10b57cec5SDimitry Andric //===--- PthreadLockChecker.cpp - Check for locking problems ---*- C++ -*--===// 20b57cec5SDimitry Andric // 30b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 40b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 50b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 60b57cec5SDimitry Andric // 70b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 80b57cec5SDimitry Andric // 95ffd83dbSDimitry Andric // This file defines: 105ffd83dbSDimitry Andric // * PthreadLockChecker, a simple lock -> unlock checker. 115ffd83dbSDimitry Andric // Which also checks for XNU locks, which behave similarly enough to share 125ffd83dbSDimitry Andric // code. 135ffd83dbSDimitry Andric // * FuchsiaLocksChecker, which is also rather similar. 145ffd83dbSDimitry Andric // * C11LockChecker which also closely follows Pthread semantics. 155ffd83dbSDimitry Andric // 165ffd83dbSDimitry Andric // TODO: Path notes. 170b57cec5SDimitry Andric // 180b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 190b57cec5SDimitry Andric 200b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" 210b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" 220b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/Checker.h" 230b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/CheckerManager.h" 24349cc55cSDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h" 255ffd83dbSDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" 260b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" 270b57cec5SDimitry Andric 280b57cec5SDimitry Andric using namespace clang; 290b57cec5SDimitry Andric using namespace ento; 300b57cec5SDimitry Andric 310b57cec5SDimitry Andric namespace { 320b57cec5SDimitry Andric 330b57cec5SDimitry Andric struct LockState { 340b57cec5SDimitry Andric enum Kind { 350b57cec5SDimitry Andric Destroyed, 360b57cec5SDimitry Andric Locked, 370b57cec5SDimitry Andric Unlocked, 380b57cec5SDimitry Andric UntouchedAndPossiblyDestroyed, 390b57cec5SDimitry Andric UnlockedAndPossiblyDestroyed 400b57cec5SDimitry Andric } K; 410b57cec5SDimitry Andric 420b57cec5SDimitry Andric private: 430b57cec5SDimitry Andric LockState(Kind K) : K(K) {} 440b57cec5SDimitry Andric 450b57cec5SDimitry Andric public: 460b57cec5SDimitry Andric static LockState getLocked() { return LockState(Locked); } 470b57cec5SDimitry Andric static LockState getUnlocked() { return LockState(Unlocked); } 480b57cec5SDimitry Andric static LockState getDestroyed() { return LockState(Destroyed); } 490b57cec5SDimitry Andric static LockState getUntouchedAndPossiblyDestroyed() { 500b57cec5SDimitry Andric return LockState(UntouchedAndPossiblyDestroyed); 510b57cec5SDimitry Andric } 520b57cec5SDimitry Andric static LockState getUnlockedAndPossiblyDestroyed() { 530b57cec5SDimitry Andric return LockState(UnlockedAndPossiblyDestroyed); 540b57cec5SDimitry Andric } 550b57cec5SDimitry Andric 565ffd83dbSDimitry Andric bool operator==(const LockState &X) const { return K == X.K; } 570b57cec5SDimitry Andric 580b57cec5SDimitry Andric bool isLocked() const { return K == Locked; } 590b57cec5SDimitry Andric bool isUnlocked() const { return K == Unlocked; } 600b57cec5SDimitry Andric bool isDestroyed() const { return K == Destroyed; } 610b57cec5SDimitry Andric bool isUntouchedAndPossiblyDestroyed() const { 620b57cec5SDimitry Andric return K == UntouchedAndPossiblyDestroyed; 630b57cec5SDimitry Andric } 640b57cec5SDimitry Andric bool isUnlockedAndPossiblyDestroyed() const { 650b57cec5SDimitry Andric return K == UnlockedAndPossiblyDestroyed; 660b57cec5SDimitry Andric } 670b57cec5SDimitry Andric 685ffd83dbSDimitry Andric void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(K); } 690b57cec5SDimitry Andric }; 700b57cec5SDimitry Andric 715ffd83dbSDimitry Andric class PthreadLockChecker : public Checker<check::PostCall, check::DeadSymbols, 725ffd83dbSDimitry Andric check::RegionChanges> { 730b57cec5SDimitry Andric public: 745ffd83dbSDimitry Andric enum LockingSemantics { NotApplicable = 0, PthreadSemantics, XNUSemantics }; 755ffd83dbSDimitry Andric enum CheckerKind { 765ffd83dbSDimitry Andric CK_PthreadLockChecker, 775ffd83dbSDimitry Andric CK_FuchsiaLockChecker, 785ffd83dbSDimitry Andric CK_C11LockChecker, 795ffd83dbSDimitry Andric CK_NumCheckKinds 805ffd83dbSDimitry Andric }; 8181ad6265SDimitry Andric bool ChecksEnabled[CK_NumCheckKinds] = {false}; 825ffd83dbSDimitry Andric CheckerNameRef CheckNames[CK_NumCheckKinds]; 830b57cec5SDimitry Andric 845ffd83dbSDimitry Andric private: 855ffd83dbSDimitry Andric typedef void (PthreadLockChecker::*FnCheck)(const CallEvent &Call, 865ffd83dbSDimitry Andric CheckerContext &C, 87e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 885ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> PThreadCallbacks = { 895ffd83dbSDimitry Andric // Init. 90bdd1243dSDimitry Andric {{{"pthread_mutex_init"}, 2}, &PthreadLockChecker::InitAnyLock}, 915ffd83dbSDimitry Andric // TODO: pthread_rwlock_init(2 arguments). 925ffd83dbSDimitry Andric // TODO: lck_mtx_init(3 arguments). 935ffd83dbSDimitry Andric // TODO: lck_mtx_alloc_init(2 arguments) => returns the mutex. 945ffd83dbSDimitry Andric // TODO: lck_rw_init(3 arguments). 955ffd83dbSDimitry Andric // TODO: lck_rw_alloc_init(2 arguments) => returns the mutex. 960b57cec5SDimitry Andric 975ffd83dbSDimitry Andric // Acquire. 98bdd1243dSDimitry Andric {{{"pthread_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 99bdd1243dSDimitry Andric {{{"pthread_rwlock_rdlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 100bdd1243dSDimitry Andric {{{"pthread_rwlock_wrlock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 101bdd1243dSDimitry Andric {{{"lck_mtx_lock"}, 1}, &PthreadLockChecker::AcquireXNULock}, 102bdd1243dSDimitry Andric {{{"lck_rw_lock_exclusive"}, 1}, &PthreadLockChecker::AcquireXNULock}, 103bdd1243dSDimitry Andric {{{"lck_rw_lock_shared"}, 1}, &PthreadLockChecker::AcquireXNULock}, 1045ffd83dbSDimitry Andric 1055ffd83dbSDimitry Andric // Try. 106bdd1243dSDimitry Andric {{{"pthread_mutex_trylock"}, 1}, &PthreadLockChecker::TryPthreadLock}, 107bdd1243dSDimitry Andric {{{"pthread_rwlock_tryrdlock"}, 1}, &PthreadLockChecker::TryPthreadLock}, 108bdd1243dSDimitry Andric {{{"pthread_rwlock_trywrlock"}, 1}, &PthreadLockChecker::TryPthreadLock}, 109bdd1243dSDimitry Andric {{{"lck_mtx_try_lock"}, 1}, &PthreadLockChecker::TryXNULock}, 110bdd1243dSDimitry Andric {{{"lck_rw_try_lock_exclusive"}, 1}, &PthreadLockChecker::TryXNULock}, 111bdd1243dSDimitry Andric {{{"lck_rw_try_lock_shared"}, 1}, &PthreadLockChecker::TryXNULock}, 1125ffd83dbSDimitry Andric 1135ffd83dbSDimitry Andric // Release. 114bdd1243dSDimitry Andric {{{"pthread_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 115bdd1243dSDimitry Andric {{{"pthread_rwlock_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 116bdd1243dSDimitry Andric {{{"lck_mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 117bdd1243dSDimitry Andric {{{"lck_rw_unlock_exclusive"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 118bdd1243dSDimitry Andric {{{"lck_rw_unlock_shared"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 119bdd1243dSDimitry Andric {{{"lck_rw_done"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 1205ffd83dbSDimitry Andric 1215ffd83dbSDimitry Andric // Destroy. 122bdd1243dSDimitry Andric {{{"pthread_mutex_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock}, 123bdd1243dSDimitry Andric {{{"lck_mtx_destroy"}, 2}, &PthreadLockChecker::DestroyXNULock}, 1245ffd83dbSDimitry Andric // TODO: pthread_rwlock_destroy(1 argument). 1255ffd83dbSDimitry Andric // TODO: lck_rw_destroy(2 arguments). 1265ffd83dbSDimitry Andric }; 1275ffd83dbSDimitry Andric 1285ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> FuchsiaCallbacks = { 1295ffd83dbSDimitry Andric // Init. 130bdd1243dSDimitry Andric {{{"spin_lock_init"}, 1}, &PthreadLockChecker::InitAnyLock}, 1315ffd83dbSDimitry Andric 1325ffd83dbSDimitry Andric // Acquire. 133bdd1243dSDimitry Andric {{{"spin_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 134bdd1243dSDimitry Andric {{{"spin_lock_save"}, 3}, &PthreadLockChecker::AcquirePthreadLock}, 135bdd1243dSDimitry Andric {{{"sync_mutex_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 136bdd1243dSDimitry Andric {{{"sync_mutex_lock_with_waiter"}, 1}, 1375ffd83dbSDimitry Andric &PthreadLockChecker::AcquirePthreadLock}, 1385ffd83dbSDimitry Andric 1395ffd83dbSDimitry Andric // Try. 140bdd1243dSDimitry Andric {{{"spin_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock}, 141bdd1243dSDimitry Andric {{{"sync_mutex_trylock"}, 1}, &PthreadLockChecker::TryFuchsiaLock}, 142bdd1243dSDimitry Andric {{{"sync_mutex_timedlock"}, 2}, &PthreadLockChecker::TryFuchsiaLock}, 1435ffd83dbSDimitry Andric 1445ffd83dbSDimitry Andric // Release. 145bdd1243dSDimitry Andric {{{"spin_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 146bdd1243dSDimitry Andric {{{"spin_unlock_restore"}, 3}, &PthreadLockChecker::ReleaseAnyLock}, 147bdd1243dSDimitry Andric {{{"sync_mutex_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 1485ffd83dbSDimitry Andric }; 1495ffd83dbSDimitry Andric 1505ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> C11Callbacks = { 1515ffd83dbSDimitry Andric // Init. 152bdd1243dSDimitry Andric {{{"mtx_init"}, 2}, &PthreadLockChecker::InitAnyLock}, 1535ffd83dbSDimitry Andric 1545ffd83dbSDimitry Andric // Acquire. 155bdd1243dSDimitry Andric {{{"mtx_lock"}, 1}, &PthreadLockChecker::AcquirePthreadLock}, 1565ffd83dbSDimitry Andric 1575ffd83dbSDimitry Andric // Try. 158bdd1243dSDimitry Andric {{{"mtx_trylock"}, 1}, &PthreadLockChecker::TryC11Lock}, 159bdd1243dSDimitry Andric {{{"mtx_timedlock"}, 2}, &PthreadLockChecker::TryC11Lock}, 1605ffd83dbSDimitry Andric 1615ffd83dbSDimitry Andric // Release. 162bdd1243dSDimitry Andric {{{"mtx_unlock"}, 1}, &PthreadLockChecker::ReleaseAnyLock}, 1635ffd83dbSDimitry Andric 1645ffd83dbSDimitry Andric // Destroy 165bdd1243dSDimitry Andric {{{"mtx_destroy"}, 1}, &PthreadLockChecker::DestroyPthreadLock}, 1665ffd83dbSDimitry Andric }; 1675ffd83dbSDimitry Andric 1680b57cec5SDimitry Andric ProgramStateRef resolvePossiblyDestroyedMutex(ProgramStateRef state, 1690b57cec5SDimitry Andric const MemRegion *lockR, 1700b57cec5SDimitry Andric const SymbolRef *sym) const; 171e8d8bef9SDimitry Andric void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 172e8d8bef9SDimitry Andric const Expr *MtxExpr, CheckerKind CheckKind, 173e8d8bef9SDimitry Andric StringRef Desc) const; 1745ffd83dbSDimitry Andric 1755ffd83dbSDimitry Andric // Init. 1765ffd83dbSDimitry Andric void InitAnyLock(const CallEvent &Call, CheckerContext &C, 177e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 178e8d8bef9SDimitry Andric void InitLockAux(const CallEvent &Call, CheckerContext &C, 179e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 180e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1815ffd83dbSDimitry Andric 1825ffd83dbSDimitry Andric // Lock, Try-lock. 1835ffd83dbSDimitry Andric void AcquirePthreadLock(const CallEvent &Call, CheckerContext &C, 184e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1855ffd83dbSDimitry Andric void AcquireXNULock(const CallEvent &Call, CheckerContext &C, 186e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1875ffd83dbSDimitry Andric void TryPthreadLock(const CallEvent &Call, CheckerContext &C, 188e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1895ffd83dbSDimitry Andric void TryXNULock(const CallEvent &Call, CheckerContext &C, 190e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1915ffd83dbSDimitry Andric void TryFuchsiaLock(const CallEvent &Call, CheckerContext &C, 192e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1935ffd83dbSDimitry Andric void TryC11Lock(const CallEvent &Call, CheckerContext &C, 194e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 195e8d8bef9SDimitry Andric void AcquireLockAux(const CallEvent &Call, CheckerContext &C, 196e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, bool IsTryLock, 197e8d8bef9SDimitry Andric LockingSemantics Semantics, CheckerKind CheckKind) const; 1985ffd83dbSDimitry Andric 1995ffd83dbSDimitry Andric // Release. 2005ffd83dbSDimitry Andric void ReleaseAnyLock(const CallEvent &Call, CheckerContext &C, 201e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 202e8d8bef9SDimitry Andric void ReleaseLockAux(const CallEvent &Call, CheckerContext &C, 203e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 204e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 2055ffd83dbSDimitry Andric 2065ffd83dbSDimitry Andric // Destroy. 2075ffd83dbSDimitry Andric void DestroyPthreadLock(const CallEvent &Call, CheckerContext &C, 208e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 2095ffd83dbSDimitry Andric void DestroyXNULock(const CallEvent &Call, CheckerContext &C, 210e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 211e8d8bef9SDimitry Andric void DestroyLockAux(const CallEvent &Call, CheckerContext &C, 212e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 213e8d8bef9SDimitry Andric LockingSemantics Semantics, CheckerKind CheckKind) const; 2145ffd83dbSDimitry Andric 2155ffd83dbSDimitry Andric public: 2165ffd83dbSDimitry Andric void checkPostCall(const CallEvent &Call, CheckerContext &C) const; 2175ffd83dbSDimitry Andric void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const; 2185ffd83dbSDimitry Andric ProgramStateRef 2195ffd83dbSDimitry Andric checkRegionChanges(ProgramStateRef State, const InvalidatedSymbols *Symbols, 2205ffd83dbSDimitry Andric ArrayRef<const MemRegion *> ExplicitRegions, 2215ffd83dbSDimitry Andric ArrayRef<const MemRegion *> Regions, 2225ffd83dbSDimitry Andric const LocationContext *LCtx, const CallEvent *Call) const; 2235ffd83dbSDimitry Andric void printState(raw_ostream &Out, ProgramStateRef State, const char *NL, 2245ffd83dbSDimitry Andric const char *Sep) const override; 2255ffd83dbSDimitry Andric 2265ffd83dbSDimitry Andric private: 2275ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds]; 2285ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds]; 2295ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds]; 2305ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds]; 2315ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds]; 2325ffd83dbSDimitry Andric 233e8d8bef9SDimitry Andric void initBugType(CheckerKind CheckKind) const { 234e8d8bef9SDimitry Andric if (BT_doublelock[CheckKind]) 2355ffd83dbSDimitry Andric return; 236e8d8bef9SDimitry Andric BT_doublelock[CheckKind].reset( 237e8d8bef9SDimitry Andric new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); 238e8d8bef9SDimitry Andric BT_doubleunlock[CheckKind].reset( 239e8d8bef9SDimitry Andric new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); 240e8d8bef9SDimitry Andric BT_destroylock[CheckKind].reset(new BugType{ 241e8d8bef9SDimitry Andric CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); 242e8d8bef9SDimitry Andric BT_initlock[CheckKind].reset(new BugType{ 243e8d8bef9SDimitry Andric CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); 244e8d8bef9SDimitry Andric BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], 2455ffd83dbSDimitry Andric "Lock order reversal", "Lock checker"}); 2465ffd83dbSDimitry Andric } 2470b57cec5SDimitry Andric }; 2480b57cec5SDimitry Andric } // end anonymous namespace 2490b57cec5SDimitry Andric 2500b57cec5SDimitry Andric // A stack of locks for tracking lock-unlock order. 2510b57cec5SDimitry Andric REGISTER_LIST_WITH_PROGRAMSTATE(LockSet, const MemRegion *) 2520b57cec5SDimitry Andric 2530b57cec5SDimitry Andric // An entry for tracking lock states. 2540b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(LockMap, const MemRegion *, LockState) 2550b57cec5SDimitry Andric 2560b57cec5SDimitry Andric // Return values for unresolved calls to pthread_mutex_destroy(). 2570b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(DestroyRetVal, const MemRegion *, SymbolRef) 2580b57cec5SDimitry Andric 2595ffd83dbSDimitry Andric void PthreadLockChecker::checkPostCall(const CallEvent &Call, 2600b57cec5SDimitry Andric CheckerContext &C) const { 2615ffd83dbSDimitry Andric // An additional umbrella check that all functions modeled by this checker 2625ffd83dbSDimitry Andric // are global C functions. 2635ffd83dbSDimitry Andric // TODO: Maybe make this the default behavior of CallDescription 2645ffd83dbSDimitry Andric // with exactly one identifier? 2655ffd83dbSDimitry Andric // FIXME: Try to handle cases when the implementation was inlined rather 2665ffd83dbSDimitry Andric // than just giving up. 2675ffd83dbSDimitry Andric if (!Call.isGlobalCFunction() || C.wasInlined) 2680b57cec5SDimitry Andric return; 2690b57cec5SDimitry Andric 2705ffd83dbSDimitry Andric if (const FnCheck *Callback = PThreadCallbacks.lookup(Call)) 2715ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_PthreadLockChecker); 2725ffd83dbSDimitry Andric else if (const FnCheck *Callback = FuchsiaCallbacks.lookup(Call)) 2735ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_FuchsiaLockChecker); 2745ffd83dbSDimitry Andric else if (const FnCheck *Callback = C11Callbacks.lookup(Call)) 2755ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_C11LockChecker); 2760b57cec5SDimitry Andric } 2770b57cec5SDimitry Andric 2780b57cec5SDimitry Andric // When a lock is destroyed, in some semantics(like PthreadSemantics) we are not 2790b57cec5SDimitry Andric // sure if the destroy call has succeeded or failed, and the lock enters one of 2800b57cec5SDimitry Andric // the 'possibly destroyed' state. There is a short time frame for the 2810b57cec5SDimitry Andric // programmer to check the return value to see if the lock was successfully 2820b57cec5SDimitry Andric // destroyed. Before we model the next operation over that lock, we call this 2830b57cec5SDimitry Andric // function to see if the return value was checked by now and set the lock state 2840b57cec5SDimitry Andric // - either to destroyed state or back to its previous state. 2850b57cec5SDimitry Andric 2860b57cec5SDimitry Andric // In PthreadSemantics, pthread_mutex_destroy() returns zero if the lock is 2870b57cec5SDimitry Andric // successfully destroyed and it returns a non-zero value otherwise. 2880b57cec5SDimitry Andric ProgramStateRef PthreadLockChecker::resolvePossiblyDestroyedMutex( 2890b57cec5SDimitry Andric ProgramStateRef state, const MemRegion *lockR, const SymbolRef *sym) const { 2900b57cec5SDimitry Andric const LockState *lstate = state->get<LockMap>(lockR); 2910b57cec5SDimitry Andric // Existence in DestroyRetVal ensures existence in LockMap. 2920b57cec5SDimitry Andric // Existence in Destroyed also ensures that the lock state for lockR is either 2930b57cec5SDimitry Andric // UntouchedAndPossiblyDestroyed or UnlockedAndPossiblyDestroyed. 294*06c3fb27SDimitry Andric assert(lstate); 2950b57cec5SDimitry Andric assert(lstate->isUntouchedAndPossiblyDestroyed() || 2960b57cec5SDimitry Andric lstate->isUnlockedAndPossiblyDestroyed()); 2970b57cec5SDimitry Andric 2980b57cec5SDimitry Andric ConstraintManager &CMgr = state->getConstraintManager(); 2990b57cec5SDimitry Andric ConditionTruthVal retZero = CMgr.isNull(state, *sym); 3000b57cec5SDimitry Andric if (retZero.isConstrainedFalse()) { 3010b57cec5SDimitry Andric if (lstate->isUntouchedAndPossiblyDestroyed()) 3020b57cec5SDimitry Andric state = state->remove<LockMap>(lockR); 3030b57cec5SDimitry Andric else if (lstate->isUnlockedAndPossiblyDestroyed()) 3040b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getUnlocked()); 3050b57cec5SDimitry Andric } else 3060b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getDestroyed()); 3070b57cec5SDimitry Andric 3080b57cec5SDimitry Andric // Removing the map entry (lockR, sym) from DestroyRetVal as the lock state is 3090b57cec5SDimitry Andric // now resolved. 3100b57cec5SDimitry Andric state = state->remove<DestroyRetVal>(lockR); 3110b57cec5SDimitry Andric return state; 3120b57cec5SDimitry Andric } 3130b57cec5SDimitry Andric 3140b57cec5SDimitry Andric void PthreadLockChecker::printState(raw_ostream &Out, ProgramStateRef State, 3150b57cec5SDimitry Andric const char *NL, const char *Sep) const { 3160b57cec5SDimitry Andric LockMapTy LM = State->get<LockMap>(); 3170b57cec5SDimitry Andric if (!LM.isEmpty()) { 3180b57cec5SDimitry Andric Out << Sep << "Mutex states:" << NL; 3190b57cec5SDimitry Andric for (auto I : LM) { 3200b57cec5SDimitry Andric I.first->dumpToStream(Out); 3210b57cec5SDimitry Andric if (I.second.isLocked()) 3220b57cec5SDimitry Andric Out << ": locked"; 3230b57cec5SDimitry Andric else if (I.second.isUnlocked()) 3240b57cec5SDimitry Andric Out << ": unlocked"; 3250b57cec5SDimitry Andric else if (I.second.isDestroyed()) 3260b57cec5SDimitry Andric Out << ": destroyed"; 3270b57cec5SDimitry Andric else if (I.second.isUntouchedAndPossiblyDestroyed()) 3280b57cec5SDimitry Andric Out << ": not tracked, possibly destroyed"; 3290b57cec5SDimitry Andric else if (I.second.isUnlockedAndPossiblyDestroyed()) 3300b57cec5SDimitry Andric Out << ": unlocked, possibly destroyed"; 3310b57cec5SDimitry Andric Out << NL; 3320b57cec5SDimitry Andric } 3330b57cec5SDimitry Andric } 3340b57cec5SDimitry Andric 3350b57cec5SDimitry Andric LockSetTy LS = State->get<LockSet>(); 3360b57cec5SDimitry Andric if (!LS.isEmpty()) { 3370b57cec5SDimitry Andric Out << Sep << "Mutex lock order:" << NL; 3380b57cec5SDimitry Andric for (auto I : LS) { 3390b57cec5SDimitry Andric I->dumpToStream(Out); 3400b57cec5SDimitry Andric Out << NL; 3410b57cec5SDimitry Andric } 3420b57cec5SDimitry Andric } 3430b57cec5SDimitry Andric 344fe6060f1SDimitry Andric DestroyRetValTy DRV = State->get<DestroyRetVal>(); 345fe6060f1SDimitry Andric if (!DRV.isEmpty()) { 346fe6060f1SDimitry Andric Out << Sep << "Mutexes in unresolved possibly destroyed state:" << NL; 347fe6060f1SDimitry Andric for (auto I : DRV) { 348fe6060f1SDimitry Andric I.first->dumpToStream(Out); 349fe6060f1SDimitry Andric Out << ": "; 350fe6060f1SDimitry Andric I.second->dumpToStream(Out); 351fe6060f1SDimitry Andric Out << NL; 352fe6060f1SDimitry Andric } 353fe6060f1SDimitry Andric } 3540b57cec5SDimitry Andric } 3550b57cec5SDimitry Andric 3565ffd83dbSDimitry Andric void PthreadLockChecker::AcquirePthreadLock(const CallEvent &Call, 3575ffd83dbSDimitry Andric CheckerContext &C, 358e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 359e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false, 360e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3615ffd83dbSDimitry Andric } 3625ffd83dbSDimitry Andric 3635ffd83dbSDimitry Andric void PthreadLockChecker::AcquireXNULock(const CallEvent &Call, 3645ffd83dbSDimitry Andric CheckerContext &C, 365e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 366e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false, 367e8d8bef9SDimitry Andric XNUSemantics, CheckKind); 3685ffd83dbSDimitry Andric } 3695ffd83dbSDimitry Andric 3705ffd83dbSDimitry Andric void PthreadLockChecker::TryPthreadLock(const CallEvent &Call, 3715ffd83dbSDimitry Andric CheckerContext &C, 372e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 373e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 374e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3755ffd83dbSDimitry Andric } 3765ffd83dbSDimitry Andric 3775ffd83dbSDimitry Andric void PthreadLockChecker::TryXNULock(const CallEvent &Call, CheckerContext &C, 378e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 379e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 380e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3815ffd83dbSDimitry Andric } 3825ffd83dbSDimitry Andric 3835ffd83dbSDimitry Andric void PthreadLockChecker::TryFuchsiaLock(const CallEvent &Call, 3845ffd83dbSDimitry Andric CheckerContext &C, 385e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 386e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 387e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3885ffd83dbSDimitry Andric } 3895ffd83dbSDimitry Andric 3905ffd83dbSDimitry Andric void PthreadLockChecker::TryC11Lock(const CallEvent &Call, CheckerContext &C, 391e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 392e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 393e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3945ffd83dbSDimitry Andric } 3955ffd83dbSDimitry Andric 3965ffd83dbSDimitry Andric void PthreadLockChecker::AcquireLockAux(const CallEvent &Call, 397e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 398e8d8bef9SDimitry Andric SVal MtxVal, bool IsTryLock, 399e8d8bef9SDimitry Andric enum LockingSemantics Semantics, 400e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 401e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 4025ffd83dbSDimitry Andric return; 4030b57cec5SDimitry Andric 404e8d8bef9SDimitry Andric const MemRegion *lockR = MtxVal.getAsRegion(); 4050b57cec5SDimitry Andric if (!lockR) 4060b57cec5SDimitry Andric return; 4070b57cec5SDimitry Andric 4080b57cec5SDimitry Andric ProgramStateRef state = C.getState(); 4090b57cec5SDimitry Andric const SymbolRef *sym = state->get<DestroyRetVal>(lockR); 4100b57cec5SDimitry Andric if (sym) 4110b57cec5SDimitry Andric state = resolvePossiblyDestroyedMutex(state, lockR, sym); 4120b57cec5SDimitry Andric 4130b57cec5SDimitry Andric if (const LockState *LState = state->get<LockMap>(lockR)) { 4140b57cec5SDimitry Andric if (LState->isLocked()) { 415e8d8bef9SDimitry Andric reportBug(C, BT_doublelock, MtxExpr, CheckKind, 416e8d8bef9SDimitry Andric "This lock has already been acquired"); 4170b57cec5SDimitry Andric return; 4180b57cec5SDimitry Andric } else if (LState->isDestroyed()) { 419e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, 420e8d8bef9SDimitry Andric "This lock has already been destroyed"); 4210b57cec5SDimitry Andric return; 4220b57cec5SDimitry Andric } 4230b57cec5SDimitry Andric } 4240b57cec5SDimitry Andric 4250b57cec5SDimitry Andric ProgramStateRef lockSucc = state; 426e8d8bef9SDimitry Andric if (IsTryLock) { 4270b57cec5SDimitry Andric // Bifurcate the state, and allow a mode where the lock acquisition fails. 4285ffd83dbSDimitry Andric SVal RetVal = Call.getReturnValue(); 4295ffd83dbSDimitry Andric if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) { 4300b57cec5SDimitry Andric ProgramStateRef lockFail; 431e8d8bef9SDimitry Andric switch (Semantics) { 4320b57cec5SDimitry Andric case PthreadSemantics: 4335ffd83dbSDimitry Andric std::tie(lockFail, lockSucc) = state->assume(*DefinedRetVal); 4340b57cec5SDimitry Andric break; 4350b57cec5SDimitry Andric case XNUSemantics: 4365ffd83dbSDimitry Andric std::tie(lockSucc, lockFail) = state->assume(*DefinedRetVal); 4370b57cec5SDimitry Andric break; 4380b57cec5SDimitry Andric default: 4390b57cec5SDimitry Andric llvm_unreachable("Unknown tryLock locking semantics"); 4400b57cec5SDimitry Andric } 4410b57cec5SDimitry Andric assert(lockFail && lockSucc); 4420b57cec5SDimitry Andric C.addTransition(lockFail); 4435ffd83dbSDimitry Andric } 4445ffd83dbSDimitry Andric // We might want to handle the case when the mutex lock function was inlined 4455ffd83dbSDimitry Andric // and returned an Unknown or Undefined value. 446e8d8bef9SDimitry Andric } else if (Semantics == PthreadSemantics) { 4470b57cec5SDimitry Andric // Assume that the return value was 0. 4485ffd83dbSDimitry Andric SVal RetVal = Call.getReturnValue(); 4495ffd83dbSDimitry Andric if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) { 4505ffd83dbSDimitry Andric // FIXME: If the lock function was inlined and returned true, 4515ffd83dbSDimitry Andric // we need to behave sanely - at least generate sink. 4525ffd83dbSDimitry Andric lockSucc = state->assume(*DefinedRetVal, false); 4530b57cec5SDimitry Andric assert(lockSucc); 4545ffd83dbSDimitry Andric } 4555ffd83dbSDimitry Andric // We might want to handle the case when the mutex lock function was inlined 4565ffd83dbSDimitry Andric // and returned an Unknown or Undefined value. 4570b57cec5SDimitry Andric } else { 4580b57cec5SDimitry Andric // XNU locking semantics return void on non-try locks 459e8d8bef9SDimitry Andric assert((Semantics == XNUSemantics) && "Unknown locking semantics"); 4600b57cec5SDimitry Andric lockSucc = state; 4610b57cec5SDimitry Andric } 4620b57cec5SDimitry Andric 4630b57cec5SDimitry Andric // Record that the lock was acquired. 4640b57cec5SDimitry Andric lockSucc = lockSucc->add<LockSet>(lockR); 4650b57cec5SDimitry Andric lockSucc = lockSucc->set<LockMap>(lockR, LockState::getLocked()); 4660b57cec5SDimitry Andric C.addTransition(lockSucc); 4670b57cec5SDimitry Andric } 4680b57cec5SDimitry Andric 4695ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseAnyLock(const CallEvent &Call, 4705ffd83dbSDimitry Andric CheckerContext &C, 471e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 472e8d8bef9SDimitry Andric ReleaseLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind); 4735ffd83dbSDimitry Andric } 4745ffd83dbSDimitry Andric 4755ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseLockAux(const CallEvent &Call, 476e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 477e8d8bef9SDimitry Andric SVal MtxVal, 478e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 479e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 4805ffd83dbSDimitry Andric return; 4810b57cec5SDimitry Andric 482e8d8bef9SDimitry Andric const MemRegion *lockR = MtxVal.getAsRegion(); 4830b57cec5SDimitry Andric if (!lockR) 4840b57cec5SDimitry Andric return; 4850b57cec5SDimitry Andric 4860b57cec5SDimitry Andric ProgramStateRef state = C.getState(); 4870b57cec5SDimitry Andric const SymbolRef *sym = state->get<DestroyRetVal>(lockR); 4880b57cec5SDimitry Andric if (sym) 4890b57cec5SDimitry Andric state = resolvePossiblyDestroyedMutex(state, lockR, sym); 4900b57cec5SDimitry Andric 4910b57cec5SDimitry Andric if (const LockState *LState = state->get<LockMap>(lockR)) { 4920b57cec5SDimitry Andric if (LState->isUnlocked()) { 493e8d8bef9SDimitry Andric reportBug(C, BT_doubleunlock, MtxExpr, CheckKind, 494e8d8bef9SDimitry Andric "This lock has already been unlocked"); 4950b57cec5SDimitry Andric return; 4960b57cec5SDimitry Andric } else if (LState->isDestroyed()) { 497e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, 498e8d8bef9SDimitry Andric "This lock has already been destroyed"); 4990b57cec5SDimitry Andric return; 5000b57cec5SDimitry Andric } 5010b57cec5SDimitry Andric } 5020b57cec5SDimitry Andric 5030b57cec5SDimitry Andric LockSetTy LS = state->get<LockSet>(); 5040b57cec5SDimitry Andric 5050b57cec5SDimitry Andric if (!LS.isEmpty()) { 5060b57cec5SDimitry Andric const MemRegion *firstLockR = LS.getHead(); 5070b57cec5SDimitry Andric if (firstLockR != lockR) { 508e8d8bef9SDimitry Andric reportBug(C, BT_lor, MtxExpr, CheckKind, 509e8d8bef9SDimitry Andric "This was not the most recently acquired lock. Possible lock " 510e8d8bef9SDimitry Andric "order reversal"); 5110b57cec5SDimitry Andric return; 5120b57cec5SDimitry Andric } 5130b57cec5SDimitry Andric // Record that the lock was released. 5140b57cec5SDimitry Andric state = state->set<LockSet>(LS.getTail()); 5150b57cec5SDimitry Andric } 5160b57cec5SDimitry Andric 5170b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getUnlocked()); 5180b57cec5SDimitry Andric C.addTransition(state); 5190b57cec5SDimitry Andric } 5200b57cec5SDimitry Andric 5215ffd83dbSDimitry Andric void PthreadLockChecker::DestroyPthreadLock(const CallEvent &Call, 5225ffd83dbSDimitry Andric CheckerContext &C, 523e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 524e8d8bef9SDimitry Andric DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), 525e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 5265ffd83dbSDimitry Andric } 5275ffd83dbSDimitry Andric 5285ffd83dbSDimitry Andric void PthreadLockChecker::DestroyXNULock(const CallEvent &Call, 5295ffd83dbSDimitry Andric CheckerContext &C, 530e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 531e8d8bef9SDimitry Andric DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), XNUSemantics, 532e8d8bef9SDimitry Andric CheckKind); 5335ffd83dbSDimitry Andric } 5345ffd83dbSDimitry Andric 5355ffd83dbSDimitry Andric void PthreadLockChecker::DestroyLockAux(const CallEvent &Call, 536e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 537e8d8bef9SDimitry Andric SVal MtxVal, 538e8d8bef9SDimitry Andric enum LockingSemantics Semantics, 539e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 540e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 5415ffd83dbSDimitry Andric return; 5420b57cec5SDimitry Andric 543e8d8bef9SDimitry Andric const MemRegion *LockR = MtxVal.getAsRegion(); 5440b57cec5SDimitry Andric if (!LockR) 5450b57cec5SDimitry Andric return; 5460b57cec5SDimitry Andric 5470b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 5480b57cec5SDimitry Andric 5490b57cec5SDimitry Andric const SymbolRef *sym = State->get<DestroyRetVal>(LockR); 5500b57cec5SDimitry Andric if (sym) 5510b57cec5SDimitry Andric State = resolvePossiblyDestroyedMutex(State, LockR, sym); 5520b57cec5SDimitry Andric 5530b57cec5SDimitry Andric const LockState *LState = State->get<LockMap>(LockR); 5540b57cec5SDimitry Andric // Checking the return value of the destroy method only in the case of 5550b57cec5SDimitry Andric // PthreadSemantics 556e8d8bef9SDimitry Andric if (Semantics == PthreadSemantics) { 5570b57cec5SDimitry Andric if (!LState || LState->isUnlocked()) { 5585ffd83dbSDimitry Andric SymbolRef sym = Call.getReturnValue().getAsSymbol(); 5590b57cec5SDimitry Andric if (!sym) { 5600b57cec5SDimitry Andric State = State->remove<LockMap>(LockR); 5610b57cec5SDimitry Andric C.addTransition(State); 5620b57cec5SDimitry Andric return; 5630b57cec5SDimitry Andric } 5640b57cec5SDimitry Andric State = State->set<DestroyRetVal>(LockR, sym); 5650b57cec5SDimitry Andric if (LState && LState->isUnlocked()) 5660b57cec5SDimitry Andric State = State->set<LockMap>( 5670b57cec5SDimitry Andric LockR, LockState::getUnlockedAndPossiblyDestroyed()); 5680b57cec5SDimitry Andric else 5690b57cec5SDimitry Andric State = State->set<LockMap>( 5700b57cec5SDimitry Andric LockR, LockState::getUntouchedAndPossiblyDestroyed()); 5710b57cec5SDimitry Andric C.addTransition(State); 5720b57cec5SDimitry Andric return; 5730b57cec5SDimitry Andric } 5740b57cec5SDimitry Andric } else { 5750b57cec5SDimitry Andric if (!LState || LState->isUnlocked()) { 5760b57cec5SDimitry Andric State = State->set<LockMap>(LockR, LockState::getDestroyed()); 5770b57cec5SDimitry Andric C.addTransition(State); 5780b57cec5SDimitry Andric return; 5790b57cec5SDimitry Andric } 5800b57cec5SDimitry Andric } 5810b57cec5SDimitry Andric 582e8d8bef9SDimitry Andric StringRef Message = LState->isLocked() 583e8d8bef9SDimitry Andric ? "This lock is still locked" 584e8d8bef9SDimitry Andric : "This lock has already been destroyed"; 5850b57cec5SDimitry Andric 586e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message); 5870b57cec5SDimitry Andric } 5880b57cec5SDimitry Andric 5895ffd83dbSDimitry Andric void PthreadLockChecker::InitAnyLock(const CallEvent &Call, CheckerContext &C, 590e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 591e8d8bef9SDimitry Andric InitLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind); 5925ffd83dbSDimitry Andric } 5935ffd83dbSDimitry Andric 5945ffd83dbSDimitry Andric void PthreadLockChecker::InitLockAux(const CallEvent &Call, CheckerContext &C, 595e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 596e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 597e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 5985ffd83dbSDimitry Andric return; 5990b57cec5SDimitry Andric 600e8d8bef9SDimitry Andric const MemRegion *LockR = MtxVal.getAsRegion(); 6010b57cec5SDimitry Andric if (!LockR) 6020b57cec5SDimitry Andric return; 6030b57cec5SDimitry Andric 6040b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 6050b57cec5SDimitry Andric 6060b57cec5SDimitry Andric const SymbolRef *sym = State->get<DestroyRetVal>(LockR); 6070b57cec5SDimitry Andric if (sym) 6080b57cec5SDimitry Andric State = resolvePossiblyDestroyedMutex(State, LockR, sym); 6090b57cec5SDimitry Andric 6100b57cec5SDimitry Andric const struct LockState *LState = State->get<LockMap>(LockR); 6110b57cec5SDimitry Andric if (!LState || LState->isDestroyed()) { 6120b57cec5SDimitry Andric State = State->set<LockMap>(LockR, LockState::getUnlocked()); 6130b57cec5SDimitry Andric C.addTransition(State); 6140b57cec5SDimitry Andric return; 6150b57cec5SDimitry Andric } 6160b57cec5SDimitry Andric 617e8d8bef9SDimitry Andric StringRef Message = LState->isLocked() 618e8d8bef9SDimitry Andric ? "This lock is still being held" 619e8d8bef9SDimitry Andric : "This lock has already been initialized"; 6200b57cec5SDimitry Andric 621e8d8bef9SDimitry Andric reportBug(C, BT_initlock, MtxExpr, CheckKind, Message); 6220b57cec5SDimitry Andric } 6230b57cec5SDimitry Andric 624e8d8bef9SDimitry Andric void PthreadLockChecker::reportBug(CheckerContext &C, 625e8d8bef9SDimitry Andric std::unique_ptr<BugType> BT[], 626e8d8bef9SDimitry Andric const Expr *MtxExpr, CheckerKind CheckKind, 627e8d8bef9SDimitry Andric StringRef Desc) const { 6280b57cec5SDimitry Andric ExplodedNode *N = C.generateErrorNode(); 6290b57cec5SDimitry Andric if (!N) 6300b57cec5SDimitry Andric return; 631e8d8bef9SDimitry Andric initBugType(CheckKind); 632e8d8bef9SDimitry Andric auto Report = 633e8d8bef9SDimitry Andric std::make_unique<PathSensitiveBugReport>(*BT[CheckKind], Desc, N); 634e8d8bef9SDimitry Andric Report->addRange(MtxExpr->getSourceRange()); 6350b57cec5SDimitry Andric C.emitReport(std::move(Report)); 6360b57cec5SDimitry Andric } 6370b57cec5SDimitry Andric 6380b57cec5SDimitry Andric void PthreadLockChecker::checkDeadSymbols(SymbolReaper &SymReaper, 6390b57cec5SDimitry Andric CheckerContext &C) const { 6400b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 6410b57cec5SDimitry Andric 6425ffd83dbSDimitry Andric for (auto I : State->get<DestroyRetVal>()) { 6435ffd83dbSDimitry Andric // Once the return value symbol dies, no more checks can be performed 6445ffd83dbSDimitry Andric // against it. See if the return value was checked before this point. 6455ffd83dbSDimitry Andric // This would remove the symbol from the map as well. 6465ffd83dbSDimitry Andric if (SymReaper.isDead(I.second)) 6475ffd83dbSDimitry Andric State = resolvePossiblyDestroyedMutex(State, I.first, &I.second); 6480b57cec5SDimitry Andric } 6495ffd83dbSDimitry Andric 6505ffd83dbSDimitry Andric for (auto I : State->get<LockMap>()) { 6515ffd83dbSDimitry Andric // Stop tracking dead mutex regions as well. 652fe6060f1SDimitry Andric if (!SymReaper.isLiveRegion(I.first)) { 6535ffd83dbSDimitry Andric State = State->remove<LockMap>(I.first); 654fe6060f1SDimitry Andric State = State->remove<DestroyRetVal>(I.first); 655fe6060f1SDimitry Andric } 6565ffd83dbSDimitry Andric } 6575ffd83dbSDimitry Andric 6585ffd83dbSDimitry Andric // TODO: We probably need to clean up the lock stack as well. 6595ffd83dbSDimitry Andric // It is tricky though: even if the mutex cannot be unlocked anymore, 6605ffd83dbSDimitry Andric // it can still participate in lock order reversal resolution. 6615ffd83dbSDimitry Andric 6620b57cec5SDimitry Andric C.addTransition(State); 6630b57cec5SDimitry Andric } 6640b57cec5SDimitry Andric 6655ffd83dbSDimitry Andric ProgramStateRef PthreadLockChecker::checkRegionChanges( 6665ffd83dbSDimitry Andric ProgramStateRef State, const InvalidatedSymbols *Symbols, 6675ffd83dbSDimitry Andric ArrayRef<const MemRegion *> ExplicitRegions, 6685ffd83dbSDimitry Andric ArrayRef<const MemRegion *> Regions, const LocationContext *LCtx, 6695ffd83dbSDimitry Andric const CallEvent *Call) const { 6705ffd83dbSDimitry Andric 6715ffd83dbSDimitry Andric bool IsLibraryFunction = false; 6725ffd83dbSDimitry Andric if (Call && Call->isGlobalCFunction()) { 6735ffd83dbSDimitry Andric // Avoid invalidating mutex state when a known supported function is called. 6745ffd83dbSDimitry Andric if (PThreadCallbacks.lookup(*Call) || FuchsiaCallbacks.lookup(*Call) || 6755ffd83dbSDimitry Andric C11Callbacks.lookup(*Call)) 6765ffd83dbSDimitry Andric return State; 6775ffd83dbSDimitry Andric 6785ffd83dbSDimitry Andric if (Call->isInSystemHeader()) 6795ffd83dbSDimitry Andric IsLibraryFunction = true; 6805ffd83dbSDimitry Andric } 6815ffd83dbSDimitry Andric 6825ffd83dbSDimitry Andric for (auto R : Regions) { 6835ffd83dbSDimitry Andric // We assume that system library function wouldn't touch the mutex unless 6845ffd83dbSDimitry Andric // it takes the mutex explicitly as an argument. 6855ffd83dbSDimitry Andric // FIXME: This is a bit quadratic. 686349cc55cSDimitry Andric if (IsLibraryFunction && !llvm::is_contained(ExplicitRegions, R)) 6875ffd83dbSDimitry Andric continue; 6885ffd83dbSDimitry Andric 6895ffd83dbSDimitry Andric State = State->remove<LockMap>(R); 6905ffd83dbSDimitry Andric State = State->remove<DestroyRetVal>(R); 6915ffd83dbSDimitry Andric 6925ffd83dbSDimitry Andric // TODO: We need to invalidate the lock stack as well. This is tricky 6935ffd83dbSDimitry Andric // to implement correctly and efficiently though, because the effects 6945ffd83dbSDimitry Andric // of mutex escapes on lock order may be fairly varied. 6955ffd83dbSDimitry Andric } 6965ffd83dbSDimitry Andric 6975ffd83dbSDimitry Andric return State; 6985ffd83dbSDimitry Andric } 6995ffd83dbSDimitry Andric 7005ffd83dbSDimitry Andric void ento::registerPthreadLockBase(CheckerManager &mgr) { 7010b57cec5SDimitry Andric mgr.registerChecker<PthreadLockChecker>(); 7020b57cec5SDimitry Andric } 7030b57cec5SDimitry Andric 7045ffd83dbSDimitry Andric bool ento::shouldRegisterPthreadLockBase(const CheckerManager &mgr) { return true; } 7055ffd83dbSDimitry Andric 7065ffd83dbSDimitry Andric #define REGISTER_CHECKER(name) \ 7075ffd83dbSDimitry Andric void ento::register##name(CheckerManager &mgr) { \ 7085ffd83dbSDimitry Andric PthreadLockChecker *checker = mgr.getChecker<PthreadLockChecker>(); \ 7095ffd83dbSDimitry Andric checker->ChecksEnabled[PthreadLockChecker::CK_##name] = true; \ 7105ffd83dbSDimitry Andric checker->CheckNames[PthreadLockChecker::CK_##name] = \ 7115ffd83dbSDimitry Andric mgr.getCurrentCheckerName(); \ 7125ffd83dbSDimitry Andric } \ 7135ffd83dbSDimitry Andric \ 7145ffd83dbSDimitry Andric bool ento::shouldRegister##name(const CheckerManager &mgr) { return true; } 7155ffd83dbSDimitry Andric 7165ffd83dbSDimitry Andric REGISTER_CHECKER(PthreadLockChecker) 7175ffd83dbSDimitry Andric REGISTER_CHECKER(FuchsiaLockChecker) 7185ffd83dbSDimitry Andric REGISTER_CHECKER(C11LockChecker) 719