forked from OSchip/llvm-project
103 lines
3.7 KiB
C++
103 lines
3.7 KiB
C++
//=== Taint.h - Taint tracking and basic propagation rules. --------*- C++ -*-//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Defines basic, non-domain-specific mechanisms for tracking tainted values.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_TAINT_H
|
|
#define LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_TAINT_H
|
|
|
|
#include "clang/StaticAnalyzer/Core/BugReporter/BugReporterVisitors.h"
|
|
#include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
|
|
|
|
namespace clang {
|
|
namespace ento {
|
|
namespace taint {
|
|
|
|
/// The type of taint, which helps to differentiate between different types of
|
|
/// taint.
|
|
using TaintTagType = unsigned;
|
|
|
|
static constexpr TaintTagType TaintTagGeneric = 0;
|
|
|
|
/// Create a new state in which the value of the statement is marked as tainted.
|
|
LLVM_NODISCARD ProgramStateRef
|
|
addTaint(ProgramStateRef State, const Stmt *S, const LocationContext *LCtx,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Create a new state in which the value is marked as tainted.
|
|
LLVM_NODISCARD ProgramStateRef
|
|
addTaint(ProgramStateRef State, SVal V,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Create a new state in which the symbol is marked as tainted.
|
|
LLVM_NODISCARD ProgramStateRef
|
|
addTaint(ProgramStateRef State, SymbolRef Sym,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Create a new state in which the pointer represented by the region
|
|
/// is marked as tainted.
|
|
LLVM_NODISCARD ProgramStateRef
|
|
addTaint(ProgramStateRef State, const MemRegion *R,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Create a new state in a which a sub-region of a given symbol is tainted.
|
|
/// This might be necessary when referring to regions that can not have an
|
|
/// individual symbol, e.g. if they are represented by the default binding of
|
|
/// a LazyCompoundVal.
|
|
LLVM_NODISCARD ProgramStateRef
|
|
addPartialTaint(ProgramStateRef State,
|
|
SymbolRef ParentSym, const SubRegion *SubRegion,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Check if the statement has a tainted value in the given state.
|
|
bool isTainted(ProgramStateRef State, const Stmt *S,
|
|
const LocationContext *LCtx,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Check if the value is tainted in the given state.
|
|
bool isTainted(ProgramStateRef State, SVal V,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Check if the symbol is tainted in the given state.
|
|
bool isTainted(ProgramStateRef State, SymbolRef Sym,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
/// Check if the pointer represented by the region is tainted in the given
|
|
/// state.
|
|
bool isTainted(ProgramStateRef State, const MemRegion *Reg,
|
|
TaintTagType Kind = TaintTagGeneric);
|
|
|
|
void printTaint(ProgramStateRef State, raw_ostream &Out, const char *nl = "\n",
|
|
const char *sep = "");
|
|
|
|
LLVM_DUMP_METHOD void dumpTaint(ProgramStateRef State);
|
|
|
|
/// The bug visitor prints a diagnostic message at the location where a given
|
|
/// variable was tainted.
|
|
class TaintBugVisitor final : public BugReporterVisitor {
|
|
private:
|
|
const SVal V;
|
|
|
|
public:
|
|
TaintBugVisitor(const SVal V) : V(V) {}
|
|
void Profile(llvm::FoldingSetNodeID &ID) const override { ID.Add(V); }
|
|
|
|
std::shared_ptr<PathDiagnosticPiece> VisitNode(const ExplodedNode *N,
|
|
BugReporterContext &BRC,
|
|
BugReport &BR) override;
|
|
};
|
|
|
|
} // namespace taint
|
|
} // namespace ento
|
|
} // namespace clang
|
|
|
|
#endif
|
|
|