Index: clang-tidy/android/AndroidTidyModule.cpp =================================================================== --- clang-tidy/android/AndroidTidyModule.cpp +++ clang-tidy/android/AndroidTidyModule.cpp @@ -10,6 +10,7 @@ #include "../ClangTidy.h" #include "../ClangTidyModule.h" #include "../ClangTidyModuleRegistry.h" +#include "CloexecAccept4Check.h" #include "CloexecCreatCheck.h" #include "CloexecDupCheck.h" #include "CloexecFopenCheck.h" @@ -27,6 +28,7 @@ class AndroidModule : public ClangTidyModule { public: void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override { + CheckFactories.registerCheck("android-cloexec-accept4"); CheckFactories.registerCheck("android-cloexec-creat"); CheckFactories.registerCheck("android-cloexec-dup"); CheckFactories.registerCheck("android-cloexec-fopen"); Index: clang-tidy/android/CMakeLists.txt =================================================================== --- clang-tidy/android/CMakeLists.txt +++ clang-tidy/android/CMakeLists.txt @@ -2,6 +2,7 @@ add_clang_library(clangTidyAndroidModule AndroidTidyModule.cpp + CloexecAccept4Check.cpp CloexecCheck.cpp CloexecCreatCheck.cpp CloexecDupCheck.cpp Index: clang-tidy/android/CloexecAccept4Check.h =================================================================== --- /dev/null +++ clang-tidy/android/CloexecAccept4Check.h @@ -0,0 +1,35 @@ +//===--- CloexecAccept4Check.h - clang-tidy----------------------*- C++ -*-===// +// +// The LLVM Compiler Infrastructure +// +// This file is distributed under the University of Illinois Open Source +// License. See LICENSE.TXT for details. +// +//===----------------------------------------------------------------------===// + +#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_ACCEPT4_H +#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_ACCEPT4_H + +#include "CloexecCheck.h" + +namespace clang { +namespace tidy { +namespace android { + +/// Finds code that uses accept4() without using the SOCK_CLOEXEC flag. +/// +/// For the user-facing documentation see: +/// http://clang.llvm.org/extra/clang-tidy/checks/android-cloexec-accept4.html +class CloexecAccept4Check : public CloexecCheck { +public: + CloexecAccept4Check(StringRef Name, ClangTidyContext *Context) + : CloexecCheck(Name, Context) {} + void registerMatchers(ast_matchers::MatchFinder *Finder) override; + void check(const ast_matchers::MatchFinder::MatchResult &Result) override; +}; + +} // namespace android +} // namespace tidy +} // namespace clang + +#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_ANDROID_CLOEXEC_ACCEPT4_H Index: clang-tidy/android/CloexecAccept4Check.cpp =================================================================== --- /dev/null +++ clang-tidy/android/CloexecAccept4Check.cpp @@ -0,0 +1,40 @@ +//===--- CloexecAccept4Check.cpp - clang-tidy------------------------------===// +// +// The LLVM Compiler Infrastructure +// +// This file is distributed under the University of Illinois Open Source +// License. See LICENSE.TXT for details. +// +//===----------------------------------------------------------------------===// + +#include "CloexecAccept4Check.h" +#include "../utils/ASTUtils.h" +#include "clang/AST/ASTContext.h" +#include "clang/ASTMatchers/ASTMatchFinder.h" + +using namespace clang::ast_matchers; + +namespace clang { +namespace tidy { +namespace android { + +void CloexecAccept4Check::registerMatchers(MatchFinder *Finder) { + auto SockAddrPointerType = + hasType(pointsTo(recordDecl(isStruct(), hasName("sockaddr")))); + auto SockLenPointerType = hasType(pointsTo(namedDecl(hasName("socklen_t")))); + + registerMatchersImpl(Finder, + functionDecl(returns(isInteger()), hasName("accept4"), + hasParameter(0, hasType(isInteger())), + hasParameter(1, SockAddrPointerType), + hasParameter(2, SockLenPointerType), + hasParameter(3, hasType(isInteger())))); +} + +void CloexecAccept4Check::check(const MatchFinder::MatchResult &Result) { + insertMacroFlag(Result, "SOCK_CLOEXEC", /*ArgPos=*/3); +} + +} // namespace android +} // namespace tidy +} // namespace clang Index: docs/ReleaseNotes.rst =================================================================== --- docs/ReleaseNotes.rst +++ docs/ReleaseNotes.rst @@ -70,6 +70,12 @@ ``AllowConditionalIntegerCasts`` -> ``AllowIntegerConditions``, ``AllowConditionalPointerCasts`` -> ``AllowPointerConditions``. +- New `android-cloexec-accept4 + `_ check + + Checks if the required file flag ``SOCK_CLOEXEC`` is present in the argument of + ``accept4()``. + - New `android-cloexec-dup `_ check Index: docs/clang-tidy/checks/android-cloexec-accept4.rst =================================================================== --- /dev/null +++ docs/clang-tidy/checks/android-cloexec-accept4.rst @@ -0,0 +1,18 @@ +.. title:: clang-tidy - android-cloexec-accept4 + +android-cloexec-accept4 +======================= + +``accept4()`` should include ``SOCK_CLOEXEC`` in its type argument to avoid the +file descriptor leakage. Without this flag, an opened sensitive file would +remain open across a fork+exec to a lower-privileged SELinux domain. + +Examples: + +.. code-block:: c++ + + accept4(sockfd, addr, addrlen, SOCK_NONBLOCK); + + // becomes + + accept4(sockfd, addr, addrlen, SOCK_NONBLOCK | SOCK_CLOEXEC); Index: docs/clang-tidy/checks/list.rst =================================================================== --- docs/clang-tidy/checks/list.rst +++ docs/clang-tidy/checks/list.rst @@ -4,6 +4,7 @@ ================= .. toctree:: + android-cloexec-accept4 android-cloexec-creat android-cloexec-dup android-cloexec-fopen Index: test/clang-tidy/android-cloexec-accept4.cpp =================================================================== --- /dev/null +++ test/clang-tidy/android-cloexec-accept4.cpp @@ -0,0 +1,66 @@ +// RUN: %check_clang_tidy %s android-cloexec-accept4 %t + +typedef int socklen_t; +struct sockaddr {}; + +#define SOCK_NONBLOCK 1 +#define __O_CLOEXEC 3 +#define SOCK_CLOEXEC __O_CLOEXEC +#define TEMP_FAILURE_RETRY(exp) \ + ({ \ + int _rc; \ + do { \ + _rc = (exp); \ + } while (_rc == -1); \ + }) +#define NULL 0 + +extern "C" int accept4(int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags); + +void a() { + accept4(0, NULL, NULL, SOCK_NONBLOCK); + // CHECK-MESSAGES: :[[@LINE-1]]:39: warning: 'accept4' should use SOCK_CLOEXEC where possible [android-cloexec-accept4] + // CHECK-FIXES: accept4(0, NULL, NULL, SOCK_NONBLOCK | SOCK_CLOEXEC); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_NONBLOCK)); + // CHECK-MESSAGES: :[[@LINE-1]]:58: warning: 'accept4' + // CHECK-FIXES: TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_NONBLOCK | SOCK_CLOEXEC)) +} + +void f() { + accept4(0, NULL, NULL, 3); + // CHECK-MESSAGES: :[[@LINE-1]]:27: warning: 'accept4' + // CHECK-FIXES: accept4(0, NULL, NULL, 3 | SOCK_CLOEXEC) + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, 3)); + // CHECK-MESSAGES: :[[@LINE-1]]:46: warning: 'accept4' + // CHECK-FIXES: TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, 3 | SOCK_CLOEXEC)) + + int flag = SOCK_NONBLOCK; + accept4(0, NULL, NULL, flag); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, flag)); +} + +namespace i { +int accept4(int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags); + +void d() { + accept4(0, NULL, NULL, SOCK_NONBLOCK); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_NONBLOCK)); +} + +} // namespace i + +void e() { + accept4(0, NULL, NULL, SOCK_CLOEXEC); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_CLOEXEC)); + accept4(0, NULL, NULL, SOCK_NONBLOCK | SOCK_CLOEXEC); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_NONBLOCK | SOCK_CLOEXEC)); +} + +class G { +public: + int accept4(int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags); + void d() { + accept4(0, NULL, NULL, SOCK_NONBLOCK); + TEMP_FAILURE_RETRY(accept4(0, NULL, NULL, SOCK_NONBLOCK)); + } +};