aboutsummaryrefslogtreecommitdiff
path: root/lib/Checker/ReturnStackAddressChecker.cpp
blob: 9cbabba4a5f5c54d9ee950ed65231e387e00273d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
//== ReturnStackAddressChecker.cpp ------------------------------*- C++ -*--==//
//
//                     The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file defines ReturnStackAddressChecker, which is a path-sensitive
// check which looks for the addresses of stack variables being returned to
// callers.
//
//===----------------------------------------------------------------------===//

#include "GRExprEngineInternalChecks.h"
#include "clang/Checker/PathSensitive/GRExprEngine.h"
#include "clang/Checker/BugReporter/BugReporter.h"
#include "clang/Checker/PathSensitive/CheckerVisitor.h"
#include "clang/Basic/SourceManager.h"
#include "llvm/ADT/SmallString.h"

using namespace clang;

namespace {
class ReturnStackAddressChecker : 
    public CheckerVisitor<ReturnStackAddressChecker> {      
  BuiltinBug *BT;
public:
  ReturnStackAddressChecker() : BT(0) {}
  static void *getTag();
  void PreVisitReturnStmt(CheckerContext &C, const ReturnStmt *RS);
private:
  void EmitStackError(CheckerContext &C, const MemRegion *R, const Expr *RetE);
};
}

void clang::RegisterReturnStackAddressChecker(GRExprEngine &Eng) {
  Eng.registerCheck(new ReturnStackAddressChecker());
}

void *ReturnStackAddressChecker::getTag() {
  static int x = 0; return &x;
}

void ReturnStackAddressChecker::EmitStackError(CheckerContext &C,
                                               const MemRegion *R,
                                               const Expr *RetE) {
	ExplodedNode *N = C.GenerateSink();

	if (!N)
		return;

	if (!BT)
		BT = new BuiltinBug("Return of address to stack-allocated memory");

	// Generate a report for this bug.
	llvm::SmallString<512> buf;
	llvm::raw_svector_ostream os(buf);
	SourceRange range;

	// Get the base region, stripping away fields and elements.
	R = R->getBaseRegion();

	// Check if the region is a compound literal.
	if (const CompoundLiteralRegion* CR = dyn_cast<CompoundLiteralRegion>(R)) {    
		const CompoundLiteralExpr* CL = CR->getLiteralExpr();
		os << "Address of stack memory associated with a compound literal "
          "declared on line "
       << C.getSourceManager().getInstantiationLineNumber(CL->getLocStart())
       << " returned to caller";    
		range = CL->getSourceRange();
	}
	else if (const AllocaRegion* AR = dyn_cast<AllocaRegion>(R)) {
		const Expr* ARE = AR->getExpr();
		SourceLocation L = ARE->getLocStart();
		range = ARE->getSourceRange();    
		os << "Address of stack memory allocated by call to alloca() on line "
       << C.getSourceManager().getInstantiationLineNumber(L)
       << " returned to caller";
	}
	else if (const BlockDataRegion *BR = dyn_cast<BlockDataRegion>(R)) {
		const BlockDecl *BD = BR->getCodeRegion()->getDecl();
		SourceLocation L = BD->getLocStart();
		range = BD->getSourceRange();
		os << "Address of stack-allocated block declared on line "
       << C.getSourceManager().getInstantiationLineNumber(L)
       << " returned to caller";
	}
	else if (const VarRegion *VR = dyn_cast<VarRegion>(R)) {
		os << "Address of stack memory associated with local variable '"
       << VR->getString() << "' returned";
		range = VR->getDecl()->getSourceRange();
	}
	else {
		assert(false && "Invalid region in ReturnStackAddressChecker.");
		return;
	}

	RangedBugReport *report = new RangedBugReport(*BT, os.str(), N);
	report->addRange(RetE->getSourceRange());
	if (range.isValid())
		report->addRange(range);

	C.EmitReport(report);
}	

void ReturnStackAddressChecker::PreVisitReturnStmt(CheckerContext &C,
                                                   const ReturnStmt *RS) {
  
  const Expr *RetE = RS->getRetValue();
  if (!RetE)
    return;
 
  SVal V = C.getState()->getSVal(RetE);
  const MemRegion *R = V.getAsRegion();

  if (!R || !R->hasStackStorage())
    return;  
  
  if (R->hasStackStorage()) {
    EmitStackError(C, R, RetE);
    return;
  }
}