1d99bd55aSTed Kremenek //==- CheckSecuritySyntaxOnly.cpp - Basic security checks --------*- C++ -*-==// 2d99bd55aSTed Kremenek // 3d99bd55aSTed Kremenek // The LLVM Compiler Infrastructure 4d99bd55aSTed Kremenek // 5d99bd55aSTed Kremenek // This file is distributed under the University of Illinois Open Source 6d99bd55aSTed Kremenek // License. See LICENSE.TXT for details. 7d99bd55aSTed Kremenek // 8d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 9d99bd55aSTed Kremenek // 10d99bd55aSTed Kremenek // This file defines a set of flow-insensitive security checks. 11d99bd55aSTed Kremenek // 12d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 13d99bd55aSTed Kremenek 14af45aca6SArgyrios Kyrtzidis #include "ClangSACheckers.h" 15c29bed39SAnna Zaks #include "clang/AST/StmtVisitor.h" 163a02247dSChandler Carruth #include "clang/Analysis/AnalysisContext.h" 17c29bed39SAnna Zaks #include "clang/Basic/TargetInfo.h" 18f8cbac4bSTed Kremenek #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h" 193a02247dSChandler Carruth #include "clang/StaticAnalyzer/Core/Checker.h" 20c29bed39SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h" 214903802fSBenjamin Kramer #include "llvm/ADT/SmallString.h" 22fca2e961SLenny Maiorani #include "llvm/ADT/StringSwitch.h" 23c29bed39SAnna Zaks #include "llvm/Support/raw_ostream.h" 24d99bd55aSTed Kremenek 25d99bd55aSTed Kremenek using namespace clang; 26d99bd55aSTed Kremenek using namespace ento; 27d99bd55aSTed Kremenek 28d99bd55aSTed Kremenek static bool isArc4RandomAvailable(const ASTContext &Ctx) { 29e8bbc121SDouglas Gregor const llvm::Triple &T = Ctx.getTargetInfo().getTriple(); 30d99bd55aSTed Kremenek return T.getVendor() == llvm::Triple::Apple || 31*e5bdc851SEd Schouten T.getOS() == llvm::Triple::CloudABI || 3245e84b00SDouglas Gregor T.getOS() == llvm::Triple::FreeBSD || 3345e84b00SDouglas Gregor T.getOS() == llvm::Triple::NetBSD || 3445e84b00SDouglas Gregor T.getOS() == llvm::Triple::OpenBSD || 359fa28855SEli Friedman T.getOS() == llvm::Triple::Bitrig || 3645e84b00SDouglas Gregor T.getOS() == llvm::Triple::DragonFly; 37d99bd55aSTed Kremenek } 38d99bd55aSTed Kremenek 39d99bd55aSTed Kremenek namespace { 40c54dc951STed Kremenek struct ChecksFilter { 41c54dc951STed Kremenek DefaultBool check_gets; 42c54dc951STed Kremenek DefaultBool check_getpw; 43c54dc951STed Kremenek DefaultBool check_mktemp; 4489eaf8d5STed Kremenek DefaultBool check_mkstemp; 45c54dc951STed Kremenek DefaultBool check_strcpy; 46c54dc951STed Kremenek DefaultBool check_rand; 47c54dc951STed Kremenek DefaultBool check_vfork; 48c54dc951STed Kremenek DefaultBool check_FloatLoopCounter; 4989eaf8d5STed Kremenek DefaultBool check_UncheckedReturn; 504aca9b1cSAlexander Kornienko 514aca9b1cSAlexander Kornienko CheckName checkName_gets; 524aca9b1cSAlexander Kornienko CheckName checkName_getpw; 534aca9b1cSAlexander Kornienko CheckName checkName_mktemp; 544aca9b1cSAlexander Kornienko CheckName checkName_mkstemp; 554aca9b1cSAlexander Kornienko CheckName checkName_strcpy; 564aca9b1cSAlexander Kornienko CheckName checkName_rand; 574aca9b1cSAlexander Kornienko CheckName checkName_vfork; 584aca9b1cSAlexander Kornienko CheckName checkName_FloatLoopCounter; 594aca9b1cSAlexander Kornienko CheckName checkName_UncheckedReturn; 60c54dc951STed Kremenek }; 61c54dc951STed Kremenek 62d99bd55aSTed Kremenek class WalkAST : public StmtVisitor<WalkAST> { 63d99bd55aSTed Kremenek BugReporter &BR; 6481ce1c8aSTed Kremenek AnalysisDeclContext* AC; 65d99bd55aSTed Kremenek enum { num_setids = 6 }; 66d99bd55aSTed Kremenek IdentifierInfo *II_setid[num_setids]; 67d99bd55aSTed Kremenek 68d99bd55aSTed Kremenek const bool CheckRand; 69c54dc951STed Kremenek const ChecksFilter &filter; 70d99bd55aSTed Kremenek 71d99bd55aSTed Kremenek public: 72c54dc951STed Kremenek WalkAST(BugReporter &br, AnalysisDeclContext* ac, 73c54dc951STed Kremenek const ChecksFilter &f) 74c29bed39SAnna Zaks : BR(br), AC(ac), II_setid(), 75c54dc951STed Kremenek CheckRand(isArc4RandomAvailable(BR.getContext())), 76c54dc951STed Kremenek filter(f) {} 77d99bd55aSTed Kremenek 78d99bd55aSTed Kremenek // Statement visitor methods. 79d99bd55aSTed Kremenek void VisitCallExpr(CallExpr *CE); 80d99bd55aSTed Kremenek void VisitForStmt(ForStmt *S); 81d99bd55aSTed Kremenek void VisitCompoundStmt (CompoundStmt *S); 82d99bd55aSTed Kremenek void VisitStmt(Stmt *S) { VisitChildren(S); } 83d99bd55aSTed Kremenek 84d99bd55aSTed Kremenek void VisitChildren(Stmt *S); 85d99bd55aSTed Kremenek 86d99bd55aSTed Kremenek // Helpers. 87de909e49SLenny Maiorani bool checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD); 88d99bd55aSTed Kremenek 89fca2e961SLenny Maiorani typedef void (WalkAST::*FnCheck)(const CallExpr *, 90fca2e961SLenny Maiorani const FunctionDecl *); 91fca2e961SLenny Maiorani 92d99bd55aSTed Kremenek // Checker-specific methods. 93de909e49SLenny Maiorani void checkLoopConditionForFloat(const ForStmt *FS); 94de909e49SLenny Maiorani void checkCall_gets(const CallExpr *CE, const FunctionDecl *FD); 95de909e49SLenny Maiorani void checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD); 96de909e49SLenny Maiorani void checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD); 9789eaf8d5STed Kremenek void checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD); 98de909e49SLenny Maiorani void checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD); 99de909e49SLenny Maiorani void checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD); 100de909e49SLenny Maiorani void checkCall_rand(const CallExpr *CE, const FunctionDecl *FD); 101de909e49SLenny Maiorani void checkCall_random(const CallExpr *CE, const FunctionDecl *FD); 102fedf5dfcSAnna Zaks void checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD); 103de909e49SLenny Maiorani void checkUncheckedReturnValue(CallExpr *CE); 104d99bd55aSTed Kremenek }; 105d99bd55aSTed Kremenek } // end anonymous namespace 106d99bd55aSTed Kremenek 107d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 108d99bd55aSTed Kremenek // AST walking. 109d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 110d99bd55aSTed Kremenek 111d99bd55aSTed Kremenek void WalkAST::VisitChildren(Stmt *S) { 112d99bd55aSTed Kremenek for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I) 113d99bd55aSTed Kremenek if (Stmt *child = *I) 114d99bd55aSTed Kremenek Visit(child); 115d99bd55aSTed Kremenek } 116d99bd55aSTed Kremenek 117d99bd55aSTed Kremenek void WalkAST::VisitCallExpr(CallExpr *CE) { 118fca2e961SLenny Maiorani // Get the callee. 119fca2e961SLenny Maiorani const FunctionDecl *FD = CE->getDirectCallee(); 120fca2e961SLenny Maiorani 121fca2e961SLenny Maiorani if (!FD) 122fca2e961SLenny Maiorani return; 123fca2e961SLenny Maiorani 124fca2e961SLenny Maiorani // Get the name of the callee. If it's a builtin, strip off the prefix. 125fca2e961SLenny Maiorani IdentifierInfo *II = FD->getIdentifier(); 126fca2e961SLenny Maiorani if (!II) // if no identifier, not a simple C function 127fca2e961SLenny Maiorani return; 1280e62c1ccSChris Lattner StringRef Name = II->getName(); 129fca2e961SLenny Maiorani if (Name.startswith("__builtin_")) 130fca2e961SLenny Maiorani Name = Name.substr(10); 131fca2e961SLenny Maiorani 132fca2e961SLenny Maiorani // Set the evaluation function by switching on the callee name. 133fca2e961SLenny Maiorani FnCheck evalFunction = llvm::StringSwitch<FnCheck>(Name) 134de909e49SLenny Maiorani .Case("gets", &WalkAST::checkCall_gets) 135de909e49SLenny Maiorani .Case("getpw", &WalkAST::checkCall_getpw) 136de909e49SLenny Maiorani .Case("mktemp", &WalkAST::checkCall_mktemp) 13789eaf8d5STed Kremenek .Case("mkstemp", &WalkAST::checkCall_mkstemp) 13889eaf8d5STed Kremenek .Case("mkdtemp", &WalkAST::checkCall_mkstemp) 13989eaf8d5STed Kremenek .Case("mkstemps", &WalkAST::checkCall_mkstemp) 140de909e49SLenny Maiorani .Cases("strcpy", "__strcpy_chk", &WalkAST::checkCall_strcpy) 141de909e49SLenny Maiorani .Cases("strcat", "__strcat_chk", &WalkAST::checkCall_strcat) 142de909e49SLenny Maiorani .Case("drand48", &WalkAST::checkCall_rand) 143de909e49SLenny Maiorani .Case("erand48", &WalkAST::checkCall_rand) 144de909e49SLenny Maiorani .Case("jrand48", &WalkAST::checkCall_rand) 145de909e49SLenny Maiorani .Case("lrand48", &WalkAST::checkCall_rand) 146de909e49SLenny Maiorani .Case("mrand48", &WalkAST::checkCall_rand) 147de909e49SLenny Maiorani .Case("nrand48", &WalkAST::checkCall_rand) 148de909e49SLenny Maiorani .Case("lcong48", &WalkAST::checkCall_rand) 149de909e49SLenny Maiorani .Case("rand", &WalkAST::checkCall_rand) 150de909e49SLenny Maiorani .Case("rand_r", &WalkAST::checkCall_rand) 151de909e49SLenny Maiorani .Case("random", &WalkAST::checkCall_random) 152fedf5dfcSAnna Zaks .Case("vfork", &WalkAST::checkCall_vfork) 1530dbb783cSCraig Topper .Default(nullptr); 154fca2e961SLenny Maiorani 155fca2e961SLenny Maiorani // If the callee isn't defined, it is not of security concern. 156fca2e961SLenny Maiorani // Check and evaluate the call. 157fca2e961SLenny Maiorani if (evalFunction) 158fca2e961SLenny Maiorani (this->*evalFunction)(CE, FD); 159d99bd55aSTed Kremenek 160d99bd55aSTed Kremenek // Recurse and check children. 161d99bd55aSTed Kremenek VisitChildren(CE); 162d99bd55aSTed Kremenek } 163d99bd55aSTed Kremenek 164d99bd55aSTed Kremenek void WalkAST::VisitCompoundStmt(CompoundStmt *S) { 165d99bd55aSTed Kremenek for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I) 166d99bd55aSTed Kremenek if (Stmt *child = *I) { 167d99bd55aSTed Kremenek if (CallExpr *CE = dyn_cast<CallExpr>(child)) 168de909e49SLenny Maiorani checkUncheckedReturnValue(CE); 169d99bd55aSTed Kremenek Visit(child); 170d99bd55aSTed Kremenek } 171d99bd55aSTed Kremenek } 172d99bd55aSTed Kremenek 173d99bd55aSTed Kremenek void WalkAST::VisitForStmt(ForStmt *FS) { 174de909e49SLenny Maiorani checkLoopConditionForFloat(FS); 175d99bd55aSTed Kremenek 176d99bd55aSTed Kremenek // Recurse and check children. 177d99bd55aSTed Kremenek VisitChildren(FS); 178d99bd55aSTed Kremenek } 179d99bd55aSTed Kremenek 180d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 181d99bd55aSTed Kremenek // Check: floating poing variable used as loop counter. 182d99bd55aSTed Kremenek // Originally: <rdar://problem/6336718> 183d99bd55aSTed Kremenek // Implements: CERT security coding advisory FLP-30. 184d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 185d99bd55aSTed Kremenek 186d99bd55aSTed Kremenek static const DeclRefExpr* 187de909e49SLenny Maiorani getIncrementedVar(const Expr *expr, const VarDecl *x, const VarDecl *y) { 188d99bd55aSTed Kremenek expr = expr->IgnoreParenCasts(); 189d99bd55aSTed Kremenek 190d99bd55aSTed Kremenek if (const BinaryOperator *B = dyn_cast<BinaryOperator>(expr)) { 191d99bd55aSTed Kremenek if (!(B->isAssignmentOp() || B->isCompoundAssignmentOp() || 192d99bd55aSTed Kremenek B->getOpcode() == BO_Comma)) 1930dbb783cSCraig Topper return nullptr; 194d99bd55aSTed Kremenek 195de909e49SLenny Maiorani if (const DeclRefExpr *lhs = getIncrementedVar(B->getLHS(), x, y)) 196d99bd55aSTed Kremenek return lhs; 197d99bd55aSTed Kremenek 198de909e49SLenny Maiorani if (const DeclRefExpr *rhs = getIncrementedVar(B->getRHS(), x, y)) 199d99bd55aSTed Kremenek return rhs; 200d99bd55aSTed Kremenek 2010dbb783cSCraig Topper return nullptr; 202d99bd55aSTed Kremenek } 203d99bd55aSTed Kremenek 204d99bd55aSTed Kremenek if (const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(expr)) { 205d99bd55aSTed Kremenek const NamedDecl *ND = DR->getDecl(); 2060dbb783cSCraig Topper return ND == x || ND == y ? DR : nullptr; 207d99bd55aSTed Kremenek } 208d99bd55aSTed Kremenek 209d99bd55aSTed Kremenek if (const UnaryOperator *U = dyn_cast<UnaryOperator>(expr)) 210d99bd55aSTed Kremenek return U->isIncrementDecrementOp() 2110dbb783cSCraig Topper ? getIncrementedVar(U->getSubExpr(), x, y) : nullptr; 212d99bd55aSTed Kremenek 2130dbb783cSCraig Topper return nullptr; 214d99bd55aSTed Kremenek } 215d99bd55aSTed Kremenek 216d99bd55aSTed Kremenek /// CheckLoopConditionForFloat - This check looks for 'for' statements that 217d99bd55aSTed Kremenek /// use a floating point variable as a loop counter. 218d99bd55aSTed Kremenek /// CERT: FLP30-C, FLP30-CPP. 219d99bd55aSTed Kremenek /// 220de909e49SLenny Maiorani void WalkAST::checkLoopConditionForFloat(const ForStmt *FS) { 221c54dc951STed Kremenek if (!filter.check_FloatLoopCounter) 222c54dc951STed Kremenek return; 223c54dc951STed Kremenek 224d99bd55aSTed Kremenek // Does the loop have a condition? 225d99bd55aSTed Kremenek const Expr *condition = FS->getCond(); 226d99bd55aSTed Kremenek 227d99bd55aSTed Kremenek if (!condition) 228d99bd55aSTed Kremenek return; 229d99bd55aSTed Kremenek 230d99bd55aSTed Kremenek // Does the loop have an increment? 231d99bd55aSTed Kremenek const Expr *increment = FS->getInc(); 232d99bd55aSTed Kremenek 233d99bd55aSTed Kremenek if (!increment) 234d99bd55aSTed Kremenek return; 235d99bd55aSTed Kremenek 236d99bd55aSTed Kremenek // Strip away '()' and casts. 237d99bd55aSTed Kremenek condition = condition->IgnoreParenCasts(); 238d99bd55aSTed Kremenek increment = increment->IgnoreParenCasts(); 239d99bd55aSTed Kremenek 240d99bd55aSTed Kremenek // Is the loop condition a comparison? 241d99bd55aSTed Kremenek const BinaryOperator *B = dyn_cast<BinaryOperator>(condition); 242d99bd55aSTed Kremenek 243d99bd55aSTed Kremenek if (!B) 244d99bd55aSTed Kremenek return; 245d99bd55aSTed Kremenek 246d99bd55aSTed Kremenek // Is this a comparison? 247d99bd55aSTed Kremenek if (!(B->isRelationalOp() || B->isEqualityOp())) 248d99bd55aSTed Kremenek return; 249d99bd55aSTed Kremenek 250d99bd55aSTed Kremenek // Are we comparing variables? 251d99bd55aSTed Kremenek const DeclRefExpr *drLHS = 252d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getLHS()->IgnoreParenLValueCasts()); 253d99bd55aSTed Kremenek const DeclRefExpr *drRHS = 254d99bd55aSTed Kremenek dyn_cast<DeclRefExpr>(B->getRHS()->IgnoreParenLValueCasts()); 255d99bd55aSTed Kremenek 256d99bd55aSTed Kremenek // Does at least one of the variables have a floating point type? 2570dbb783cSCraig Topper drLHS = drLHS && drLHS->getType()->isRealFloatingType() ? drLHS : nullptr; 2580dbb783cSCraig Topper drRHS = drRHS && drRHS->getType()->isRealFloatingType() ? drRHS : nullptr; 259d99bd55aSTed Kremenek 260d99bd55aSTed Kremenek if (!drLHS && !drRHS) 261d99bd55aSTed Kremenek return; 262d99bd55aSTed Kremenek 2630dbb783cSCraig Topper const VarDecl *vdLHS = drLHS ? dyn_cast<VarDecl>(drLHS->getDecl()) : nullptr; 2640dbb783cSCraig Topper const VarDecl *vdRHS = drRHS ? dyn_cast<VarDecl>(drRHS->getDecl()) : nullptr; 265d99bd55aSTed Kremenek 266d99bd55aSTed Kremenek if (!vdLHS && !vdRHS) 267d99bd55aSTed Kremenek return; 268d99bd55aSTed Kremenek 269d99bd55aSTed Kremenek // Does either variable appear in increment? 270de909e49SLenny Maiorani const DeclRefExpr *drInc = getIncrementedVar(increment, vdLHS, vdRHS); 271d99bd55aSTed Kremenek 272d99bd55aSTed Kremenek if (!drInc) 273d99bd55aSTed Kremenek return; 274d99bd55aSTed Kremenek 275d99bd55aSTed Kremenek // Emit the error. First figure out which DeclRefExpr in the condition 276d99bd55aSTed Kremenek // referenced the compared variable. 27726a3661aSTed Kremenek assert(drInc->getDecl()); 278d99bd55aSTed Kremenek const DeclRefExpr *drCond = vdLHS == drInc->getDecl() ? drLHS : drRHS; 279d99bd55aSTed Kremenek 2800e62c1ccSChris Lattner SmallVector<SourceRange, 2> ranges; 2812c1dd271SDylan Noblesmith SmallString<256> sbuf; 282d99bd55aSTed Kremenek llvm::raw_svector_ostream os(sbuf); 283d99bd55aSTed Kremenek 284d99bd55aSTed Kremenek os << "Variable '" << drCond->getDecl()->getName() 285d99bd55aSTed Kremenek << "' with floating point type '" << drCond->getType().getAsString() 286d99bd55aSTed Kremenek << "' should not be used as a loop counter"; 287d99bd55aSTed Kremenek 288d99bd55aSTed Kremenek ranges.push_back(drCond->getSourceRange()); 289d99bd55aSTed Kremenek ranges.push_back(drInc->getSourceRange()); 290d99bd55aSTed Kremenek 291d99bd55aSTed Kremenek const char *bugType = "Floating point variable used as loop counter"; 292c29bed39SAnna Zaks 293c29bed39SAnna Zaks PathDiagnosticLocation FSLoc = 294c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 2954aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_FloatLoopCounter, 2965a10f08bSTed Kremenek bugType, "Security", os.str(), 29742b4248fSJordan Rose FSLoc, ranges); 298d99bd55aSTed Kremenek } 299d99bd55aSTed Kremenek 300d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 301d99bd55aSTed Kremenek // Check: Any use of 'gets' is insecure. 302d99bd55aSTed Kremenek // Originally: <rdar://problem/6335715> 303d99bd55aSTed Kremenek // Implements (part of): 300-BSI (buildsecurityin.us-cert.gov) 304d99bd55aSTed Kremenek // CWE-242: Use of Inherently Dangerous Function 305d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 306d99bd55aSTed Kremenek 307de909e49SLenny Maiorani void WalkAST::checkCall_gets(const CallExpr *CE, const FunctionDecl *FD) { 308c54dc951STed Kremenek if (!filter.check_gets) 309c54dc951STed Kremenek return; 310c54dc951STed Kremenek 31157d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 312d99bd55aSTed Kremenek if (!FPT) 313d99bd55aSTed Kremenek return; 314d99bd55aSTed Kremenek 315d99bd55aSTed Kremenek // Verify that the function takes a single argument. 3169cacbabdSAlp Toker if (FPT->getNumParams() != 1) 317d99bd55aSTed Kremenek return; 318d99bd55aSTed Kremenek 319d99bd55aSTed Kremenek // Is the argument a 'char*'? 3209cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 321d99bd55aSTed Kremenek if (!PT) 322d99bd55aSTed Kremenek return; 323d99bd55aSTed Kremenek 324d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 325d99bd55aSTed Kremenek return; 326d99bd55aSTed Kremenek 327d99bd55aSTed Kremenek // Issue a warning. 328c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 329c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3304aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_gets, 3315a10f08bSTed Kremenek "Potential buffer overflow in call to 'gets'", 332d99bd55aSTed Kremenek "Security", 333d99bd55aSTed Kremenek "Call to function 'gets' is extremely insecure as it can " 334d99bd55aSTed Kremenek "always result in a buffer overflow", 33542b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 336d99bd55aSTed Kremenek } 337d99bd55aSTed Kremenek 338d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 339d99bd55aSTed Kremenek // Check: Any use of 'getpwd' is insecure. 340d99bd55aSTed Kremenek // CWE-477: Use of Obsolete Functions 341d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 342d99bd55aSTed Kremenek 343de909e49SLenny Maiorani void WalkAST::checkCall_getpw(const CallExpr *CE, const FunctionDecl *FD) { 344c54dc951STed Kremenek if (!filter.check_getpw) 345c54dc951STed Kremenek return; 346c54dc951STed Kremenek 34757d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 348d99bd55aSTed Kremenek if (!FPT) 349d99bd55aSTed Kremenek return; 350d99bd55aSTed Kremenek 351d99bd55aSTed Kremenek // Verify that the function takes two arguments. 3529cacbabdSAlp Toker if (FPT->getNumParams() != 2) 353d99bd55aSTed Kremenek return; 354d99bd55aSTed Kremenek 355d99bd55aSTed Kremenek // Verify the first argument type is integer. 3569cacbabdSAlp Toker if (!FPT->getParamType(0)->isIntegralOrUnscopedEnumerationType()) 357d99bd55aSTed Kremenek return; 358d99bd55aSTed Kremenek 359d99bd55aSTed Kremenek // Verify the second argument type is char*. 3609cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(1)->getAs<PointerType>(); 361d99bd55aSTed Kremenek if (!PT) 362d99bd55aSTed Kremenek return; 363d99bd55aSTed Kremenek 364d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 365d99bd55aSTed Kremenek return; 366d99bd55aSTed Kremenek 367d99bd55aSTed Kremenek // Issue a warning. 368c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 369c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 3704aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_getpw, 3715a10f08bSTed Kremenek "Potential buffer overflow in call to 'getpw'", 372d99bd55aSTed Kremenek "Security", 373d99bd55aSTed Kremenek "The getpw() function is dangerous as it may overflow the " 374d99bd55aSTed Kremenek "provided buffer. It is obsoleted by getpwuid().", 37542b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 376d99bd55aSTed Kremenek } 377d99bd55aSTed Kremenek 378d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 379d99bd55aSTed Kremenek // Check: Any use of 'mktemp' is insecure. It is obsoleted by mkstemp(). 380d99bd55aSTed Kremenek // CWE-377: Insecure Temporary File 381d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 382d99bd55aSTed Kremenek 383de909e49SLenny Maiorani void WalkAST::checkCall_mktemp(const CallExpr *CE, const FunctionDecl *FD) { 384afddb9c8STed Kremenek if (!filter.check_mktemp) { 385afddb9c8STed Kremenek // Fall back to the security check of looking for enough 'X's in the 386afddb9c8STed Kremenek // format string, since that is a less severe warning. 387afddb9c8STed Kremenek checkCall_mkstemp(CE, FD); 388afddb9c8STed Kremenek return; 389afddb9c8STed Kremenek } 390afddb9c8STed Kremenek 39157d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 392d99bd55aSTed Kremenek if(!FPT) 393d99bd55aSTed Kremenek return; 394d99bd55aSTed Kremenek 39570568c2bSLenny Maiorani // Verify that the function takes a single argument. 3969cacbabdSAlp Toker if (FPT->getNumParams() != 1) 397d99bd55aSTed Kremenek return; 398d99bd55aSTed Kremenek 399d99bd55aSTed Kremenek // Verify that the argument is Pointer Type. 4009cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(0)->getAs<PointerType>(); 401d99bd55aSTed Kremenek if (!PT) 402d99bd55aSTed Kremenek return; 403d99bd55aSTed Kremenek 404d99bd55aSTed Kremenek // Verify that the argument is a 'char*'. 405d99bd55aSTed Kremenek if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 406d99bd55aSTed Kremenek return; 407d99bd55aSTed Kremenek 408c3f36af8SAlp Toker // Issue a warning. 409c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 410c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4114aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mktemp, 4125a10f08bSTed Kremenek "Potential insecure temporary file in call 'mktemp'", 413d99bd55aSTed Kremenek "Security", 414d99bd55aSTed Kremenek "Call to function 'mktemp' is insecure as it always " 4155a10f08bSTed Kremenek "creates or uses insecure temporary file. Use 'mkstemp' " 4165a10f08bSTed Kremenek "instead", 41742b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 418d99bd55aSTed Kremenek } 419d99bd55aSTed Kremenek 42089eaf8d5STed Kremenek 42189eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 42289eaf8d5STed Kremenek // Check: Use of 'mkstemp', 'mktemp', 'mkdtemp' should contain at least 6 X's. 42389eaf8d5STed Kremenek //===----------------------------------------------------------------------===// 42489eaf8d5STed Kremenek 42589eaf8d5STed Kremenek void WalkAST::checkCall_mkstemp(const CallExpr *CE, const FunctionDecl *FD) { 42689eaf8d5STed Kremenek if (!filter.check_mkstemp) 42789eaf8d5STed Kremenek return; 42889eaf8d5STed Kremenek 42989eaf8d5STed Kremenek StringRef Name = FD->getIdentifier()->getName(); 43089eaf8d5STed Kremenek std::pair<signed, signed> ArgSuffix = 43189eaf8d5STed Kremenek llvm::StringSwitch<std::pair<signed, signed> >(Name) 43289eaf8d5STed Kremenek .Case("mktemp", std::make_pair(0,-1)) 43389eaf8d5STed Kremenek .Case("mkstemp", std::make_pair(0,-1)) 43489eaf8d5STed Kremenek .Case("mkdtemp", std::make_pair(0,-1)) 43589eaf8d5STed Kremenek .Case("mkstemps", std::make_pair(0,1)) 43689eaf8d5STed Kremenek .Default(std::make_pair(-1, -1)); 43789eaf8d5STed Kremenek 43889eaf8d5STed Kremenek assert(ArgSuffix.first >= 0 && "Unsupported function"); 43989eaf8d5STed Kremenek 44089eaf8d5STed Kremenek // Check if the number of arguments is consistent with out expectations. 44189eaf8d5STed Kremenek unsigned numArgs = CE->getNumArgs(); 44289eaf8d5STed Kremenek if ((signed) numArgs <= ArgSuffix.first) 44389eaf8d5STed Kremenek return; 44489eaf8d5STed Kremenek 44589eaf8d5STed Kremenek const StringLiteral *strArg = 44689eaf8d5STed Kremenek dyn_cast<StringLiteral>(CE->getArg((unsigned)ArgSuffix.first) 44789eaf8d5STed Kremenek ->IgnoreParenImpCasts()); 44889eaf8d5STed Kremenek 44989eaf8d5STed Kremenek // Currently we only handle string literals. It is possible to do better, 45089eaf8d5STed Kremenek // either by looking at references to const variables, or by doing real 45189eaf8d5STed Kremenek // flow analysis. 45289eaf8d5STed Kremenek if (!strArg || strArg->getCharByteWidth() != 1) 45389eaf8d5STed Kremenek return; 45489eaf8d5STed Kremenek 45589eaf8d5STed Kremenek // Count the number of X's, taking into account a possible cutoff suffix. 45689eaf8d5STed Kremenek StringRef str = strArg->getString(); 45789eaf8d5STed Kremenek unsigned numX = 0; 45889eaf8d5STed Kremenek unsigned n = str.size(); 45989eaf8d5STed Kremenek 46089eaf8d5STed Kremenek // Take into account the suffix. 46189eaf8d5STed Kremenek unsigned suffix = 0; 46289eaf8d5STed Kremenek if (ArgSuffix.second >= 0) { 46389eaf8d5STed Kremenek const Expr *suffixEx = CE->getArg((unsigned)ArgSuffix.second); 46489eaf8d5STed Kremenek llvm::APSInt Result; 46589eaf8d5STed Kremenek if (!suffixEx->EvaluateAsInt(Result, BR.getContext())) 46689eaf8d5STed Kremenek return; 46789eaf8d5STed Kremenek // FIXME: Issue a warning. 46889eaf8d5STed Kremenek if (Result.isNegative()) 46989eaf8d5STed Kremenek return; 47089eaf8d5STed Kremenek suffix = (unsigned) Result.getZExtValue(); 47189eaf8d5STed Kremenek n = (n > suffix) ? n - suffix : 0; 47289eaf8d5STed Kremenek } 47389eaf8d5STed Kremenek 47489eaf8d5STed Kremenek for (unsigned i = 0; i < n; ++i) 47589eaf8d5STed Kremenek if (str[i] == 'X') ++numX; 47689eaf8d5STed Kremenek 47789eaf8d5STed Kremenek if (numX >= 6) 47889eaf8d5STed Kremenek return; 47989eaf8d5STed Kremenek 48089eaf8d5STed Kremenek // Issue a warning. 48189eaf8d5STed Kremenek PathDiagnosticLocation CELoc = 48289eaf8d5STed Kremenek PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 4832c1dd271SDylan Noblesmith SmallString<512> buf; 48489eaf8d5STed Kremenek llvm::raw_svector_ostream out(buf); 48589eaf8d5STed Kremenek out << "Call to '" << Name << "' should have at least 6 'X's in the" 48689eaf8d5STed Kremenek " format string to be secure (" << numX << " 'X'"; 48789eaf8d5STed Kremenek if (numX != 1) 48889eaf8d5STed Kremenek out << 's'; 48989eaf8d5STed Kremenek out << " seen"; 49089eaf8d5STed Kremenek if (suffix) { 49189eaf8d5STed Kremenek out << ", " << suffix << " character"; 49289eaf8d5STed Kremenek if (suffix > 1) 49389eaf8d5STed Kremenek out << 's'; 49489eaf8d5STed Kremenek out << " used as a suffix"; 49589eaf8d5STed Kremenek } 49689eaf8d5STed Kremenek out << ')'; 4974aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_mkstemp, 4985a10f08bSTed Kremenek "Insecure temporary file creation", "Security", 49942b4248fSJordan Rose out.str(), CELoc, strArg->getSourceRange()); 50089eaf8d5STed Kremenek } 50189eaf8d5STed Kremenek 502d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 5036ffe738fSLenny Maiorani // Check: Any use of 'strcpy' is insecure. 5046ffe738fSLenny Maiorani // 5056ffe738fSLenny Maiorani // CWE-119: Improper Restriction of Operations within 5066ffe738fSLenny Maiorani // the Bounds of a Memory Buffer 5076ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 508de909e49SLenny Maiorani void WalkAST::checkCall_strcpy(const CallExpr *CE, const FunctionDecl *FD) { 509c54dc951STed Kremenek if (!filter.check_strcpy) 510c54dc951STed Kremenek return; 511c54dc951STed Kremenek 512de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 5136ffe738fSLenny Maiorani return; 5146ffe738fSLenny Maiorani 515de909e49SLenny Maiorani // Issue a warning. 516c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 517c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5184aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 5195a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 5206ffe738fSLenny Maiorani "call 'strcpy'", 5216ffe738fSLenny Maiorani "Security", 5226ffe738fSLenny Maiorani "Call to function 'strcpy' is insecure as it does not " 5236ffe738fSLenny Maiorani "provide bounding of the memory buffer. Replace " 5246ffe738fSLenny Maiorani "unbounded copy functions with analogous functions that " 525ee5e8ae8SAnna Zaks "support length arguments such as 'strlcpy'. CWE-119.", 52642b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 5276ffe738fSLenny Maiorani } 5286ffe738fSLenny Maiorani 5296ffe738fSLenny Maiorani //===----------------------------------------------------------------------===// 530de909e49SLenny Maiorani // Check: Any use of 'strcat' is insecure. 531de909e49SLenny Maiorani // 532de909e49SLenny Maiorani // CWE-119: Improper Restriction of Operations within 533de909e49SLenny Maiorani // the Bounds of a Memory Buffer 534de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 535de909e49SLenny Maiorani void WalkAST::checkCall_strcat(const CallExpr *CE, const FunctionDecl *FD) { 536c54dc951STed Kremenek if (!filter.check_strcpy) 537c54dc951STed Kremenek return; 538c54dc951STed Kremenek 539de909e49SLenny Maiorani if (!checkCall_strCommon(CE, FD)) 540de909e49SLenny Maiorani return; 541de909e49SLenny Maiorani 542de909e49SLenny Maiorani // Issue a warning. 543c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 544c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 5454aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_strcpy, 5465a10f08bSTed Kremenek "Potential insecure memory buffer bounds restriction in " 547de909e49SLenny Maiorani "call 'strcat'", 548de909e49SLenny Maiorani "Security", 549de909e49SLenny Maiorani "Call to function 'strcat' is insecure as it does not " 550de909e49SLenny Maiorani "provide bounding of the memory buffer. Replace " 551de909e49SLenny Maiorani "unbounded copy functions with analogous functions that " 552ee5e8ae8SAnna Zaks "support length arguments such as 'strlcat'. CWE-119.", 55342b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 554de909e49SLenny Maiorani } 555de909e49SLenny Maiorani 556de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 557de909e49SLenny Maiorani // Common check for str* functions with no bounds parameters. 558de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 559de909e49SLenny Maiorani bool WalkAST::checkCall_strCommon(const CallExpr *CE, const FunctionDecl *FD) { 56057d1f1c8SEli Friedman const FunctionProtoType *FPT = FD->getType()->getAs<FunctionProtoType>(); 561de909e49SLenny Maiorani if (!FPT) 562de909e49SLenny Maiorani return false; 563de909e49SLenny Maiorani 564de909e49SLenny Maiorani // Verify the function takes two arguments, three in the _chk version. 5659cacbabdSAlp Toker int numArgs = FPT->getNumParams(); 566de909e49SLenny Maiorani if (numArgs != 2 && numArgs != 3) 567de909e49SLenny Maiorani return false; 568de909e49SLenny Maiorani 569de909e49SLenny Maiorani // Verify the type for both arguments. 570de909e49SLenny Maiorani for (int i = 0; i < 2; i++) { 571de909e49SLenny Maiorani // Verify that the arguments are pointers. 5729cacbabdSAlp Toker const PointerType *PT = FPT->getParamType(i)->getAs<PointerType>(); 573de909e49SLenny Maiorani if (!PT) 574de909e49SLenny Maiorani return false; 575de909e49SLenny Maiorani 576de909e49SLenny Maiorani // Verify that the argument is a 'char*'. 577de909e49SLenny Maiorani if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 578de909e49SLenny Maiorani return false; 579de909e49SLenny Maiorani } 580de909e49SLenny Maiorani 581de909e49SLenny Maiorani return true; 582de909e49SLenny Maiorani } 583de909e49SLenny Maiorani 584de909e49SLenny Maiorani //===----------------------------------------------------------------------===// 585d99bd55aSTed Kremenek // Check: Linear congruent random number generators should not be used 586d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 587d99bd55aSTed Kremenek // CWE-338: Use of cryptographically weak prng 588d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 589d99bd55aSTed Kremenek 590de909e49SLenny Maiorani void WalkAST::checkCall_rand(const CallExpr *CE, const FunctionDecl *FD) { 591c54dc951STed Kremenek if (!filter.check_rand || !CheckRand) 592d99bd55aSTed Kremenek return; 593d99bd55aSTed Kremenek 59457d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 595d99bd55aSTed Kremenek if (!FTP) 596d99bd55aSTed Kremenek return; 597d99bd55aSTed Kremenek 5989cacbabdSAlp Toker if (FTP->getNumParams() == 1) { 599d99bd55aSTed Kremenek // Is the argument an 'unsigned short *'? 600d99bd55aSTed Kremenek // (Actually any integer type is allowed.) 6019cacbabdSAlp Toker const PointerType *PT = FTP->getParamType(0)->getAs<PointerType>(); 602d99bd55aSTed Kremenek if (!PT) 603d99bd55aSTed Kremenek return; 604d99bd55aSTed Kremenek 60561e221f6SJordan Rose if (! PT->getPointeeType()->isIntegralOrUnscopedEnumerationType()) 606d99bd55aSTed Kremenek return; 6079cacbabdSAlp Toker } else if (FTP->getNumParams() != 0) 608d99bd55aSTed Kremenek return; 609d99bd55aSTed Kremenek 610d99bd55aSTed Kremenek // Issue a warning. 6112c1dd271SDylan Noblesmith SmallString<256> buf1; 612d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 613b89514a9SBenjamin Kramer os1 << '\'' << *FD << "' is a poor random number generator"; 614d99bd55aSTed Kremenek 6152c1dd271SDylan Noblesmith SmallString<256> buf2; 616d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 617b89514a9SBenjamin Kramer os2 << "Function '" << *FD 618d99bd55aSTed Kremenek << "' is obsolete because it implements a poor random number generator." 619d99bd55aSTed Kremenek << " Use 'arc4random' instead"; 620d99bd55aSTed Kremenek 621c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 622c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6234aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, os1.str(), 6244aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 6254aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 626d99bd55aSTed Kremenek } 627d99bd55aSTed Kremenek 628d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 629d99bd55aSTed Kremenek // Check: 'random' should not be used 630d99bd55aSTed Kremenek // Originally: <rdar://problem/63371000> 631d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 632d99bd55aSTed Kremenek 633de909e49SLenny Maiorani void WalkAST::checkCall_random(const CallExpr *CE, const FunctionDecl *FD) { 63489eaf8d5STed Kremenek if (!CheckRand || !filter.check_rand) 635d99bd55aSTed Kremenek return; 636d99bd55aSTed Kremenek 63757d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 638d99bd55aSTed Kremenek if (!FTP) 639d99bd55aSTed Kremenek return; 640d99bd55aSTed Kremenek 641d99bd55aSTed Kremenek // Verify that the function takes no argument. 6429cacbabdSAlp Toker if (FTP->getNumParams() != 0) 643d99bd55aSTed Kremenek return; 644d99bd55aSTed Kremenek 645d99bd55aSTed Kremenek // Issue a warning. 646c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 647c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6484aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_rand, 6495a10f08bSTed Kremenek "'random' is not a secure random number generator", 650d99bd55aSTed Kremenek "Security", 651d99bd55aSTed Kremenek "The 'random' function produces a sequence of values that " 652d99bd55aSTed Kremenek "an adversary may be able to predict. Use 'arc4random' " 65342b4248fSJordan Rose "instead", CELoc, CE->getCallee()->getSourceRange()); 654d99bd55aSTed Kremenek } 655d99bd55aSTed Kremenek 656d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 657fedf5dfcSAnna Zaks // Check: 'vfork' should not be used. 658fedf5dfcSAnna Zaks // POS33-C: Do not use vfork(). 659fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 660fedf5dfcSAnna Zaks 661fedf5dfcSAnna Zaks void WalkAST::checkCall_vfork(const CallExpr *CE, const FunctionDecl *FD) { 662c54dc951STed Kremenek if (!filter.check_vfork) 663c54dc951STed Kremenek return; 664c54dc951STed Kremenek 665fedf5dfcSAnna Zaks // All calls to vfork() are insecure, issue a warning. 666fedf5dfcSAnna Zaks PathDiagnosticLocation CELoc = 667fedf5dfcSAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 6684aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_vfork, 6695a10f08bSTed Kremenek "Potential insecure implementation-specific behavior in " 670fedf5dfcSAnna Zaks "call 'vfork'", 671fedf5dfcSAnna Zaks "Security", 672fedf5dfcSAnna Zaks "Call to function 'vfork' is insecure as it can lead to " 673fedf5dfcSAnna Zaks "denial of service situations in the parent process. " 674fedf5dfcSAnna Zaks "Replace calls to vfork with calls to the safer " 675fedf5dfcSAnna Zaks "'posix_spawn' function", 67642b4248fSJordan Rose CELoc, CE->getCallee()->getSourceRange()); 677fedf5dfcSAnna Zaks } 678fedf5dfcSAnna Zaks 679fedf5dfcSAnna Zaks //===----------------------------------------------------------------------===// 680d99bd55aSTed Kremenek // Check: Should check whether privileges are dropped successfully. 681d99bd55aSTed Kremenek // Originally: <rdar://problem/6337132> 682d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 683d99bd55aSTed Kremenek 684de909e49SLenny Maiorani void WalkAST::checkUncheckedReturnValue(CallExpr *CE) { 68589eaf8d5STed Kremenek if (!filter.check_UncheckedReturn) 68689eaf8d5STed Kremenek return; 68789eaf8d5STed Kremenek 688d99bd55aSTed Kremenek const FunctionDecl *FD = CE->getDirectCallee(); 689d99bd55aSTed Kremenek if (!FD) 690d99bd55aSTed Kremenek return; 691d99bd55aSTed Kremenek 6920dbb783cSCraig Topper if (II_setid[0] == nullptr) { 693d99bd55aSTed Kremenek static const char * const identifiers[num_setids] = { 694d99bd55aSTed Kremenek "setuid", "setgid", "seteuid", "setegid", 695d99bd55aSTed Kremenek "setreuid", "setregid" 696d99bd55aSTed Kremenek }; 697d99bd55aSTed Kremenek 698d99bd55aSTed Kremenek for (size_t i = 0; i < num_setids; i++) 699d99bd55aSTed Kremenek II_setid[i] = &BR.getContext().Idents.get(identifiers[i]); 700d99bd55aSTed Kremenek } 701d99bd55aSTed Kremenek 702d99bd55aSTed Kremenek const IdentifierInfo *id = FD->getIdentifier(); 703d99bd55aSTed Kremenek size_t identifierid; 704d99bd55aSTed Kremenek 705d99bd55aSTed Kremenek for (identifierid = 0; identifierid < num_setids; identifierid++) 706d99bd55aSTed Kremenek if (id == II_setid[identifierid]) 707d99bd55aSTed Kremenek break; 708d99bd55aSTed Kremenek 709d99bd55aSTed Kremenek if (identifierid >= num_setids) 710d99bd55aSTed Kremenek return; 711d99bd55aSTed Kremenek 71257d1f1c8SEli Friedman const FunctionProtoType *FTP = FD->getType()->getAs<FunctionProtoType>(); 713d99bd55aSTed Kremenek if (!FTP) 714d99bd55aSTed Kremenek return; 715d99bd55aSTed Kremenek 716d99bd55aSTed Kremenek // Verify that the function takes one or two arguments (depending on 717d99bd55aSTed Kremenek // the function). 7189cacbabdSAlp Toker if (FTP->getNumParams() != (identifierid < 4 ? 1 : 2)) 719d99bd55aSTed Kremenek return; 720d99bd55aSTed Kremenek 721d99bd55aSTed Kremenek // The arguments must be integers. 7229cacbabdSAlp Toker for (unsigned i = 0; i < FTP->getNumParams(); i++) 7239cacbabdSAlp Toker if (!FTP->getParamType(i)->isIntegralOrUnscopedEnumerationType()) 724d99bd55aSTed Kremenek return; 725d99bd55aSTed Kremenek 726d99bd55aSTed Kremenek // Issue a warning. 7272c1dd271SDylan Noblesmith SmallString<256> buf1; 728d99bd55aSTed Kremenek llvm::raw_svector_ostream os1(buf1); 729b89514a9SBenjamin Kramer os1 << "Return value is not checked in call to '" << *FD << '\''; 730d99bd55aSTed Kremenek 7312c1dd271SDylan Noblesmith SmallString<256> buf2; 732d99bd55aSTed Kremenek llvm::raw_svector_ostream os2(buf2); 733b89514a9SBenjamin Kramer os2 << "The return value from the call to '" << *FD 734b89514a9SBenjamin Kramer << "' is not checked. If an error occurs in '" << *FD 735d99bd55aSTed Kremenek << "', the following code may execute with unexpected privileges"; 736d99bd55aSTed Kremenek 737c29bed39SAnna Zaks PathDiagnosticLocation CELoc = 738c29bed39SAnna Zaks PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 7394aca9b1cSAlexander Kornienko BR.EmitBasicReport(AC->getDecl(), filter.checkName_UncheckedReturn, os1.str(), 7404aca9b1cSAlexander Kornienko "Security", os2.str(), CELoc, 7414aca9b1cSAlexander Kornienko CE->getCallee()->getSourceRange()); 742d99bd55aSTed Kremenek } 743d99bd55aSTed Kremenek 744d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 745af45aca6SArgyrios Kyrtzidis // SecuritySyntaxChecker 746d99bd55aSTed Kremenek //===----------------------------------------------------------------------===// 747d99bd55aSTed Kremenek 748af45aca6SArgyrios Kyrtzidis namespace { 7496a5674ffSArgyrios Kyrtzidis class SecuritySyntaxChecker : public Checker<check::ASTCodeBody> { 750af45aca6SArgyrios Kyrtzidis public: 751c54dc951STed Kremenek ChecksFilter filter; 752c54dc951STed Kremenek 753af45aca6SArgyrios Kyrtzidis void checkASTCodeBody(const Decl *D, AnalysisManager& mgr, 754af45aca6SArgyrios Kyrtzidis BugReporter &BR) const { 755c54dc951STed Kremenek WalkAST walker(BR, mgr.getAnalysisDeclContext(D), filter); 756d99bd55aSTed Kremenek walker.Visit(D->getBody()); 757d99bd55aSTed Kremenek } 758af45aca6SArgyrios Kyrtzidis }; 759af45aca6SArgyrios Kyrtzidis } 760af45aca6SArgyrios Kyrtzidis 761c54dc951STed Kremenek #define REGISTER_CHECKER(name) \ 762c54dc951STed Kremenek void ento::register##name(CheckerManager &mgr) { \ 7634aca9b1cSAlexander Kornienko SecuritySyntaxChecker *checker = \ 7644aca9b1cSAlexander Kornienko mgr.registerChecker<SecuritySyntaxChecker>(); \ 7654aca9b1cSAlexander Kornienko checker->filter.check_##name = true; \ 7664aca9b1cSAlexander Kornienko checker->filter.checkName_##name = mgr.getCurrentCheckName(); \ 767af45aca6SArgyrios Kyrtzidis } 768c54dc951STed Kremenek 769c54dc951STed Kremenek REGISTER_CHECKER(gets) 770c54dc951STed Kremenek REGISTER_CHECKER(getpw) 77189eaf8d5STed Kremenek REGISTER_CHECKER(mkstemp) 772c54dc951STed Kremenek REGISTER_CHECKER(mktemp) 773c54dc951STed Kremenek REGISTER_CHECKER(strcpy) 774c54dc951STed Kremenek REGISTER_CHECKER(rand) 775c54dc951STed Kremenek REGISTER_CHECKER(vfork) 776c54dc951STed Kremenek REGISTER_CHECKER(FloatLoopCounter) 77789eaf8d5STed Kremenek REGISTER_CHECKER(UncheckedReturn) 77889eaf8d5STed Kremenek 779c54dc951STed Kremenek 780