1 //===--- UnsafeFunctionsCheck.cpp - clang-tidy ----------------------------===//
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 #include "UnsafeFunctionsCheck.h"
10 #include "../utils/OptionsUtils.h"
11 #include "clang/AST/ASTContext.h"
12 #include "clang/ASTMatchers/ASTMatchFinder.h"
13 #include "clang/Lex/PPCallbacks.h"
14 #include "clang/Lex/Preprocessor.h"
17 using namespace clang::ast_matchers
;
20 namespace clang::tidy::bugprone
{
22 static constexpr llvm::StringLiteral OptionNameCustomFunctions
=
24 static constexpr llvm::StringLiteral OptionNameReportDefaultFunctions
=
25 "ReportDefaultFunctions";
26 static constexpr llvm::StringLiteral OptionNameReportMoreUnsafeFunctions
=
27 "ReportMoreUnsafeFunctions";
29 static constexpr llvm::StringLiteral FunctionNamesWithAnnexKReplacementId
=
30 "FunctionNamesWithAnnexKReplacement";
31 static constexpr llvm::StringLiteral FunctionNamesId
= "FunctionsNames";
32 static constexpr llvm::StringLiteral AdditionalFunctionNamesId
=
33 "AdditionalFunctionsNames";
34 static constexpr llvm::StringLiteral CustomFunctionNamesId
=
35 "CustomFunctionNames";
36 static constexpr llvm::StringLiteral DeclRefId
= "DRE";
38 static std::optional
<std::string
>
39 getAnnexKReplacementFor(StringRef FunctionName
) {
40 return StringSwitch
<std::string
>(FunctionName
)
41 .Case("strlen", "strnlen_s")
42 .Case("wcslen", "wcsnlen_s")
43 .Default((Twine
{FunctionName
} + "_s").str());
46 static StringRef
getReplacementFor(StringRef FunctionName
,
47 bool IsAnnexKAvailable
) {
48 if (IsAnnexKAvailable
) {
49 // Try to find a better replacement from Annex K first.
50 StringRef AnnexKReplacementFunction
=
51 StringSwitch
<StringRef
>(FunctionName
)
52 .Cases("asctime", "asctime_r", "asctime_s")
53 .Case("gets", "gets_s")
55 if (!AnnexKReplacementFunction
.empty())
56 return AnnexKReplacementFunction
;
59 // FIXME: Some of these functions are available in C++ under "std::", and
60 // should be matched and suggested.
61 return StringSwitch
<StringRef
>(FunctionName
)
62 .Cases("asctime", "asctime_r", "strftime")
63 .Case("gets", "fgets")
64 .Case("rewind", "fseek")
65 .Case("setbuf", "setvbuf");
68 static StringRef
getReplacementForAdditional(StringRef FunctionName
,
69 bool IsAnnexKAvailable
) {
70 if (IsAnnexKAvailable
) {
71 // Try to find a better replacement from Annex K first.
72 StringRef AnnexKReplacementFunction
= StringSwitch
<StringRef
>(FunctionName
)
73 .Case("bcopy", "memcpy_s")
74 .Case("bzero", "memset_s")
77 if (!AnnexKReplacementFunction
.empty())
78 return AnnexKReplacementFunction
;
81 return StringSwitch
<StringRef
>(FunctionName
)
82 .Case("bcmp", "memcmp")
83 .Case("bcopy", "memcpy")
84 .Case("bzero", "memset")
85 .Case("getpw", "getpwuid")
86 .Case("vfork", "posix_spawn");
89 /// \returns The rationale for replacing the function \p FunctionName with the
90 /// safer alternative.
91 static StringRef
getRationaleFor(StringRef FunctionName
) {
92 return StringSwitch
<StringRef
>(FunctionName
)
93 .Cases("asctime", "asctime_r", "ctime",
94 "is not bounds-checking and non-reentrant")
95 .Cases("bcmp", "bcopy", "bzero", "is deprecated")
96 .Cases("fopen", "freopen", "has no exclusive access to the opened file")
97 .Case("gets", "is insecure, was deprecated and removed in C11 and C++14")
98 .Case("getpw", "is dangerous as it may overflow the provided buffer")
99 .Cases("rewind", "setbuf", "has no error detection")
100 .Case("vfork", "is insecure as it can lead to denial of service "
101 "situations in the parent process")
102 .Default("is not bounds-checking");
105 /// Calculates whether Annex K is available for the current translation unit
106 /// based on the macro definitions and the language options.
108 /// The result is cached and saved in \p CacheVar.
109 static bool isAnnexKAvailable(std::optional
<bool> &CacheVar
, Preprocessor
*PP
,
110 const LangOptions
&LO
) {
111 if (CacheVar
.has_value())
115 // TODO: How is "Annex K" available in C++ mode?
116 return (CacheVar
= false).value();
118 assert(PP
&& "No Preprocessor registered.");
120 if (!PP
->isMacroDefined("__STDC_LIB_EXT1__") ||
121 !PP
->isMacroDefined("__STDC_WANT_LIB_EXT1__"))
122 return (CacheVar
= false).value();
125 PP
->getMacroInfo(PP
->getIdentifierInfo("__STDC_WANT_LIB_EXT1__"));
126 if (!MI
|| MI
->tokens_empty())
127 return (CacheVar
= false).value();
129 const Token
&T
= MI
->tokens().back();
130 if (!T
.isLiteral() || !T
.getLiteralData())
131 return (CacheVar
= false).value();
133 CacheVar
= StringRef(T
.getLiteralData(), T
.getLength()) == "1";
134 return CacheVar
.value();
137 static std::vector
<UnsafeFunctionsCheck::CheckedFunction
>
138 parseCheckedFunctions(StringRef Option
, ClangTidyContext
*Context
) {
139 const std::vector
<StringRef
> Functions
=
140 utils::options::parseStringList(Option
);
141 std::vector
<UnsafeFunctionsCheck::CheckedFunction
> Result
;
142 Result
.reserve(Functions
.size());
144 for (StringRef Function
: Functions
) {
145 if (Function
.empty())
148 const auto [Name
, Rest
] = Function
.split(',');
149 const auto [Replacement
, Reason
] = Rest
.split(',');
151 if (Name
.trim().empty()) {
152 Context
->configurationDiag("invalid configuration value for option '%0'; "
153 "expected the name of an unsafe function")
154 << OptionNameCustomFunctions
;
160 matchers::MatchesAnyListedNameMatcher::NameMatcher(Name
.trim()),
161 Replacement
.trim().str(), Reason
.trim().str()});
167 static std::string
serializeCheckedFunctions(
168 const std::vector
<UnsafeFunctionsCheck::CheckedFunction
> &Functions
) {
169 std::vector
<std::string
> Result
;
170 Result
.reserve(Functions
.size());
172 for (const auto &Entry
: Functions
) {
173 if (Entry
.Reason
.empty())
174 Result
.push_back(Entry
.Name
+ "," + Entry
.Replacement
);
176 Result
.push_back(Entry
.Name
+ "," + Entry
.Replacement
+ "," +
180 return llvm::join(Result
, ";");
183 UnsafeFunctionsCheck::UnsafeFunctionsCheck(StringRef Name
,
184 ClangTidyContext
*Context
)
185 : ClangTidyCheck(Name
, Context
),
186 CustomFunctions(parseCheckedFunctions(
187 Options
.get(OptionNameCustomFunctions
, ""), Context
)),
188 ReportDefaultFunctions(
189 Options
.get(OptionNameReportDefaultFunctions
, true)),
190 ReportMoreUnsafeFunctions(
191 Options
.get(OptionNameReportMoreUnsafeFunctions
, true)) {}
193 void UnsafeFunctionsCheck::storeOptions(ClangTidyOptions::OptionMap
&Opts
) {
194 Options
.store(Opts
, OptionNameCustomFunctions
,
195 serializeCheckedFunctions(CustomFunctions
));
196 Options
.store(Opts
, OptionNameReportDefaultFunctions
, ReportDefaultFunctions
);
197 Options
.store(Opts
, OptionNameReportMoreUnsafeFunctions
,
198 ReportMoreUnsafeFunctions
);
201 void UnsafeFunctionsCheck::registerMatchers(MatchFinder
*Finder
) {
202 if (ReportDefaultFunctions
) {
203 if (getLangOpts().C11
) {
204 // Matching functions with safe replacements only in Annex K.
205 auto FunctionNamesWithAnnexKReplacementMatcher
= hasAnyName(
206 "::bsearch", "::ctime", "::fopen", "::fprintf", "::freopen",
207 "::fscanf", "::fwprintf", "::fwscanf", "::getenv", "::gmtime",
208 "::localtime", "::mbsrtowcs", "::mbstowcs", "::memcpy", "::memmove",
209 "::memset", "::printf", "::qsort", "::scanf", "::snprintf",
210 "::sprintf", "::sscanf", "::strcat", "::strcpy", "::strerror",
211 "::strlen", "::strncat", "::strncpy", "::strtok", "::swprintf",
212 "::swscanf", "::vfprintf", "::vfscanf", "::vfwprintf", "::vfwscanf",
213 "::vprintf", "::vscanf", "::vsnprintf", "::vsprintf", "::vsscanf",
214 "::vswprintf", "::vswscanf", "::vwprintf", "::vwscanf", "::wcrtomb",
215 "::wcscat", "::wcscpy", "::wcslen", "::wcsncat", "::wcsncpy",
216 "::wcsrtombs", "::wcstok", "::wcstombs", "::wctomb", "::wmemcpy",
217 "::wmemmove", "::wprintf", "::wscanf");
219 declRefExpr(to(functionDecl(FunctionNamesWithAnnexKReplacementMatcher
)
220 .bind(FunctionNamesWithAnnexKReplacementId
)))
225 // Matching functions with replacements without Annex K.
226 auto FunctionNamesMatcher
=
227 hasAnyName("::asctime", "asctime_r", "::gets", "::rewind", "::setbuf");
230 to(functionDecl(FunctionNamesMatcher
).bind(FunctionNamesId
)))
234 if (ReportMoreUnsafeFunctions
) {
235 // Matching functions with replacements without Annex K, at user request.
236 auto AdditionalFunctionNamesMatcher
=
237 hasAnyName("::bcmp", "::bcopy", "::bzero", "::getpw", "::vfork");
239 declRefExpr(to(functionDecl(AdditionalFunctionNamesMatcher
)
240 .bind(AdditionalFunctionNamesId
)))
246 if (!CustomFunctions
.empty()) {
247 std::vector
<llvm::StringRef
> FunctionNames
;
248 FunctionNames
.reserve(CustomFunctions
.size());
250 for (const auto &Entry
: CustomFunctions
)
251 FunctionNames
.push_back(Entry
.Name
);
253 auto CustomFunctionsMatcher
= matchers::matchesAnyListedName(FunctionNames
);
255 Finder
->addMatcher(declRefExpr(to(functionDecl(CustomFunctionsMatcher
)
256 .bind(CustomFunctionNamesId
)))
262 void UnsafeFunctionsCheck::check(const MatchFinder::MatchResult
&Result
) {
263 const auto *DeclRef
= Result
.Nodes
.getNodeAs
<DeclRefExpr
>(DeclRefId
);
264 const auto *FuncDecl
= cast
<FunctionDecl
>(DeclRef
->getDecl());
265 assert(DeclRef
&& FuncDecl
&& "No valid matched node in check()");
267 // Only one of these are matched at a time.
268 const auto *AnnexK
= Result
.Nodes
.getNodeAs
<FunctionDecl
>(
269 FunctionNamesWithAnnexKReplacementId
);
270 const auto *Normal
= Result
.Nodes
.getNodeAs
<FunctionDecl
>(FunctionNamesId
);
271 const auto *Additional
=
272 Result
.Nodes
.getNodeAs
<FunctionDecl
>(AdditionalFunctionNamesId
);
274 Result
.Nodes
.getNodeAs
<FunctionDecl
>(CustomFunctionNamesId
);
275 assert((AnnexK
|| Normal
|| Additional
|| Custom
) &&
276 "No valid match category.");
278 bool AnnexKIsAvailable
=
279 isAnnexKAvailable(IsAnnexKAvailable
, PP
, getLangOpts());
280 StringRef FunctionName
= FuncDecl
->getName();
283 for (const auto &Entry
: CustomFunctions
) {
284 if (Entry
.Pattern
.match(*FuncDecl
)) {
286 Entry
.Reason
.empty() ? "is marked as unsafe" : Entry
.Reason
.c_str();
288 if (Entry
.Replacement
.empty()) {
289 diag(DeclRef
->getExprLoc(), "function %0 %1; it should not be used")
290 << FuncDecl
<< Reason
<< Entry
.Replacement
291 << DeclRef
->getSourceRange();
293 diag(DeclRef
->getExprLoc(),
294 "function %0 %1; '%2' should be used instead")
295 << FuncDecl
<< Reason
<< Entry
.Replacement
296 << DeclRef
->getSourceRange();
303 llvm_unreachable("No custom function was matched.");
307 const std::optional
<std::string
> ReplacementFunctionName
=
308 [&]() -> std::optional
<std::string
> {
310 if (AnnexKIsAvailable
)
311 return getAnnexKReplacementFor(FunctionName
);
316 return getReplacementFor(FunctionName
, AnnexKIsAvailable
).str();
319 return getReplacementForAdditional(FunctionName
, AnnexKIsAvailable
).str();
321 llvm_unreachable("Unhandled match category");
323 if (!ReplacementFunctionName
)
326 diag(DeclRef
->getExprLoc(), "function %0 %1; '%2' should be used instead")
327 << FuncDecl
<< getRationaleFor(FunctionName
)
328 << ReplacementFunctionName
.value() << DeclRef
->getSourceRange();
331 void UnsafeFunctionsCheck::registerPPCallbacks(
332 const SourceManager
&SM
, Preprocessor
*PP
,
333 Preprocessor
* /*ModuleExpanderPP*/) {
337 void UnsafeFunctionsCheck::onEndOfTranslationUnit() {
339 IsAnnexKAvailable
.reset();
342 } // namespace clang::tidy::bugprone