diff --git a/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp b/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp --- a/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp +++ b/clang-tools-extra/clang-tidy/android/AndroidTidyModule.cpp @@ -20,6 +20,7 @@ #include "CloexecInotifyInitCheck.h" #include "CloexecMemfdCreateCheck.h" #include "CloexecOpenCheck.h" +#include "CloexecPipeCheck.h" #include "CloexecSocketCheck.h" #include "ComparisonInTempFailureRetryCheck.h" @@ -49,6 +50,7 @@ CheckFactories.registerCheck( "android-cloexec-memfd-create"); CheckFactories.registerCheck("android-cloexec-open"); + CheckFactories.registerCheck("android-cloexec-pipe"); CheckFactories.registerCheck("android-cloexec-socket"); CheckFactories.registerCheck( "android-comparison-in-temp-failure-retry"); diff --git a/clang-tools-extra/clang-tidy/android/CMakeLists.txt b/clang-tools-extra/clang-tidy/android/CMakeLists.txt --- a/clang-tools-extra/clang-tidy/android/CMakeLists.txt +++ b/clang-tools-extra/clang-tidy/android/CMakeLists.txt @@ -14,6 +14,7 @@ CloexecInotifyInitCheck.cpp CloexecMemfdCreateCheck.cpp CloexecOpenCheck.cpp + CloexecPipeCheck.cpp CloexecSocketCheck.cpp ComparisonInTempFailureRetryCheck.cpp diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h new file mode 100644 --- /dev/null +++ b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h @@ -0,0 +1,34 @@ +//===--- CloexecPipeCheck.h - clang-tidy-------------------------*- C++ -*-===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_PIPE_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_PIPE_H + +#include "CloexecCheck.h" + +namespace clang { +namespace tidy { +namespace android { + +/// Suggests to replace calls to pipe() with calls to pipe2(). +/// +/// For the user-facing documentation see: +/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-pipe.html +class CloexecPipeCheck : public CloexecCheck { +public: + CloexecPipeCheck(StringRef Name, ClangTidyContext *Context) + : CloexecCheck(Name, Context) {} + void registerMatchers(ast_matchers::MatchFinder *Finder) override; + void check(const ast_matchers::MatchFinder::MatchResult &Result) override; +}; + +} // namespace android +} // namespace tidy +} // namespace clang + +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_PIPE_H diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.cpp b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.cpp new file mode 100644 --- /dev/null +++ b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.cpp @@ -0,0 +1,37 @@ +//===--- CloexecPipeCheck.cpp - clang-tidy---------------------------------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "CloexecPipeCheck.h" +#include "clang/AST/ASTContext.h" +#include "clang/ASTMatchers/ASTMatchFinder.h" + +using namespace clang::ast_matchers; + +namespace clang { +namespace tidy { +namespace android { + +void CloexecPipeCheck::registerMatchers(MatchFinder *Finder) { + registerMatchersImpl(Finder, + functionDecl(returns(isInteger()), hasName("pipe"), + hasParameter(0, hasType(pointsTo(isInteger()))))); +} + +void CloexecPipeCheck::check(const MatchFinder::MatchResult &Result) { + std::string ReplacementText = + (Twine("pipe2(") + getSpellingArg(Result, 0) + ", O_CLOEXEC)").str(); + + replaceFunc( + Result, + "prefer pipe2() with O_CLOEXEC to avoid leaking file descriptors to child processes", + ReplacementText); +} + +} // namespace android +} // namespace tidy +} // namespace clang diff --git a/clang-tools-extra/docs/ReleaseNotes.rst b/clang-tools-extra/docs/ReleaseNotes.rst --- a/clang-tools-extra/docs/ReleaseNotes.rst +++ b/clang-tools-extra/docs/ReleaseNotes.rst @@ -101,6 +101,11 @@ Finds and fixes ``absl::Time`` subtraction expressions to do subtraction in the Time domain instead of the numeric domain. +- New :doc:`android-cloexec-pipe + ` check. + + This check detects usage of ``pipe()``. + - New :doc:`bugprone-unhandled-self-assignment ` check. diff --git a/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-pipe.rst b/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-pipe.rst new file mode 100644 --- /dev/null +++ b/clang-tools-extra/docs/clang-tidy/checks/android-cloexec-pipe.rst @@ -0,0 +1,20 @@ +.. title:: clang-tidy - android-cloexec-pipe + +android-cloexec-pipe +==================== + +This check detects usage of ``pipe()``. Using ``pipe()`` is not recommended, ``pipe2()`` is the +suggested replacement. The check also adds the O_CLOEXEC flag that marks the file descriptor to +be closed in child processes. Without this flag a sensitive file descriptor can be leaked to a +child process, potentially into a lower-privileged SELinux domain. + +Examples: + +.. code-block:: c++ + + pipe(pipefd); + +Suggested replacement: + +.. code-block:: c++ + pipe2(pipefd, O_CLOEXEC); diff --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst b/clang-tools-extra/docs/clang-tidy/checks/list.rst --- a/clang-tools-extra/docs/clang-tidy/checks/list.rst +++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst @@ -32,6 +32,7 @@ android-cloexec-inotify-init1 android-cloexec-memfd-create android-cloexec-open + android-cloexec-pipe android-cloexec-socket android-comparison-in-temp-failure-retry boost-use-to-string diff --git a/clang-tools-extra/test/clang-tidy/android-cloexec-pipe.cpp b/clang-tools-extra/test/clang-tidy/android-cloexec-pipe.cpp new file mode 100644 --- /dev/null +++ b/clang-tools-extra/test/clang-tidy/android-cloexec-pipe.cpp @@ -0,0 +1,27 @@ +// RUN: %check_clang_tidy %s android-cloexec-pipe %t + +extern "C" int pipe(int pipefd[2]); + +void f() { + int pipefd[2]; + pipe(pipefd); + // CHECK-MESSAGES: :[[@LINE-1]]:3: warning: prefer pipe2() with O_CLOEXEC to avoid leaking file descriptors to child processes [android-cloexec-pipe] + // CHECK-FIXES: pipe2(pipefd, O_CLOEXEC); +} + +namespace i { +int pipe(int pipefd[2]); +void g() { + int pipefd[2]; + pipe(pipefd); +} +} // namespace i + +class C { +public: + int pipe(int pipefd[2]); + void h() { + int pipefd[2]; + pipe(pipefd); + } +};