428 lines
12 KiB
C++
428 lines
12 KiB
C++
//===--- SignalHandlerCheck.cpp - clang-tidy ------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "SignalHandlerCheck.h"
|
|
#include "clang/ASTMatchers/ASTMatchFinder.h"
|
|
#include "llvm/ADT/DepthFirstIterator.h"
|
|
#include "llvm/ADT/STLExtras.h"
|
|
|
|
using namespace clang::ast_matchers;
|
|
|
|
namespace clang {
|
|
namespace tidy {
|
|
|
|
template <>
|
|
struct OptionEnumMapping<
|
|
bugprone::SignalHandlerCheck::AsyncSafeFunctionSetType> {
|
|
static llvm::ArrayRef<std::pair<
|
|
bugprone::SignalHandlerCheck::AsyncSafeFunctionSetType, StringRef>>
|
|
getEnumMapping() {
|
|
static constexpr std::pair<
|
|
bugprone::SignalHandlerCheck::AsyncSafeFunctionSetType, StringRef>
|
|
Mapping[] = {
|
|
{bugprone::SignalHandlerCheck::AsyncSafeFunctionSetType::Minimal,
|
|
"minimal"},
|
|
{bugprone::SignalHandlerCheck::AsyncSafeFunctionSetType::POSIX,
|
|
"POSIX"},
|
|
};
|
|
return makeArrayRef(Mapping);
|
|
}
|
|
};
|
|
|
|
namespace bugprone {
|
|
|
|
namespace {
|
|
|
|
bool isSystemCall(const FunctionDecl *FD) {
|
|
// Find a possible redeclaration in system header.
|
|
// FIXME: Looking at the canonical declaration is not the most exact way
|
|
// to do this.
|
|
|
|
// Most common case will be inclusion directly from a header.
|
|
// This works fine by using canonical declaration.
|
|
// a.c
|
|
// #include <sysheader.h>
|
|
|
|
// Next most common case will be extern declaration.
|
|
// Can't catch this with either approach.
|
|
// b.c
|
|
// extern void sysfunc(void);
|
|
|
|
// Canonical declaration is the first found declaration, so this works.
|
|
// c.c
|
|
// #include <sysheader.h>
|
|
// extern void sysfunc(void); // redecl won't matter
|
|
|
|
// This does not work with canonical declaration.
|
|
// Probably this is not a frequently used case but may happen (the first
|
|
// declaration can be in a non-system header for example).
|
|
// d.c
|
|
// extern void sysfunc(void); // Canonical declaration, not in system header.
|
|
// #include <sysheader.h>
|
|
|
|
return FD->getASTContext().getSourceManager().isInSystemHeader(
|
|
FD->getCanonicalDecl()->getLocation());
|
|
}
|
|
|
|
/// Given a call graph node of a function and another one that is called from
|
|
/// this function, get a CallExpr of the corresponding function call.
|
|
/// It is unspecified which call is found if multiple calls exist, but the order
|
|
/// should be deterministic (depend only on the AST).
|
|
Expr *findCallExpr(const CallGraphNode *Caller, const CallGraphNode *Callee) {
|
|
auto FoundCallee = llvm::find_if(
|
|
Caller->callees(), [Callee](const CallGraphNode::CallRecord &Call) {
|
|
return Call.Callee == Callee;
|
|
});
|
|
assert(FoundCallee != Caller->end() &&
|
|
"Callee should be called from the caller function here.");
|
|
return FoundCallee->CallExpr;
|
|
}
|
|
|
|
} // namespace
|
|
|
|
AST_MATCHER(FunctionDecl, isSystemCall) { return isSystemCall(&Node); }
|
|
|
|
SignalHandlerCheck::SignalHandlerCheck(StringRef Name,
|
|
ClangTidyContext *Context)
|
|
: ClangTidyCheck(Name, Context),
|
|
AsyncSafeFunctionSet(
|
|
Options.get("AsyncSafeFunctionSet", AsyncSafeFunctionSetType::POSIX)),
|
|
ConformingFunctions(AsyncSafeFunctionSet ==
|
|
AsyncSafeFunctionSetType::Minimal
|
|
? MinimalConformingFunctions
|
|
: POSIXConformingFunctions) {}
|
|
|
|
void SignalHandlerCheck::storeOptions(ClangTidyOptions::OptionMap &Opts) {
|
|
Options.store(Opts, "AsyncSafeFunctionSet", AsyncSafeFunctionSet);
|
|
}
|
|
|
|
bool SignalHandlerCheck::isLanguageVersionSupported(
|
|
const LangOptions &LangOpts) const {
|
|
// FIXME: Make the checker useful on C++ code.
|
|
if (LangOpts.CPlusPlus)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
void SignalHandlerCheck::registerMatchers(MatchFinder *Finder) {
|
|
auto SignalFunction = functionDecl(hasAnyName("::signal", "::std::signal"),
|
|
parameterCountIs(2), isSystemCall());
|
|
auto HandlerExpr =
|
|
declRefExpr(hasDeclaration(functionDecl().bind("handler_decl")),
|
|
unless(isExpandedFromMacro("SIG_IGN")),
|
|
unless(isExpandedFromMacro("SIG_DFL")))
|
|
.bind("handler_expr");
|
|
Finder->addMatcher(
|
|
callExpr(callee(SignalFunction), hasArgument(1, HandlerExpr))
|
|
.bind("register_call"),
|
|
this);
|
|
}
|
|
|
|
void SignalHandlerCheck::check(const MatchFinder::MatchResult &Result) {
|
|
const auto *SignalCall = Result.Nodes.getNodeAs<CallExpr>("register_call");
|
|
const auto *HandlerDecl =
|
|
Result.Nodes.getNodeAs<FunctionDecl>("handler_decl");
|
|
const auto *HandlerExpr = Result.Nodes.getNodeAs<DeclRefExpr>("handler_expr");
|
|
assert(SignalCall && HandlerDecl && HandlerExpr &&
|
|
"All of these should exist in a match here.");
|
|
|
|
if (CG.size() <= 1) {
|
|
// Call graph must be populated with the entire TU at the beginning.
|
|
// (It is possible to add a single function but the functions called from it
|
|
// are not analysed in this case.)
|
|
CG.addToCallGraph(const_cast<TranslationUnitDecl *>(
|
|
HandlerDecl->getTranslationUnitDecl()));
|
|
assert(CG.size() > 1 &&
|
|
"There should be at least one function added to call graph.");
|
|
}
|
|
|
|
// Check for special case when the signal handler itself is an unsafe external
|
|
// function.
|
|
if (!isFunctionAsyncSafe(HandlerDecl)) {
|
|
reportBug(HandlerDecl, HandlerExpr, /*DirectHandler=*/true);
|
|
return;
|
|
}
|
|
|
|
CallGraphNode *HandlerNode = CG.getNode(HandlerDecl);
|
|
// Signal handler can be external but not unsafe, no call graph in this case.
|
|
if (!HandlerNode)
|
|
return;
|
|
// Start from signal handler and visit every function call.
|
|
for (auto Itr = llvm::df_begin(HandlerNode), ItrE = llvm::df_end(HandlerNode);
|
|
Itr != ItrE; ++Itr) {
|
|
const auto *CallF = dyn_cast<FunctionDecl>((*Itr)->getDecl());
|
|
if (CallF && !isFunctionAsyncSafe(CallF)) {
|
|
assert(Itr.getPathLength() >= 2);
|
|
reportBug(CallF, findCallExpr(Itr.getPath(Itr.getPathLength() - 2), *Itr),
|
|
/*DirectHandler=*/false);
|
|
reportHandlerCommon(Itr, SignalCall, HandlerDecl, HandlerExpr);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool SignalHandlerCheck::isFunctionAsyncSafe(const FunctionDecl *FD) const {
|
|
if (isSystemCall(FD))
|
|
return isSystemCallAsyncSafe(FD);
|
|
// For external (not checkable) functions assume that these are unsafe.
|
|
return FD->hasBody();
|
|
}
|
|
|
|
bool SignalHandlerCheck::isSystemCallAsyncSafe(const FunctionDecl *FD) const {
|
|
const IdentifierInfo *II = FD->getIdentifier();
|
|
// Unnamed functions are not explicitly allowed.
|
|
if (!II)
|
|
return false;
|
|
|
|
// FIXME: Improve for C++ (check for namespace).
|
|
if (ConformingFunctions.count(II->getName()))
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
void SignalHandlerCheck::reportBug(const FunctionDecl *CalledFunction,
|
|
const Expr *CallOrRef, bool DirectHandler) {
|
|
diag(CallOrRef->getBeginLoc(),
|
|
"%0 may not be asynchronous-safe; %select{calling it from|using it as}1 "
|
|
"a signal handler may be dangerous")
|
|
<< CalledFunction << DirectHandler;
|
|
}
|
|
|
|
void SignalHandlerCheck::reportHandlerCommon(
|
|
llvm::df_iterator<clang::CallGraphNode *> Itr, const CallExpr *SignalCall,
|
|
const FunctionDecl *HandlerDecl, const Expr *HandlerRef) {
|
|
int CallLevel = Itr.getPathLength() - 2;
|
|
assert(CallLevel >= -1 && "Empty iterator?");
|
|
|
|
const CallGraphNode *Caller = Itr.getPath(CallLevel + 1), *Callee = nullptr;
|
|
while (CallLevel >= 0) {
|
|
Callee = Caller;
|
|
Caller = Itr.getPath(CallLevel);
|
|
const Expr *CE = findCallExpr(Caller, Callee);
|
|
diag(CE->getBeginLoc(), "function %0 called here from %1",
|
|
DiagnosticIDs::Note)
|
|
<< cast<FunctionDecl>(Callee->getDecl())
|
|
<< cast<FunctionDecl>(Caller->getDecl());
|
|
--CallLevel;
|
|
}
|
|
|
|
diag(HandlerRef->getBeginLoc(),
|
|
"function %0 registered here as signal handler", DiagnosticIDs::Note)
|
|
<< HandlerDecl;
|
|
}
|
|
|
|
// This is the minimal set of safe functions.
|
|
// https://wiki.sei.cmu.edu/confluence/display/c/SIG30-C.+Call+only+asynchronous-safe+functions+within+signal+handlers
|
|
llvm::StringSet<> SignalHandlerCheck::MinimalConformingFunctions{
|
|
"signal", "abort", "_Exit", "quick_exit"};
|
|
|
|
// The POSIX-defined set of safe functions.
|
|
// https://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04_03
|
|
// 'quick_exit' is added to the set additionally because it looks like the
|
|
// mentioned POSIX specification was not updated after 'quick_exit' appeared
|
|
// in the C11 standard.
|
|
// Also, we want to keep the "minimal set" a subset of the "POSIX set".
|
|
llvm::StringSet<> SignalHandlerCheck::POSIXConformingFunctions{
|
|
"_Exit",
|
|
"_exit",
|
|
"abort",
|
|
"accept",
|
|
"access",
|
|
"aio_error",
|
|
"aio_return",
|
|
"aio_suspend",
|
|
"alarm",
|
|
"bind",
|
|
"cfgetispeed",
|
|
"cfgetospeed",
|
|
"cfsetispeed",
|
|
"cfsetospeed",
|
|
"chdir",
|
|
"chmod",
|
|
"chown",
|
|
"clock_gettime",
|
|
"close",
|
|
"connect",
|
|
"creat",
|
|
"dup",
|
|
"dup2",
|
|
"execl",
|
|
"execle",
|
|
"execv",
|
|
"execve",
|
|
"faccessat",
|
|
"fchdir",
|
|
"fchmod",
|
|
"fchmodat",
|
|
"fchown",
|
|
"fchownat",
|
|
"fcntl",
|
|
"fdatasync",
|
|
"fexecve",
|
|
"ffs",
|
|
"fork",
|
|
"fstat",
|
|
"fstatat",
|
|
"fsync",
|
|
"ftruncate",
|
|
"futimens",
|
|
"getegid",
|
|
"geteuid",
|
|
"getgid",
|
|
"getgroups",
|
|
"getpeername",
|
|
"getpgrp",
|
|
"getpid",
|
|
"getppid",
|
|
"getsockname",
|
|
"getsockopt",
|
|
"getuid",
|
|
"htonl",
|
|
"htons",
|
|
"kill",
|
|
"link",
|
|
"linkat",
|
|
"listen",
|
|
"longjmp",
|
|
"lseek",
|
|
"lstat",
|
|
"memccpy",
|
|
"memchr",
|
|
"memcmp",
|
|
"memcpy",
|
|
"memmove",
|
|
"memset",
|
|
"mkdir",
|
|
"mkdirat",
|
|
"mkfifo",
|
|
"mkfifoat",
|
|
"mknod",
|
|
"mknodat",
|
|
"ntohl",
|
|
"ntohs",
|
|
"open",
|
|
"openat",
|
|
"pause",
|
|
"pipe",
|
|
"poll",
|
|
"posix_trace_event",
|
|
"pselect",
|
|
"pthread_kill",
|
|
"pthread_self",
|
|
"pthread_sigmask",
|
|
"quick_exit",
|
|
"raise",
|
|
"read",
|
|
"readlink",
|
|
"readlinkat",
|
|
"recv",
|
|
"recvfrom",
|
|
"recvmsg",
|
|
"rename",
|
|
"renameat",
|
|
"rmdir",
|
|
"select",
|
|
"sem_post",
|
|
"send",
|
|
"sendmsg",
|
|
"sendto",
|
|
"setgid",
|
|
"setpgid",
|
|
"setsid",
|
|
"setsockopt",
|
|
"setuid",
|
|
"shutdown",
|
|
"sigaction",
|
|
"sigaddset",
|
|
"sigdelset",
|
|
"sigemptyset",
|
|
"sigfillset",
|
|
"sigismember",
|
|
"siglongjmp",
|
|
"signal",
|
|
"sigpause",
|
|
"sigpending",
|
|
"sigprocmask",
|
|
"sigqueue",
|
|
"sigset",
|
|
"sigsuspend",
|
|
"sleep",
|
|
"sockatmark",
|
|
"socket",
|
|
"socketpair",
|
|
"stat",
|
|
"stpcpy",
|
|
"stpncpy",
|
|
"strcat",
|
|
"strchr",
|
|
"strcmp",
|
|
"strcpy",
|
|
"strcspn",
|
|
"strlen",
|
|
"strncat",
|
|
"strncmp",
|
|
"strncpy",
|
|
"strnlen",
|
|
"strpbrk",
|
|
"strrchr",
|
|
"strspn",
|
|
"strstr",
|
|
"strtok_r",
|
|
"symlink",
|
|
"symlinkat",
|
|
"tcdrain",
|
|
"tcflow",
|
|
"tcflush",
|
|
"tcgetattr",
|
|
"tcgetpgrp",
|
|
"tcsendbreak",
|
|
"tcsetattr",
|
|
"tcsetpgrp",
|
|
"time",
|
|
"timer_getoverrun",
|
|
"timer_gettime",
|
|
"timer_settime",
|
|
"times",
|
|
"umask",
|
|
"uname",
|
|
"unlink",
|
|
"unlinkat",
|
|
"utime",
|
|
"utimensat",
|
|
"utimes",
|
|
"wait",
|
|
"waitpid",
|
|
"wcpcpy",
|
|
"wcpncpy",
|
|
"wcscat",
|
|
"wcschr",
|
|
"wcscmp",
|
|
"wcscpy",
|
|
"wcscspn",
|
|
"wcslen",
|
|
"wcsncat",
|
|
"wcsncmp",
|
|
"wcsncpy",
|
|
"wcsnlen",
|
|
"wcspbrk",
|
|
"wcsrchr",
|
|
"wcsspn",
|
|
"wcsstr",
|
|
"wcstok",
|
|
"wmemchr",
|
|
"wmemcmp",
|
|
"wmemcpy",
|
|
"wmemmove",
|
|
"wmemset",
|
|
"write"};
|
|
|
|
} // namespace bugprone
|
|
} // namespace tidy
|
|
} // namespace clang
|