xref: /freebsd-src/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/PutenvStackArrayChecker.cpp (revision 0fca6ea1d4eea4c934cfff25ac9ee8ad6fe95583)
1*0fca6ea1SDimitry Andric //== PutenvStackArrayChecker.cpp ------------------------------- -*- C++ -*--=//
2*0fca6ea1SDimitry Andric //
3*0fca6ea1SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*0fca6ea1SDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
5*0fca6ea1SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*0fca6ea1SDimitry Andric //
7*0fca6ea1SDimitry Andric //===----------------------------------------------------------------------===//
8*0fca6ea1SDimitry Andric //
9*0fca6ea1SDimitry Andric // This file defines PutenvStackArrayChecker which finds calls of ``putenv``
10*0fca6ea1SDimitry Andric // function with automatic array variable as the argument.
11*0fca6ea1SDimitry Andric // https://wiki.sei.cmu.edu/confluence/x/6NYxBQ
12*0fca6ea1SDimitry Andric //
13*0fca6ea1SDimitry Andric //===----------------------------------------------------------------------===//
14*0fca6ea1SDimitry Andric 
15*0fca6ea1SDimitry Andric #include "AllocationState.h"
16*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
17*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
18*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/Checker.h"
19*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/CheckerManager.h"
20*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
21*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
22*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
23*0fca6ea1SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/MemRegion.h"
24*0fca6ea1SDimitry Andric 
25*0fca6ea1SDimitry Andric using namespace clang;
26*0fca6ea1SDimitry Andric using namespace ento;
27*0fca6ea1SDimitry Andric 
28*0fca6ea1SDimitry Andric namespace {
29*0fca6ea1SDimitry Andric class PutenvStackArrayChecker : public Checker<check::PostCall> {
30*0fca6ea1SDimitry Andric private:
31*0fca6ea1SDimitry Andric   BugType BT{this, "'putenv' called with stack-allocated string",
32*0fca6ea1SDimitry Andric              categories::SecurityError};
33*0fca6ea1SDimitry Andric   const CallDescription Putenv{CDM::CLibrary, {"putenv"}, 1};
34*0fca6ea1SDimitry Andric 
35*0fca6ea1SDimitry Andric public:
36*0fca6ea1SDimitry Andric   void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
37*0fca6ea1SDimitry Andric };
38*0fca6ea1SDimitry Andric } // namespace
39*0fca6ea1SDimitry Andric 
40*0fca6ea1SDimitry Andric void PutenvStackArrayChecker::checkPostCall(const CallEvent &Call,
41*0fca6ea1SDimitry Andric                                             CheckerContext &C) const {
42*0fca6ea1SDimitry Andric   if (!Putenv.matches(Call))
43*0fca6ea1SDimitry Andric     return;
44*0fca6ea1SDimitry Andric 
45*0fca6ea1SDimitry Andric   SVal ArgV = Call.getArgSVal(0);
46*0fca6ea1SDimitry Andric   const Expr *ArgExpr = Call.getArgExpr(0);
47*0fca6ea1SDimitry Andric 
48*0fca6ea1SDimitry Andric   const auto *SSR =
49*0fca6ea1SDimitry Andric       dyn_cast<StackSpaceRegion>(ArgV.getAsRegion()->getMemorySpace());
50*0fca6ea1SDimitry Andric   if (!SSR)
51*0fca6ea1SDimitry Andric     return;
52*0fca6ea1SDimitry Andric   const auto *StackFrameFuncD =
53*0fca6ea1SDimitry Andric       dyn_cast_or_null<FunctionDecl>(SSR->getStackFrame()->getDecl());
54*0fca6ea1SDimitry Andric   if (StackFrameFuncD && StackFrameFuncD->isMain())
55*0fca6ea1SDimitry Andric     return;
56*0fca6ea1SDimitry Andric 
57*0fca6ea1SDimitry Andric   StringRef ErrorMsg = "The 'putenv' function should not be called with "
58*0fca6ea1SDimitry Andric                        "arrays that have automatic storage";
59*0fca6ea1SDimitry Andric   ExplodedNode *N = C.generateErrorNode();
60*0fca6ea1SDimitry Andric   auto Report = std::make_unique<PathSensitiveBugReport>(BT, ErrorMsg, N);
61*0fca6ea1SDimitry Andric 
62*0fca6ea1SDimitry Andric   // Track the argument.
63*0fca6ea1SDimitry Andric   bugreporter::trackExpressionValue(Report->getErrorNode(), ArgExpr, *Report);
64*0fca6ea1SDimitry Andric 
65*0fca6ea1SDimitry Andric   C.emitReport(std::move(Report));
66*0fca6ea1SDimitry Andric }
67*0fca6ea1SDimitry Andric 
68*0fca6ea1SDimitry Andric void ento::registerPutenvStackArray(CheckerManager &Mgr) {
69*0fca6ea1SDimitry Andric   Mgr.registerChecker<PutenvStackArrayChecker>();
70*0fca6ea1SDimitry Andric }
71*0fca6ea1SDimitry Andric 
72*0fca6ea1SDimitry Andric bool ento::shouldRegisterPutenvStackArray(const CheckerManager &) {
73*0fca6ea1SDimitry Andric   return true;
74*0fca6ea1SDimitry Andric }
75