10b57cec5SDimitry Andric //===--- PthreadLockChecker.cpp - Check for locking problems ---*- C++ -*--===// 20b57cec5SDimitry Andric // 30b57cec5SDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 40b57cec5SDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 50b57cec5SDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 60b57cec5SDimitry Andric // 70b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 80b57cec5SDimitry Andric // 95ffd83dbSDimitry Andric // This file defines: 105ffd83dbSDimitry Andric // * PthreadLockChecker, a simple lock -> unlock checker. 115ffd83dbSDimitry Andric // Which also checks for XNU locks, which behave similarly enough to share 125ffd83dbSDimitry Andric // code. 135ffd83dbSDimitry Andric // * FuchsiaLocksChecker, which is also rather similar. 145ffd83dbSDimitry Andric // * C11LockChecker which also closely follows Pthread semantics. 155ffd83dbSDimitry Andric // 165ffd83dbSDimitry Andric // TODO: Path notes. 170b57cec5SDimitry Andric // 180b57cec5SDimitry Andric //===----------------------------------------------------------------------===// 190b57cec5SDimitry Andric 200b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" 210b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" 220b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/Checker.h" 230b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/CheckerManager.h" 245ffd83dbSDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" 250b57cec5SDimitry Andric #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" 260b57cec5SDimitry Andric 270b57cec5SDimitry Andric using namespace clang; 280b57cec5SDimitry Andric using namespace ento; 290b57cec5SDimitry Andric 300b57cec5SDimitry Andric namespace { 310b57cec5SDimitry Andric 320b57cec5SDimitry Andric struct LockState { 330b57cec5SDimitry Andric enum Kind { 340b57cec5SDimitry Andric Destroyed, 350b57cec5SDimitry Andric Locked, 360b57cec5SDimitry Andric Unlocked, 370b57cec5SDimitry Andric UntouchedAndPossiblyDestroyed, 380b57cec5SDimitry Andric UnlockedAndPossiblyDestroyed 390b57cec5SDimitry Andric } K; 400b57cec5SDimitry Andric 410b57cec5SDimitry Andric private: 420b57cec5SDimitry Andric LockState(Kind K) : K(K) {} 430b57cec5SDimitry Andric 440b57cec5SDimitry Andric public: 450b57cec5SDimitry Andric static LockState getLocked() { return LockState(Locked); } 460b57cec5SDimitry Andric static LockState getUnlocked() { return LockState(Unlocked); } 470b57cec5SDimitry Andric static LockState getDestroyed() { return LockState(Destroyed); } 480b57cec5SDimitry Andric static LockState getUntouchedAndPossiblyDestroyed() { 490b57cec5SDimitry Andric return LockState(UntouchedAndPossiblyDestroyed); 500b57cec5SDimitry Andric } 510b57cec5SDimitry Andric static LockState getUnlockedAndPossiblyDestroyed() { 520b57cec5SDimitry Andric return LockState(UnlockedAndPossiblyDestroyed); 530b57cec5SDimitry Andric } 540b57cec5SDimitry Andric 555ffd83dbSDimitry Andric bool operator==(const LockState &X) const { return K == X.K; } 560b57cec5SDimitry Andric 570b57cec5SDimitry Andric bool isLocked() const { return K == Locked; } 580b57cec5SDimitry Andric bool isUnlocked() const { return K == Unlocked; } 590b57cec5SDimitry Andric bool isDestroyed() const { return K == Destroyed; } 600b57cec5SDimitry Andric bool isUntouchedAndPossiblyDestroyed() const { 610b57cec5SDimitry Andric return K == UntouchedAndPossiblyDestroyed; 620b57cec5SDimitry Andric } 630b57cec5SDimitry Andric bool isUnlockedAndPossiblyDestroyed() const { 640b57cec5SDimitry Andric return K == UnlockedAndPossiblyDestroyed; 650b57cec5SDimitry Andric } 660b57cec5SDimitry Andric 675ffd83dbSDimitry Andric void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(K); } 680b57cec5SDimitry Andric }; 690b57cec5SDimitry Andric 705ffd83dbSDimitry Andric class PthreadLockChecker : public Checker<check::PostCall, check::DeadSymbols, 715ffd83dbSDimitry Andric check::RegionChanges> { 720b57cec5SDimitry Andric public: 735ffd83dbSDimitry Andric enum LockingSemantics { NotApplicable = 0, PthreadSemantics, XNUSemantics }; 745ffd83dbSDimitry Andric enum CheckerKind { 755ffd83dbSDimitry Andric CK_PthreadLockChecker, 765ffd83dbSDimitry Andric CK_FuchsiaLockChecker, 775ffd83dbSDimitry Andric CK_C11LockChecker, 785ffd83dbSDimitry Andric CK_NumCheckKinds 795ffd83dbSDimitry Andric }; 805ffd83dbSDimitry Andric DefaultBool ChecksEnabled[CK_NumCheckKinds]; 815ffd83dbSDimitry Andric CheckerNameRef CheckNames[CK_NumCheckKinds]; 820b57cec5SDimitry Andric 835ffd83dbSDimitry Andric private: 845ffd83dbSDimitry Andric typedef void (PthreadLockChecker::*FnCheck)(const CallEvent &Call, 855ffd83dbSDimitry Andric CheckerContext &C, 86e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 875ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> PThreadCallbacks = { 885ffd83dbSDimitry Andric // Init. 895ffd83dbSDimitry Andric {{"pthread_mutex_init", 2}, &PthreadLockChecker::InitAnyLock}, 905ffd83dbSDimitry Andric // TODO: pthread_rwlock_init(2 arguments). 915ffd83dbSDimitry Andric // TODO: lck_mtx_init(3 arguments). 925ffd83dbSDimitry Andric // TODO: lck_mtx_alloc_init(2 arguments) => returns the mutex. 935ffd83dbSDimitry Andric // TODO: lck_rw_init(3 arguments). 945ffd83dbSDimitry Andric // TODO: lck_rw_alloc_init(2 arguments) => returns the mutex. 950b57cec5SDimitry Andric 965ffd83dbSDimitry Andric // Acquire. 975ffd83dbSDimitry Andric {{"pthread_mutex_lock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 985ffd83dbSDimitry Andric {{"pthread_rwlock_rdlock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 995ffd83dbSDimitry Andric {{"pthread_rwlock_wrlock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 1005ffd83dbSDimitry Andric {{"lck_mtx_lock", 1}, &PthreadLockChecker::AcquireXNULock}, 1015ffd83dbSDimitry Andric {{"lck_rw_lock_exclusive", 1}, &PthreadLockChecker::AcquireXNULock}, 1025ffd83dbSDimitry Andric {{"lck_rw_lock_shared", 1}, &PthreadLockChecker::AcquireXNULock}, 1035ffd83dbSDimitry Andric 1045ffd83dbSDimitry Andric // Try. 1055ffd83dbSDimitry Andric {{"pthread_mutex_trylock", 1}, &PthreadLockChecker::TryPthreadLock}, 1065ffd83dbSDimitry Andric {{"pthread_rwlock_tryrdlock", 1}, &PthreadLockChecker::TryPthreadLock}, 1075ffd83dbSDimitry Andric {{"pthread_rwlock_trywrlock", 1}, &PthreadLockChecker::TryPthreadLock}, 1085ffd83dbSDimitry Andric {{"lck_mtx_try_lock", 1}, &PthreadLockChecker::TryXNULock}, 1095ffd83dbSDimitry Andric {{"lck_rw_try_lock_exclusive", 1}, &PthreadLockChecker::TryXNULock}, 1105ffd83dbSDimitry Andric {{"lck_rw_try_lock_shared", 1}, &PthreadLockChecker::TryXNULock}, 1115ffd83dbSDimitry Andric 1125ffd83dbSDimitry Andric // Release. 1135ffd83dbSDimitry Andric {{"pthread_mutex_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1145ffd83dbSDimitry Andric {{"pthread_rwlock_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1155ffd83dbSDimitry Andric {{"lck_mtx_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1165ffd83dbSDimitry Andric {{"lck_rw_unlock_exclusive", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1175ffd83dbSDimitry Andric {{"lck_rw_unlock_shared", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1185ffd83dbSDimitry Andric {{"lck_rw_done", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1195ffd83dbSDimitry Andric 1205ffd83dbSDimitry Andric // Destroy. 1215ffd83dbSDimitry Andric {{"pthread_mutex_destroy", 1}, &PthreadLockChecker::DestroyPthreadLock}, 1225ffd83dbSDimitry Andric {{"lck_mtx_destroy", 2}, &PthreadLockChecker::DestroyXNULock}, 1235ffd83dbSDimitry Andric // TODO: pthread_rwlock_destroy(1 argument). 1245ffd83dbSDimitry Andric // TODO: lck_rw_destroy(2 arguments). 1255ffd83dbSDimitry Andric }; 1265ffd83dbSDimitry Andric 1275ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> FuchsiaCallbacks = { 1285ffd83dbSDimitry Andric // Init. 1295ffd83dbSDimitry Andric {{"spin_lock_init", 1}, &PthreadLockChecker::InitAnyLock}, 1305ffd83dbSDimitry Andric 1315ffd83dbSDimitry Andric // Acquire. 1325ffd83dbSDimitry Andric {{"spin_lock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 1335ffd83dbSDimitry Andric {{"spin_lock_save", 3}, &PthreadLockChecker::AcquirePthreadLock}, 1345ffd83dbSDimitry Andric {{"sync_mutex_lock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 1355ffd83dbSDimitry Andric {{"sync_mutex_lock_with_waiter", 1}, 1365ffd83dbSDimitry Andric &PthreadLockChecker::AcquirePthreadLock}, 1375ffd83dbSDimitry Andric 1385ffd83dbSDimitry Andric // Try. 1395ffd83dbSDimitry Andric {{"spin_trylock", 1}, &PthreadLockChecker::TryFuchsiaLock}, 1405ffd83dbSDimitry Andric {{"sync_mutex_trylock", 1}, &PthreadLockChecker::TryFuchsiaLock}, 1415ffd83dbSDimitry Andric {{"sync_mutex_timedlock", 2}, &PthreadLockChecker::TryFuchsiaLock}, 1425ffd83dbSDimitry Andric 1435ffd83dbSDimitry Andric // Release. 1445ffd83dbSDimitry Andric {{"spin_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1455ffd83dbSDimitry Andric {{"spin_unlock_restore", 3}, &PthreadLockChecker::ReleaseAnyLock}, 1465ffd83dbSDimitry Andric {{"sync_mutex_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1475ffd83dbSDimitry Andric }; 1485ffd83dbSDimitry Andric 1495ffd83dbSDimitry Andric CallDescriptionMap<FnCheck> C11Callbacks = { 1505ffd83dbSDimitry Andric // Init. 1515ffd83dbSDimitry Andric {{"mtx_init", 2}, &PthreadLockChecker::InitAnyLock}, 1525ffd83dbSDimitry Andric 1535ffd83dbSDimitry Andric // Acquire. 1545ffd83dbSDimitry Andric {{"mtx_lock", 1}, &PthreadLockChecker::AcquirePthreadLock}, 1555ffd83dbSDimitry Andric 1565ffd83dbSDimitry Andric // Try. 1575ffd83dbSDimitry Andric {{"mtx_trylock", 1}, &PthreadLockChecker::TryC11Lock}, 1585ffd83dbSDimitry Andric {{"mtx_timedlock", 2}, &PthreadLockChecker::TryC11Lock}, 1595ffd83dbSDimitry Andric 1605ffd83dbSDimitry Andric // Release. 1615ffd83dbSDimitry Andric {{"mtx_unlock", 1}, &PthreadLockChecker::ReleaseAnyLock}, 1625ffd83dbSDimitry Andric 1635ffd83dbSDimitry Andric // Destroy 1645ffd83dbSDimitry Andric {{"mtx_destroy", 1}, &PthreadLockChecker::DestroyPthreadLock}, 1655ffd83dbSDimitry Andric }; 1665ffd83dbSDimitry Andric 1670b57cec5SDimitry Andric ProgramStateRef resolvePossiblyDestroyedMutex(ProgramStateRef state, 1680b57cec5SDimitry Andric const MemRegion *lockR, 1690b57cec5SDimitry Andric const SymbolRef *sym) const; 170e8d8bef9SDimitry Andric void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 171e8d8bef9SDimitry Andric const Expr *MtxExpr, CheckerKind CheckKind, 172e8d8bef9SDimitry Andric StringRef Desc) const; 1735ffd83dbSDimitry Andric 1745ffd83dbSDimitry Andric // Init. 1755ffd83dbSDimitry Andric void InitAnyLock(const CallEvent &Call, CheckerContext &C, 176e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 177e8d8bef9SDimitry Andric void InitLockAux(const CallEvent &Call, CheckerContext &C, 178e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 179e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1805ffd83dbSDimitry Andric 1815ffd83dbSDimitry Andric // Lock, Try-lock. 1825ffd83dbSDimitry Andric void AcquirePthreadLock(const CallEvent &Call, CheckerContext &C, 183e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1845ffd83dbSDimitry Andric void AcquireXNULock(const CallEvent &Call, CheckerContext &C, 185e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1865ffd83dbSDimitry Andric void TryPthreadLock(const CallEvent &Call, CheckerContext &C, 187e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1885ffd83dbSDimitry Andric void TryXNULock(const CallEvent &Call, CheckerContext &C, 189e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1905ffd83dbSDimitry Andric void TryFuchsiaLock(const CallEvent &Call, CheckerContext &C, 191e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 1925ffd83dbSDimitry Andric void TryC11Lock(const CallEvent &Call, CheckerContext &C, 193e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 194e8d8bef9SDimitry Andric void AcquireLockAux(const CallEvent &Call, CheckerContext &C, 195e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, bool IsTryLock, 196e8d8bef9SDimitry Andric LockingSemantics Semantics, CheckerKind CheckKind) const; 1975ffd83dbSDimitry Andric 1985ffd83dbSDimitry Andric // Release. 1995ffd83dbSDimitry Andric void ReleaseAnyLock(const CallEvent &Call, CheckerContext &C, 200e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 201e8d8bef9SDimitry Andric void ReleaseLockAux(const CallEvent &Call, CheckerContext &C, 202e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 203e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 2045ffd83dbSDimitry Andric 2055ffd83dbSDimitry Andric // Destroy. 2065ffd83dbSDimitry Andric void DestroyPthreadLock(const CallEvent &Call, CheckerContext &C, 207e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 2085ffd83dbSDimitry Andric void DestroyXNULock(const CallEvent &Call, CheckerContext &C, 209e8d8bef9SDimitry Andric CheckerKind CheckKind) const; 210e8d8bef9SDimitry Andric void DestroyLockAux(const CallEvent &Call, CheckerContext &C, 211e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 212e8d8bef9SDimitry Andric LockingSemantics Semantics, CheckerKind CheckKind) const; 2135ffd83dbSDimitry Andric 2145ffd83dbSDimitry Andric public: 2155ffd83dbSDimitry Andric void checkPostCall(const CallEvent &Call, CheckerContext &C) const; 2165ffd83dbSDimitry Andric void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const; 2175ffd83dbSDimitry Andric ProgramStateRef 2185ffd83dbSDimitry Andric checkRegionChanges(ProgramStateRef State, const InvalidatedSymbols *Symbols, 2195ffd83dbSDimitry Andric ArrayRef<const MemRegion *> ExplicitRegions, 2205ffd83dbSDimitry Andric ArrayRef<const MemRegion *> Regions, 2215ffd83dbSDimitry Andric const LocationContext *LCtx, const CallEvent *Call) const; 2225ffd83dbSDimitry Andric void printState(raw_ostream &Out, ProgramStateRef State, const char *NL, 2235ffd83dbSDimitry Andric const char *Sep) const override; 2245ffd83dbSDimitry Andric 2255ffd83dbSDimitry Andric private: 2265ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds]; 2275ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds]; 2285ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds]; 2295ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds]; 2305ffd83dbSDimitry Andric mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds]; 2315ffd83dbSDimitry Andric 232e8d8bef9SDimitry Andric void initBugType(CheckerKind CheckKind) const { 233e8d8bef9SDimitry Andric if (BT_doublelock[CheckKind]) 2345ffd83dbSDimitry Andric return; 235e8d8bef9SDimitry Andric BT_doublelock[CheckKind].reset( 236e8d8bef9SDimitry Andric new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); 237e8d8bef9SDimitry Andric BT_doubleunlock[CheckKind].reset( 238e8d8bef9SDimitry Andric new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); 239e8d8bef9SDimitry Andric BT_destroylock[CheckKind].reset(new BugType{ 240e8d8bef9SDimitry Andric CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); 241e8d8bef9SDimitry Andric BT_initlock[CheckKind].reset(new BugType{ 242e8d8bef9SDimitry Andric CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); 243e8d8bef9SDimitry Andric BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], 2445ffd83dbSDimitry Andric "Lock order reversal", "Lock checker"}); 2455ffd83dbSDimitry Andric } 2460b57cec5SDimitry Andric }; 2470b57cec5SDimitry Andric } // end anonymous namespace 2480b57cec5SDimitry Andric 2490b57cec5SDimitry Andric // A stack of locks for tracking lock-unlock order. 2500b57cec5SDimitry Andric REGISTER_LIST_WITH_PROGRAMSTATE(LockSet, const MemRegion *) 2510b57cec5SDimitry Andric 2520b57cec5SDimitry Andric // An entry for tracking lock states. 2530b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(LockMap, const MemRegion *, LockState) 2540b57cec5SDimitry Andric 2550b57cec5SDimitry Andric // Return values for unresolved calls to pthread_mutex_destroy(). 2560b57cec5SDimitry Andric REGISTER_MAP_WITH_PROGRAMSTATE(DestroyRetVal, const MemRegion *, SymbolRef) 2570b57cec5SDimitry Andric 2585ffd83dbSDimitry Andric void PthreadLockChecker::checkPostCall(const CallEvent &Call, 2590b57cec5SDimitry Andric CheckerContext &C) const { 2605ffd83dbSDimitry Andric // An additional umbrella check that all functions modeled by this checker 2615ffd83dbSDimitry Andric // are global C functions. 2625ffd83dbSDimitry Andric // TODO: Maybe make this the default behavior of CallDescription 2635ffd83dbSDimitry Andric // with exactly one identifier? 2645ffd83dbSDimitry Andric // FIXME: Try to handle cases when the implementation was inlined rather 2655ffd83dbSDimitry Andric // than just giving up. 2665ffd83dbSDimitry Andric if (!Call.isGlobalCFunction() || C.wasInlined) 2670b57cec5SDimitry Andric return; 2680b57cec5SDimitry Andric 2695ffd83dbSDimitry Andric if (const FnCheck *Callback = PThreadCallbacks.lookup(Call)) 2705ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_PthreadLockChecker); 2715ffd83dbSDimitry Andric else if (const FnCheck *Callback = FuchsiaCallbacks.lookup(Call)) 2725ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_FuchsiaLockChecker); 2735ffd83dbSDimitry Andric else if (const FnCheck *Callback = C11Callbacks.lookup(Call)) 2745ffd83dbSDimitry Andric (this->**Callback)(Call, C, CK_C11LockChecker); 2750b57cec5SDimitry Andric } 2760b57cec5SDimitry Andric 2770b57cec5SDimitry Andric // When a lock is destroyed, in some semantics(like PthreadSemantics) we are not 2780b57cec5SDimitry Andric // sure if the destroy call has succeeded or failed, and the lock enters one of 2790b57cec5SDimitry Andric // the 'possibly destroyed' state. There is a short time frame for the 2800b57cec5SDimitry Andric // programmer to check the return value to see if the lock was successfully 2810b57cec5SDimitry Andric // destroyed. Before we model the next operation over that lock, we call this 2820b57cec5SDimitry Andric // function to see if the return value was checked by now and set the lock state 2830b57cec5SDimitry Andric // - either to destroyed state or back to its previous state. 2840b57cec5SDimitry Andric 2850b57cec5SDimitry Andric // In PthreadSemantics, pthread_mutex_destroy() returns zero if the lock is 2860b57cec5SDimitry Andric // successfully destroyed and it returns a non-zero value otherwise. 2870b57cec5SDimitry Andric ProgramStateRef PthreadLockChecker::resolvePossiblyDestroyedMutex( 2880b57cec5SDimitry Andric ProgramStateRef state, const MemRegion *lockR, const SymbolRef *sym) const { 2890b57cec5SDimitry Andric const LockState *lstate = state->get<LockMap>(lockR); 2900b57cec5SDimitry Andric // Existence in DestroyRetVal ensures existence in LockMap. 2910b57cec5SDimitry Andric // Existence in Destroyed also ensures that the lock state for lockR is either 2920b57cec5SDimitry Andric // UntouchedAndPossiblyDestroyed or UnlockedAndPossiblyDestroyed. 2930b57cec5SDimitry Andric assert(lstate->isUntouchedAndPossiblyDestroyed() || 2940b57cec5SDimitry Andric lstate->isUnlockedAndPossiblyDestroyed()); 2950b57cec5SDimitry Andric 2960b57cec5SDimitry Andric ConstraintManager &CMgr = state->getConstraintManager(); 2970b57cec5SDimitry Andric ConditionTruthVal retZero = CMgr.isNull(state, *sym); 2980b57cec5SDimitry Andric if (retZero.isConstrainedFalse()) { 2990b57cec5SDimitry Andric if (lstate->isUntouchedAndPossiblyDestroyed()) 3000b57cec5SDimitry Andric state = state->remove<LockMap>(lockR); 3010b57cec5SDimitry Andric else if (lstate->isUnlockedAndPossiblyDestroyed()) 3020b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getUnlocked()); 3030b57cec5SDimitry Andric } else 3040b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getDestroyed()); 3050b57cec5SDimitry Andric 3060b57cec5SDimitry Andric // Removing the map entry (lockR, sym) from DestroyRetVal as the lock state is 3070b57cec5SDimitry Andric // now resolved. 3080b57cec5SDimitry Andric state = state->remove<DestroyRetVal>(lockR); 3090b57cec5SDimitry Andric return state; 3100b57cec5SDimitry Andric } 3110b57cec5SDimitry Andric 3120b57cec5SDimitry Andric void PthreadLockChecker::printState(raw_ostream &Out, ProgramStateRef State, 3130b57cec5SDimitry Andric const char *NL, const char *Sep) const { 3140b57cec5SDimitry Andric LockMapTy LM = State->get<LockMap>(); 3150b57cec5SDimitry Andric if (!LM.isEmpty()) { 3160b57cec5SDimitry Andric Out << Sep << "Mutex states:" << NL; 3170b57cec5SDimitry Andric for (auto I : LM) { 3180b57cec5SDimitry Andric I.first->dumpToStream(Out); 3190b57cec5SDimitry Andric if (I.second.isLocked()) 3200b57cec5SDimitry Andric Out << ": locked"; 3210b57cec5SDimitry Andric else if (I.second.isUnlocked()) 3220b57cec5SDimitry Andric Out << ": unlocked"; 3230b57cec5SDimitry Andric else if (I.second.isDestroyed()) 3240b57cec5SDimitry Andric Out << ": destroyed"; 3250b57cec5SDimitry Andric else if (I.second.isUntouchedAndPossiblyDestroyed()) 3260b57cec5SDimitry Andric Out << ": not tracked, possibly destroyed"; 3270b57cec5SDimitry Andric else if (I.second.isUnlockedAndPossiblyDestroyed()) 3280b57cec5SDimitry Andric Out << ": unlocked, possibly destroyed"; 3290b57cec5SDimitry Andric Out << NL; 3300b57cec5SDimitry Andric } 3310b57cec5SDimitry Andric } 3320b57cec5SDimitry Andric 3330b57cec5SDimitry Andric LockSetTy LS = State->get<LockSet>(); 3340b57cec5SDimitry Andric if (!LS.isEmpty()) { 3350b57cec5SDimitry Andric Out << Sep << "Mutex lock order:" << NL; 3360b57cec5SDimitry Andric for (auto I : LS) { 3370b57cec5SDimitry Andric I->dumpToStream(Out); 3380b57cec5SDimitry Andric Out << NL; 3390b57cec5SDimitry Andric } 3400b57cec5SDimitry Andric } 3410b57cec5SDimitry Andric 342*fe6060f1SDimitry Andric DestroyRetValTy DRV = State->get<DestroyRetVal>(); 343*fe6060f1SDimitry Andric if (!DRV.isEmpty()) { 344*fe6060f1SDimitry Andric Out << Sep << "Mutexes in unresolved possibly destroyed state:" << NL; 345*fe6060f1SDimitry Andric for (auto I : DRV) { 346*fe6060f1SDimitry Andric I.first->dumpToStream(Out); 347*fe6060f1SDimitry Andric Out << ": "; 348*fe6060f1SDimitry Andric I.second->dumpToStream(Out); 349*fe6060f1SDimitry Andric Out << NL; 350*fe6060f1SDimitry Andric } 351*fe6060f1SDimitry Andric } 3520b57cec5SDimitry Andric } 3530b57cec5SDimitry Andric 3545ffd83dbSDimitry Andric void PthreadLockChecker::AcquirePthreadLock(const CallEvent &Call, 3555ffd83dbSDimitry Andric CheckerContext &C, 356e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 357e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false, 358e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3595ffd83dbSDimitry Andric } 3605ffd83dbSDimitry Andric 3615ffd83dbSDimitry Andric void PthreadLockChecker::AcquireXNULock(const CallEvent &Call, 3625ffd83dbSDimitry Andric CheckerContext &C, 363e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 364e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), false, 365e8d8bef9SDimitry Andric XNUSemantics, CheckKind); 3665ffd83dbSDimitry Andric } 3675ffd83dbSDimitry Andric 3685ffd83dbSDimitry Andric void PthreadLockChecker::TryPthreadLock(const CallEvent &Call, 3695ffd83dbSDimitry Andric CheckerContext &C, 370e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 371e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 372e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3735ffd83dbSDimitry Andric } 3745ffd83dbSDimitry Andric 3755ffd83dbSDimitry Andric void PthreadLockChecker::TryXNULock(const CallEvent &Call, CheckerContext &C, 376e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 377e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 378e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3795ffd83dbSDimitry Andric } 3805ffd83dbSDimitry Andric 3815ffd83dbSDimitry Andric void PthreadLockChecker::TryFuchsiaLock(const CallEvent &Call, 3825ffd83dbSDimitry Andric CheckerContext &C, 383e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 384e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 385e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3865ffd83dbSDimitry Andric } 3875ffd83dbSDimitry Andric 3885ffd83dbSDimitry Andric void PthreadLockChecker::TryC11Lock(const CallEvent &Call, CheckerContext &C, 389e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 390e8d8bef9SDimitry Andric AcquireLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), true, 391e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 3925ffd83dbSDimitry Andric } 3935ffd83dbSDimitry Andric 3945ffd83dbSDimitry Andric void PthreadLockChecker::AcquireLockAux(const CallEvent &Call, 395e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 396e8d8bef9SDimitry Andric SVal MtxVal, bool IsTryLock, 397e8d8bef9SDimitry Andric enum LockingSemantics Semantics, 398e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 399e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 4005ffd83dbSDimitry Andric return; 4010b57cec5SDimitry Andric 402e8d8bef9SDimitry Andric const MemRegion *lockR = MtxVal.getAsRegion(); 4030b57cec5SDimitry Andric if (!lockR) 4040b57cec5SDimitry Andric return; 4050b57cec5SDimitry Andric 4060b57cec5SDimitry Andric ProgramStateRef state = C.getState(); 4070b57cec5SDimitry Andric const SymbolRef *sym = state->get<DestroyRetVal>(lockR); 4080b57cec5SDimitry Andric if (sym) 4090b57cec5SDimitry Andric state = resolvePossiblyDestroyedMutex(state, lockR, sym); 4100b57cec5SDimitry Andric 4110b57cec5SDimitry Andric if (const LockState *LState = state->get<LockMap>(lockR)) { 4120b57cec5SDimitry Andric if (LState->isLocked()) { 413e8d8bef9SDimitry Andric reportBug(C, BT_doublelock, MtxExpr, CheckKind, 414e8d8bef9SDimitry Andric "This lock has already been acquired"); 4150b57cec5SDimitry Andric return; 4160b57cec5SDimitry Andric } else if (LState->isDestroyed()) { 417e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, 418e8d8bef9SDimitry Andric "This lock has already been destroyed"); 4190b57cec5SDimitry Andric return; 4200b57cec5SDimitry Andric } 4210b57cec5SDimitry Andric } 4220b57cec5SDimitry Andric 4230b57cec5SDimitry Andric ProgramStateRef lockSucc = state; 424e8d8bef9SDimitry Andric if (IsTryLock) { 4250b57cec5SDimitry Andric // Bifurcate the state, and allow a mode where the lock acquisition fails. 4265ffd83dbSDimitry Andric SVal RetVal = Call.getReturnValue(); 4275ffd83dbSDimitry Andric if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) { 4280b57cec5SDimitry Andric ProgramStateRef lockFail; 429e8d8bef9SDimitry Andric switch (Semantics) { 4300b57cec5SDimitry Andric case PthreadSemantics: 4315ffd83dbSDimitry Andric std::tie(lockFail, lockSucc) = state->assume(*DefinedRetVal); 4320b57cec5SDimitry Andric break; 4330b57cec5SDimitry Andric case XNUSemantics: 4345ffd83dbSDimitry Andric std::tie(lockSucc, lockFail) = state->assume(*DefinedRetVal); 4350b57cec5SDimitry Andric break; 4360b57cec5SDimitry Andric default: 4370b57cec5SDimitry Andric llvm_unreachable("Unknown tryLock locking semantics"); 4380b57cec5SDimitry Andric } 4390b57cec5SDimitry Andric assert(lockFail && lockSucc); 4400b57cec5SDimitry Andric C.addTransition(lockFail); 4415ffd83dbSDimitry Andric } 4425ffd83dbSDimitry Andric // We might want to handle the case when the mutex lock function was inlined 4435ffd83dbSDimitry Andric // and returned an Unknown or Undefined value. 444e8d8bef9SDimitry Andric } else if (Semantics == PthreadSemantics) { 4450b57cec5SDimitry Andric // Assume that the return value was 0. 4465ffd83dbSDimitry Andric SVal RetVal = Call.getReturnValue(); 4475ffd83dbSDimitry Andric if (auto DefinedRetVal = RetVal.getAs<DefinedSVal>()) { 4485ffd83dbSDimitry Andric // FIXME: If the lock function was inlined and returned true, 4495ffd83dbSDimitry Andric // we need to behave sanely - at least generate sink. 4505ffd83dbSDimitry Andric lockSucc = state->assume(*DefinedRetVal, false); 4510b57cec5SDimitry Andric assert(lockSucc); 4525ffd83dbSDimitry Andric } 4535ffd83dbSDimitry Andric // We might want to handle the case when the mutex lock function was inlined 4545ffd83dbSDimitry Andric // and returned an Unknown or Undefined value. 4550b57cec5SDimitry Andric } else { 4560b57cec5SDimitry Andric // XNU locking semantics return void on non-try locks 457e8d8bef9SDimitry Andric assert((Semantics == XNUSemantics) && "Unknown locking semantics"); 4580b57cec5SDimitry Andric lockSucc = state; 4590b57cec5SDimitry Andric } 4600b57cec5SDimitry Andric 4610b57cec5SDimitry Andric // Record that the lock was acquired. 4620b57cec5SDimitry Andric lockSucc = lockSucc->add<LockSet>(lockR); 4630b57cec5SDimitry Andric lockSucc = lockSucc->set<LockMap>(lockR, LockState::getLocked()); 4640b57cec5SDimitry Andric C.addTransition(lockSucc); 4650b57cec5SDimitry Andric } 4660b57cec5SDimitry Andric 4675ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseAnyLock(const CallEvent &Call, 4685ffd83dbSDimitry Andric CheckerContext &C, 469e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 470e8d8bef9SDimitry Andric ReleaseLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind); 4715ffd83dbSDimitry Andric } 4725ffd83dbSDimitry Andric 4735ffd83dbSDimitry Andric void PthreadLockChecker::ReleaseLockAux(const CallEvent &Call, 474e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 475e8d8bef9SDimitry Andric SVal MtxVal, 476e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 477e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 4785ffd83dbSDimitry Andric return; 4790b57cec5SDimitry Andric 480e8d8bef9SDimitry Andric const MemRegion *lockR = MtxVal.getAsRegion(); 4810b57cec5SDimitry Andric if (!lockR) 4820b57cec5SDimitry Andric return; 4830b57cec5SDimitry Andric 4840b57cec5SDimitry Andric ProgramStateRef state = C.getState(); 4850b57cec5SDimitry Andric const SymbolRef *sym = state->get<DestroyRetVal>(lockR); 4860b57cec5SDimitry Andric if (sym) 4870b57cec5SDimitry Andric state = resolvePossiblyDestroyedMutex(state, lockR, sym); 4880b57cec5SDimitry Andric 4890b57cec5SDimitry Andric if (const LockState *LState = state->get<LockMap>(lockR)) { 4900b57cec5SDimitry Andric if (LState->isUnlocked()) { 491e8d8bef9SDimitry Andric reportBug(C, BT_doubleunlock, MtxExpr, CheckKind, 492e8d8bef9SDimitry Andric "This lock has already been unlocked"); 4930b57cec5SDimitry Andric return; 4940b57cec5SDimitry Andric } else if (LState->isDestroyed()) { 495e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, 496e8d8bef9SDimitry Andric "This lock has already been destroyed"); 4970b57cec5SDimitry Andric return; 4980b57cec5SDimitry Andric } 4990b57cec5SDimitry Andric } 5000b57cec5SDimitry Andric 5010b57cec5SDimitry Andric LockSetTy LS = state->get<LockSet>(); 5020b57cec5SDimitry Andric 5030b57cec5SDimitry Andric if (!LS.isEmpty()) { 5040b57cec5SDimitry Andric const MemRegion *firstLockR = LS.getHead(); 5050b57cec5SDimitry Andric if (firstLockR != lockR) { 506e8d8bef9SDimitry Andric reportBug(C, BT_lor, MtxExpr, CheckKind, 507e8d8bef9SDimitry Andric "This was not the most recently acquired lock. Possible lock " 508e8d8bef9SDimitry Andric "order reversal"); 5090b57cec5SDimitry Andric return; 5100b57cec5SDimitry Andric } 5110b57cec5SDimitry Andric // Record that the lock was released. 5120b57cec5SDimitry Andric state = state->set<LockSet>(LS.getTail()); 5130b57cec5SDimitry Andric } 5140b57cec5SDimitry Andric 5150b57cec5SDimitry Andric state = state->set<LockMap>(lockR, LockState::getUnlocked()); 5160b57cec5SDimitry Andric C.addTransition(state); 5170b57cec5SDimitry Andric } 5180b57cec5SDimitry Andric 5195ffd83dbSDimitry Andric void PthreadLockChecker::DestroyPthreadLock(const CallEvent &Call, 5205ffd83dbSDimitry Andric CheckerContext &C, 521e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 522e8d8bef9SDimitry Andric DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), 523e8d8bef9SDimitry Andric PthreadSemantics, CheckKind); 5245ffd83dbSDimitry Andric } 5255ffd83dbSDimitry Andric 5265ffd83dbSDimitry Andric void PthreadLockChecker::DestroyXNULock(const CallEvent &Call, 5275ffd83dbSDimitry Andric CheckerContext &C, 528e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 529e8d8bef9SDimitry Andric DestroyLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), XNUSemantics, 530e8d8bef9SDimitry Andric CheckKind); 5315ffd83dbSDimitry Andric } 5325ffd83dbSDimitry Andric 5335ffd83dbSDimitry Andric void PthreadLockChecker::DestroyLockAux(const CallEvent &Call, 534e8d8bef9SDimitry Andric CheckerContext &C, const Expr *MtxExpr, 535e8d8bef9SDimitry Andric SVal MtxVal, 536e8d8bef9SDimitry Andric enum LockingSemantics Semantics, 537e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 538e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 5395ffd83dbSDimitry Andric return; 5400b57cec5SDimitry Andric 541e8d8bef9SDimitry Andric const MemRegion *LockR = MtxVal.getAsRegion(); 5420b57cec5SDimitry Andric if (!LockR) 5430b57cec5SDimitry Andric return; 5440b57cec5SDimitry Andric 5450b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 5460b57cec5SDimitry Andric 5470b57cec5SDimitry Andric const SymbolRef *sym = State->get<DestroyRetVal>(LockR); 5480b57cec5SDimitry Andric if (sym) 5490b57cec5SDimitry Andric State = resolvePossiblyDestroyedMutex(State, LockR, sym); 5500b57cec5SDimitry Andric 5510b57cec5SDimitry Andric const LockState *LState = State->get<LockMap>(LockR); 5520b57cec5SDimitry Andric // Checking the return value of the destroy method only in the case of 5530b57cec5SDimitry Andric // PthreadSemantics 554e8d8bef9SDimitry Andric if (Semantics == PthreadSemantics) { 5550b57cec5SDimitry Andric if (!LState || LState->isUnlocked()) { 5565ffd83dbSDimitry Andric SymbolRef sym = Call.getReturnValue().getAsSymbol(); 5570b57cec5SDimitry Andric if (!sym) { 5580b57cec5SDimitry Andric State = State->remove<LockMap>(LockR); 5590b57cec5SDimitry Andric C.addTransition(State); 5600b57cec5SDimitry Andric return; 5610b57cec5SDimitry Andric } 5620b57cec5SDimitry Andric State = State->set<DestroyRetVal>(LockR, sym); 5630b57cec5SDimitry Andric if (LState && LState->isUnlocked()) 5640b57cec5SDimitry Andric State = State->set<LockMap>( 5650b57cec5SDimitry Andric LockR, LockState::getUnlockedAndPossiblyDestroyed()); 5660b57cec5SDimitry Andric else 5670b57cec5SDimitry Andric State = State->set<LockMap>( 5680b57cec5SDimitry Andric LockR, LockState::getUntouchedAndPossiblyDestroyed()); 5690b57cec5SDimitry Andric C.addTransition(State); 5700b57cec5SDimitry Andric return; 5710b57cec5SDimitry Andric } 5720b57cec5SDimitry Andric } else { 5730b57cec5SDimitry Andric if (!LState || LState->isUnlocked()) { 5740b57cec5SDimitry Andric State = State->set<LockMap>(LockR, LockState::getDestroyed()); 5750b57cec5SDimitry Andric C.addTransition(State); 5760b57cec5SDimitry Andric return; 5770b57cec5SDimitry Andric } 5780b57cec5SDimitry Andric } 5790b57cec5SDimitry Andric 580e8d8bef9SDimitry Andric StringRef Message = LState->isLocked() 581e8d8bef9SDimitry Andric ? "This lock is still locked" 582e8d8bef9SDimitry Andric : "This lock has already been destroyed"; 5830b57cec5SDimitry Andric 584e8d8bef9SDimitry Andric reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message); 5850b57cec5SDimitry Andric } 5860b57cec5SDimitry Andric 5875ffd83dbSDimitry Andric void PthreadLockChecker::InitAnyLock(const CallEvent &Call, CheckerContext &C, 588e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 589e8d8bef9SDimitry Andric InitLockAux(Call, C, Call.getArgExpr(0), Call.getArgSVal(0), CheckKind); 5905ffd83dbSDimitry Andric } 5915ffd83dbSDimitry Andric 5925ffd83dbSDimitry Andric void PthreadLockChecker::InitLockAux(const CallEvent &Call, CheckerContext &C, 593e8d8bef9SDimitry Andric const Expr *MtxExpr, SVal MtxVal, 594e8d8bef9SDimitry Andric CheckerKind CheckKind) const { 595e8d8bef9SDimitry Andric if (!ChecksEnabled[CheckKind]) 5965ffd83dbSDimitry Andric return; 5970b57cec5SDimitry Andric 598e8d8bef9SDimitry Andric const MemRegion *LockR = MtxVal.getAsRegion(); 5990b57cec5SDimitry Andric if (!LockR) 6000b57cec5SDimitry Andric return; 6010b57cec5SDimitry Andric 6020b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 6030b57cec5SDimitry Andric 6040b57cec5SDimitry Andric const SymbolRef *sym = State->get<DestroyRetVal>(LockR); 6050b57cec5SDimitry Andric if (sym) 6060b57cec5SDimitry Andric State = resolvePossiblyDestroyedMutex(State, LockR, sym); 6070b57cec5SDimitry Andric 6080b57cec5SDimitry Andric const struct LockState *LState = State->get<LockMap>(LockR); 6090b57cec5SDimitry Andric if (!LState || LState->isDestroyed()) { 6100b57cec5SDimitry Andric State = State->set<LockMap>(LockR, LockState::getUnlocked()); 6110b57cec5SDimitry Andric C.addTransition(State); 6120b57cec5SDimitry Andric return; 6130b57cec5SDimitry Andric } 6140b57cec5SDimitry Andric 615e8d8bef9SDimitry Andric StringRef Message = LState->isLocked() 616e8d8bef9SDimitry Andric ? "This lock is still being held" 617e8d8bef9SDimitry Andric : "This lock has already been initialized"; 6180b57cec5SDimitry Andric 619e8d8bef9SDimitry Andric reportBug(C, BT_initlock, MtxExpr, CheckKind, Message); 6200b57cec5SDimitry Andric } 6210b57cec5SDimitry Andric 622e8d8bef9SDimitry Andric void PthreadLockChecker::reportBug(CheckerContext &C, 623e8d8bef9SDimitry Andric std::unique_ptr<BugType> BT[], 624e8d8bef9SDimitry Andric const Expr *MtxExpr, CheckerKind CheckKind, 625e8d8bef9SDimitry Andric StringRef Desc) const { 6260b57cec5SDimitry Andric ExplodedNode *N = C.generateErrorNode(); 6270b57cec5SDimitry Andric if (!N) 6280b57cec5SDimitry Andric return; 629e8d8bef9SDimitry Andric initBugType(CheckKind); 630e8d8bef9SDimitry Andric auto Report = 631e8d8bef9SDimitry Andric std::make_unique<PathSensitiveBugReport>(*BT[CheckKind], Desc, N); 632e8d8bef9SDimitry Andric Report->addRange(MtxExpr->getSourceRange()); 6330b57cec5SDimitry Andric C.emitReport(std::move(Report)); 6340b57cec5SDimitry Andric } 6350b57cec5SDimitry Andric 6360b57cec5SDimitry Andric void PthreadLockChecker::checkDeadSymbols(SymbolReaper &SymReaper, 6370b57cec5SDimitry Andric CheckerContext &C) const { 6380b57cec5SDimitry Andric ProgramStateRef State = C.getState(); 6390b57cec5SDimitry Andric 6405ffd83dbSDimitry Andric for (auto I : State->get<DestroyRetVal>()) { 6415ffd83dbSDimitry Andric // Once the return value symbol dies, no more checks can be performed 6425ffd83dbSDimitry Andric // against it. See if the return value was checked before this point. 6435ffd83dbSDimitry Andric // This would remove the symbol from the map as well. 6445ffd83dbSDimitry Andric if (SymReaper.isDead(I.second)) 6455ffd83dbSDimitry Andric State = resolvePossiblyDestroyedMutex(State, I.first, &I.second); 6460b57cec5SDimitry Andric } 6475ffd83dbSDimitry Andric 6485ffd83dbSDimitry Andric for (auto I : State->get<LockMap>()) { 6495ffd83dbSDimitry Andric // Stop tracking dead mutex regions as well. 650*fe6060f1SDimitry Andric if (!SymReaper.isLiveRegion(I.first)) { 6515ffd83dbSDimitry Andric State = State->remove<LockMap>(I.first); 652*fe6060f1SDimitry Andric State = State->remove<DestroyRetVal>(I.first); 653*fe6060f1SDimitry Andric } 6545ffd83dbSDimitry Andric } 6555ffd83dbSDimitry Andric 6565ffd83dbSDimitry Andric // TODO: We probably need to clean up the lock stack as well. 6575ffd83dbSDimitry Andric // It is tricky though: even if the mutex cannot be unlocked anymore, 6585ffd83dbSDimitry Andric // it can still participate in lock order reversal resolution. 6595ffd83dbSDimitry Andric 6600b57cec5SDimitry Andric C.addTransition(State); 6610b57cec5SDimitry Andric } 6620b57cec5SDimitry Andric 6635ffd83dbSDimitry Andric ProgramStateRef PthreadLockChecker::checkRegionChanges( 6645ffd83dbSDimitry Andric ProgramStateRef State, const InvalidatedSymbols *Symbols, 6655ffd83dbSDimitry Andric ArrayRef<const MemRegion *> ExplicitRegions, 6665ffd83dbSDimitry Andric ArrayRef<const MemRegion *> Regions, const LocationContext *LCtx, 6675ffd83dbSDimitry Andric const CallEvent *Call) const { 6685ffd83dbSDimitry Andric 6695ffd83dbSDimitry Andric bool IsLibraryFunction = false; 6705ffd83dbSDimitry Andric if (Call && Call->isGlobalCFunction()) { 6715ffd83dbSDimitry Andric // Avoid invalidating mutex state when a known supported function is called. 6725ffd83dbSDimitry Andric if (PThreadCallbacks.lookup(*Call) || FuchsiaCallbacks.lookup(*Call) || 6735ffd83dbSDimitry Andric C11Callbacks.lookup(*Call)) 6745ffd83dbSDimitry Andric return State; 6755ffd83dbSDimitry Andric 6765ffd83dbSDimitry Andric if (Call->isInSystemHeader()) 6775ffd83dbSDimitry Andric IsLibraryFunction = true; 6785ffd83dbSDimitry Andric } 6795ffd83dbSDimitry Andric 6805ffd83dbSDimitry Andric for (auto R : Regions) { 6815ffd83dbSDimitry Andric // We assume that system library function wouldn't touch the mutex unless 6825ffd83dbSDimitry Andric // it takes the mutex explicitly as an argument. 6835ffd83dbSDimitry Andric // FIXME: This is a bit quadratic. 6845ffd83dbSDimitry Andric if (IsLibraryFunction && 6855ffd83dbSDimitry Andric std::find(ExplicitRegions.begin(), ExplicitRegions.end(), R) == 6865ffd83dbSDimitry Andric ExplicitRegions.end()) 6875ffd83dbSDimitry Andric continue; 6885ffd83dbSDimitry Andric 6895ffd83dbSDimitry Andric State = State->remove<LockMap>(R); 6905ffd83dbSDimitry Andric State = State->remove<DestroyRetVal>(R); 6915ffd83dbSDimitry Andric 6925ffd83dbSDimitry Andric // TODO: We need to invalidate the lock stack as well. This is tricky 6935ffd83dbSDimitry Andric // to implement correctly and efficiently though, because the effects 6945ffd83dbSDimitry Andric // of mutex escapes on lock order may be fairly varied. 6955ffd83dbSDimitry Andric } 6965ffd83dbSDimitry Andric 6975ffd83dbSDimitry Andric return State; 6985ffd83dbSDimitry Andric } 6995ffd83dbSDimitry Andric 7005ffd83dbSDimitry Andric void ento::registerPthreadLockBase(CheckerManager &mgr) { 7010b57cec5SDimitry Andric mgr.registerChecker<PthreadLockChecker>(); 7020b57cec5SDimitry Andric } 7030b57cec5SDimitry Andric 7045ffd83dbSDimitry Andric bool ento::shouldRegisterPthreadLockBase(const CheckerManager &mgr) { return true; } 7055ffd83dbSDimitry Andric 7065ffd83dbSDimitry Andric #define REGISTER_CHECKER(name) \ 7075ffd83dbSDimitry Andric void ento::register##name(CheckerManager &mgr) { \ 7085ffd83dbSDimitry Andric PthreadLockChecker *checker = mgr.getChecker<PthreadLockChecker>(); \ 7095ffd83dbSDimitry Andric checker->ChecksEnabled[PthreadLockChecker::CK_##name] = true; \ 7105ffd83dbSDimitry Andric checker->CheckNames[PthreadLockChecker::CK_##name] = \ 7115ffd83dbSDimitry Andric mgr.getCurrentCheckerName(); \ 7125ffd83dbSDimitry Andric } \ 7135ffd83dbSDimitry Andric \ 7145ffd83dbSDimitry Andric bool ento::shouldRegister##name(const CheckerManager &mgr) { return true; } 7155ffd83dbSDimitry Andric 7165ffd83dbSDimitry Andric REGISTER_CHECKER(PthreadLockChecker) 7175ffd83dbSDimitry Andric REGISTER_CHECKER(FuchsiaLockChecker) 7185ffd83dbSDimitry Andric REGISTER_CHECKER(C11LockChecker) 719