diff options
author | Chih-Hung Hsieh <chh@google.com> | 2017-08-14 17:04:16 +0000 |
---|---|---|
committer | Chih-Hung Hsieh <chh@google.com> | 2017-08-14 17:04:16 +0000 |
commit | 56650e7fc58770fbfecfad746222da47cb208f5e (patch) | |
tree | 1f1e316c2060697275b4cd1a14d0a5237b848c5e | |
parent | 533d4c90bda5aa40a81671bbf8b059e91fb24925 (diff) | |
download | bcm5719-llvm-56650e7fc58770fbfecfad746222da47cb208f5e.tar.gz bcm5719-llvm-56650e7fc58770fbfecfad746222da47cb208f5e.zip |
[clang-tidy] Add a close-on-exec check on dup() in Android module.
Summary:
dup() is better to be replaced by fcntl() to avoid file descriptor leakage.
Differential Revision: https://reviews.llvm.org/D35364
llvm-svn: 310858
10 files changed, 145 insertions, 0 deletions
diff --git a/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp b/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp index 729047ee35e..71c6accba97 100644 --- a/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp +++ b/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp @@ -11,6 +11,7 @@ #include "../ClangTidyModule.h" #include "../ClangTidyModuleRegistry.h" #include "CloexecCreatCheck.h" +#include "CloexecDupCheck.h" #include "CloexecFopenCheck.h" #include "CloexecMemfdCreateCheck.h" #include "CloexecOpenCheck.h" @@ -27,6 +28,7 @@ class AndroidModule : public ClangTidyModule { public: void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override { CheckFactories.registerCheck<CloexecCreatCheck>("android-cloexec-creat"); + CheckFactories.registerCheck<CloexecDupCheck>("android-cloexec-dup"); CheckFactories.registerCheck<CloexecFopenCheck>("android-cloexec-fopen"); CheckFactories.registerCheck<CloexecMemfdCreateCheck>( "android-cloexec-memfd-create"); diff --git a/clang-tools-extra/clang-tidy/android/CMakeLists.txt b/clang-tools-extra/clang-tidy/android/CMakeLists.txt index a70ea8de72f..77ba18c81a6 100644 --- a/clang-tools-extra/clang-tidy/android/CMakeLists.txt +++ b/clang-tools-extra/clang-tidy/android/CMakeLists.txt @@ -4,6 +4,7 @@ add_clang_library(clangTidyAndroidModule AndroidTidyModule.cpp CloexecCheck.cpp CloexecCreatCheck.cpp + CloexecDupCheck.cpp CloexecFopenCheck.cpp CloexecMemfdCreateCheck.cpp CloexecOpenCheck.cpp diff --git a/clang-tools-extra/clang-tidy/android/CloexecCheck.cpp b/clang-tools-extra/clang-tidy/android/CloexecCheck.cpp index 9cf823a48ad..38afa137059 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecCheck.cpp +++ b/clang-tools-extra/clang-tidy/android/CloexecCheck.cpp @@ -100,6 +100,15 @@ void CloexecCheck::insertStringFlag( ReplacementText); } +StringRef CloexecCheck::getSpellingArg(const MatchFinder::MatchResult &Result, + int N) const { + const auto *MatchedCall = Result.Nodes.getNodeAs<CallExpr>(FuncBindingStr); + const SourceManager &SM = *Result.SourceManager; + return Lexer::getSourceText( + CharSourceRange::getTokenRange(MatchedCall->getArg(N)->getSourceRange()), + SM, Result.Context->getLangOpts()); +} + } // namespace android } // namespace tidy } // namespace clang diff --git a/clang-tools-extra/clang-tidy/android/CloexecCheck.h b/clang-tools-extra/clang-tidy/android/CloexecCheck.h index 9c1c1a9691f..a7a61069c02 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecCheck.h @@ -86,6 +86,10 @@ protected: /// \param ArgPos The 0-based position of the flag argument. void insertStringFlag(const ast_matchers::MatchFinder::MatchResult &Result, const char Mode, const int ArgPos); + + /// Helper function to get the spelling of a particular argument. + StringRef getSpellingArg(const ast_matchers::MatchFinder::MatchResult &Result, + int N) const; }; } // namespace android diff --git a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.cpp b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.cpp new file mode 100644 index 00000000000..ec4ff0acd85 --- /dev/null +++ b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.cpp @@ -0,0 +1,38 @@ +//===--- CloexecDupCheck.cpp - clang-tidy----------------------------------===// +// +// The LLVM Compiler Infrastructure +// +// This file is distributed under the University of Illinois Open Source +// License. See LICENSE.TXT for details. +// +//===----------------------------------------------------------------------===// + +#include "CloexecDupCheck.h" +#include "clang/AST/ASTContext.h" +#include "clang/ASTMatchers/ASTMatchFinder.h" + +using namespace clang::ast_matchers; + +namespace clang { +namespace tidy { +namespace android { + +void CloexecDupCheck::registerMatchers(MatchFinder *Finder) { + registerMatchersImpl(Finder, + functionDecl(returns(isInteger()), hasName("dup"), + hasParameter(0, hasType(isInteger())))); +} + +void CloexecDupCheck::check(const MatchFinder::MatchResult &Result) { + const std::string &ReplacementText = + (Twine("fcntl(") + getSpellingArg(Result, 0) + ", F_DUPFD_CLOEXEC)") + .str(); + + replaceFunc(Result, + "prefer fcntl() to dup() because fcntl() allows F_DUPFD_CLOEXEC", + ReplacementText); +} + +} // namespace android +} // namespace tidy +} // namespace clang diff --git a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h new file mode 100644 index 00000000000..c040b3808bb --- /dev/null +++ b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h @@ -0,0 +1,36 @@ +//===--- CloexecDupCheck.h - clang-tidy-------------------------*- C++ -*-===// +// +// The LLVM Compiler Infrastructure +// +// This file is distributed under the University of Illinois Open Source +// License. See LICENSE.TXT for details. +// +//===----------------------------------------------------------------------===// + +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_DUP_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_DUP_H + +#include "CloexecCheck.h" + +namespace clang { +namespace tidy { +namespace android { + +/// dup() is better to be replaced by fcntl(), which has close-on-exec flag. +/// Find the usage of dup() and redirect user to use fcntl(). +/// +/// For the user-facing documentation see: +/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-dup.html +class CloexecDupCheck : public CloexecCheck { +public: + CloexecDupCheck(StringRef Name, ClangTidyContext *Context) + : CloexecCheck(Name, Context) {} + void registerMatchers(ast_matchers::MatchFinder *Finder) override; + void check(const ast_matchers::MatchFinder::MatchResult &Result) override; +}; + +} // namespace android +} // namespace tidy +} // namespace clang + +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_DUP_H diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst index 870c2587ac5..377d85b79db 100644 --- a/clang-tools-extra/docs/ReleaseNotes.rst +++ b/clang-tools-extra/docs/ReleaseNotes.rst @@ -70,6 +70,11 @@ Improvements to clang-tidy ``AllowConditionalIntegerCasts`` -> ``AllowIntegerConditions``, ``AllowConditionalPointerCasts`` -> ``AllowPointerConditions``. +- New `android-cloexec-dup + <http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-dup.html>`_ check + + Detects usage of ``dup()``. + - New `android-cloexec-memfd_create <http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-memfd_create.html>`_ check diff --git a/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-dup.rst b/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-dup.rst new file mode 100644 index 00000000000..d287a657d1c --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-dup.rst @@ -0,0 +1,18 @@ +.. title:: clang-tidy - android-cloexec-dup + +android-cloexec-dup +=================== + +The usage of ``dup()`` is not recommended, it's better to use ``fcntl()``, +which can set the close-on-exec flag. Otherwise, an opened sensitive file would +remain open across a fork+exec to a lower-privileged SELinux domain. + +Examples: + +.. code-block:: c++ + + int fd = dup(oldfd); + + // becomes + + int fd = fcntl(oldfd, F_DUPFD_CLOEXEC); diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst index 1d99a4ed90e..b25495bfdae 100644 --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -5,6 +5,7 @@ Clang-Tidy Checks .. toctree:: android-cloexec-creat + android-cloexec-dup android-cloexec-fopen android-cloexec-memfd-create android-cloexec-open diff --git a/clang-tools-extra/test/clang-tidy/android-cloexec-dup.cpp b/clang-tools-extra/test/clang-tidy/android-cloexec-dup.cpp new file mode 100644 index 00000000000..f7011b8b835 --- /dev/null +++ b/clang-tools-extra/test/clang-tidy/android-cloexec-dup.cpp @@ -0,0 +1,31 @@ +// RUN: %check_clang_tidy %s android-cloexec-dup %t + +extern "C" int dup(int oldfd); +void f() { + dup(1); + // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: prefer fcntl() to dup() because fcntl() allows F_DUPFD_CLOEXEC [android-cloexec-dup] + // CHECK-FIXES: fcntl(1, F_DUPFD_CLOEXEC); + int oldfd = 0; + dup(oldfd); + // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: prefer + // CHECK-FIXES: fcntl(oldfd, F_DUPFD_CLOEXEC); +} + +namespace i { +int dup(int oldfd); +void g() { + dup(0); + int oldfd = 1; + dup(oldfd); +} +} // namespace i + +class C { +public: + int dup(int oldfd); + void h() { + dup(0); + int oldfd = 1; + dup(oldfd); + } +}; |