Kremenek filter(f) {} 82d99bd55aSTed Kremenek 83d99bd55aSTed Kremenek // Statement visitor methods. 84d99bd55aSTed Kremenek void VisitCallExpr(CallExpr *CE); 85d99bd55aSTed Kremenek void VisitForStmt(ForStmt *S); 86d99bd55aSTed Kremenek void VisitCompoundStmt (CompoundStmt *S); 87d99bd55aSTed Kremenek void VisitStmt(Stmt *S) { VisitChildren(S); } 88d99bd55aSTed Kremenek 89d99bd55aSTed Kremenek void VisitChildren(Stmt *S); 90d99bd55aSTed Kremenek 91d99bd55aSTed Kremenek // Helpers. 92de909e49SLenny Maiorani bool checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD); 93d99bd55aSTed Kremenek 942a3ca840SPierre Gousseau typedef void (WalkAST::*FnCheck)(const CallExpr *, const FunctionDecl *); 95fca2e961SLenny Maiorani 96d99bd55aSTed Kremenek // Checker-specific methods. 97de909e49SLenny Maiorani void checkLoopConditionForFloat(const ForStmt *FS); 988419cf30SArtem Dergachev void checkCall_bcmp(const CallExpr *CE, const FunctionDecl *FD); 998419cf30SArtem Dergachev void checkCall_bcopy(const CallExpr *CE, const FunctionDecl *FD); 1008419cf30SArtem Dergachev void checkCall_bzero(const CallExpr *CE, const FunctionDecl *FD); 101de909e49SLenny Maiorani void checkCall_gets(const CallExpr *CE, const FunctionDecl *FD); 102de909e49SLenny Maiorani void checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD); 103de909e49SLenny Maiorani void checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD); 10489eaf8d5STed Kremenek void checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD); 105de909e49SLenny Maiorani void checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD); 106de909e49SLenny Maiorani void checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD); 107de909e49SLenny Maiorani void checkCall_rand(const CallExpr *CE, const FunctionDecl *FD); 108de909e49SLenny Maiorani void checkCall_random(const CallExpr *CE, const FunctionDecl *FD); 109fedf5dfcSAnna Zaks void checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD); 110de909e49SLenny Maiorani void checkUncheckedReturnValue(CallExpr *CE); 111d99bd55aSTed Kremenek }; 112d99bd55aSTed Kremenek } // end anonymous namespace 113d99bd55aSTed Kremenek 114d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 115d99bd55aSTed Kremenek // AST walking. 116d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 117d99bd55aSTed Kremenek 118d99bd55aSTed Kremenek void WalkAST::VisitChildren(Stmt *S) { 119973431b2SBenjamin Kramer for (Stmt *Child : S->children()) 120973431b2SBenjamin Kramer if (Child) 121973431b2SBenjamin Kramer Visit(Child); 122d99bd55aSTed Kremenek } 123d99bd55aSTed Kremenek 124d99bd55aSTed Kremenek void WalkAST::VisitCallExpr(CallExpr *CE) { 125fca2e961SLenny Maiorani // Get the callee. 126fca2e961SLenny Maiorani const FunctionDecl *FD = CE->getDirectCallee(); 127fca2e961SLenny Maiorani 128fca2e961SLenny Maiorani if (!FD) 129fca2e961SLenny Maiorani return; 130fca2e961SLenny Maiorani 131fca2e961SLenny Maiorani // Get the name of the callee. If it's a builtin, strip off the prefix. 132fca2e961SLenny Maiorani IdentifierInfo *II = FD->getIdentifier(); 133fca2e961SLenny Maiorani if (!II) // if no identifier, not a simple C function 134fca2e961SLenny Maiorani return; 1350e62c1ccSChris Lattner StringRef Name = II->getName(); 136fca2e961SLenny Maiorani if (Name.startswith("__builtin_")) 137fca2e961SLenny Maiorani Name = Name.substr(10); 138fca2e961SLenny Maiorani 139fca2e961SLenny Maiorani // Set the evaluation function by switching on the callee name. 140fca2e961SLenny Maiorani FnCheck evalFunction = llvm::StringSwitch<FnCheck>(Name) 1418419cf30SArtem Dergachev .Case("bcmp", &WalkAST::checkCall_bcmp) 1428419cf30SArtem Dergachev .Case("bcopy", &WalkAST::checkCall_bcopy) 1438419cf30SArtem Dergachev .Case("bzero", &WalkAST::checkCall_bzero) 144de909e49SLenny Maiorani .Case("gets", &WalkAST::checkCall_gets) 145de909e49SLenny Maiorani .Case("getpw", &WalkAST::checkCall_getpw) 146de909e49SLenny Maiorani .Case("mktemp", &WalkAST::checkCall_mktemp) 14789eaf8d5STed Kremenek .Case("mkstemp", &WalkAST::checkCall_mkstemp) 14889eaf8d5STed Kremenek .Case("mkdtemp", &WalkAST::checkCall_mkstemp) 14989eaf8d5STed Kremenek .Case("mkstemps", &WalkAST::checkCall_mkstemp) 150de909e49SLenny Maiorani .Cases("strcpy", "__strcpy_chk", &WalkAST::checkCall_strcpy) 151de909e49SLenny Maiorani .Cases("strcat", "__strcat_chk", &WalkAST::checkCall_strcat) 152de909e49SLenny Maiorani .Case("drand48", &WalkAST::checkCall_rand) 153de909e49SLenny Maiorani .Case("erand48", &WalkAST::checkCall_rand) 154de909e49SLenny Maiorani .Case("jrand48", &WalkAST::checkCall_rand) 155de909e49SLenny Maiorani .Case("lrand48", &WalkAST::checkCall_rand) 156de909e49SLenny Maiorani .Case("mrand48", &WalkAST::checkCall_rand) 157de909e49SLenny Maiorani .Case("nrand48", &WalkAST::checkCall_rand) 158de909e49SLenny Maiorani .Case("lcong48", &WalkAST::checkCall_rand) 159de909e49SLenny Maiorani .Case("rand", &WalkAST::checkCall_rand) 160de909e49SLenny Maiorani .Case("rand_r", &WalkAST::checkCall_rand) 161de909e49SLenny Maiorani .Case("random", &WalkAST::checkCall_random) 162fedf5dfcSAnna Zaks .Case("vfork", &WalkAST::checkCall_vfork) 1630dbb783cSCraig Topper .Default(nullptr); 164fca2e961SLenny Maiorani 165fca2e961SLenny Maiorani // If the callee isn't defined, it is not of security concern. 166fca2e961SLenny Maiorani // Check and evaluate the call. 167fca2e961SLenny Maiorani if (evalFunction) 168fca2e961SLenny Maiorani (this->*evalFunction)(CE, FD); 169d99bd55aSTed Kremenek 170d99bd55aSTed Kremenek // Recurse and check children. 171d99bd55aSTed Kremenek VisitChildren(CE); 172d99bd55aSTed Kremenek } 173d99bd55aSTed Kremenek 174d99bd55aSTed Kremenek void WalkAST::VisitCompoundStmt(CompoundStmt *S) { 175973431b2SBenjamin Kramer for (Stmt *Child : S->children()) 176973431b2SBenjamin Kramer if (Child) { 177973431b2SBenjamin Kramer if (CallExpr *CE = dyn_cast<CallExpr>(Child)) 178de909e49SLenny Maiorani checkUncheckedReturnValue(CE); 179973431b2SBenjamin Kramer Visit(Child); 180d99bd55aSTed Kremenek } 181d99bd55aSTed Kremenek } 182d99bd55aSTed Kremenek 183d99bd55aSTed Kremenek void WalkAST::VisitForStmt(ForStmt *FS) { 184de909e49SLenny Maiorani checkLoopConditionForFloat(FS); 185d99bd55aSTed Kremenek 186d99bd55aSTed Kremenek // Recurse and check children. 187d99bd55aSTed Kremenek VisitChildren(FS); 188d99bd55aSTed Kremenek } 189d99bd55aSTed Kremenek 190d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 191b23ccecbSRaphael Isemann // Check: floating point variable used as loop counter. 192d99bd55aSTed Kremenek // Originally: <rdar://problem/6336718> 193d99bd55aSTed Kremenek // Implements: CERT security coding advisory FLP-30. 194d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 195d99bd55aSTed Kremenek 196d99bd55aSTed Kremenek static const DeclRefExpr* 197de909e49SLenny Maiorani getIncrementedVar(const Expr *expr, const VarDecl *x, const VarDecl *y) { 198d99bd55aSTed Kremenek expr = expr->IgnoreParenCasts(); 199d99bd55aSTed Kremenek 200d99bd55aSTed Kremenek if (const BinaryOperator *B = dyn_cast<BinaryOperator>(expr)) { 201d99bd55aSTed Kremenek if (!(B->isAssignmentOp() || B->isCompoundAssignmentOp() || 202d99bd55aSTed Kremenek B->getOpcode() == BO_Comma)) 2030dbb783cSCraig Topper return nullptr; 204d99bd55aSTed Kremenek 205de909e49SLenny Maiorani if (const DeclRefExpr *lhs = getIncrementedVar(B->getLHS(), x, y)) 206d99bd55aSTed Kremenek return lhs; 207d99bd55aSTed Kremenek 208de909e49SLenny Maiorani if (const DeclRefExpr *rhs = getIncrementedVar(B->getRHS(), x, y)) 209d99bd55aSTed Kremenek return rhs; 210d99bd55aSTed Kremenek 2110dbb783cSCraig Topper return nullptr; 212d99bd55aSTed Kremenek } 213d99bd55aSTed Kremenek 214d99bd55aSTed Kremenek if (const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(expr)) { 215d99bd55aSTed Kremenek const NamedDecl *ND = DR->getDecl(); 2160dbb783cSCraig Topper return ND == x || ND == y ? DR : nullptr; 217d99bd55aSTed Kremenek } 218d99bd55aSTed Kremenek 219d99bd55aSTed Kremenek if (const UnaryOperator *U = dyn_cast<UnaryOperator>(expr)) 220d99bd55aSTed Kremenek return U->isIncrementDecrementOp() 2210dbb783cSCraig Topper ? getIncrementedVar(U->getSubExpr(), x, y) : nullptr; 222d99bd55aSTed Kremenek 2230dbb783cSCraig Topper return nullptr; 224d99bd55aSTed Kremenek } 225d99bd55aSTed Kremenek 226d99bd55aSTed Kremenek /// CheckLoopConditionForFloat - This check looks for 'for' statements that 227d99bd55aSTed Kremenek /// use a floating point variable as a loop counter. 228d99bd55aSTed Kremenek /// CERT: FLP30-C, FLP30-CPP. 229d99bd55aSTed Kremenek /// 230de909e49SLenny Maiorani void WalkAST::checkLoopConditionForFloat(const ForStmt *FS) { 231c54dc951STed Kremenek if (!filter.check_FloatLoopCounter) 232c54dc951STed Kremenek return; 233c54dc951STed Kremenek 234d99bd55aSTed Kremenek // Does the loop have a condition? 235d99bd55aSTed Kremenek const Expr *condition = FS->getCond(); 236d99bd55aSTed Kremenek 237d99bd55aSTed Kremenek if (!condition) 238d99bd55aSTed Kremenek return; 239d99bd55aSTed Kremenek 240d99bd55aSTed Kremenek // Does the loop have an increment? 241d99bd55aSTed Kremenek const Expr *increment = FS->getInc(); 242d99bd55aSTed Kremenek 243d99bd55aSTed Kremenek if (!increment) 244d99bd55aSTed Kremenek return; 245d99bd55aSTed Kremenek 246d99bd55aSTed Kremenek // Strip away '()' and casts. 247d99bd55aSTed Kremenek condition = condition->IgnoreParenCasts(); 248d99bd55aSTed Kremenek increment = increment->IgnoreParenCasts(); 249d99bd55aSTed Kremenek 250d99bd55aSTed Kremenek // Is the loop condition a comparison? 251d99bd55aSTed Kremenek const BinaryOperator *B = dyn_cast<BinaryOperator>(condition); 252d99bd55aSTed Kremenek 253d99bd55aSTed Kremenek if (!B) 254d99bd55aSTed Kremenek return; 255d99bd55aSTed Kremenek 256d99bd55aSTed Kremenek // Is this a comparison? 257d99bd55aSTed Kremenek if (!(B->isRelationalOp() || B->isEqualityOp())) 258d99bd55aSTed Kremenek return; 259d99bd55aSTed Kremenek 260d99bd55aSTed Kremenek // Are we comparing variables? 261d99bd55aSTed Kremenek const DeclRefExpr *drLHS = 262d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getLHS()->IgnoreParenLValueCasts()); 263d99bd55aSTed Kremenek const DeclRefExpr *drRHS = 264d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getRHS()->IgnoreParenLValueCasts()); 265d99bd55aSTed Kremenek 266d99bd55aSTed Kremenek // Does at least one of the variables have a floating point type? 2670dbb783cSCraig Topper drLHS = drLHS && drLHS->getType()->isRealFloatingType() ? drLHS : nullptr; 2680dbb783cSCraig Topper drRHS = drRHS && drRHS->getType()->isRealFloatingType() ? drRHS : nullptr; 269d99bd55aSTed Kremenek 270d99bd55aSTed Kremenek if (!drLHS && !drRHS) 271d99bd55aSTed Kremenek return; 272d99bd55aSTed Kremenek 2730dbb783cSCraig Topper const VarDecl *vdLHS = drLHS ? dyn_cast<VarDecl>(drLHS->getDecl()) : nullptr; 2740dbb783cSCraig Topper const VarDecl *vdRHS = drRHS ? dyn_cast<VarDecl>(drRHS->getDecl()) : nullptr; 275d99bd55aSTed Kremenek 276d99bd55aSTed Kremenek if (!vdLHS && !vdRHS) 277d99bd55aSTed Kremenek return; 278d99bd55aSTed Kremenek 279d99bd55aSTed Kremenek // Does either variable appear in increment? 280de909e49SLenny Maiorani const DeclRefExpr *drInc = getIncrementedVar(increment, vdLHS, vdRHS); 281d99bd55aSTed Kremenek 282d99bd55aSTed Kremenek if (!drInc) 283d99bd55aSTed Kremenek return; 284d99bd55aSTed Kremenek 285d99bd55aSTed Kremenek // Emit the error. First figure out which DeclRefExpr in the condition 286d99bd55aSTed Kremenek // referenced the compared variable. 28726a3661aSTed Kremenek assert(drInc->getDecl()); 288d99bd55aSTed Kremenek const DeclRefExpr *drCond = vdLHS == drInc->getDecl() ? drLHS : drRHS; 289d99bd55aSTed Kremenek 2900e62c1ccSChris Lattner SmallVector<SourceRange, 2> ranges; 2912c1dd271SDylan Noblesmith SmallString<256> sbuf; 292d99bd55aSTed Kremenek llvm::raw_svector_ostream os(sbuf); 293d99bd55aSTed Kremenek 294d99bd55aSTed Kremenek os << "Variable '" << drCond->getDecl()->getName() 295d99bd55aSTed Kremenek << "' with floating point type '" << drCond->getType().getAsString() 296d99bd55aSTed Kremenek << "' should not be used as a loop counter"; 297d99bd55aSTed Kremenek 298d99bd55aSTed Kremenek ranges.push_back(drCond->getSourceRange()); 299d99bd55aSTed Kremenek ranges.push_back(drInc->getSourceRange()); 300d99bd55aSTed Kremenek 301d99bd55aSTed Kremenek const char *bugType = "Floating point variable used as loop counter"; 302c29bed39SAnna Zaks 303c29bed39SAnna Zaks PathDiagnosticLocation FSLoc = 304c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 3054aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_FloatLoopCounter, 3065a10f08bSTed Kremenek bugType, "Security", os.str(), 30742b4248fSJordan Rose FSLoc, ranges); 308d99bd55aSTed Kremenek } 309d99bd55aSTed Kremenek 310d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 3118419cf30SArtem Dergachev // Check: Any use of bcmp. 3128419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3138419cf30SArtem Dergachev // bcmp was deprecated in POSIX.1-2008 3148419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3158419cf30SArtem Dergachev 3168419cf30SArtem Dergachev void WalkAST::checkCall_bcmp(const CallExpr *CE, const FunctionDecl *FD) { 3178419cf30SArtem Dergachev if (!filter.check_bcmp) 3188419cf30SArtem Dergachev return; 3198419cf30SArtem Dergachev 3208419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 3218419cf30SArtem Dergachev if (!FPT) 3228419cf30SArtem Dergachev return; 3238419cf30SArtem Dergachev 3248419cf30SArtem Dergachev // Verify that the function takes three arguments. 3258419cf30SArtem Dergachev if (FPT->getNumParams() != 3) 3268419cf30SArtem Dergachev return; 3278419cf30SArtem Dergachev 3288419cf30SArtem Dergachev for (int i = 0; i < 2; i++) { 3298419cf30SArtem Dergachev // Verify the first and second argument type is void*. 3308419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 3318419cf30SArtem Dergachev if (!PT) 3328419cf30SArtem Dergachev return; 3338419cf30SArtem Dergachev 3348419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 3358419cf30SArtem Dergachev return; 3368419cf30SArtem Dergachev } 3378419cf30SArtem Dergachev 3388419cf30SArtem Dergachev // Verify the third argument type is integer. 3398419cf30SArtem Dergachev if (!FPT->getParamType(2)->isIntegralOrUnscopedEnumerationType()) 3408419cf30SArtem Dergachev return; 3418419cf30SArtem Dergachev 3428419cf30SArtem Dergachev // Issue a warning. 3438419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 3448419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3458419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcmp, 3468419cf30SArtem Dergachev "Use of deprecated function in call to 'bcmp()'", 3478419cf30SArtem Dergachev "Security", 3488419cf30SArtem Dergachev "The bcmp() function is obsoleted by memcmp().", 3498419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 3508419cf30SArtem Dergachev } 3518419cf30SArtem Dergachev 3528419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3538419cf30SArtem Dergachev // Check: Any use of bcopy. 3548419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3558419cf30SArtem Dergachev // bcopy was deprecated in POSIX.1-2008 3568419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3578419cf30SArtem Dergachev 3588419cf30SArtem Dergachev void WalkAST::checkCall_bcopy(const CallExpr *CE, const FunctionDecl *FD) { 3598419cf30SArtem Dergachev if (!filter.check_bcopy) 3608419cf30SArtem Dergachev return; 3618419cf30SArtem Dergachev 3628419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 3638419cf30SArtem Dergachev if (!FPT) 3648419cf30SArtem Dergachev return; 3658419cf30SArtem Dergachev 3668419cf30SArtem Dergachev // Verify that the function takes three arguments. 3678419cf30SArtem Dergachev if (FPT->getNumParams() != 3) 3688419cf30SArtem Dergachev return; 3698419cf30SArtem Dergachev 3708419cf30SArtem Dergachev for (int i = 0; i < 2; i++) { 3718419cf30SArtem Dergachev // Verify the first and second argument type is void*. 3728419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 3738419cf30SArtem Dergachev if (!PT) 3748419cf30SArtem Dergachev return; 3758419cf30SArtem Dergachev 3768419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 3778419cf30SArtem Dergachev return; 3788419cf30SArtem Dergachev } 3798419cf30SArtem Dergachev 3808419cf30SArtem Dergachev // Verify the third argument type is integer. 3818419cf30SArtem Dergachev if (!FPT->getParamType(2)->isIntegralOrUnscopedEnumerationType()) 3828419cf30SArtem Dergachev return; 3838419cf30SArtem Dergachev 3848419cf30SArtem Dergachev // Issue a warning. 3858419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 3868419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3878419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcopy, 3888419cf30SArtem Dergachev "Use of deprecated function in call to 'bcopy()'", 3898419cf30SArtem Dergachev "Security", 3908419cf30SArtem Dergachev "The bcopy() function is obsoleted by memcpy() " 3918419cf30SArtem Dergachev "or memmove().", 3928419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 3938419cf30SArtem Dergachev } 3948419cf30SArtem Dergachev 3958419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 3968419cf30SArtem Dergachev // Check: Any use of bzero. 3978419cf30SArtem Dergachev // CWE-477: Use of Obsolete Functions 3988419cf30SArtem Dergachev // bzero was deprecated in POSIX.1-2008 3998419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 4008419cf30SArtem Dergachev 4018419cf30SArtem Dergachev void WalkAST::checkCall_bzero(const CallExpr *CE, const FunctionDecl *FD) { 4028419cf30SArtem Dergachev if (!filter.check_bzero) 4038419cf30SArtem Dergachev return; 4048419cf30SArtem Dergachev 4058419cf30SArtem Dergachev const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 4068419cf30SArtem Dergachev if (!FPT) 4078419cf30SArtem Dergachev return; 4088419cf30SArtem Dergachev 4098419cf30SArtem Dergachev // Verify that the function takes two arguments. 4108419cf30SArtem Dergachev if (FPT->getNumParams() != 2) 4118419cf30SArtem Dergachev return; 4128419cf30SArtem Dergachev 4138419cf30SArtem Dergachev // Verify the first argument type is void*. 4148419cf30SArtem Dergachev const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 4158419cf30SArtem Dergachev if (!PT) 4168419cf30SArtem Dergachev return; 4178419cf30SArtem Dergachev 4188419cf30SArtem Dergachev if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().VoidTy) 4198419cf30SArtem Dergachev return; 4208419cf30SArtem Dergachev 4218419cf30SArtem Dergachev // Verify the second argument type is integer. 4228419cf30SArtem Dergachev if (!FPT->getParamType(1)->isIntegralOrUnscopedEnumerationType()) 4238419cf30SArtem Dergachev return; 4248419cf30SArtem Dergachev 4258419cf30SArtem Dergachev // Issue a warning. 4268419cf30SArtem Dergachev PathDiagnosticLocation CELoc = 4278419cf30SArtem Dergachev PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4288419cf30SArtem Dergachev BR.EmitBasicReport(AC->getDecl(), filter.checkName_bzero, 4298419cf30SArtem Dergachev "Use of deprecated function in call to 'bzero()'", 4308419cf30SArtem Dergachev "Security", 4318419cf30SArtem Dergachev "The bzero() function is obsoleted by memset().", 4328419cf30SArtem Dergachev CELoc, CE->getCallee()->getSourceRange()); 4338419cf30SArtem Dergachev } 4348419cf30SArtem Dergachev 4358419cf30SArtem Dergachev 4368419cf30SArtem Dergachev //===----------------------------------------------------------------------===// 437d99bd55aSTed Kremenek // Check: Any use of 'gets' is insecure. 438d99bd55aSTed Kremenek // Originally: <rdar://problem/6335715> 439d99bd55aSTed Kremenek // Implements (part of): 300-BSI (buildsecurityin.us-cert.gov) 440d99bd55aSTed Kremenek // CWE-242: Use of Inherently Dangerous Function 441d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 442d99bd55aSTed Kremenek 443de909e49SLenny Maiorani void WalkAST::checkCall_gets(const CallExpr *CE, const FunctionDecl *FD) { 444c54dc951STed Kremenek if (!filter.check_gets) 445c54dc951STed Kremenek return; 446c54dc951STed Kremenek 44757d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 448d99bd55aSTed Kremenek if (!FPT) 449d99bd55aSTed Kremenek return; 450d99bd55aSTed Kremenek 451d99bd55aSTed Kremenek // Verify that the function takes a single argument. 4529cacbabdSAlp Toker if (FPT->getNumParams() != 1) 453d99bd55aSTed Kremenek return; 454d99bd55aSTed Kremenek 455d99bd55aSTed Kremenek // Is the argument a 'char*'? 4569cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 457d99bd55aSTed Kremenek if (!PT) 458d99bd55aSTed Kremenek return; 459d99bd55aSTed Kremenek 460d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 461d99bd55aSTed Kremenek return; 462d99bd55aSTed Kremenek 463d99bd55aSTed Kremenek // Issue a warning. 464c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 465c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4664aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_gets, 4675a10f08bSTed Kremenek "Potential buffer overflow in call to 'gets'", 468d99bd55aSTed Kremenek "Security", 469d99bd55aSTed Kremenek "Call to function 'gets' is extremely insecure as it can " 470d99bd55aSTed Kremenek "always result in a buffer overflow", 47142b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 472d99bd55aSTed Kremenek } 473d99bd55aSTed Kremenek 474d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 475d99bd55aSTed Kremenek // Check: Any use of 'getpwd' is insecure. 476d99bd55aSTed Kremenek // CWE-477: Use of Obsolete Functions 477d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 478d99bd55aSTed Kremenek 479de909e49SLenny Maiorani void WalkAST::checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD) { 480c54dc951STed Kremenek if (!filter.check_getpw) 481c54dc951STed Kremenek return; 482c54dc951STed Kremenek 48357d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 484d99bd55aSTed Kremenek if (!FPT) 485d99bd55aSTed Kremenek return; 486d99bd55aSTed Kremenek 487d99bd55aSTed Kremenek // Verify that the function takes two arguments. 4889cacbabdSAlp Toker if (FPT->getNumParams() != 2) 489d99bd55aSTed Kremenek return; 490d99bd55aSTed Kremenek 491d99bd55aSTed Kremenek // Verify the first argument type is integer. 4929cacbabdSAlp Toker if (!FPT->getParamType(0)->isIntegralOrUnscopedEnumerationType()) 493d99bd55aSTed Kremenek return; 494d99bd55aSTed Kremenek 495d99bd55aSTed Kremenek // Verify the second argument type is char*. 4969cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(1)->getAs<PointerType>(); 497d99bd55aSTed Kremenek if (!PT) 498d99bd55aSTed Kremenek return; 499d99bd55aSTed Kremenek 500d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 501d99bd55aSTed Kremenek return; 502d99bd55aSTed Kremenek 503d99bd55aSTed Kremenek // Issue a warning. 504c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 505c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5064aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_getpw, 5075a10f08bSTed Kremenek "Potential buffer overflow in call to 'getpw'", 508d99bd55aSTed Kremenek "Security", 509d99bd55aSTed Kremenek "The getpw() function is dangerous as it may overflow the " 510d99bd55aSTed Kremenek "provided buffer. It is obsoleted by getpwuid().", 51142b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 512d99bd55aSTed Kremenek } 513d99bd55aSTed Kremenek 514d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 515d99bd55aSTed Kremenek // Check: Any use of 'mktemp' is insecure. It is obsoleted by mkstemp(). 516d99bd55aSTed Kremenek // CWE-377: Insecure Temporary File 517d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 518d99bd55aSTed Kremenek 519de909e49SLenny Maiorani void WalkAST::checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD) { 520afddb9c8STed Kremenek if (!filter.check_mktemp) { 521afddb9c8STed Kremenek // Fall back to the security check of looking for enough 'X's in the 522afddb9c8STed Kremenek // format string, since that is a less severe warning. 523afddb9c8STed Kremenek checkCall_mkstemp(CE, FD); 524afddb9c8STed Kremenek return; 525afddb9c8STed Kremenek } 526afddb9c8STed Kremenek 52757d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 528d99bd55aSTed Kremenek if(!FPT) 529d99bd55aSTed Kremenek return; 530d99bd55aSTed Kremenek 53170568c2bSLenny Maiorani // Verify that the function takes a single argument. 5329cacbabdSAlp Toker if (FPT->getNumParams() != 1) 533d99bd55aSTed Kremenek return; 534d99bd55aSTed Kremenek 535d99bd55aSTed Kremenek // Verify that the argument is Pointer Type. 5369cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 537d99bd55aSTed Kremenek if (!PT) 538d99bd55aSTed Kremenek return; 539d99bd55aSTed Kremenek 540d99bd55aSTed Kremenek // Verify that the argument is a 'char*'. 541d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 542d99bd55aSTed Kremenek return; 543d99bd55aSTed Kremenek 544c3f36af8SAlp Toker // Issue a warning. 545c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 546c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5474aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mktemp, 5485a10f08bSTed Kremenek "Potential insecure temporary file in call 'mktemp'", 549d99bd55aSTed Kremenek "Security", 550d99bd55aSTed Kremenek "Call to function 'mktemp' is insecure as it always " 5515a10f08bSTed Kremenek "creates or uses insecure temporary file. Use 'mkstemp' " 5525a10f08bSTed Kremenek "instead", 55342b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 554d99bd55aSTed Kremenek } 555d99bd55aSTed Kremenek 55689eaf8d5STed Kremenek 55789eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 55889eaf8d5STed Kremenek // Check: Use of 'mkstemp', 'mktemp', 'mkdtemp' should contain at least 6 X's. 55989eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 56089eaf8d5STed Kremenek 56189eaf8d5STed Kremenek void WalkAST::checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD) { 56289eaf8d5STed Kremenek if (!filter.check_mkstemp) 56389eaf8d5STed Kremenek return; 56489eaf8d5STed Kremenek 56589eaf8d5STed Kremenek StringRef Name = FD->getIdentifier()->getName(); 56689eaf8d5STed Kremenek std::pair<signed, signed> ArgSuffix = 56789eaf8d5STed Kremenek llvm::StringSwitch<std::pair<signed, signed> >(Name) 56889eaf8d5STed Kremenek .Case("mktemp", std::make_pair(0,-1)) 56989eaf8d5STed Kremenek .Case("mkstemp", std::make_pair(0,-1)) 57089eaf8d5STed Kremenek .Case("mkdtemp", std::make_pair(0,-1)) 57189eaf8d5STed Kremenek .Case("mkstemps", std::make_pair(0,1)) 57289eaf8d5STed Kremenek .Default(std::make_pair(-1, -1)); 57389eaf8d5STed Kremenek 57489eaf8d5STed Kremenek assert(ArgSuffix.first >= 0 && "Unsupported function"); 57589eaf8d5STed Kremenek 57689eaf8d5STed Kremenek // Check if the number of arguments is consistent with out expectations. 57789eaf8d5STed Kremenek unsigned numArgs = CE->getNumArgs(); 57889eaf8d5STed Kremenek if ((signed) numArgs <= ArgSuffix.first) 57989eaf8d5STed Kremenek return; 58089eaf8d5STed Kremenek 58189eaf8d5STed Kremenek const StringLiteral *strArg = 58289eaf8d5STed Kremenek dyn_cast<StringLiteral>(CE->getArg((unsigned)ArgSuffix.first) 58389eaf8d5STed Kremenek ->IgnoreParenImpCasts()); 58489eaf8d5STed Kremenek 58589eaf8d5STed Kremenek // Currently we only handle string literals. It is possible to do better, 58689eaf8d5STed Kremenek // either by looking at references to const variables, or by doing real 58789eaf8d5STed Kremenek // flow analysis. 58889eaf8d5STed Kremenek if (!strArg || strArg->getCharByteWidth() != 1) 58989eaf8d5STed Kremenek return; 59089eaf8d5STed Kremenek 59189eaf8d5STed Kremenek // Count the number of X's, taking into account a possible cutoff suffix. 59289eaf8d5STed Kremenek StringRef str = strArg->getString(); 59389eaf8d5STed Kremenek unsigned numX = 0; 59489eaf8d5STed Kremenek unsigned n = str.size(); 59589eaf8d5STed Kremenek 59689eaf8d5STed Kremenek // Take into account the suffix. 59789eaf8d5STed Kremenek unsigned suffix = 0; 59889eaf8d5STed Kremenek if (ArgSuffix.second >= 0) { 59989eaf8d5STed Kremenek const Expr *suffixEx = CE->getArg((unsigned)ArgSuffix.second); 600407659abSFangrui Song Expr::EvalResult EVResult; 601407659abSFangrui Song if (!suffixEx->EvaluateAsInt(EVResult, BR.getContext())) 60289eaf8d5STed Kremenek return; 603407659abSFangrui Song llvm::APSInt Result = EVResult.Val.getInt(); 60489eaf8d5STed Kremenek // FIXME: Issue a warning. 60589eaf8d5STed Kremenek if (Result.isNegative()) 60689eaf8d5STed Kremenek return; 60789eaf8d5STed Kremenek suffix = (unsigned) Result.getZExtValue(); 60889eaf8d5STed Kremenek n = (n > suffix) ? n - suffix : 0; 60989eaf8d5STed Kremenek } 61089eaf8d5STed Kremenek 61189eaf8d5STed Kremenek for (unsigned i = 0; i < n; ++i) 61289eaf8d5STed Kremenek if (str[i] == 'X') ++numX; 61389eaf8d5STed Kremenek 61489eaf8d5STed Kremenek if (numX >= 6) 61589eaf8d5STed Kremenek return; 61689eaf8d5STed Kremenek 61789eaf8d5STed Kremenek // Issue a warning. 61889eaf8d5STed Kremenek PathDiagnosticLocation CELoc = 61989eaf8d5STed Kremenek PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6202c1dd271SDylan Noblesmith SmallString<512> buf; 62189eaf8d5STed Kremenek llvm::raw_svector_ostream out(buf); 62289eaf8d5STed Kremenek out << "Call to '" << Name << "' should have at least 6 'X's in the" 62389eaf8d5STed Kremenek " format string to be secure (" << numX << " 'X'"; 62489eaf8d5STed Kremenek if (numX != 1) 62589eaf8d5STed Kremenek out << 's'; 62689eaf8d5STed Kremenek out << " seen"; 62789eaf8d5STed Kremenek if (suffix) { 62889eaf8d5STed Kremenek out << ", " << suffix << " character"; 62989eaf8d5STed Kremenek if (suffix > 1) 63089eaf8d5STed Kremenek out << 's'; 63189eaf8d5STed Kremenek out << " used as a suffix"; 63289eaf8d5STed Kremenek } 63389eaf8d5STed Kremenek out << ')'; 6344aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mkstemp, 6355a10f08bSTed Kremenek "Insecure temporary file creation", "Security", 63642b4248fSJordan Rose out.str(), CELoc, strArg->getSourceRange()); 63789eaf8d5STed Kremenek } 63889eaf8d5STed Kremenek 639d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 6406ffe738fSLenny Maiorani // Check: Any use of 'strcpy' is insecure. 6416ffe738fSLenny Maiorani // 6426ffe738fSLenny Maiorani // CWE-119: Improper Restriction of Operations within 6436ffe738fSLenny Maiorani // the Bounds of a Memory Buffer 6446ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 645de909e49SLenny Maiorani void WalkAST::checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD) { 646c54dc951STed Kremenek if (!filter.check_strcpy) 647c54dc951STed Kremenek return; 648c54dc951STed Kremenek 649de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 6506ffe738fSLenny Maiorani return; 6516ffe738fSLenny Maiorani 6521ebd1c4fSArtem Dergachev const auto *Target = CE->getArg(0)->IgnoreImpCasts(), 6531ebd1c4fSArtem Dergachev *Source = CE->getArg(1)->IgnoreImpCasts(); 654*e2a8eec4SGeorge Karpenkov 655*e2a8eec4SGeorge Karpenkov if (const auto *Array = dyn_cast<ConstantArrayType>(Target->getType())) { 6561ebd1c4fSArtem Dergachev uint64_t ArraySize = BR.getContext().getTypeSize(Array) / 8; 6571ebd1c4fSArtem Dergachev if (const auto *String = dyn_cast<StringLiteral>(Source)) { 6581ebd1c4fSArtem Dergachev if (ArraySize >= String->getLength() + 1) 6591ebd1c4fSArtem Dergachev return; 6601ebd1c4fSArtem Dergachev } 6611ebd1c4fSArtem Dergachev } 6621ebd1c4fSArtem Dergachev 663de909e49SLenny Maiorani // Issue a warning. 664c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 665c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6664aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 6675a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 6686ffe738fSLenny Maiorani "call 'strcpy'", 6696ffe738fSLenny Maiorani "Security", 6706ffe738fSLenny Maiorani "Call to function 'strcpy' is insecure as it does not " 6716ffe738fSLenny Maiorani "provide bounding of the memory buffer. Replace " 6726ffe738fSLenny Maiorani "unbounded copy functions with analogous functions that " 673ee5e8ae8SAnna Zaks "support length arguments such as 'strlcpy'. CWE-119.", 67442b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 6756ffe738fSLenny Maiorani } 6766ffe738fSLenny Maiorani 6776ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 678de909e49SLenny Maiorani // Check: Any use of 'strcat' is insecure. 679de909e49SLenny Maiorani // 680de909e49SLenny Maiorani // CWE-119: Improper Restriction of Operations within 681de909e49SLenny Maiorani // the Bounds of a Memory Buffer 682de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 683de909e49SLenny Maiorani void WalkAST::checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD) { 684c54dc951STed Kremenek if (!filter.check_strcpy) 685c54dc951STed Kremenek return; 686c54dc951STed Kremenek 687de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 688de909e49SLenny Maiorani return; 689de909e49SLenny Maiorani 690de909e49SLenny Maiorani // Issue a warning. 691c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 692c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6934aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 6945a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 695de909e49SLenny Maiorani "call 'strcat'", 696de909e49SLenny Maiorani "Security", 697de909e49SLenny Maiorani "Call to function 'strcat' is insecure as it does not " 698de909e49SLenny Maiorani "provide bounding of the memory buffer. Replace " 699de909e49SLenny Maiorani "unbounded copy functions with analogous functions that " 700ee5e8ae8SAnna Zaks "support length arguments such as 'strlcat'. CWE-119.", 70142b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 702de909e49SLenny Maiorani } 703de909e49SLenny Maiorani 704de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 705de909e49SLenny Maiorani // Common check for str* functions with no bounds parameters. 706de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 707de909e49SLenny Maiorani bool WalkAST::checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD) { 70857d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 709de909e49SLenny Maiorani if (!FPT) 710de909e49SLenny Maiorani return false; 711de909e49SLenny Maiorani 712de909e49SLenny Maiorani // Verify the function takes two arguments, three in the _chk version. 7139cacbabdSAlp Toker int numArgs = FPT->getNumParams(); 714de909e49SLenny Maiorani if (numArgs != 2 && numArgs != 3) 715de909e49SLenny Maiorani return false; 716de909e49SLenny Maiorani 717de909e49SLenny Maiorani // Verify the type for both arguments. 718de909e49SLenny Maiorani for (int i = 0; i < 2; i++) { 719de909e49SLenny Maiorani // Verify that the arguments are pointers. 7209cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 721de909e49SLenny Maiorani if (!PT) 722de909e49SLenny Maiorani return false; 723de909e49SLenny Maiorani 724de909e49SLenny Maiorani // Verify that the argument is a 'char*'. 725de909e49SLenny Maiorani if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 726de909e49SLenny Maiorani return false; 727de909e49SLenny Maiorani } 728de909e49SLenny Maiorani 729de909e49SLenny Maiorani return true; 730de909e49SLenny Maiorani } 731de909e49SLenny Maiorani 732de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 733d99bd55aSTed Kremenek // Check: Linear congruent random number generators should not be used 734d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 735d99bd55aSTed Kremenek // CWE-338: Use of cryptographically weak prng 736d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 737d99bd55aSTed Kremenek 738de909e49SLenny Maiorani void WalkAST::checkCall_rand(const CallExpr *CE, const FunctionDecl *FD) { 739c54dc951STed Kremenek if (!filter.check_rand || !CheckRand) 740d99bd55aSTed Kremenek return; 741d99bd55aSTed Kremenek 74257d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 743d99bd55aSTed Kremenek if (!FTP) 744d99bd55aSTed Kremenek return; 745d99bd55aSTed Kremenek 7469cacbabdSAlp Toker if (FTP->getNumParams() == 1) { 747d99bd55aSTed Kremenek // Is the argument an 'unsigned short *'? 748d99bd55aSTed Kremenek // (Actually any integer type is allowed.) 7499cacbabdSAlp Toker const PointerType *PT = FTP->getParamType(0)->getAs<PointerType>(); 750d99bd55aSTed Kremenek if (!PT) 751d99bd55aSTed Kremenek return; 752d99bd55aSTed Kremenek 75361e221f6SJordan Rose if (! PT->getPointeeType()->isIntegralOrUnscopedEnumerationType()) 754d99bd55aSTed Kremenek return; 7559cacbabdSAlp Toker } else if (FTP->getNumParams() != 0) 756d99bd55aSTed Kremenek return; 757d99bd55aSTed Kremenek 758d99bd55aSTed Kremenek // Issue a warning. 7592c1dd271SDylan Noblesmith SmallString<256> buf1; 760d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 761b89514a9SBenjamin Kramer os1 << '\'' << *FD << "' is a poor random number generator"; 762d99bd55aSTed Kremenek 7632c1dd271SDylan Noblesmith SmallString<256> buf2; 764d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 765b89514a9SBenjamin Kramer os2 << "Function '" << *FD 766d99bd55aSTed Kremenek << "' is obsolete because it implements a poor random number generator." 767d99bd55aSTed Kremenek << " Use 'arc4random' instead"; 768d99bd55aSTed Kremenek 769c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 770c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 7714aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, os1.str(), 7724aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 7734aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 774d99bd55aSTed Kremenek } 775d99bd55aSTed Kremenek 776d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 777d99bd55aSTed Kremenek // Check: 'random' should not be used 778d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 779d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 780d99bd55aSTed Kremenek 781de909e49SLenny Maiorani void WalkAST::checkCall_random(const CallExpr *CE, const FunctionDecl *FD) { 78289eaf8d5STed Kremenek if (!CheckRand || !filter.check_rand) 783d99bd55aSTed Kremenek return; 784d99bd55aSTed Kremenek 78557d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 786d99bd55aSTed Kremenek if (!FTP) 787d99bd55aSTed Kremenek return; 788d99bd55aSTed Kremenek 789d99bd55aSTed Kremenek // Verify that the function takes no argument. 7909cacbabdSAlp Toker if (FTP->getNumParams() != 0) 791d99bd55aSTed Kremenek return; 792d99bd55aSTed Kremenek 793d99bd55aSTed Kremenek // Issue a warning. 794c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 795c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 7964aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, 7975a10f08bSTed Kremenek "'random' is not a secure random number generator", 798d99bd55aSTed Kremenek "Security", 799d99bd55aSTed Kremenek "The 'random' function produces a sequence of values that " 800d99bd55aSTed Kremenek "an adversary may be able to predict. Use 'arc4random' " 80142b4248fSJordan Rose "instead", CELoc, CE->getCallee()->getSourceRange()); 802d99bd55aSTed Kremenek } 803d99bd55aSTed Kremenek 804d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 805fedf5dfcSAnna Zaks // Check: 'vfork' should not be used. 806fedf5dfcSAnna Zaks // POS33-C: Do not use vfork(). 807fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 808fedf5dfcSAnna Zaks 809fedf5dfcSAnna Zaks void WalkAST::checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD) { 810c54dc951STed Kremenek if (!filter.check_vfork) 811c54dc951STed Kremenek return; 812c54dc951STed Kremenek 813fedf5dfcSAnna Zaks // All calls to vfork() are insecure, issue a warning. 814fedf5dfcSAnna Zaks PathDiagnosticLocation CELoc = 815fedf5dfcSAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 8164aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_vfork, 8175a10f08bSTed Kremenek "Potential insecure implementation-specific behavior in " 818fedf5dfcSAnna Zaks "call 'vfork'", 819fedf5dfcSAnna Zaks "Security", 820fedf5dfcSAnna Zaks "Call to function 'vfork' is insecure as it can lead to " 821fedf5dfcSAnna Zaks "denial of service situations in the parent process. " 822fedf5dfcSAnna Zaks "Replace calls to vfork with calls to the safer " 823fedf5dfcSAnna Zaks "'posix_spawn' function", 82442b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 825fedf5dfcSAnna Zaks } 826fedf5dfcSAnna Zaks 827fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 828d99bd55aSTed Kremenek // Check: Should check whether privileges are dropped successfully. 829d99bd55aSTed Kremenek // Originally: <rdar://problem/6337132> 830d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 831d99bd55aSTed Kremenek 832de909e49SLenny Maiorani void WalkAST::checkUncheckedReturnValue(CallExpr *CE) { 83389eaf8d5STed Kremenek if (!filter.check_UncheckedReturn) 83489eaf8d5STed Kremenek return; 83589eaf8d5STed Kremenek 836d99bd55aSTed Kremenek const FunctionDecl *FD = CE->getDirectCallee(); 837d99bd55aSTed Kremenek if (!FD) 838d99bd55aSTed Kremenek return; 839d99bd55aSTed Kremenek 8400dbb783cSCraig Topper if (II_setid[0] == nullptr) { 841d99bd55aSTed Kremenek static const char * const identifiers[num_setids] = { 842d99bd55aSTed Kremenek "setuid", "setgid", "seteuid", "setegid", 843d99bd55aSTed Kremenek "setreuid", "setregid" 844d99bd55aSTed Kremenek }; 845d99bd55aSTed Kremenek 846d99bd55aSTed Kremenek for (size_t i = 0; i < num_setids; i++) 847d99bd55aSTed Kremenek II_setid[i] = &BR.getContext().Idents.get(identifiers[i]); 848d99bd55aSTed Kremenek } 849d99bd55aSTed Kremenek 850d99bd55aSTed Kremenek const IdentifierInfo *id = FD->getIdentifier(); 851d99bd55aSTed Kremenek size_t identifierid; 852d99bd55aSTed Kremenek 853d99bd55aSTed Kremenek for (identifierid = 0; identifierid < num_setids; identifierid++) 854d99bd55aSTed Kremenek if (id == II_setid[identifierid]) 855d99bd55aSTed Kremenek break; 856d99bd55aSTed Kremenek 857d99bd55aSTed Kremenek if (identifierid >= num_setids) 858d99bd55aSTed Kremenek return; 859d99bd55aSTed Kremenek 86057d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 861d99bd55aSTed Kremenek if (!FTP) 862d99bd55aSTed Kremenek return; 863d99bd55aSTed Kremenek 864d99bd55aSTed Kremenek // Verify that the function takes one or two arguments (depending on 865d99bd55aSTed Kremenek // the function). 8669cacbabdSAlp Toker if (FTP->getNumParams() != (identifierid < 4 ? 1 : 2)) 867d99bd55aSTed Kremenek return; 868d99bd55aSTed Kremenek 869d99bd55aSTed Kremenek // The arguments must be integers. 8709cacbabdSAlp Toker for (unsigned i = 0; i < FTP->getNumParams(); i++) 8719cacbabdSAlp Toker if (!FTP->getParamType(i)->isIntegralOrUnscopedEnumerationType()) 872d99bd55aSTed Kremenek return; 873d99bd55aSTed Kremenek 874d99bd55aSTed Kremenek // Issue a warning. 8752c1dd271SDylan Noblesmith SmallString<256> buf1; 876d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 877b89514a9SBenjamin Kramer os1 << "Return value is not checked in call to '" << *FD << '\''; 878d99bd55aSTed Kremenek 8792c1dd271SDylan Noblesmith SmallString<256> buf2; 880d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 881b89514a9SBenjamin Kramer os2 << "The return value from the call to '" << *FD 882b89514a9SBenjamin Kramer << "' is not checked. If an error occurs in '" << *FD 883d99bd55aSTed Kremenek << "', the following code may execute with unexpected privileges"; 884d99bd55aSTed Kremenek 885c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 886c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 8874aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_UncheckedReturn, os1.str(), 8884aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 8894aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 890d99bd55aSTed Kremenek } 891d99bd55aSTed Kremenek 892d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 893af45aca6SArgyrios Kyrtzidis // SecuritySyntaxChecker 894d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 895d99bd55aSTed Kremenek 896af45aca6SArgyrios Kyrtzidis namespace { 8976a5674ffSArgyrios Kyrtzidis class SecuritySyntaxChecker : public Checker<check::ASTCodeBody> { 898af45aca6SArgyrios Kyrtzidis public: 899c54dc951STed Kremenek ChecksFilter filter; 900c54dc951STed Kremenek 901af45aca6SArgyrios Kyrtzidis void checkASTCodeBody(const Decl *D, AnalysisManager& mgr, 902af45aca6SArgyrios Kyrtzidis BugReporter &BR) const { 903c54dc951STed Kremenek WalkAST walker(BR, mgr.getAnalysisDeclContext(D), filter); 904d99bd55aSTed Kremenek walker.Visit(D->getBody()); 905d99bd55aSTed Kremenek } 906af45aca6SArgyrios Kyrtzidis }; 907ab9db510SAlexander Kornienko } 908af45aca6SArgyrios Kyrtzidis 909c54dc951STed Kremenek #define REGISTER_CHECKER(name) \ 910c54dc951STed Kremenek void ento::register##name(CheckerManager &mgr) { \ 9114aca9b1cSAlexander Kornienko SecuritySyntaxChecker *checker = \ 9124aca9b1cSAlexander Kornienko mgr.registerChecker<SecuritySyntaxChecker>(); \ 9134aca9b1cSAlexander Kornienko checker->filter.check_##name = true; \ 9144aca9b1cSAlexander Kornienko checker->filter.checkName_##name = mgr.getCurrentCheckName(); \ 915af45aca6SArgyrios Kyrtzidis } 916c54dc951STed Kremenek 9178419cf30SArtem Dergachev REGISTER_CHECKER(bcmp) 9188419cf30SArtem Dergachev REGISTER_CHECKER(bcopy) 9198419cf30SArtem Dergachev REGISTER_CHECKER(bzero) 920c54dc951STed Kremenek REGISTER_CHECKER(gets) 921c54dc951STed Kremenek REGISTER_CHECKER(getpw) 92289eaf8d5STed Kremenek REGISTER_CHECKER(mkstemp) 923c54dc951STed Kremenek REGISTER_CHECKER(mktemp) 924c54dc951STed Kremenek REGISTER_CHECKER(strcpy) 925c54dc951STed Kremenek REGISTER_CHECKER(rand) 926c54dc951STed Kremenek REGISTER_CHECKER(vfork) 927c54dc951STed Kremenek REGISTER_CHECKER(FloatLoopCounter) 92889eaf8d5STed Kremenek REGISTER_CHECKER(UncheckedReturn) 92989eaf8d5STed Kremenek 930c54dc951STed Kremenek 931