xref: /llvm-project/clang/lib/StaticAnalyzer/Checkers/CStringSyntaxChecker.cpp (revision 75cb0dd5ed61a2052875c23a7c1059f08f998ba4)
187b6ff09SAnna Zaks //== CStringSyntaxChecker.cpp - CoreFoundation containers API *- C++ -*-==//
287b6ff09SAnna Zaks //
387b6ff09SAnna Zaks //                     The LLVM Compiler Infrastructure
487b6ff09SAnna Zaks //
587b6ff09SAnna Zaks // This file is distributed under the University of Illinois Open Source
687b6ff09SAnna Zaks // License. See LICENSE.TXT for details.
787b6ff09SAnna Zaks //
887b6ff09SAnna Zaks //===----------------------------------------------------------------------===//
987b6ff09SAnna Zaks //
1087b6ff09SAnna Zaks // An AST checker that looks for common pitfalls when using C string APIs.
1187b6ff09SAnna Zaks //  - Identifies erroneous patterns in the last argument to strncat - the number
1287b6ff09SAnna Zaks //    of bytes to copy.
1387b6ff09SAnna Zaks //
1487b6ff09SAnna Zaks //===----------------------------------------------------------------------===//
1587b6ff09SAnna Zaks #include "ClangSACheckers.h"
1687b6ff09SAnna Zaks #include "clang/AST/Expr.h"
1787b6ff09SAnna Zaks #include "clang/AST/OperationKinds.h"
1887b6ff09SAnna Zaks #include "clang/AST/StmtVisitor.h"
1950657f6bSGeorge Karpenkov #include "clang/Analysis/AnalysisDeclContext.h"
2087b6ff09SAnna Zaks #include "clang/Basic/TargetInfo.h"
2187b6ff09SAnna Zaks #include "clang/Basic/TypeTraits.h"
2287b6ff09SAnna Zaks #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
233a02247dSChandler Carruth #include "clang/StaticAnalyzer/Core/Checker.h"
2487b6ff09SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
2587b6ff09SAnna Zaks #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
264903802fSBenjamin Kramer #include "llvm/ADT/SmallString.h"
2787b6ff09SAnna Zaks #include "llvm/Support/raw_ostream.h"
2887b6ff09SAnna Zaks 
2987b6ff09SAnna Zaks using namespace clang;
3087b6ff09SAnna Zaks using namespace ento;
3187b6ff09SAnna Zaks 
3287b6ff09SAnna Zaks namespace {
3387b6ff09SAnna Zaks class WalkAST: public StmtVisitor<WalkAST> {
344aca9b1cSAlexander Kornienko   const CheckerBase *Checker;
3587b6ff09SAnna Zaks   BugReporter &BR;
3687b6ff09SAnna Zaks   AnalysisDeclContext* AC;
3787b6ff09SAnna Zaks 
3887b6ff09SAnna Zaks   /// Check if two expressions refer to the same declaration.
393b008536SGabor Horvath   bool sameDecl(const Expr *A1, const Expr *A2) {
403b008536SGabor Horvath     if (const auto *D1 = dyn_cast<DeclRefExpr>(A1->IgnoreParenCasts()))
413b008536SGabor Horvath       if (const auto *D2 = dyn_cast<DeclRefExpr>(A2->IgnoreParenCasts()))
4287b6ff09SAnna Zaks         return D1->getDecl() == D2->getDecl();
4387b6ff09SAnna Zaks     return false;
4487b6ff09SAnna Zaks   }
4587b6ff09SAnna Zaks 
4687b6ff09SAnna Zaks   /// Check if the expression E is a sizeof(WithArg).
473b008536SGabor Horvath   bool isSizeof(const Expr *E, const Expr *WithArg) {
483b008536SGabor Horvath     if (const auto *UE = dyn_cast<UnaryExprOrTypeTraitExpr>(E))
493b008536SGabor Horvath       if (UE->getKind() == UETT_SizeOf && !UE->isArgumentType())
5087b6ff09SAnna Zaks         return sameDecl(UE->getArgumentExpr(), WithArg);
5187b6ff09SAnna Zaks     return false;
5287b6ff09SAnna Zaks   }
5387b6ff09SAnna Zaks 
5487b6ff09SAnna Zaks   /// Check if the expression E is a strlen(WithArg).
553b008536SGabor Horvath   bool isStrlen(const Expr *E, const Expr *WithArg) {
563b008536SGabor Horvath     if (const auto *CE = dyn_cast<CallExpr>(E)) {
5787b6ff09SAnna Zaks       const FunctionDecl *FD = CE->getDirectCallee();
5887b6ff09SAnna Zaks       if (!FD)
5987b6ff09SAnna Zaks         return false;
600da67479SJordan Rose       return (CheckerContext::isCLibraryFunction(FD, "strlen") &&
610da67479SJordan Rose               sameDecl(CE->getArg(0), WithArg));
6287b6ff09SAnna Zaks     }
6387b6ff09SAnna Zaks     return false;
6487b6ff09SAnna Zaks   }
6587b6ff09SAnna Zaks 
6687b6ff09SAnna Zaks   /// Check if the expression is an integer literal with value 1.
673b008536SGabor Horvath   bool isOne(const Expr *E) {
683b008536SGabor Horvath     if (const auto *IL = dyn_cast<IntegerLiteral>(E))
6987b6ff09SAnna Zaks       return (IL->getValue().isIntN(1));
7087b6ff09SAnna Zaks     return false;
7187b6ff09SAnna Zaks   }
7287b6ff09SAnna Zaks 
733b008536SGabor Horvath   StringRef getPrintableName(const Expr *E) {
743b008536SGabor Horvath     if (const auto *D = dyn_cast<DeclRefExpr>(E->IgnoreParenCasts()))
7587b6ff09SAnna Zaks       return D->getDecl()->getName();
7687b6ff09SAnna Zaks     return StringRef();
7787b6ff09SAnna Zaks   }
7887b6ff09SAnna Zaks 
7987b6ff09SAnna Zaks   /// Identify erroneous patterns in the last argument to strncat - the number
8087b6ff09SAnna Zaks   /// of bytes to copy.
8187b6ff09SAnna Zaks   bool containsBadStrncatPattern(const CallExpr *CE);
8287b6ff09SAnna Zaks 
838e75de21SDavid Carlier   /// Identify erroneous patterns in the last argument to strlcpy - the number
848e75de21SDavid Carlier   /// of bytes to copy.
858e75de21SDavid Carlier   /// The bad pattern checked is when the size is known
868e75de21SDavid Carlier   /// to be larger than the destination can handle.
878e75de21SDavid Carlier   ///   char dst[2];
888e75de21SDavid Carlier   ///   size_t cpy = 4;
898e75de21SDavid Carlier   ///   strlcpy(dst, "abcd", sizeof("abcd") - 1);
908e75de21SDavid Carlier   ///   strlcpy(dst, "abcd", 4);
912ea81639SDavid Carlier   ///   strlcpy(dst + 3, "abcd", 2);
928e75de21SDavid Carlier   ///   strlcpy(dst, "abcd", cpy);
93*75cb0dd5SDavid Carlier   /// Identify erroneous patterns in the last argument to strlcat - the number
94*75cb0dd5SDavid Carlier   /// of bytes to copy.
95*75cb0dd5SDavid Carlier   /// The bad pattern checked is when the last argument is basically
96*75cb0dd5SDavid Carlier   /// pointing to the destination buffer size or argument larger or
97*75cb0dd5SDavid Carlier   /// equal to.
98*75cb0dd5SDavid Carlier   ///   char dst[2];
99*75cb0dd5SDavid Carlier   ///   strlcat(dst, src2, sizeof(dst));
100*75cb0dd5SDavid Carlier   ///   strlcat(dst, src2, 2);
101*75cb0dd5SDavid Carlier   ///   strlcat(dst, src2, 10);
102*75cb0dd5SDavid Carlier   bool containsBadStrlcpyStrlcatPattern(const CallExpr *CE);
1038e75de21SDavid Carlier 
10487b6ff09SAnna Zaks public:
1053b008536SGabor Horvath   WalkAST(const CheckerBase *Checker, BugReporter &BR, AnalysisDeclContext *AC)
1063b008536SGabor Horvath       : Checker(Checker), BR(BR), AC(AC) {}
10787b6ff09SAnna Zaks 
10887b6ff09SAnna Zaks   // Statement visitor methods.
10987b6ff09SAnna Zaks   void VisitChildren(Stmt *S);
11087b6ff09SAnna Zaks   void VisitStmt(Stmt *S) {
11187b6ff09SAnna Zaks     VisitChildren(S);
11287b6ff09SAnna Zaks   }
11387b6ff09SAnna Zaks   void VisitCallExpr(CallExpr *CE);
11487b6ff09SAnna Zaks };
11587b6ff09SAnna Zaks } // end anonymous namespace
11687b6ff09SAnna Zaks 
11787b6ff09SAnna Zaks // The correct size argument should look like following:
11887b6ff09SAnna Zaks //   strncat(dst, src, sizeof(dst) - strlen(dest) - 1);
11987b6ff09SAnna Zaks // We look for the following anti-patterns:
12087b6ff09SAnna Zaks //   - strncat(dst, src, sizeof(dst) - strlen(dst));
12187b6ff09SAnna Zaks //   - strncat(dst, src, sizeof(dst) - 1);
12287b6ff09SAnna Zaks //   - strncat(dst, src, sizeof(dst));
12387b6ff09SAnna Zaks bool WalkAST::containsBadStrncatPattern(const CallExpr *CE) {
12460d98befSAnna Zaks   if (CE->getNumArgs() != 3)
12560d98befSAnna Zaks     return false;
12687b6ff09SAnna Zaks   const Expr *DstArg = CE->getArg(0);
12787b6ff09SAnna Zaks   const Expr *SrcArg = CE->getArg(1);
12887b6ff09SAnna Zaks   const Expr *LenArg = CE->getArg(2);
12987b6ff09SAnna Zaks 
13087b6ff09SAnna Zaks   // Identify wrong size expressions, which are commonly used instead.
1313b008536SGabor Horvath   if (const auto *BE = dyn_cast<BinaryOperator>(LenArg->IgnoreParenCasts())) {
13287b6ff09SAnna Zaks     // - sizeof(dst) - strlen(dst)
13387b6ff09SAnna Zaks     if (BE->getOpcode() == BO_Sub) {
13487b6ff09SAnna Zaks       const Expr *L = BE->getLHS();
13587b6ff09SAnna Zaks       const Expr *R = BE->getRHS();
13687b6ff09SAnna Zaks       if (isSizeof(L, DstArg) && isStrlen(R, DstArg))
13787b6ff09SAnna Zaks         return true;
13887b6ff09SAnna Zaks 
13987b6ff09SAnna Zaks       // - sizeof(dst) - 1
14087b6ff09SAnna Zaks       if (isSizeof(L, DstArg) && isOne(R->IgnoreParenCasts()))
14187b6ff09SAnna Zaks         return true;
14287b6ff09SAnna Zaks     }
14387b6ff09SAnna Zaks   }
14487b6ff09SAnna Zaks   // - sizeof(dst)
14587b6ff09SAnna Zaks   if (isSizeof(LenArg, DstArg))
14687b6ff09SAnna Zaks     return true;
14787b6ff09SAnna Zaks 
14887b6ff09SAnna Zaks   // - sizeof(src)
14987b6ff09SAnna Zaks   if (isSizeof(LenArg, SrcArg))
15087b6ff09SAnna Zaks     return true;
15187b6ff09SAnna Zaks   return false;
15287b6ff09SAnna Zaks }
15387b6ff09SAnna Zaks 
154*75cb0dd5SDavid Carlier bool WalkAST::containsBadStrlcpyStrlcatPattern(const CallExpr *CE) {
1558e75de21SDavid Carlier   if (CE->getNumArgs() != 3)
1568e75de21SDavid Carlier     return false;
157*75cb0dd5SDavid Carlier   const FunctionDecl *FD = CE->getDirectCallee();
158*75cb0dd5SDavid Carlier   bool Append = CheckerContext::isCLibraryFunction(FD, "strlcat");
1598e75de21SDavid Carlier   const Expr *DstArg = CE->getArg(0);
1608e75de21SDavid Carlier   const Expr *LenArg = CE->getArg(2);
1618e75de21SDavid Carlier 
162c30cedfcSDavid Carlier   const auto *DstArgDecl = dyn_cast<DeclRefExpr>(DstArg->IgnoreParenImpCasts());
1638e75de21SDavid Carlier   const auto *LenArgDecl = dyn_cast<DeclRefExpr>(LenArg->IgnoreParenLValueCasts());
1642ea81639SDavid Carlier   uint64_t DstOff = 0;
165*75cb0dd5SDavid Carlier   if (isSizeof(LenArg, DstArg))
166*75cb0dd5SDavid Carlier     return false;
1678e75de21SDavid Carlier   // - size_t dstlen = sizeof(dst)
1688e75de21SDavid Carlier   if (LenArgDecl) {
1698e75de21SDavid Carlier     const auto *LenArgVal = dyn_cast<VarDecl>(LenArgDecl->getDecl());
1708e75de21SDavid Carlier     if (LenArgVal->getInit())
1718e75de21SDavid Carlier       LenArg = LenArgVal->getInit();
1728e75de21SDavid Carlier   }
1738e75de21SDavid Carlier 
1748e75de21SDavid Carlier   // - integral value
1758e75de21SDavid Carlier   // We try to figure out if the last argument is possibly longer
1762ea81639SDavid Carlier   // than the destination can possibly handle if its size can be defined.
177c30cedfcSDavid Carlier   if (const auto *IL = dyn_cast<IntegerLiteral>(LenArg->IgnoreParenImpCasts())) {
1788e75de21SDavid Carlier     uint64_t ILRawVal = IL->getValue().getZExtValue();
1792ea81639SDavid Carlier 
1802ea81639SDavid Carlier     // Case when there is pointer arithmetic on the destination buffer
1812ea81639SDavid Carlier     // especially when we offset from the base decreasing the
1822ea81639SDavid Carlier     // buffer length accordingly.
1832ea81639SDavid Carlier     if (!DstArgDecl) {
1842ea81639SDavid Carlier       if (const auto *BE = dyn_cast<BinaryOperator>(DstArg->IgnoreParenImpCasts())) {
1852ea81639SDavid Carlier         DstArgDecl = dyn_cast<DeclRefExpr>(BE->getLHS()->IgnoreParenImpCasts());
1862ea81639SDavid Carlier         if (BE->getOpcode() == BO_Add) {
1872ea81639SDavid Carlier           if ((IL = dyn_cast<IntegerLiteral>(BE->getRHS()->IgnoreParenImpCasts()))) {
1882ea81639SDavid Carlier             DstOff = IL->getValue().getZExtValue();
1892ea81639SDavid Carlier           }
1902ea81639SDavid Carlier         }
1912ea81639SDavid Carlier       }
1922ea81639SDavid Carlier     }
193c30cedfcSDavid Carlier     if (DstArgDecl) {
1948e75de21SDavid Carlier       if (const auto *Buffer = dyn_cast<ConstantArrayType>(DstArgDecl->getType())) {
1958e75de21SDavid Carlier         ASTContext &C = BR.getContext();
196c30cedfcSDavid Carlier         uint64_t BufferLen = C.getTypeSize(Buffer) / 8;
197*75cb0dd5SDavid Carlier         auto RemainingBufferLen = BufferLen - DstOff;
198*75cb0dd5SDavid Carlier         if (Append) {
199*75cb0dd5SDavid Carlier           if (RemainingBufferLen <= ILRawVal)
2008e75de21SDavid Carlier             return true;
201*75cb0dd5SDavid Carlier         } else {
202*75cb0dd5SDavid Carlier           if (RemainingBufferLen < ILRawVal)
203*75cb0dd5SDavid Carlier             return true;
204*75cb0dd5SDavid Carlier         }
2058e75de21SDavid Carlier       }
2068e75de21SDavid Carlier     }
207c30cedfcSDavid Carlier   }
2088e75de21SDavid Carlier 
2098e75de21SDavid Carlier   return false;
2108e75de21SDavid Carlier }
2118e75de21SDavid Carlier 
21287b6ff09SAnna Zaks void WalkAST::VisitCallExpr(CallExpr *CE) {
21387b6ff09SAnna Zaks   const FunctionDecl *FD = CE->getDirectCallee();
21487b6ff09SAnna Zaks   if (!FD)
21587b6ff09SAnna Zaks     return;
21687b6ff09SAnna Zaks 
2170da67479SJordan Rose   if (CheckerContext::isCLibraryFunction(FD, "strncat")) {
21887b6ff09SAnna Zaks     if (containsBadStrncatPattern(CE)) {
21987b6ff09SAnna Zaks       const Expr *DstArg = CE->getArg(0);
22087b6ff09SAnna Zaks       const Expr *LenArg = CE->getArg(2);
22187b6ff09SAnna Zaks       PathDiagnosticLocation Loc =
22287b6ff09SAnna Zaks         PathDiagnosticLocation::createBegin(LenArg, BR.getSourceManager(), AC);
22387b6ff09SAnna Zaks 
22487b6ff09SAnna Zaks       StringRef DstName = getPrintableName(DstArg);
22587b6ff09SAnna Zaks 
2262c1dd271SDylan Noblesmith       SmallString<256> S;
22787b6ff09SAnna Zaks       llvm::raw_svector_ostream os(S);
22887b6ff09SAnna Zaks       os << "Potential buffer overflow. ";
22987b6ff09SAnna Zaks       if (!DstName.empty()) {
23087b6ff09SAnna Zaks         os << "Replace with 'sizeof(" << DstName << ") "
23187b6ff09SAnna Zaks               "- strlen(" << DstName <<") - 1'";
23287b6ff09SAnna Zaks         os << " or u";
23387b6ff09SAnna Zaks       } else
23487b6ff09SAnna Zaks         os << "U";
23587b6ff09SAnna Zaks       os << "se a safer 'strlcat' API";
23687b6ff09SAnna Zaks 
2374aca9b1cSAlexander Kornienko       BR.EmitBasicReport(FD, Checker, "Anti-pattern in the argument",
2384aca9b1cSAlexander Kornienko                          "C String API", os.str(), Loc,
2394aca9b1cSAlexander Kornienko                          LenArg->getSourceRange());
24087b6ff09SAnna Zaks     }
241*75cb0dd5SDavid Carlier   } else if (CheckerContext::isCLibraryFunction(FD, "strlcpy") ||
242*75cb0dd5SDavid Carlier              CheckerContext::isCLibraryFunction(FD, "strlcat")) {
243*75cb0dd5SDavid Carlier     if (containsBadStrlcpyStrlcatPattern(CE)) {
2448e75de21SDavid Carlier       const Expr *DstArg = CE->getArg(0);
2458e75de21SDavid Carlier       const Expr *LenArg = CE->getArg(2);
2468e75de21SDavid Carlier       PathDiagnosticLocation Loc =
2478e75de21SDavid Carlier         PathDiagnosticLocation::createBegin(LenArg, BR.getSourceManager(), AC);
2488e75de21SDavid Carlier 
2498e75de21SDavid Carlier       StringRef DstName = getPrintableName(DstArg);
2508e75de21SDavid Carlier 
2518e75de21SDavid Carlier       SmallString<256> S;
2528e75de21SDavid Carlier       llvm::raw_svector_ostream os(S);
253*75cb0dd5SDavid Carlier       os << "The third argument allows to potentially copy more bytes than it should. ";
254*75cb0dd5SDavid Carlier       os << "Replace with the value ";
2558e75de21SDavid Carlier       if (!DstName.empty())
256*75cb0dd5SDavid Carlier           os << "sizeof(" << DstName << ")";
257*75cb0dd5SDavid Carlier       else
258*75cb0dd5SDavid Carlier           os << "sizeof(<destination buffer>)";
259*75cb0dd5SDavid Carlier       os << " or lower";
2608e75de21SDavid Carlier 
2618e75de21SDavid Carlier       BR.EmitBasicReport(FD, Checker, "Anti-pattern in the argument",
2628e75de21SDavid Carlier               "C String API", os.str(), Loc,
2638e75de21SDavid Carlier               LenArg->getSourceRange());
2648e75de21SDavid Carlier     }
26587b6ff09SAnna Zaks   }
26687b6ff09SAnna Zaks 
26787b6ff09SAnna Zaks   // Recurse and check children.
26887b6ff09SAnna Zaks   VisitChildren(CE);
26987b6ff09SAnna Zaks }
27087b6ff09SAnna Zaks 
27187b6ff09SAnna Zaks void WalkAST::VisitChildren(Stmt *S) {
272973431b2SBenjamin Kramer   for (Stmt *Child : S->children())
273973431b2SBenjamin Kramer     if (Child)
274973431b2SBenjamin Kramer       Visit(Child);
27587b6ff09SAnna Zaks }
27687b6ff09SAnna Zaks 
27787b6ff09SAnna Zaks namespace {
27887b6ff09SAnna Zaks class CStringSyntaxChecker: public Checker<check::ASTCodeBody> {
27987b6ff09SAnna Zaks public:
28087b6ff09SAnna Zaks 
28187b6ff09SAnna Zaks   void checkASTCodeBody(const Decl *D, AnalysisManager& Mgr,
28287b6ff09SAnna Zaks       BugReporter &BR) const {
2834aca9b1cSAlexander Kornienko     WalkAST walker(this, BR, Mgr.getAnalysisDeclContext(D));
28487b6ff09SAnna Zaks     walker.Visit(D->getBody());
28587b6ff09SAnna Zaks   }
28687b6ff09SAnna Zaks };
287ab9db510SAlexander Kornienko }
28887b6ff09SAnna Zaks 
28987b6ff09SAnna Zaks void ento::registerCStringSyntaxChecker(CheckerManager &mgr) {
29087b6ff09SAnna Zaks   mgr.registerChecker<CStringSyntaxChecker>();
29187b6ff09SAnna Zaks }
29287b6ff09SAnna Zaks 
293